Thief crying 'Stop thief'

By Zhao Jinglun
0 Comment(s)Print E-mail China.org.cn, February 23, 2013
Adjust font size:

Barely a week after President Barack Obama announced in his State of the Union message that he had signed an executive order to "strengthen our cyber defenses," Washington accused Beijing of hacking into the computers of American companies and other organizations, and even pin pointed to a Shanghai building that houses PLA Unit 61398 as the source of cyber attack.

The accusation was solely based on a report by a private cyber security firm Mandiant that offered the flimsiest "evidence." For instance, it claimed that the intruder used a Shanghai phone number to register an e-mail account. But that proves absolutely nothing. So are all the other evidence offered by Mandiant.

Analysts point out that "cyber-security" is not a science, but an industry: That is, the entities issuing alarming reports of those lurking threats are for profit mainly if not exclusively concerned with selling a product. So Mandiant is talking with the New York Times, a self-proclaimed victim, for a contract to protect the latter's computers.

As Jeffrey Carr, founder of a cyber security firm and author of Inside Cyber Warfare, points out: "It's good business to blame China. I know from experience that many corporations, government and DOD organizations are more eager to buy cyber threat data that claims to focus on the PRC than any other nation state. When the cyber security industry issues PRC-centric reports like this one without performing any alternative analysis of the collected data, and when the readership of these reports are government and corporate officials without the depth of knowledge to critically analyze what they're reading,…we wind up being in the position that we're in today—easily fooled into looking in one direction when we have an entire threat landscape left unattended."

More than thirty nations are currently running "military-grade operations," as Carr noted. And there are non-state actors such as criminal gangs that also launch cyber attacks. And the U.S. chose to pick on China.

Both the PLA and China's Foreign Ministry have denied the accusation and stated that in fact China has been the victim of cyber attacks, and most of the attacks originated in the United States. According to Qian Xiaoqian, vice minister of the State Council Information Office, 4.5 million PCs in the country had been attacked by Trojan viruses from IPs abroad in 2010, an increase of more than sixteen times from 2009. China opposes any kind of hacker attacks and cyberspace armament race. During the fifth U.S.-China Internet Industry Forum in Washington on December 7 and 8, 2011, China proposed an opposition to any internet war or cyber armament race.

The U.S. is the only country that has a Cyber Command led by Gen. Keith Alexander. U.S. Department of Defense is reportedly to have been busily revamping its current cyber-warfare capabilities and steadily building up its cadre of cyber warriors. Defense Secretary Leon Panetta himself acknowledged U.S. has the capacity to wage offensive cyber warfare.

According to Time Magazine, U.S. officials don't like to acknowledge that the Pentagon is hard at work developing an offensive cyber capability. In fact it has begun using that capability to wage war. Beyond shutting down enemy systems, the U.S. military is crafting a witch's brew of stealth, manipulation and falsehoods designed to lure the enemy into believing he is in charge of his forces when in fact they have been secretly enlisted as allies of the U.S. military.

Time says the U.S. Air Force wants the ability to burrow into any computer system anywhere in the world. And the U.S. cyber warriors' goal is to "complete functional capabilities" of an enemy's computer network – from U.S. military keyboards. The magazine quotes William Owens, a retired admiral and cyber expert, "I have no doubt we're doing some very profoundly sophisticated thing on the attack side."

So the thief needs to cry "Stop thief!" so as to divert attention away from its own cyber war ambitions.

The author is a columnist with China.org.cn. For more information please visit: http://www.ccgp-fushun.com/opinion/zhaojinglun.htm

Opinion articles reflect the views of their authors, not necessarily those of China.org.cn

Print E-mail Bookmark and Share

Go to Forum >>0 Comment(s)

No comments.

Add your comments...

  • User Name Required
  • Your Comment
  • Enter the words you see:   
    Racist, abusive and off-topic comments may be removed by the moderator.
Send your storiesGet more from China.org.cnMobileRSSNewsletter
主站蜘蛛池模板: 女人扒开下面让男人桶爽视频| 韩国三级大全久久电影| 少妇人妻无码精品视频| 久久亚洲精品国产精品黑人| 神马老子不卡视频在线| 国产丰满肥熟在线观看| 97热久久免费频精品99| 干妞网免费视频| 中日韩欧美经典电影大全免费看| 激情成人综合网| 国产乱人伦偷精品视频下| 激情三级hd中文字幕| 国产精品第12页| 99re在线视频观看| 天天影视综合网| 一区二区精品视频| 日韩欧美色视频在线观看| 人人妻人人爽人人澡欧美一区| 高清国产精品久久| 欧美午夜春性猛交xxxx| 午夜网站免费版在线观看| **性色生活片毛片| 在线观看一级毛片| chinese乱子伦xxxx国语对白| 日本精品a在线| 亚洲AV无码一区二区三区在线| 欧美成人精品三级网站| 亚洲精品在线免费观看| 狠狠色综合久久婷婷| 国产一区二区三区免费在线视频| 99久热任我爽精品视频| 国产激情精品一区二区三区| a毛片免费全部在线播放**| 婷婷开心深爱五月天播播| 东京加勒比中文字幕波多野结衣| 成年网址网站在线观看| 中文字幕日韩欧美一区二区三区| 无翼乌全彩里番蛇姬本子| 亚洲中文字幕久久无码| 欧美性极品hd高清视频| 亚洲最大激情网|