Subscribe free to our newsletters via your
. 24/7 Space News .




SUPERPOWERS
Commentary: New world disorder
by Arnaud De Borchgrave
Washington (UPI) Jun 26, 2013


disclaimer: image is for illustration purposes only

The United States has spent $1 trillion on homeland defense since the world's worst terrorist attacks 12 years ago killed almost 3,000 peolple. Yet America is now more vulnerable than it was in 2001.

How is this possible?

The answer is a defenseless ether -- or cyberspace. And China is arguably the most aggressive nation in cyberspying. Beijing's global vacuum cleaner has cleaned America's clock, from defense firms to classified research labs to global corporations.

This gigantic operation was brilliantly illustrated by three top experts at a June 3 meeting of the Atlantic Council.

What Edward Snowden, the 30-year-old defector who handled top secret work for Booz Allen under a National Security Agency contract, purloined and made public by leaking it to Britain's liberal The Guardian and The Washington Post newspapers, paled next to China's electronic reach.

U.S. cyberexperts, who have worked in both the public (including top secret) and private sectors, are unanimous: "Advanced Persistent Threats," as China's clean sweep is known, "target every business."

Denials by China's Foreign Affairs Ministry are genuine. They aren't in their country's cyberspying loop. Nor is the U.S. State Department in Washington. But NSA topsiders are in awe over China's all-encompassing cyber intelligence loop.

"Without adequate investigation and without further evidence, accusing China of carrying out cyberattacks against U.S. companies is not only unprofessional but also irresponsible," said China's Foreign Ministry spokesman Hong Lei in an interview with CNBC.

Lei added China is the victim of cyber-theft attacks -- and "it's our duty to stop them anywhere they happen."

So it's a Mexican standoff. And there is no denying China is closing the technological gap with the United States in all key civilian and military research and development areas, from the banal to the most secret.

Beijing's forward planners now have access to company secrets and confidential strategies.

China, argue its many admirers in Western countries, is fearful of its slowest gross domestic product growth for the past 20 years. And its awesome cybertheft effort is the strategy for closing the gap.

Chinese leaders are also fearful of being left behind in the high-tech race that is an endless marathon.

China isn't alone in targeting the United States' vital organs. Other governments, including Russia's, as well as organized crime syndicates, and "hacker collectives," are busy trolling every facet of the U.S. economy.

Companies that get paid to protect corporate secrets are also high on China's list of priorities.

In a report to Congress, the Office of the National Counterintelligence Agency (under the CIA) described China's ether cleaner as "the world's most active and persistent perpetrators of economic espionage."

Not surprisingly, given Snowden's choice of destinations -- Hong Kong, Moscow, and possibly Ecuador (governed by a U.S.-hating president) -- the self-despised American defector only referred to U.S. activities in cyberspace. China's and Russia's cyberespionage was of little concern to him.

Snowden was clearly aided and abetted by WikiLeaks founder Julian Assange, who helped organize his global flight to elude U.S. prosecution.

Assange, cloistered at the Ecuadorian Embassy in London for the past year to evade a British arrest warrant (he's wanted for questioning in Sweden in relation to a sexual assault investigation), acted as Snowden's travel agent as he made his escape through countries where he felt safe (i.e., China and Russia).

Through the embassy's ground floor window, Assange hotly denied that Snowden was a traitor. The respectable synonym for traitor is now "whistleblower."

All the goodwill built up at the recent Sino-U.S. summit by President Barack Obama and Chinese President Xi Jinping seemed to vanish in a few hours as Beijing scuttled any chance of extradition proceedings.

White House spokesman Jay Carney said Obama thinks China pre-empted any chance of laying out the case that would have facilitated extradition.

In reality, Snowden was off to Moscow while Chinese leaders were debating what to do.

Neither Chinese nor Russian authorities made any move to detain him. In Moscow, he didn't leave the duty-free zone of the airport.

China's gigantic effort to raid America's corporate and defense secrets is now moving to the top of the Sino-American dialogue.

In the United States, some geostrategic experts are arguing for nuclear retaliation in response to major cyberattacks. Former counter-terrorism czar Richard Clarke, among other experts, say this should be off the table as it would be "destabilizing, dangerous and inimical to broader U.S. goals."

Clarke was responding to last January's Defense Science Board recommendation for countering "existential cyberattacks." In "The National Interest," rising GOP defense star Elbridge Colby makes the case for DSB.

"The (DSB) Task Force," he writes, "was saying that if an enemy hits us with a cyberattack of a scale comparable to a nuclear blow, we should be ready to retaliate with a nuclear strike. This is in line with longstanding U.S. nuclear doctrine, most recently restated in the 2010 Nuclear Posture Review, that the United States reserves the right to retaliate with nuclear weapons in response to non-nuclear attacks of great severity or danger -- in 'extreme circumstances,' in the Review's apt parlance."

"The U.S. needs deterrence," says Colby, "as we simply can't practically defend against large-scale, sophisticated cyber assaults. A central finding of the Task Force was that 'the full spectrum cyber threat (of a top-tier cyber power)' is of such magnitude and sophistication that it cannot be defended against ... a successful (Department of Defense) cyber strategy must include a deterrence component.'

"In other words," concludes Colby, "a military strategy relying only on defenses against cyberattacks is a recipe for failure."

.


Related Links
Learn about the Superpowers of the 21st Century at SpaceWar.com
Learn about nuclear weapons doctrine and defense at SpaceWar.com






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








SUPERPOWERS
Philippines, US hold war games near China flashpoint reef
Manila (AFP) June 27, 2013
A US destroyer will join the Philippine Navy's flagship for war games starting Thursday close to a flashpoint area of the South China Sea, adding to tensions with China over rival territorial claims. The exercises are a boost for the Philippines' poorly equipped military as it struggles with perceived rising Chinese aggression, and follows repeated pleas to longtime ally the United States fo ... read more


SUPERPOWERS
Metamorphosis of Moon's Water Ice Explained

Scientists use gravity, topographic data to find unmapped moon craters

Australian team maps Moon's hidden craters

LADEE Arrives at Wallops for Moon Mission

SUPERPOWERS
Mars Rover Opportunity Trekking Toward More Layers

Mars had oxygen-rich atmosphere 4,000 million years ago

Billion-Pixel View of Mars Comes From Curiosity Rover

Study: Mars may have had ancient oxygen-rich atmosphere

SUPERPOWERS
PayPal launches quest for intergalactic currency

NASA Bill Would 'End Reliance on Russia,' Nix Asteroid Capture Project

Britain shut down UFO desk after finding no threat: files

New Zealand emerges as guinea pig for global tech firms

SUPERPOWERS
China calls for international cooperation in manned space program

Shenzhou 10 Returns Safely To Earth

Home of space dreams

China's Shenzhou-10 spacecraft returns to Earth

SUPERPOWERS
Russian cosmonauts conduct space station tasks in spacewalk

Accelerating ISS Science With Upgraded Payload Operations Integration Center

Strange Flames on the ISS

Europe's space truck docks with ISS

SUPERPOWERS
SpaceX Will Launch Turkmenistan Satellite For Thales Alenia Space

New Mexico Space Grant Consortium student experiments blast into space from Spaceport America

Arianespace Soyuz Puts Four O3b Networks' Birds Into Orbit

Four O3b Network birds integrated to Arianespace Soyuz launcher

SUPERPOWERS
Gas-giant exoplanets seen clinging close to their parent stars

First Transiting Planets in a Star Cluster Discovered

Astronomers find three 'super-Earths' in nearby star's habitable zone

Retirement for planet-hunting space probe

SUPERPOWERS
Laser guided codes advance single pixel terahertz imaging

New laser shows what substances are made of; could be new eyes for military

Google making videogame console and smart watch: report

Ames Laboratory scientists solve riddle of strangely behaving magnetic material




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement