Wednesday, May 29, 2013

China - US Summit - determining rules of Cyber warfare ? Really , with the 2013 version of Neville Chamberlain holding the reins for the US ? The word " Appeasement " comes to mind because if the Chinese have cracked our security systems and already have insights into US major defense systems to reverse engineer , design countermeasures or replicate - they are negotiating from strength not weakness. And let's not forget which nation is creditor vs debtor ...........


http://www.zerohedge.com/news/2013-05-30/us-cyber-chief-military-unprepared-hacking


US Cyber Chief: Military Is Unprepared For Hacking

Tyler Durden's picture




Submitted by Zachary Keck via The Diplomat,
The head of the U.S. Cyber Command said that the U.S. military is unprepared for cyber attacks, specifically singling out China.
"What we're seeing in cyber is going to continue and it's going to grow and it's going to get worse," Gen. Keith Alexander, the Pentagon’s top Cyber chief said at a Washington, DC breakfast this week, InsideDefense reported. He added:
"The platform we have today is not defensible. You can't see it, you can't defend it, and I would guarantee you that the adversary could penetrate it. And it'd take us months to find it."
Elaborating on this point, Gen. Alexander said that the military’s current network has 15,000 enclaves, which made it “obviously indefensible.” To remedy this problem, the general advocated that the military adopt a “thin, virtual client that is defensible, a cloud-like architecture. By doing that it collapses that 15,000 enclaves into a defensible perimeter," according to the InsideDefense report.
He also stressed the importance of working more closely with defense companies that have been the target of cyber espionage operations, particularly from China. In addition, Gen. Alexander emphasized that the military and intelligence agencies didn’t to do a better job of creating a unified set of standards to facilitate information sharing and joint operations between different agencies responsible for cyber defense.
According to the report, Gen. Alexander singled out China as a particularly cyber concern. To bolster his argument that hacking operations could enable China to acquire information and technology must more quickly and cheaply than Western companies, he cited the rapid rise of the Chinese telecommunication company Huawei.
"If you look at Huawei and how they've come up so quickly, did they grow all by themselves or did they steal some of the intellectual property that led to it?"
Gen. Alexander’s speech seemed to contradict a statement the Pentagon had made earlier in the week downplaying the U.S. defense industries’ vulnerability to hackers following reports that major U.S. weapon systems had been compromised by Chinese hackers. In the statement, Pentagon spokesperson George Little said:
“We maintain full confidence in our weapons platforms... The Department of Defense takes the threat of cyber espionage and cyber security very seriously, which is why we have taken a number of steps to increase funding to strengthen our capabilities, harden our networks, and work with the defense industrial base to achieve greater visibility into the threats our industrial partners are facing. Suggestions that cyber intrusions have somehow led to the erosion of our capabilities or technological edge are incorrect.”










http://siliconangle.com/blog/2013/05/29/china-us-summit-means-determining-the-rules-of-cyber-warfare-engagement/


China-US Summit Means Determining the Rules of Cyber-Warfare Engagement

On today’s NewsDesk segment we discussed this situation with Chinese cyber-espionage and their sustained campaign again U.S. defense contractors, government agencies, and private industry.  It’s a perilous state of affairs to say the least.  I also made the point that we are in a new arms race only that this time around we are not talking about nuclear weapons or missiles, today’s arms race is based in cybersecurity, cyberweaponry, and cyberintelligence.  This upcoming week President Obama is scheduled to summit in Palm Springs with Xi Jinping, the General Secretary of the Communist Party of China, the President of the People’s Republic of China, and the Chairman of the Central Military Commission.   The list of topics will be long but as many expect that the topic of cyber-espionage will be front and center.
As cyber issues continue to attract attention, so will the nature of what can come from these discussions.  Some have wondered if an agreement of some sort can be reached between the two giants.  To be certain, this has been a growing issue for a number of years now and incidents have been revealed publicly in the last couple of months.  A number have exposed the worst of fears, the most sensitive of documents and targets.  Lately the issue has been pushed to the forefront because of these obvious issues and the fact that business and corporations are now involved, under threat of cyber attack.  Surely they feel something could be done about this.
Back to the nuclear analogy, a bunch of interesting elements enter into the fray.  It is well estimated that a single cyber attack could significantly cripple this country’s infrastructure, financial systems, and more.  This is on order with what chaos and devastating effects can occur under a nuclear scenario, or terrorism -it’s that serious.  Will it happen?  It certainly could, but will it – that’s the question.  I for one don’t believe this is the end goal for China.  They have trillions of dollars invested and at stake in American prosperity.  There are still many questions that remain and among them are what will the president stake out as the rules o engagement in cyber-affairs?  President Obama has already stated that the U.S. has the right to counter-attack.  What exactly does that mean?  What is the threshold?  Where is the burden of proof and what is the timetable?  It aims to be an interesting discussion as you can already tell.  Here’s another one that should raise some real issues – if an attack is launched against a private corporation, does that corporation now have the right to strike back?
The Chinese aren’t alone in their cyber-militarism.  Though the U.S. has never confirmed it, it wasn’t that long ago that the news of Stuxnet and later the “Olympic Games” that led up to its eventual payload against Iranian nuclear development.  The U.S. was tied to that by almost anyone that could read between the lines.  We are clearly capable and there apparently is no problem in letting that be known.  Currently, the U.S. CyberCommand (USCYBERCOM) is under the direction of General Keith Alexander. This change in operational structure under a single authority has taken place since its inception in 2009 and in the following last few years.
“USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.”
General Alexander is scheduled to keynote this July’s Black Hat 2013 conference.  There will likely be considerable discussions on not only cyber-defense, but cyber-offense and further discussion on the rules of cyber-engagement.  He is expected to discuss the collaborations between the government and private sectors, among other things.

Reminds me of this moment in history - this US - China Summit and another meeting from September 30 , 1938....

                                                                               





Hitler appeased at Munich

0
On this day in 1938, Adolf HitlerBenito Mussolini, French Premier Edouard Daladier, and British Prime Minister Neville Chamberlain sign the Munich Pact, which seals the fate of Czechoslovakia, virtually handing it over to Germany in the name of peace. Upon return to Britain, Chamberlain would declare that the meeting had achieved "peace in our time."
Although the agreement was to give into Hitler's hands only the Sudentenland, that part of Czechoslovakia where 3 million ethnic Germans lived, it also handed over to the Nazi war machine 66 percent of Czechoslovakia's coal, 70 percent of its iron and steel, and 70 percent of its electrical power. It also left the Czech nation open to complete domination by Germany. In short, the Munich Pact sacrificed the autonomy of Czechoslovakia on the altar of short-term peace-very short term. The terrorized Czech government was eventually forced to surrender the western provinces of Bohemia and Moravia (which became a protectorate of Germany) and finally Slovakia and the Carpathian Ukraine. In each of these partitioned regions, Germany set up puppet, pro-Nazi regimes that served the military and political ends of Adolf Hitler. By the time of the invasion of Poland in September 1939, the nation called "Czechoslovakia" no longer existed.
It was Neville Chamberlain who would be best remembered as the champion of the Munich Pact, having met privately with Hitler at Berchtesgaden, the dictator's mountaintop retreat, before the Munich conference. Chamberlain, convinced that Hitler's territorial demands were not unreasonable (and that Hitler was a "gentleman"), persuaded the French to join him in pressuring Czechoslovakia to submit to the Fuhrer's demands. Upon Hitler's invasion of Poland a year later, Chamberlain was put in the embarrassing situation of announcing that a "state of war" existed between Germany and Britain. By the time Hitler occupied Norway and Denmark, Chamberlain was finished as a credible leader. "Depart, I say, and let us have done with you!" one member of Parliament said to him, quoting Oliver Cromwell. Winston Churchill would succeed him as prime minister soon afterwards.



http://intellihub.com/2013/05/29/why-the-next-war-with-china-could-go-very-badly-for-the-united-states/

Why The Next War With China Could Go Very Badly For The United States

5
Print Friendly

In a future conflict with China, we could see U.S. planes falling out of the sky or great naval vessels sitting dead in the water after being hit with EMP blasts.

ChinaBy Michael Snyder
End of the American Dream
May 29, 2013
Most Americans assume that the U.S. military is so vastly superior to everyone else that no other nation would ever dream of fighting a full-scale war against us.  Unfortunately, that assumption is dead wrong.  In recent years, the once mammoth technological gap between the U.S. military and the Chinese military has been closing at a frightening pace. 
China has been accomplishing this by brazenly stealing our technology and hacking into our computer systems.  The Pentagon and the Obama administration know all about this, but they don’t do anything about it.  Perhaps the fact that China owns about a trillion dollars of our national debt has something to do with that.  In any event, today China has the largest military in the world and the second largest military budget in the world.  They have stolen plans for our most advanced jets, helicopters, ships and missile systems.  It is estimated that stealing our technology has saved China about 25 years of research and development. 
In addition, China is rapidly developing a new generation of strategic weapons that could potentially enable it to actually win a future war against the United States.  At one time such a notion would have been unthinkable, but as you will see below, the next war with China could go very badly for the United States.
The Washington Post is reporting on a confidential report that was prepared for the Pentagon, and what this report says about the extent of Chinese cyber espionage is absolutely startling.  Will China know ALL of our secrets at some point?  The following is a brief excerpt from the Washington Post articleabout the theft of our military technology by China.  It turns out that Chinese hackers have gotten their hands on plans for almost all of the new cutting edge weapons systems that we have been developing…
Some of the weapons form the backbone of the Pentagon’s regional missile defense for Asia, Europe and the Persian Gulf. The designs included those for the advanced Patriot missile system, known as PAC-3; an Army system for shooting down ballistic missiles, known as the Terminal High Altitude Area Defense, or THAAD; and the Navy’s Aegis ballistic-missile defense system.
Also identified in the report are vital combat aircraft and ships, including the F/A-18 fighter jet, the V-22 Osprey, the Black Hawk helicopter and the Navy’s new Littoral Combat Ship, which is designed to patrol waters close to shore.
Also on the list is the most expensive weapons system ever built — the F-35 Joint Strike Fighter, which is on track to cost about $1.4 trillion.
One military expert that the Washington Post showed the report to was absolutely stunned…
“That’s staggering,” said Mark Stokes, executive director of the Project 2049 Institute, a think tank that focuses on Asia security issues. “These are all very critical weapons systems, critical to our national security. When I hear this in totality, it’s breathtaking.”
The experts said the cybertheft creates three major problems. First, access to advanced U.S. designs gives China an immediate operational edge that could be exploited in a conflict. Second, it accelerates China’s acquisition of advanced military technology and saves billions in development costs. And third, the U.S. designs can be used to benefit China’s own defense industry. There are long-standing suspicions that China’s theft of designs for the F-35 fighter allowed Beijing to develop its version much faster.
But it isn’t just hackers that the U.S. military needs to be concerned about.
The truth is that the Chinese are stealing secrets from us any way that they can.
For example, the Chinese use attractive young women to seduce our defense contractors.  In fact, as the Washington Times recently reported, one 59-year-old American man was recently charged with passing very sensitive secrets to a 27-year-old Chinese “honeypot” that he was seeing…
A U.S. defense contractor who works in intelligence at the military’s Pacific Command in Hawaii has been charged with passing classified national security information to a 27-year-old Chinese woman he was dating.
Benjamin Pierce Bishop, 59, is accused of sending the woman an email in May with information on Pacom’s war plans, nuclear weapons and U.S. relations with international partners, according to the complaint filed in U.S. District Court in Honolulu and unsealed Monday.
The complaint goes on to allege that Mr. Bishop told the woman over the telephone in September about the deployment of U.S. nuclear weapons and about the ability of the U.S. to detect other nations’ short- and medium-range ballistic missiles.
Another way that China is gaining a strategic advantage over the U.S. is by getting the U.S. military to become increasingly dependent upon them.  According to Forbes, now the U.S. military is even leasing a Chinese satellite for communications purposes…
American dependence on China grows by the day. The latest news is that the United States has been reduced to leasing a Chinese satellite to handle communications with U.S. military bases in Africa. Surprising, isn’t it? The nation that launched the world’s first communications satellite (I remember it well – it was called Telstar) has so lost its manufacturing mojo that it has to rely on its most formidable military adversary to provide the hardware for some of its most sensitive communications. This at a time when underlying unemployment rates among U.S. manufacturing workers remain at near-depression levels.
Isn’t that crazy?
And a recent Senate report discovered that many of our most advanced weapons systems are absolutely riddled with counterfeit Chinese parts…
A recent Senate report, titled Inquiry Into Counterfeit Electronic Parts In The Department Of Defense Supply Chain, “uncovered overwhelming evidence of large numbers of counterfeit parts making their way into critical defense systems.”
The investigation found 1,800 cases of counterfeit electronic parts involving over one million suspect parts in 2009-10 alone, thereby exposing “a defense supply chain that relies on hundreds of unveiled independent distributors to supply electronic parts for some of our most sensitive systems.”
The report concluded, among other things, that China is the “dominant source” of counterfeit products that enter the DoD supply chain, that the Chinese government does little to stop it and that the DoD doesn’t know the “scope and impact” of these parts on critical defense systems.
Who in the world would be stupid enough to allow one of their greatest strategic enemies to supply large numbers of parts for key weapons systems?
Apparently we are that stupid.
Things are particularly bad when it comes to semiconductors
Senator John McCain commented: “We can’t tolerate the risk of a ballistic missile interceptor failing to hit its target, a helicopter pilot unable to fire his missiles, or any other mission failure because of a counterfeit part.” Calling the issue “a ticking time bomb,” Brian Toohey, president of the Semiconductor Industry Association, commented: “The catastrophic failure risk inherently found in counterfeit semiconductors places our citizens and military personnel in unreasonable peril.”
It would be bad enough if we just had to worry about counterfeit parts failing.  But what if China has a way to shut some of those parts down in the event of a conflict?  What if some of those parts contain “Trojan Horse” computer chips or malware?
That may sound crazy, but unfortunately Trojan Horse chips can be extremely difficult to detect.  The following is from a recent Forbes article
As the Defense Science Board pointed out, Trojan Horse circuitry is almost impossible to detect even with the most rigorous analysis. This is particularly so if a saboteur can accomplish matching subversions in both software and relevant hardware.
And as I mentioned above, China is rapidly developing a vast array of new strategic weapons which may enable it to actually win the next war with the United States.
For example, China has been developing a new generation of inter-continental and submarine-launched nuclear missiles.
The submarine-launched missiles are of particular concern…
The Ju Lang-2 intercontinental missile is the second generation of Chinese submarine-launched ballistic missiles.
It’s a closely held secret, and details are sketchy. If it lives up to what public military intelligence says it is, it’s a huge get for China, especially with their new sub fleet.
The missile is believed to have a range of 8,000 km, and can carry conventional or nuclear warheads.
Do you remember a few years ago when a Chinese sub fired a missile from just off the west coast of the United States?
We didn’t know that the sub was there.  If that missile had been fired at Los Angeles it would have been destroyed long before we could have ever responded.
And don’t think that a first strike by either China or Russia is inconceivable.  As I have written about previously, the U.S. strategic nuclear arsenal has already been reduced by about 95 percent, and Obama seems absolutely determined to whittle it down even more.  In fact, there has been talk that the Obama administration ultimately wants to reduce our arsenal down to just 300 warheads.  If Russia or China knows exactly where those warheads are, it would be very easy to take them out in less than 10 minutes with a submarine-based first strike.
And China has also reportedly been developing very sophisticated EMP weapons.  The following is from a WND report…
In 2011, it was first revealed that China was developing EMP weapons to be used against U.S. aircraft carriers in any future conflict, especially over Taiwan, according to a 2005 National Ground Intelligence Center study.
That center study said the Chinese were developing a family, or “assassin’s mace” of EMP and high-powered microwave, or HPM, weapons to be used by a technologically inferior force such as China’s, against U.S. military forces.
The once secret but now declassified study pointed out that the Chinese could detonate an EMP weapon some 30 to 40 kilometers over Taiwan or – by inference – a U.S. carrier strike group – and destroy the electronics capability on which U.S. network-centric strategy depends.
But an EMP weapon does not have to be a high-altitude weapon that affects a large area.  Smaller scale EMP weapons could take out a wave of fighter jets or a carrier fleet.
In a future conflict with China, we could see U.S. planes falling out of the sky or great naval vessels sitting dead in the water after being hit with EMP blasts.
But isn’t China our friend?
That is what most Americans and most American politicians seem to believe.  They seem to think that China is our “buddy” and “trading partner” and that we will never have a military conflict with China.
But that is NOT how the Chinese see things.
The Chinese regard the United States as their greatest strategic threat and as an enemy that needs to be vanquished.
That is why they are constantly spying on us, hacking into our computers and stealing our technology.
That is why they are feverishly building up their military and preparing for a future war with America.
So what do you think?
Do you believe that war with China is in our future?
If so, do you think that we will win?






No comments:

Post a Comment