opinion web
Liberal Opinion Conservative Opinion
Austin Bay
Austin Bay
3 Feb 2016
Japan Takes Hard Line on North Korean Missile Threat

North Korea's nuclear extortion drama, the repeated threat of nuclear attack followed by demands for food and … Read More.

27 Jan 2016
South Sudan's President Undermines Peace Deal

South Sudan's civil war began on the night of December 15, 2013, when a firefight erupted between soldiers … Read More.

20 Jan 2016
Desert Storm 25 Years Later

Twenty-five years ago this week, in the early hours of January 17, 1991, the remarkable Persian Gulf War … Read More.

Cyber-Vulnerabilities: American Grid, Chinese Grip


The U.S. fears for its grid; China's communist government worries about its grip.

That is the strategic insight gleaned from the fracas over Chinese engineering student Wang Jianwei's article titled "Cascade-Based Attack Vulnerability on the U.S. Power Grid."

Wang's study appeared last year in the Safety Science journal and has been online since spring 2009. Its abstract's first sentence reads: "The vulnerability of real-life networks subject to intentional attacks has been one of the outstanding challenges in the study of the network safety."

Wang, a student at China's elite Dalian University of Technology, addressed known power-grid weaknesses and ways to attack them. Wang claims he wants to reduce grid vulnerabilities and the published paper is an alert.

Several U.S. defense analysts who read the paper, among them Larry Wortzel, were not so sanguine. In testimony on March 10 to the House Foreign Affairs Committee, Wortzel mentioned Wang's paper in passing, but suggested it served as a template for an attack on the entire U.S. power grid.

U.S. media sensationalists presented Wortzel as a fretful alarmist. Context matters — computers controlling power grid operations have been attacked by hackers. Wortzel is a retired U.S. Army colonel, an intelligence officer and a specialist in Chinese affairs, and served as U.S. military attache in China. Wang sees his job as demonstrating grid vulnerabilities; Wortzel is in the business of assessing political, economic and military threats, capabilities and intentions.

Wortzel's entire testimony, however, provided extensive background on U.S. cyber-defense concerns regarding China. After discussing China's high-profile cyber-intrusions on Google's gmail accounts and attempts to steal Google source code, Wortzel identified three types of "malicious Chinese computer network operations": (1) operations that solidify "political and economic control in China"; (2) spy ops gathering "economic, military or technology intelligence" data; (3) cyber reconnaissance of "U.S. military, government, civil infrastructure or corporate networks for later exploitation or attack."

Conceding he could not prove his assessments "beyond a reasonable doubt in a court of law," he said he believed "such persistent, systematic and sophisticated attacks ...

most likely are state-directed." He noted that Chinese dissident organizations like Falun Gong have been "singled out by the Chinese Communist Party leadership for suppression. It is the organs of control and repression in China that need the type of information that was extracted from Google and who most profit from such penetrations."

Which leads to China's cyber-struggles. Beijing complains that the U.S. has extraordinary cyber-warfare capabilities, and it does. China's worries, however, go well beyond protecting military secrets and electrical grids: FREE information, disseminated by unfettered digital media on the Internet, threatens political control by communist elites.

China may have weathered the global recession, but if it has, Beijing regards its success as tentative, for even slow economic growth threatens the communist elites' deal with the Chinese people: We will let you get wealthy, just don't question the political structure. Beijing knows this.

Fear of losing its grip on dissidents during a period of economic stress played a role in China's January cyber-attack on Google's email service for Chinese clients. Google began Chinese operations in 2006 and admits it censored Chinese Internet search results. What an ugly side-story: A liberal California company that makes billions of dollars in the digital free information regimen (that ultimately owes its existence to the U.S. Constitution's First Amendment) acceded to the censorship demands of authoritarians. At least Google now says no more.

This week, Google left China for Hong Kong. But isn't Hong Kong in China? At the moment, Beijing still respects its "One China, Two Systems." Hong Kong makes money — its Basic Law, which protects free information, is one reason.

Two political systems, but for Beijing, one firewall. Bloomberg News reported that on March 23 Internet searches for "Tiananmen" (1989 Tianamen Square massacre) "on computers in Shanghai and Beijing could not be displayed, suggesting the (Beijing) government had started limiting access."

Free, wealth-generating economies need free information. China's communist elites, however, can't yet risk it.

To find out more about Austin Bay, and read features by other Creators Syndicate writers and cartoonists, visit the Creators Syndicate Web page at



0 Comments | Post Comment
Already have an account? Log in.
New Account  
Your Name:
Your E-mail:
Your Password:
Confirm Your Password:

Please allow a few minutes for your comment to be posted.

Enter the numbers to the right: comments policy
Austin Bay
Feb. `16
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 1 2 3 4 5
About the author About the author
Write the author Write the author
Printer friendly format Printer friendly format
Email to friend Email to friend
View by Month
Authorís Podcast
Marc Dion
Marc DionUpdated 8 Feb 2016
Mark Shields
Mark ShieldsUpdated 6 Feb 2016
diane dimond
Diane DimondUpdated 6 Feb 2016

18 Nov 2009 Al-Qaida's Prospects

18 Dec 2012 Tangled History Snarls China-Japan Island Dispute

19 Nov 2014 Sherman's March to the Sea: Total Impact Warfare