creators.com opinion web
Liberal Opinion Conservative Opinion
Austin Bay
Austin Bay
17 Dec 2014
A Few Confirmation Questions for Obama's SecDef Nominee

Several senators returning in 2015, among them Diane Feinstein, John McCain and Joe Manchin, have already … Read More.

10 Dec 2014
A 14th Cavalry Surgeon's Battle of the Bulge

Captain and medical doctor James E. Kreisle's Dec. 6, 1944 letter, posted from Clervaux, Luxembourg, begins … Read More.

3 Dec 2014
Putin's Kemlin Losing the Oil Price War -- And That's Good

Free enterprise is proving to be Russian dictator Vladimir Putin's most potent foe. Moscow's February 2014 … Read More.

Cyber-Vulnerabilities: American Grid, Chinese Grip

Comment

The U.S. fears for its grid; China's communist government worries about its grip.

That is the strategic insight gleaned from the fracas over Chinese engineering student Wang Jianwei's article titled "Cascade-Based Attack Vulnerability on the U.S. Power Grid."

Wang's study appeared last year in the Safety Science journal and has been online since spring 2009. Its abstract's first sentence reads: "The vulnerability of real-life networks subject to intentional attacks has been one of the outstanding challenges in the study of the network safety."

Wang, a student at China's elite Dalian University of Technology, addressed known power-grid weaknesses and ways to attack them. Wang claims he wants to reduce grid vulnerabilities and the published paper is an alert.

Several U.S. defense analysts who read the paper, among them Larry Wortzel, were not so sanguine. In testimony on March 10 to the House Foreign Affairs Committee, Wortzel mentioned Wang's paper in passing, but suggested it served as a template for an attack on the entire U.S. power grid.

U.S. media sensationalists presented Wortzel as a fretful alarmist. Context matters — computers controlling power grid operations have been attacked by hackers. Wortzel is a retired U.S. Army colonel, an intelligence officer and a specialist in Chinese affairs, and served as U.S. military attache in China. Wang sees his job as demonstrating grid vulnerabilities; Wortzel is in the business of assessing political, economic and military threats, capabilities and intentions.

Wortzel's entire testimony, however, provided extensive background on U.S. cyber-defense concerns regarding China. After discussing China's high-profile cyber-intrusions on Google's gmail accounts and attempts to steal Google source code, Wortzel identified three types of "malicious Chinese computer network operations": (1) operations that solidify "political and economic control in China"; (2) spy ops gathering "economic, military or technology intelligence" data; (3) cyber reconnaissance of "U.S. military, government, civil infrastructure or corporate networks for later exploitation or attack."

Conceding he could not prove his assessments "beyond a reasonable doubt in a court of law," he said he believed "such persistent, systematic and sophisticated attacks ...

most likely are state-directed." He noted that Chinese dissident organizations like Falun Gong have been "singled out by the Chinese Communist Party leadership for suppression. It is the organs of control and repression in China that need the type of information that was extracted from Google and who most profit from such penetrations."

Which leads to China's cyber-struggles. Beijing complains that the U.S. has extraordinary cyber-warfare capabilities, and it does. China's worries, however, go well beyond protecting military secrets and electrical grids: FREE information, disseminated by unfettered digital media on the Internet, threatens political control by communist elites.

China may have weathered the global recession, but if it has, Beijing regards its success as tentative, for even slow economic growth threatens the communist elites' deal with the Chinese people: We will let you get wealthy, just don't question the political structure. Beijing knows this.

Fear of losing its grip on dissidents during a period of economic stress played a role in China's January cyber-attack on Google's email service for Chinese clients. Google began Chinese operations in 2006 and admits it censored Chinese Internet search results. What an ugly side-story: A liberal California company that makes billions of dollars in the digital free information regimen (that ultimately owes its existence to the U.S. Constitution's First Amendment) acceded to the censorship demands of authoritarians. At least Google now says no more.

This week, Google left China for Hong Kong. But isn't Hong Kong in China? At the moment, Beijing still respects its "One China, Two Systems." Hong Kong makes money — its Basic Law, which protects free information, is one reason.

Two political systems, but for Beijing, one firewall. Bloomberg News reported that on March 23 Internet searches for "Tiananmen" (1989 Tianamen Square massacre) "on computers in Shanghai and Beijing could not be displayed, suggesting the (Beijing) government had started limiting access."

Free, wealth-generating economies need free information. China's communist elites, however, can't yet risk it.

To find out more about Austin Bay, and read features by other Creators Syndicate writers and cartoonists, visit the Creators Syndicate Web page at www.creators.com.

COPYRIGHT 2010 CREATORS.COM



Comments

0 Comments | Post Comment
Already have an account? Log in.
New Account  
Your Name:
Your E-mail:
Your Password:
Confirm Your Password:

Please allow a few minutes for your comment to be posted.

Enter the numbers to the right:  
Creators.com comments policy
More
Austin Bay
Dec. `14
Su Mo Tu We Th Fr Sa
30 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 31 1 2 3
About the author About the author
Write the author Write the author
Printer friendly format Printer friendly format
Email to friend Email to friend
View by Month
Authorís Podcast
Walter Williams
Walter E. WilliamsUpdated 24 Dec 2014
Patrick Buchanan
Pat BuchananUpdated 23 Dec 2014
Dennis Prager
Dennis PragerUpdated 23 Dec 2014

28 Mar 2007 Iran's Latest Hostage Gamble

14 Oct 2009 What Kind of Action in the World Justifies a Nobel Peace Prize?

5 Nov 2008 Eastern Congo's Graveyard of Good Intentions