When Do We Attack China?

This is a pretty bold threat, seeing as how the United States’ government, infrastructure, corporations, and individuals are being seriously cyberattacked ever second of every day.

Cyber Combat: Act of War

The Pentagon has concluded that computer sabotage coming from another country can constitute an act of war, a finding that for the first time opens the door for the U.S. to respond using traditional military force.

The Pentagon’s first formal cyber strategy, unclassified portions of which are expected to become public next month, represents an early attempt to grapple with a changing world in which a hacker could pose as significant a threat to U.S. nuclear reactors, subways or pipelines as a hostile country’s military.

In part, the Pentagon intends its plan as a warning to potential adversaries of the consequences of attacking the U.S. in this way. “If you shut down our power grid, maybe we will put a missile down one of your smokestacks,” said a military official.

See also:
Pentagon warns that cyber-attacks will be seen as ‘acts of war’
US Pentagon to treat cyber-attacks as ‘acts of war’
‘Cyber attacks are an act of war’: Pentagon to announce new rules of engagement against state sponsored hackers
US could respond to cyber-attack with conventional weapons
U.S. Government Says Cyber Attacks May Be Acts of War
Pentagon: Computer hacking can constitute an act of war
U.S. will treat cyber-attacks as act of war
Get Your Cyber War On
Acts of War in the Computer Age
The cyber arms race
Matt Gurney: U.S. military says a cyber attack means war. But with who?
The Pentagon Is Confused About How to Fight a Cyber War

So, with all the thousands of state sponsored cyberattacks unfolding 24/7/365, who are we going to attack first, China, Russia? There’s plenty of the usual suspects probing the United States’ cyberdefenses constantly, it’s hard to choose just one culprit. And what if we get the source of a cyberattack wrong? The exact origin of most of these exploits is extremely difficult to pin down. What if we mistakenly launch a missile strike on China for hacking damage that was actually caused by the Russian Mafia, how cool would that be? Probably not very cool at all.

/and, of course, when we announce a brinkmanship policy like this, and then immediately fail to back up our words with deeds, it become much more than just a joke, it manifests a profound, telltale show of national weakness

The Path To Prosperity

Adult swim, Democrats out of the pool!

Republicans embrace Rep. Ryan’s government budget plan for 2012

House Republicans announced a far-reaching vision for a leaner federal government on Tuesday, presenting a 2012 budget blueprint that would privatize Medicare for future retirees, cut spending on Medicaid and other domestic programs, and offer sharply lower tax rates to corporations and the wealthy.

The proposal represents the most comprehensive philosophical statement by resurgent Republicans since they claimed control of the House in last fall’s midterm elections. It promises to define the party heading into the 2012 presidential election and to shape the policy debate in Washington as both parties grapple with a soaring national debt.

Drafted by House Budget Chairman Paul Ryan (R-Wis.), the proposal aims to eventually shrink federal spending, measured against the economy, to its lowest level since 1949. Ryan said the plan would create jobs, promote growth, and rebuild an economy ravaged by recession and “relentless government spending, taxing and borrowing.”

Read the budget proposal:

The Path to Prosperity

See also:
House Republicans unveil ‘Path to Prosperity’ budget cuts
U.S. Republicans present budget plan with massive cuts
Proposal Transforms Role of Government
The CBO scores Paul Ryan
The Ryan Resolution
GOP budget proposal would cut feds, extend pay freeze
Ryan Rides To The Rescue With Realistic Budget Plan
Editorial: Ryan’s Budget Plan Gets The Job Done
The GOP Path to Prosperity

Right on cue, the Democrats are already squealing like stuck pigs being electrocuted in an acid bath. Children will die, senior citizens will be forced to eat cat food! Brace yourself, because the cynical and deceitful doomsday din will only get louder. Gird yourself for the 2012 elections, Republicans need to oust Obama, take the Senate, and hold the House in order to wrangle this country back onto the road to fiscal sanity. The Democrats’ irresponsible and ruinous spending gravy train must be brought to an end, the status quo is unsustainable and not an option. Vote Republican to save this country’s future from the economic abyss.

/the Path to Prosperity won’t be painless, but it has to be taken, the other road leads the United States down the third world drain

The Cyberwar Rages 24/7

Corporations’ cyber security under widespread attack, survey finds

Around the world, corporations’ computer networks and control systems are under “repeated cyberattack, often from high-level adversaries like foreign nation-states,” according to a new global survey of information technology executives.

The attacks include run-of-the-mill viruses and other “malware” that routinely strike corporate defenses, but also actions by “high-level” adversaries such as “organized crime, terrorists, or nation states,” a first-time global survey by the Center for Strategic and International Studies (CSIS) in Washington has found. More than half of the 600 IT managers surveyed, who operate critical infrastructure in 14 countries, reported that their systems have been hit by such “high-level” attacks, the survey concludes.

A large majority, 59 percent, said they believed that foreign governments or their affiliates had already been involved in such attacks or in efforts to infiltrate important infrastructure – such as refineries, electric utilities, and banks – in their countries.

Such attacks, the survey said, include sophisticated denial-of-service attacks, in which an attacker tries to so overwhelm a corporate network with requests that the network grinds to a halt.

But they also include efforts to infiltrate a company. Fifty-four percent of the IT executives said their companies’ networks had been targets of stealth attacks in which infiltration was the intent. In two-thirds of those cases, the IT managers surveyed said company operations had been harmed.

The IT managers also believed that these “stealthy” attacks were conducted by “nation states” targeting their proprietary data, says the survey’s main author, CSIS fellow Stewart Baker, in a phone interview. Mr. Baker is a cybersecurity expert formerly with the Department of Homeland Security and National Security Agency.

“It’s all the same kind of stuff – spear-phishing, malware, taking over the network and downloading-whatever-you-want kind of attack,” he says. “Over half of these executives believe they’ve been attacked with the kind of sophistication you’d expect from a nation state.”

The CSIS report describes such attacks as “stealthy infiltration” of a company’s networks by “a high-level adversary” akin to a “GhostNet,” or large spy ring featuring “individualized malware attacks that enabled hackers to infiltrate, control and download large amounts of data from computer networks.” The GhostNet attacks, which Canadian researchers attributed to Chinese state-run agencies, bear similarities to recent attacks on Google and other high-tech companies, Baker says. Google attributed attacks on it to entities in China.

Read the report:
In the Crossfire: Critical Infrastructure in the Age of Cyber War

See also:
In the Crossfire: Critical Infrastructure in the Age of Cyber War
Report: Critical Infrastructures Under Constant Cyberattack Globally
Utilities, Refineries and Banks Are Victims of Cyber Attacks, Report Says
Critical Infrastructure under Siege from Cyber Attacks
Critical Infrastructure Vulnerable To Attack
Critical Infrastructure Security a Mixed Bag, Report Finds
Report shows cyberattacks rampant; execs concerned
Key infrastructure often cyberattack target: survey
Critical infrastructure execs fear China
SCADA system, critical infrastructure security lacking, survey finds

Ironically, the more dependent we become on interconnected network technology, the more vulnerable we become too.

/so keep your fingers crossed and your computers patched against hacking and intrusion, at least you can do your part to avoid being part of the problem