END TIME BIBLE PROPHECIES HAPPENING NOW & THE ROAD TO CHRIST (YAHSHUA)
src="http://ra.revolvermaps.com/0/0/1.js?i=0s5awg5quen&m=7&s=320&c=e63100" async="async"></script>
Search
 
 

Display results as :
 


Rechercher Advanced Search

October 2017
SunMonTueWedThuFriSat
1234567
891011121314
15161718192021
22232425262728
293031    

Calendar Calendar

Latest Topice
Latest Topics
Topic
History
Written by
{classical_row.recent_topic_row.L_TITLE}
{ON} {classical_row.recent_topic_row.S_POSTTIME}
{classical_row.recent_topic_row.switch_poster.S_POSTER} {classical_row.recent_topic_row.switch_poster_guest.S_POSTER} {classical_row.recent_topic_row.switch_poster.S_POSTER}

Latest Topice
Latest Topics
Topic
History
Written by
{classical_row.recent_topic_row.L_TITLE}
{ON} {classical_row.recent_topic_row.S_POSTTIME}
{classical_row.recent_topic_row.switch_poster.S_POSTER} {classical_row.recent_topic_row.switch_poster_guest.S_POSTER} {classical_row.recent_topic_row.switch_poster.S_POSTER}

Visitors
Flag Counter

THE CYBER WARS BEGIN: OBAMA SAYS US "MUST RETALIATE"..

View previous topic View next topic Go down

THE CYBER WARS BEGIN: OBAMA SAYS US "MUST RETALIATE"..

Post by Harry on Thu Aug 06, 2015 1:56 pm

The Cyber Wars Begin: Obama Says US "Must Retaliate" Against China For Historic Data Breach

Submitted by Tyler Durden on 08/01/2015 17:15

in
 
On Friday, we highlighted a "secret" NSA map which purports to show every Chinese cyber attack on US targets over the past five years. "The prizes that China pilfered during its ‘intrusions’ included everything from specifications for hybrid cars to formulas for pharmaceutical products to details about U.S. military and civilian air traffic control systems," intelligence sources told NBC, who broke the story. 

The release of the map marked the culmination of a cyber attack propaganda campaign which began with accusations that North Korea had attempted to sabotage Sony, reached peak absurdity when Penn State claimed Chinese spies had taken control of the campus engineering department, and turned serious when Washington blamed China for what was deemed "the largest theft of US government data ever." "Whether all of this is cause for the Pentagon to activate the 'offensive' component of its brand new cyber strategy remains to be seen," we said yesterday.
As it turns out, the Office of Personnel Management breach will indeed be used to justify a cyber "retaliation"against China, because as The New York Times notes, "the hacking attack was so vast in scope and ambition that the usual practices for dealing with traditional espionage cases [do] not apply." Here’s more:


The Obama administration has determined that it must retaliate against China for the theft of the personal information of more than 20 million Americans from the databases of the Office of Personnel Management, but it is still struggling to decide what it can do without prompting an escalating cyberconflict.
 
The decision came after the administration concluded that the hacking attack was so vast in scope and ambition that the usual practices for dealing with traditional espionage cases did not apply.
 
But in a series of classified meetings, officials have struggled to choose among options that range from largely symbolic responses — for example, diplomatic protests or the ouster of known Chinese agents in the United States — to more significant actions that some officials fear could lead to an escalation of the hacking conflict between the two countries.
 
That does not mean a response will happen anytime soon — or be obvious when it does. 
So the US will do something, it just doesn’t yet know what or when or even if anyone will notice, but one thing is clear: "this aggression will not stand, man."
The problem with "symbolic" responses is that they are merely, well, symbolic, and any real retaliation risks escalating the "cyberconflict." Then again, not doing anything also risks prompting an escalation:


But over recent days, both James Clapper Jr., the director of national intelligence, and Adm. Michael S. Rogers, director of the National Security Agency and commander of the military’s Cyber Command, have hinted at the internal debate by noting that unless the United States finds a way to respond to the attacks, they are bound to escalate.
 
Mr. Clapper predicted that the number and sophistication of hacking aimed at the United States would worsen "until such time as we create both the substance and psychology of deterrence."
 
This echoes the rhetoric from the DoD’s "cyber strategy" released in April which says that "deterrence is partially a function of perception [and] works by convincing a potential adversary that it will suffer unacceptable costs if it conducts an attack on the United States." 
For now at least, it looks like criminal charges are off the table. 


The Justice Department is exploring legal action against Chinese individuals and organizations believed responsible for the personnel office theft, much as it did last summer when five officers of the People’s Liberation Army, part of the Chinese military, were indicted on a charge of the theft of intellectual property from American companies. While Justice officials say that earlier action was a breakthrough, others characterize the punishment as only symbolic: Unless they visit the United States or a friendly nation, none of them are likely to ever see the inside of an American courtroom.
 
"Criminal charges appear to be unlikely in the case of the O.P.M. breach," a study of the Office of Personnel Management breach published by the Congressional Research Service two weeks ago concluded. "As a matter of policy, the United States has sought to distinguish between cyber intrusions to collect data for national security purposes — to which the United States deems counterintelligence to be an appropriate response — and cyber intrusions to steal data for commercial purposes, to which the United States deems a criminal justice response to be appropriate."
Instead, the US may look to remove the so called "great firewall" which Beijing uses to censor content it considers to be subversive or otherwise objectionable.


One of the most innovative actions discussed inside the intelligence agencies, according to two officials familiar with the debate, involves finding a way to breach the so-called great firewall, the complex network of censorship and control that the Chinese government keeps in place to suppress dissent inside the country. The idea would be to demonstrate to the Chinese leadership that the one thing they value most — keeping absolute control over the country’s political dialogue — could be at risk if they do not moderate attacks on the United States.
So perhaps there's a silver lining in all of this: China's 650 million internet users may, if only for a split second, be free to surf the web without the Politburo filter.
Of course if the US really wanted to do some cyber damage, the Pentagon could hack into China's National Bureau of Statistics and see what the country's real GDP figure looks like, and if that doesn't teach them a lesson, maybe the best option would be to breach China Securities Finance Corporation and hit the "sell" button. 
Finally, for those interested to monitor the global cyber war in real time, you can do so via Norsecorp by clicking on the following map.

Harry
Admin
Admin

Posts : 20617
Points : 62032
Join date : 2015-05-02
Age : 89
Location : United States

View user profile

Back to top Go down

View previous topic View next topic Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum