Subscribe free to our newsletters via your
. Earth Science News .

Commentary: New world disorder
by Arnaud De Borchgrave
Washington (UPI) Jun 26, 2013

disclaimer: image is for illustration purposes only

The United States has spent $1 trillion on homeland defense since the world's worst terrorist attacks 12 years ago killed almost 3,000 peolple. Yet America is now more vulnerable than it was in 2001.

How is this possible?

The answer is a defenseless ether -- or cyberspace. And China is arguably the most aggressive nation in cyberspying. Beijing's global vacuum cleaner has cleaned America's clock, from defense firms to classified research labs to global corporations.

This gigantic operation was brilliantly illustrated by three top experts at a June 3 meeting of the Atlantic Council.

What Edward Snowden, the 30-year-old defector who handled top secret work for Booz Allen under a National Security Agency contract, purloined and made public by leaking it to Britain's liberal The Guardian and The Washington Post newspapers, paled next to China's electronic reach.

U.S. cyberexperts, who have worked in both the public (including top secret) and private sectors, are unanimous: "Advanced Persistent Threats," as China's clean sweep is known, "target every business."

Denials by China's Foreign Affairs Ministry are genuine. They aren't in their country's cyberspying loop. Nor is the U.S. State Department in Washington. But NSA topsiders are in awe over China's all-encompassing cyber intelligence loop.

"Without adequate investigation and without further evidence, accusing China of carrying out cyberattacks against U.S. companies is not only unprofessional but also irresponsible," said China's Foreign Ministry spokesman Hong Lei in an interview with CNBC.

Lei added China is the victim of cyber-theft attacks -- and "it's our duty to stop them anywhere they happen."

So it's a Mexican standoff. And there is no denying China is closing the technological gap with the United States in all key civilian and military research and development areas, from the banal to the most secret.

Beijing's forward planners now have access to company secrets and confidential strategies.

China, argue its many admirers in Western countries, is fearful of its slowest gross domestic product growth for the past 20 years. And its awesome cybertheft effort is the strategy for closing the gap.

Chinese leaders are also fearful of being left behind in the high-tech race that is an endless marathon.

China isn't alone in targeting the United States' vital organs. Other governments, including Russia's, as well as organized crime syndicates, and "hacker collectives," are busy trolling every facet of the U.S. economy.

Companies that get paid to protect corporate secrets are also high on China's list of priorities.

In a report to Congress, the Office of the National Counterintelligence Agency (under the CIA) described China's ether cleaner as "the world's most active and persistent perpetrators of economic espionage."

Not surprisingly, given Snowden's choice of destinations -- Hong Kong, Moscow, and possibly Ecuador (governed by a U.S.-hating president) -- the self-despised American defector only referred to U.S. activities in cyberspace. China's and Russia's cyberespionage was of little concern to him.

Snowden was clearly aided and abetted by WikiLeaks founder Julian Assange, who helped organize his global flight to elude U.S. prosecution.

Assange, cloistered at the Ecuadorian Embassy in London for the past year to evade a British arrest warrant (he's wanted for questioning in Sweden in relation to a sexual assault investigation), acted as Snowden's travel agent as he made his escape through countries where he felt safe (i.e., China and Russia).

Through the embassy's ground floor window, Assange hotly denied that Snowden was a traitor. The respectable synonym for traitor is now "whistleblower."

All the goodwill built up at the recent Sino-U.S. summit by President Barack Obama and Chinese President Xi Jinping seemed to vanish in a few hours as Beijing scuttled any chance of extradition proceedings.

White House spokesman Jay Carney said Obama thinks China pre-empted any chance of laying out the case that would have facilitated extradition.

In reality, Snowden was off to Moscow while Chinese leaders were debating what to do.

Neither Chinese nor Russian authorities made any move to detain him. In Moscow, he didn't leave the duty-free zone of the airport.

China's gigantic effort to raid America's corporate and defense secrets is now moving to the top of the Sino-American dialogue.

In the United States, some geostrategic experts are arguing for nuclear retaliation in response to major cyberattacks. Former counter-terrorism czar Richard Clarke, among other experts, say this should be off the table as it would be "destabilizing, dangerous and inimical to broader U.S. goals."

Clarke was responding to last January's Defense Science Board recommendation for countering "existential cyberattacks." In "The National Interest," rising GOP defense star Elbridge Colby makes the case for DSB.

"The (DSB) Task Force," he writes, "was saying that if an enemy hits us with a cyberattack of a scale comparable to a nuclear blow, we should be ready to retaliate with a nuclear strike. This is in line with longstanding U.S. nuclear doctrine, most recently restated in the 2010 Nuclear Posture Review, that the United States reserves the right to retaliate with nuclear weapons in response to non-nuclear attacks of great severity or danger -- in 'extreme circumstances,' in the Review's apt parlance."

"The U.S. needs deterrence," says Colby, "as we simply can't practically defend against large-scale, sophisticated cyber assaults. A central finding of the Task Force was that 'the full spectrum cyber threat (of a top-tier cyber power)' is of such magnitude and sophistication that it cannot be defended against ... a successful (Department of Defense) cyber strategy must include a deterrence component.'

"In other words," concludes Colby, "a military strategy relying only on defenses against cyberattacks is a recipe for failure."


Related Links
Learn about the Superpowers of the 21st Century at
Learn about nuclear weapons doctrine and defense at

Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks DiggDigg RedditReddit GoogleGoogle

Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News

Philippines, US hold war games near China flashpoint reef
Manila (AFP) June 27, 2013
A US destroyer will join the Philippine Navy's flagship for war games starting Thursday close to a flashpoint area of the South China Sea, adding to tensions with China over rival territorial claims. The exercises are a boost for the Philippines' poorly equipped military as it struggles with perceived rising Chinese aggression, and follows repeated pleas to longtime ally the United States fo ... read more

India chopper crash kills 20 as flood rescue forges on

India rescue chopper crash death toll rises to 20

WIN-T Increment 1 Enables National Guard to Restore Vital Network Communications Following a Disaster

Australia costs from natural disasters to soar: study

Laser guided codes advance single pixel terahertz imaging

New laser shows what substances are made of; could be new eyes for military

Google making videogame console and smart watch: report

Ames Laboratory scientists solve riddle of strangely behaving magnetic material

Sea level along Maryland's shorelines could rise 2 feet by 2050

Migrating animals add new depth to how the ocean "breathes"

El Nino, La Nina unlikely to make an appearance in 2013: WMO

Gulf of Mexico could see record 'dead zone': US

Is Arctic Permafrost the "Sleeping Giant" of Climate Change?

The rhythm of the Arctic summer

Global cooling as significant as global warming

Warm ocean drives most Antarctic ice shelf loss

Comparing genomes of wild and domestic tomato

Dutch government introduces nitrogen-reduction bill for nature areas

Rotation-resistant rootworms owe their success to gut microbes

Pesticides tainting traditional China herbs: Greenpeace

New Jersey may have been hit by a tsunami in mid-June

Calgary woman's drowning brings flood toll to four

Mexico storm upgraded to hurricane: forecasters

India flood rescue ops intensify, up to 1,000 feared dead

Mali coup leader says sorry: military source

New Sudan armed forces chief after rebel attacks

Uganda president's son denies plan to succeed father

Africa juggles East and West, as Obama comes to visit

China to fund search for origins of early humans

The evolution of throwing

Australia, Indonesia to face off over people smuggling

Outside View: Cosby's inciteful insights on Muslims

The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement