Free Newsletters - Space News - Defense Alert - Environment Report - Energy Monitor
. Military Space News .




SUPERPOWERS
Commentary: New world disorder
by Arnaud De Borchgrave
Washington (UPI) Jun 26, 2013


disclaimer: image is for illustration purposes only

The United States has spent $1 trillion on homeland defense since the world's worst terrorist attacks 12 years ago killed almost 3,000 peolple. Yet America is now more vulnerable than it was in 2001.

How is this possible?

The answer is a defenseless ether -- or cyberspace. And China is arguably the most aggressive nation in cyberspying. Beijing's global vacuum cleaner has cleaned America's clock, from defense firms to classified research labs to global corporations.

This gigantic operation was brilliantly illustrated by three top experts at a June 3 meeting of the Atlantic Council.

What Edward Snowden, the 30-year-old defector who handled top secret work for Booz Allen under a National Security Agency contract, purloined and made public by leaking it to Britain's liberal The Guardian and The Washington Post newspapers, paled next to China's electronic reach.

U.S. cyberexperts, who have worked in both the public (including top secret) and private sectors, are unanimous: "Advanced Persistent Threats," as China's clean sweep is known, "target every business."

Denials by China's Foreign Affairs Ministry are genuine. They aren't in their country's cyberspying loop. Nor is the U.S. State Department in Washington. But NSA topsiders are in awe over China's all-encompassing cyber intelligence loop.

"Without adequate investigation and without further evidence, accusing China of carrying out cyberattacks against U.S. companies is not only unprofessional but also irresponsible," said China's Foreign Ministry spokesman Hong Lei in an interview with CNBC.

Lei added China is the victim of cyber-theft attacks -- and "it's our duty to stop them anywhere they happen."

So it's a Mexican standoff. And there is no denying China is closing the technological gap with the United States in all key civilian and military research and development areas, from the banal to the most secret.

Beijing's forward planners now have access to company secrets and confidential strategies.

China, argue its many admirers in Western countries, is fearful of its slowest gross domestic product growth for the past 20 years. And its awesome cybertheft effort is the strategy for closing the gap.

Chinese leaders are also fearful of being left behind in the high-tech race that is an endless marathon.

China isn't alone in targeting the United States' vital organs. Other governments, including Russia's, as well as organized crime syndicates, and "hacker collectives," are busy trolling every facet of the U.S. economy.

Companies that get paid to protect corporate secrets are also high on China's list of priorities.

In a report to Congress, the Office of the National Counterintelligence Agency (under the CIA) described China's ether cleaner as "the world's most active and persistent perpetrators of economic espionage."

Not surprisingly, given Snowden's choice of destinations -- Hong Kong, Moscow, and possibly Ecuador (governed by a U.S.-hating president) -- the self-despised American defector only referred to U.S. activities in cyberspace. China's and Russia's cyberespionage was of little concern to him.

Snowden was clearly aided and abetted by WikiLeaks founder Julian Assange, who helped organize his global flight to elude U.S. prosecution.

Assange, cloistered at the Ecuadorian Embassy in London for the past year to evade a British arrest warrant (he's wanted for questioning in Sweden in relation to a sexual assault investigation), acted as Snowden's travel agent as he made his escape through countries where he felt safe (i.e., China and Russia).

Through the embassy's ground floor window, Assange hotly denied that Snowden was a traitor. The respectable synonym for traitor is now "whistleblower."

All the goodwill built up at the recent Sino-U.S. summit by President Barack Obama and Chinese President Xi Jinping seemed to vanish in a few hours as Beijing scuttled any chance of extradition proceedings.

White House spokesman Jay Carney said Obama thinks China pre-empted any chance of laying out the case that would have facilitated extradition.

In reality, Snowden was off to Moscow while Chinese leaders were debating what to do.

Neither Chinese nor Russian authorities made any move to detain him. In Moscow, he didn't leave the duty-free zone of the airport.

China's gigantic effort to raid America's corporate and defense secrets is now moving to the top of the Sino-American dialogue.

In the United States, some geostrategic experts are arguing for nuclear retaliation in response to major cyberattacks. Former counter-terrorism czar Richard Clarke, among other experts, say this should be off the table as it would be "destabilizing, dangerous and inimical to broader U.S. goals."

Clarke was responding to last January's Defense Science Board recommendation for countering "existential cyberattacks." In "The National Interest," rising GOP defense star Elbridge Colby makes the case for DSB.

"The (DSB) Task Force," he writes, "was saying that if an enemy hits us with a cyberattack of a scale comparable to a nuclear blow, we should be ready to retaliate with a nuclear strike. This is in line with longstanding U.S. nuclear doctrine, most recently restated in the 2010 Nuclear Posture Review, that the United States reserves the right to retaliate with nuclear weapons in response to non-nuclear attacks of great severity or danger -- in 'extreme circumstances,' in the Review's apt parlance."

"The U.S. needs deterrence," says Colby, "as we simply can't practically defend against large-scale, sophisticated cyber assaults. A central finding of the Task Force was that 'the full spectrum cyber threat (of a top-tier cyber power)' is of such magnitude and sophistication that it cannot be defended against ... a successful (Department of Defense) cyber strategy must include a deterrence component.'

"In other words," concludes Colby, "a military strategy relying only on defenses against cyberattacks is a recipe for failure."

.


Related Links
Learn about the Superpowers of the 21st Century at SpaceWar.com
Learn about nuclear weapons doctrine and defense at SpaceWar.com






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle




Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News





SUPERPOWERS
Philippines, US hold war games near China flashpoint reef
Manila (AFP) June 27, 2013
A US destroyer will join the Philippine Navy's flagship for war games starting Thursday close to a flashpoint area of the South China Sea, adding to tensions with China over rival territorial claims. The exercises are a boost for the Philippines' poorly equipped military as it struggles with perceived rising Chinese aggression, and follows repeated pleas to longtime ally the United States fo ... read more


SUPERPOWERS
Raytheon awarded contract to keep Patriot capabilities ahead of evolving threats

Israel fast-tracks Arrow 3 over Iran nuclear fears

US Missile Shield Threatens Balance in Asia-Pacific Region

US to send Patriot missiles, F-16s to Jordan for drill

SUPERPOWERS
Raytheon delivers first NASAMS High Mobility Launcher to Norway

BAE tests cost-saving multiservice guided projectile

U.S. seeks to buy into Israeli missile programs

Enhanced Paveway II provides improved capability, performance

SUPERPOWERS
UAV interest grows in Middle East, but suppliers few

Researchers Use Video Game Tech to Steer Roaches on Autopilot

A new trophallactic strategy for multiple unmanned aerial vehicles flying in formation

Raytheon delivers mini transponders for Identification Friend or Foe on Korean Air UAV

SUPERPOWERS
USAF Awards Lockheed Martin Contract for IT and Telecommunications Services

Northrop Grumman Provides Fuel Quantity Indicator For E-3D AWACS

Canada Makes First Call On AEHF

Mutualink Deploys Full Range of Communications Capabilities

SUPERPOWERS
Hints of 'messy quagmire' over Israeli arms sales

Kalashnikov to be airlifted to Moscow in new health scare

Germany orders Eagle V vehicles

MEADS Tactical BMC4I Software Demonstrates Interoperability in NATO Exercises

SUPERPOWERS
Lakota sale to Thailand gets green light

German cabinet approves 2013, 2014 budget plans

Obama renominates general Dempsey as military chief

Asia Pacific defence budgets 'to outstrip N. America by 2021'

SUPERPOWERS
Commentary: New world disorder

Philippines, US hold war games near China flashpoint reef

Outside View: Too many archdukes, too many bullets

Colombia signs deal with NATO in Latin America first

SUPERPOWERS
Nanotechnology holds big potential for NMSU faculty

Sound waves precisely position nanowires

Nanoparticle Opens the Door to Clean-Energy Alternatives

Spot-welding graphene nanoribbons atom by atom




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement