creators.com opinion web
Liberal Opinion Conservative Opinion
Austin Bay
Austin Bay
26 Nov 2014
As The World Burns, Obama Fires Hagel

President Barack Obama has fired Secretary of Defense Chuck Hagel. The Beltway clerks and pundits tell us … Read More.

19 Nov 2014
Sherman's March to the Sea: Total Impact Warfare

One hundred fifty years ago this month, General William Tecumseh Sherman's Union "Army of the West" marched … Read More.

12 Nov 2014
Mexico's Iguala Massacre: Criminal Gangs and Criminal Government

Gang and government lawlessness plague Mexico. On Sept. 26, a violent gang and a criminal government combined … Read More.

Cyber-Vulnerabilities: American Grid, Chinese Grip

Comment

The U.S. fears for its grid; China's communist government worries about its grip.

That is the strategic insight gleaned from the fracas over Chinese engineering student Wang Jianwei's article titled "Cascade-Based Attack Vulnerability on the U.S. Power Grid."

Wang's study appeared last year in the Safety Science journal and has been online since spring 2009. Its abstract's first sentence reads: "The vulnerability of real-life networks subject to intentional attacks has been one of the outstanding challenges in the study of the network safety."

Wang, a student at China's elite Dalian University of Technology, addressed known power-grid weaknesses and ways to attack them. Wang claims he wants to reduce grid vulnerabilities and the published paper is an alert.

Several U.S. defense analysts who read the paper, among them Larry Wortzel, were not so sanguine. In testimony on March 10 to the House Foreign Affairs Committee, Wortzel mentioned Wang's paper in passing, but suggested it served as a template for an attack on the entire U.S. power grid.

U.S. media sensationalists presented Wortzel as a fretful alarmist. Context matters — computers controlling power grid operations have been attacked by hackers. Wortzel is a retired U.S. Army colonel, an intelligence officer and a specialist in Chinese affairs, and served as U.S. military attache in China. Wang sees his job as demonstrating grid vulnerabilities; Wortzel is in the business of assessing political, economic and military threats, capabilities and intentions.

Wortzel's entire testimony, however, provided extensive background on U.S. cyber-defense concerns regarding China. After discussing China's high-profile cyber-intrusions on Google's gmail accounts and attempts to steal Google source code, Wortzel identified three types of "malicious Chinese computer network operations": (1) operations that solidify "political and economic control in China"; (2) spy ops gathering "economic, military or technology intelligence" data; (3) cyber reconnaissance of "U.S. military, government, civil infrastructure or corporate networks for later exploitation or attack."

Conceding he could not prove his assessments "beyond a reasonable doubt in a court of law," he said he believed "such persistent, systematic and sophisticated attacks ...

most likely are state-directed." He noted that Chinese dissident organizations like Falun Gong have been "singled out by the Chinese Communist Party leadership for suppression. It is the organs of control and repression in China that need the type of information that was extracted from Google and who most profit from such penetrations."

Which leads to China's cyber-struggles. Beijing complains that the U.S. has extraordinary cyber-warfare capabilities, and it does. China's worries, however, go well beyond protecting military secrets and electrical grids: FREE information, disseminated by unfettered digital media on the Internet, threatens political control by communist elites.

China may have weathered the global recession, but if it has, Beijing regards its success as tentative, for even slow economic growth threatens the communist elites' deal with the Chinese people: We will let you get wealthy, just don't question the political structure. Beijing knows this.

Fear of losing its grip on dissidents during a period of economic stress played a role in China's January cyber-attack on Google's email service for Chinese clients. Google began Chinese operations in 2006 and admits it censored Chinese Internet search results. What an ugly side-story: A liberal California company that makes billions of dollars in the digital free information regimen (that ultimately owes its existence to the U.S. Constitution's First Amendment) acceded to the censorship demands of authoritarians. At least Google now says no more.

This week, Google left China for Hong Kong. But isn't Hong Kong in China? At the moment, Beijing still respects its "One China, Two Systems." Hong Kong makes money — its Basic Law, which protects free information, is one reason.

Two political systems, but for Beijing, one firewall. Bloomberg News reported that on March 23 Internet searches for "Tiananmen" (1989 Tianamen Square massacre) "on computers in Shanghai and Beijing could not be displayed, suggesting the (Beijing) government had started limiting access."

Free, wealth-generating economies need free information. China's communist elites, however, can't yet risk it.

To find out more about Austin Bay, and read features by other Creators Syndicate writers and cartoonists, visit the Creators Syndicate Web page at www.creators.com.

COPYRIGHT 2010 CREATORS.COM



Comments

0 Comments | Post Comment
Already have an account? Log in.
New Account  
Your Name:
Your E-mail:
Your Password:
Confirm Your Password:

Please allow a few minutes for your comment to be posted.

Enter the numbers to the right:  
Creators.com comments policy
More
Austin Bay
Nov. `14
Su Mo Tu We Th Fr Sa
26 27 28 29 30 31 1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30 1 2 3 4 5 6
About the author About the author
Write the author Write the author
Printer friendly format Printer friendly format
Email to friend Email to friend
View by Month
Authorís Podcast
Ray Hanania
Ray HananiaUpdated 27 Nov 2014
R. Emmett Tyrrell
R. Emmett Tyrrell Jr.Updated 27 Nov 2014
Judge Napolitano
Judge Andrew P. NapolitanoUpdated 27 Nov 2014

4 Aug 2010 Iran: War Option on the Table

10 Feb 2010 The Great Search Engine Collides With the Great Firewall

17 Apr 2013 2013 Boston Terror's 19th-Century Roots