Ultima Thule

In ancient times the northernmost region of the habitable world - hence, any distant, unknown or mysterious land.

Friday, July 29, 2005

The Approaching Chinese Cyber Storm

By Aussiegirl

The Approaching Chinese Cyber Storm by Frederick W. Stakelbeck

Finding any funny characters on your PC lately? Might be the Chicoms messing with your computer. Makes bombs look like child's play. Something else to worry about.

On numerous occasions in the past, China’s authoritarian regime has publicly stated that the U.S. is its ideological enemy. Comments made by Chinese defector Chen Yonglin to Australian authorities in June support the theory that China’s leaders view the U.S. as their main adversary. “The U.S. is considered by the Chinese Communist Party as the largest enemy, the major strategic rival. The U.S. occupies a unique place in China’s diplomacy,” noted Yonglin.

With inflammatory statements like those noted by Chen Yonglin, it is easy to understand why national security questions still resonate in Washington from the December purchase of IBM’s PC division by China’s largest computer company Lenovo. Although eventually approved by the Committee on Foreign Investments in the United States (CFIUS), critical questions concerning the ultimate use of the company’s state-of-the-art computers as they relate to state-sponsored cyber crime and hacking attacks, still remain largely unanswered.

Specifically, could Lenovo computers or other domestic computers be used by Beijing to initiate a coordinated cyber attack against the U.S. to fracture the stability of global financial markets, interrupt international communications, damage interconnected security networks and harm the overall effectiveness and rapid response capabilities of the U.S. military?

If history is any indication, the possibility of such an attack is authentic and should be given serious attention.

Washington should be deeply concerned about the growing possibility of a massive, state-sponsored cyber attack against U.S. interests originating from mainland China – however, the opposite seems to be true. Surprisingly, there seems to be a dangerous lack of leadership, information sharing, structural flexibility and vision in the area of cyber security. “They are ignoring cyber security and it poses an enormous vulnerability,” said Edward Lazowska, professor of computer science and engineering at the University of Washington.

2 Comments:

At 9:02 AM, Blogger Billy D said...

As usual, we will not pay it nearly enough attention until zero hour, and then we'll form various blue ribbon commissions and panels to investigate who dropped the ball, and level accusations at each other while the perpetraitors sit back and laugh at us.

 
At 5:30 PM, Blogger Timothy Birdnow said...

Another great post, Aussie!

I would like to write something about the Chinese situation, but you are so far ahead of me that I don`t see any reason to bother!

I`m going to link up all of your recent stuff in one post as a resource for everybody, if you ever take a breather!

The situation with China is serious, and, like Billy d said, we will wait until it`s too late to take it seriously. I remember when the Soviet Union collapsed everyone was declaring victory. I was amazed; it was analogous to our proclaiming victory on VE Day; we still had the harder battle to fight. We have done everything possible to pretend that China is not a threat, because no-one wants to fight that battle. The fact that we can`t see the tornado coming doesn`t mean it`s not there! We have got to get our heads out of the (Arabian) sand and face the unpleasant truth.

 

Post a Comment

<< Home