China Continues to Gleefully Hack U.S. as Gov't Efforts Sunk by Partisanship
March 2, 2012 1:47 PM
comment(s) - last by
Even teenagers can defeat U.S. network security
Will the U.S. government ever step up to the plate and properly defend the nation in cyberspace?
I. Government Has Already Flunked the Cybersecurity Test
That's the pressing question as Democrats and Republicans in the U.S. Senate bicker over a pair of proposals designed to offer some improvements to the nation's overall extremely poor state of cybersecurity.
The U.S. has flunked the "real world" security test. [Image Source: The Evergreen Foundation]
The situation as it stands is dire.
in the last year have humiliated government IT departments,
hacking government websites
, while the government has been unable to find a way to shut down these hackers' homepages, such as "
These days even teens can outwit the U.S. government's internet security.
[Image Source: Financial Times (left); Michael Mayer (right)]
Meanwhile the U.S. is still grappling with the fallout of giving
a low ranking private
in the U.S. Army complete, virtually unrestricted access to the entire body of
U.S. diplomatic cables
and a great deal of military footage.
The soldier -- a teen at the time -- then passed the information on to
, a fame and fortune seeking "leaks" brainchild of ex-Australian college professor Julian Assange who resorted to creative Hollywood editing to make U.S. attacks on armed militants
look like the murder of unarmed civilians
regarding the unedited "Collateral Murder" video). The loss could well end up
, a prospect that allegedly delights
founder who is quoted by a prestigious British journalist (and supported by several other journalists who were at the meeting) as stating that those who cooperate with U.S. forces in the Middle East are traitors to the their people and "
deserve to die
" (Assange denies saying this
calling the journalists liars
Military secrets leaked and subsequently doctored by
have been a massive PR setback for the U.S. military and its allies -- one which may cost lives.
This was just one high profile example in a long string of horrific data losses for the hapless government agencies [
But all of those embarrassments stand secondary to the far more dangerous threat from America's economic superpower rival, China. At a time when there's strong impetus in the U.S. to downsize the federal government and cut programs, the nation is also grappling with the reality of a Chinese government that has no such concerns and is more than willing to reportedly spend billions on its own
While the U.S. government recently
drafted strict rules
about when it can cyberattack other countries, China seems to have
no such scruples
U.S. agencies have proved woefully incapable of protecting their data against Chinese hackers.
[Image Source: Asia Society]
China has stood accused of conducting massive
intellectual property theft
hacking into financial institutions
, stealing government information, and
U.S. Department of Defense
systems. The problem is that America is unable to retaliate in any meaningful way. The American economies' is predicated on China
manufacturing the goods U.S. companies "design"
, and hence the nation cannot hope to respond with economic sanctions. At the same, time its lack of security competence limits its bloodless
II. Defending the Nation? It's Congress's Constitution Duty
Article 1, Section 8 of the U.S. Constitution
, the foundation of the U.S. government, clearly grants Congress the power:
[Image Source: EL Civics]
The Congress shall have Power To lay and collect Taxes, Duties, Imposts and Excises, to pay the Debts and
provide for the common Defence
and general Welfare of the United States; but all Duties, Imposts and Excises shall be uniform throughout the United States;
To raise and support armies
, but no appropriation of money to that use shall be for a longer term than two years;
To provide and maintain a navy;
To make rules for the government and regulation of the land and naval forces;
To provide for calling forth the militia to
execute the laws of the union, suppress insurrections and
The U.S. Congress has been
ineffectual in legislating funding
and creating proposals outlining a sensible digital "common Defense" of the nation -- i.e. a "militia" (say, competent contracted security officials) or a digital age army (such as
China has built
In other words, when it comes to their Constitutional responsibility to protect the U.S. against invasions -- including cyberinvasions -- both parties in Congress have failed. Yet the American people remain largely apathetic of these failures and continue to vote for their party of choice, while doing little to voice public discontent over America's
in the global cyberwar.
III. U.S. Senate, House Can't Agree on What to do
In the Senate U.S. Senator Harry Reid (D-NV) has proposed a broad bill that would pay for improvements to the government security infrastructure. The bill would authorize the
Department of Homeland Security
(DHS) to both crack down on IT incompetence in the various federal agencies. It also would authorize the DHS to crack down at similar
poor practices at U.S. government contractors
, such as Lockheed Martin Corp. (LMT) whose F-35 Lightning II fighter program was
infiltrated by foreign spies
The bill has strong Democratic support. Other co-sponsors include Sens.
