Thief crying 'Stop thief'

By Zhao Jinglun
0 Comment(s)Print E-mail China.org.cn, February 23, 2013
Adjust font size:

Barely a week after President Barack Obama announced in his State of the Union message that he had signed an executive order to "strengthen our cyber defenses," Washington accused Beijing of hacking into the computers of American companies and other organizations, and even pin pointed to a Shanghai building that houses PLA Unit 61398 as the source of cyber attack.

The accusation was solely based on a report by a private cyber security firm Mandiant that offered the flimsiest "evidence." For instance, it claimed that the intruder used a Shanghai phone number to register an e-mail account. But that proves absolutely nothing. So are all the other evidence offered by Mandiant.

Analysts point out that "cyber-security" is not a science, but an industry: That is, the entities issuing alarming reports of those lurking threats are for profit mainly if not exclusively concerned with selling a product. So Mandiant is talking with the New York Times, a self-proclaimed victim, for a contract to protect the latter's computers.

As Jeffrey Carr, founder of a cyber security firm and author of Inside Cyber Warfare, points out: "It's good business to blame China. I know from experience that many corporations, government and DOD organizations are more eager to buy cyber threat data that claims to focus on the PRC than any other nation state. When the cyber security industry issues PRC-centric reports like this one without performing any alternative analysis of the collected data, and when the readership of these reports are government and corporate officials without the depth of knowledge to critically analyze what they're reading,…we wind up being in the position that we're in today—easily fooled into looking in one direction when we have an entire threat landscape left unattended."

More than thirty nations are currently running "military-grade operations," as Carr noted. And there are non-state actors such as criminal gangs that also launch cyber attacks. And the U.S. chose to pick on China.

Both the PLA and China's Foreign Ministry have denied the accusation and stated that in fact China has been the victim of cyber attacks, and most of the attacks originated in the United States. According to Qian Xiaoqian, vice minister of the State Council Information Office, 4.5 million PCs in the country had been attacked by Trojan viruses from IPs abroad in 2010, an increase of more than sixteen times from 2009. China opposes any kind of hacker attacks and cyberspace armament race. During the fifth U.S.-China Internet Industry Forum in Washington on December 7 and 8, 2011, China proposed an opposition to any internet war or cyber armament race.

The U.S. is the only country that has a Cyber Command led by Gen. Keith Alexander. U.S. Department of Defense is reportedly to have been busily revamping its current cyber-warfare capabilities and steadily building up its cadre of cyber warriors. Defense Secretary Leon Panetta himself acknowledged U.S. has the capacity to wage offensive cyber warfare.

According to Time Magazine, U.S. officials don't like to acknowledge that the Pentagon is hard at work developing an offensive cyber capability. In fact it has begun using that capability to wage war. Beyond shutting down enemy systems, the U.S. military is crafting a witch's brew of stealth, manipulation and falsehoods designed to lure the enemy into believing he is in charge of his forces when in fact they have been secretly enlisted as allies of the U.S. military.

Time says the U.S. Air Force wants the ability to burrow into any computer system anywhere in the world. And the U.S. cyber warriors' goal is to "complete functional capabilities" of an enemy's computer network – from U.S. military keyboards. The magazine quotes William Owens, a retired admiral and cyber expert, "I have no doubt we're doing some very profoundly sophisticated thing on the attack side."

So the thief needs to cry "Stop thief!" so as to divert attention away from its own cyber war ambitions.

The author is a columnist with China.org.cn. For more information please visit: http://www.ccgp-fushun.com/opinion/zhaojinglun.htm

Opinion articles reflect the views of their authors, not necessarily those of China.org.cn

Print E-mail Bookmark and Share

Go to Forum >>0 Comment(s)

No comments.

Add your comments...

  • User Name Required
  • Your Comment
  • Enter the words you see:   
    Racist, abusive and off-topic comments may be removed by the moderator.
Send your storiesGet more from China.org.cnMobileRSSNewsletter
主站蜘蛛池模板: 一区二区视频在线观看| 久久精品国产99国产精品亚洲 | 青柠直播视频在线观看网| 国产精品无码免费播放| caopon国产在线视频| 性欧美激情videos| 久久久久久久99视频| 日韩美女视频网站| 亚洲人在线视频| 毛茸茸性XXXX毛茸茸毛茸茸| 免费国产黄网站在线观看视频| 色135综合网| 国产乱子伦视频在线观看| 91精品欧美产品免费观看| 国产福利在线观看一区二区| 777奇米影视网| 在线免费视频你懂的| h视频免费观看| 女邻居掀开短裙让我挺进| 一级特黄录像在线观看| 成人毛片18女人毛片免费| 中文无码字幕中文有码字幕| 日本动态图免费观看| 久久精品国产网红主播| 最近最新中文字幕2018 | 国产精品无码翘臀在线观看| 99aiav国产精品视频| 夜色www国产精品资源站| mm1313亚洲精品国产| 好硬好大好爽18漫画| 一本大道无码日韩精品影视_| 成人欧美一区二区三区黑人| 中文字幕无码av激情不卡| 日批视频app| 久久99热成人精品国产| 无码专区人妻系列日韩精品| 久久久久国产精品免费网站| 日本高清视频网址| 久久人人爽人人爽人人片dvd| 日韩a无吗一区二区三区| 久久精品人人爽人人爽|