John D. "Jay" Rockefeller IV
(D-CA). But the bill also has a degree of bipartisan support as it is co-sponsored by Sens.
(R-ME). Sen. Collins' mentor is Sen.
(R-ME), who recently announced that
she would not seek reelection
as should could not stand the partisan conflict that has infected Washington D.C.
That conflict threatens to sink the Reid bill, as strong opposition from the Republican majority is overwhelming the minority in the party who support the measure. Senator
Saxby Chambliss, Jr.
[press release], "More government is seldom a solution to any problem."
Sens. Chambliss and former 2008 presidential candidate
(R-AZ), along with 6 other high-ranking Senate Republicans have
sponsored an alternate bill
the bill as "softer". That bill would not provide any additional funds to U.S. cybersecurity or authorize increased DHS oversight of IT/contractors. Instead, it would step up "information sharing" efforts between the U.S. gov't agencies and contractors regarding threats.
Sen. John McCain opposes the Reid bill to fund cybersecurity. [Image Source: kwout]
Sen. McCain lauded the bill as implement far less regulation than Sen. Reid's proposal. He states, "We believe that ensuring our nation's cybersecurity is critical. We have a bill that would do plenty to meet current challenges."
It should also be noted that Sen. Reid's bill also includes proposals to increase information sharing. Responding to the criticism, he stated, "I look forward to a debate on the Senate floor that will ensure this bill and other proposals get a fair hearing, and which will allow thorough consideration of amendments to improve the legislation."
While the Republicans are in the minority in the U.S. Senate, they do have strong support on the bill from the telecommunication industry, which is wary of increased regulatory powers to the DHS in the Democratic bill.
Industry officials also enjoy a close relationship with the bill's sponsor, Senator McCain. AT&T, Inc. (
) America's second largest mobile carrier and major ISP has provided
free service to Sen. McCain's ranch complex
in Ariz. And Telecoms/ISPs have heavily financed Sen. McCain's Senate and Presidential runs raising millions for him, favors he returned with hundreds of millions of dollars in tax cuts and tax holidays.
USTelecom President Walter McCormick offered glowing praise for the McCain measure, stating, "We can support the bill introduced today because it pursues those objectives without creating new bureaucracies or regulatory mandates that would erode, rather than enhance, the ability of network providers to provide nimble and effective responses to cyber threats."
The question is whether "information sharing" would do enough to improve the ineffectual cyberdefenses of the U.S. nation against threats from the Chinese and others to
water supply, electric grid
, financial networks, and transportation infrastructure.
The U.S. House of Representatives' efforts are still in their earlier stages, but a bill similar to Sen. McCain's Senate proposal authorizing the Pentagon to conduct two-way sharing of information with ISPs and contractors regarding threats. The bill passed a procedural vote by the House's Permanent Select Committee on Intelligence and will be headed to a vote on the House floor sometime later this year.
Congressional cybersecurity efforts have stalled. [Image Source: U.S. Congress]
But the Democratic minority in the Republican-controlled House is expected to be crafting their own counterproposal. Thus partisanship may stall legislative efforts in the House, much as the rancor is currently sinking the Senate bills.
In the last five years similar bills have been proposed and slowly died.
IV. Will Someone Who Cares, Please Step up
Howard Schmidt, the White House cybersecurity policy coordinator, is hopeful that Sen. Reid's measure passes. But amid the partisan rancor he's not counting his digital eggs before they hatch. He instead is pushing government agencies to
reinterpret current authorization bills
and work to promote self-dense of the private sector, aware that Congress may not be able to reach the compromises necessary to defend the nation.
In that way the White House may try to sneak increased cybersecurity regulation "in the back door" via existing programs. But such efforts stand a strong chance of winding up in court, as contractors may sue the federal government if it adopts what they view as unauthorized regulation.
No one seems interested in solving America's cybersecurity problems. [Sen. Collins]
Ultimately at the end of the day all parties involved -- the majority of U.S. businesses and the U.S. government -- are lukewarm on providing strong cybersecurity. That's not to say their half-hearted efforts have come for free. Both the government and private sector pay a lot for cybersecurity.
While an overt attack by China is unlikely -- they are as economically dependent on the U.S. as the U.S. is on China. However, China appears to be instead opting to use its steady cyberattacks on the U.S. for financial
and technological gains
. The nation has made tremendous progress in its
, progress many U.S. officials believe was fueled by
stolen U.S. government secrets
But in an era where China is conducting
almost open for-profit cyberwar
against the U.S. and amid a string of embarrassing security breaches to amateur attention-seekers, the efforts are clearly not enough. The problem is that few seem willing to pay the high cost of providing a strong security solution.
At the end of the day, this means that until something changes, the embarrassments for the U.S. government will likely continue. And, China will enjoy a faster path towards its goal of displacing the U.S. as the number one global financial power.
And for skeptics eager to smash that analysis as alarmism,
listen to Sen. McCain
All of us recognize the importance of cybersecurity in the digital world. Time and again, we have heard from experts about the importance of possessing the ability to effectively prevent and respond to cyber threats. We have listened to accounts of cyber espionage originating in countries like China; organized cyber criminals in Russia; and rogue outfits with a domestic presence like ‘Anonymous,’ who unleash cyber-attacks on those who dare to politically disagree. Our own Government Accountability Office has reported that over the last five years, cyber-attacks against the United States are up 650 percent. The threat is real.
He's certainly right about that.
John McCain [press release]
This article is over a month old, voting and posting comments is disabled
RE: But Democrats
3/2/2012 6:18:45 PM
When the Democrats accuse Republicans of being "obstructionists" they're really saying "we don't want Democracy to function, just give us our way."
"If a man really wants to make a million dollars, the best way would be to start his own religion." -- Scientology founder L. Ron. Hubbard
NASA's ISS Control Codes Were Stolen, IT Department Incapable of Patching PCs
March 1, 2012, 6:46 PM
Military PIN Number Stealing Virus Reportedly Hails from China
February 3, 2012, 10:23 AM
Report: Apple's Suppliers Continuously Violate Code of Conduct, Apple Does Nothing to Change It
January 27, 2012, 4:24 AM
China's First Space Station Module Reaches Orbit
September 30, 2011, 1:02 PM
China Brazenly Brags About Internet Attacks on U.S. in Leaked Video
August 23, 2011, 10:03 AM
Quick Note: Canada Joins Twitter, For Real, Eh
November 26, 2014, 3:30 PM
Google Caves to Microsoft and Apple's Pet "Patent Troll" Rockstar
November 24, 2014, 3:30 PM
FTC Announces Crackdown on Computer Speedup/Tech Support Scams
November 20, 2014, 1:40 PM
Nokia Lumia 635 LTE Windows Phone is Only $40 at Best Buy on Black Friday
November 18, 2014, 11:59 AM
It's Official: Twitter is Profitable "Junk"
November 16, 2014, 10:45 PM
Microsoft Rolls Out $199 “Work & Play Bundle” for Its Subscription Services
November 11, 2014, 11:18 AM
Most Popular Articles
Hack of Sony Pictures Indicates Employees Were Pirating Blu-Rays
November 25, 2014, 4:00 PM
Google Caves to Microsoft and Apple's Pet "Patent Troll" Rockstar
November 24, 2014, 3:30 PM
Report: Samsung Galaxy S5 Sales Have Come in 40% Below Projections
November 24, 2014, 6:58 AM
Xiaomi Aims to be #1 Smartphone OEM Within 10 Years, Apple Urges Caution
November 21, 2014, 9:33 AM
Some High-End Luxury Watchmakers Crack Down Hard on Smartwatch Faces
November 26, 2014, 1:28 AM
Latest Blog Posts
Costco Gives Employees Thanksgiving Off; Wal-Mart Leads "Black Thursday" Charge
Oct 29, 2014, 9:57 PM
"Bear Selfies" Fad Could Turn Deadly, Warn Nevada Wildlife Officials
Oct 28, 2014, 12:00 PM
The Surface Mini That Was Never Released Gets "Hands On" Treatment
Sep 26, 2014, 8:22 AM
ISIS Imposes Ban on Teaching Evolution in Iraq
Sep 17, 2014, 5:22 PM
Space Terrorism is a Looming Threat For the United States
Apr 23, 2014, 7:47 PM
More Blog Posts
Copyright 2014 DailyTech LLC. -
Terms, Conditions & Privacy Information