Yo, Ho, Ho and a Bottle of Rum!

No Gravatar

When I moved to Charlottesville (VA), I found out that I was wrong about a whole bunch of things.  No, not about Southern mentality, as it radically differs from that of Northerners. (But, I’m not making light of that at all!) Instead, it was that I found out that Thomas Jefferson was not dead- instead, he was alive and still the mayor of the place!

Everything went through the filter of “What would Tom do?”.  So, by now- having lived in that area for more than a decade, I’m used to it- even though I’ve been gone for nigh a quarter-century.  And, I am appalled that our country is not considering those concepts right now- What would Tom do?

Thomas Jefferson first considered the Barbary “states” piracy when he was the Ambassador to France (long before there was any American President).  And, when these terrorists confronted his presidency, he refused to pay the stipulated bribe of 10% of the US Budget ($ 1 million).  We still recall his policy “millions for defense, not one cent for tribute”.  We glorify the actions he approved with the Marine Hymn, “From the Halls of Montezuma to the shores of Tripoli”.

But, we are still beholden to piracy.  And, I’m extending it way beyond those who use the failed states of Yemen, Somalia, et. al. to threaten the open seas.  Because it’s more than our oil shipments and cargo ships that traverse the open seas.  Our commerce today relies upon the Internet, the “open seas” of eMail, document transfer, websites, and the like. And, just like no private company in the 1800’s could take on the Barbary pirates, we still have no private company that can tackle the internet piracy that flourishes today.

I’ve written that our power grid, transportation network, and back-rooms of Wall Street are at risk.  Leon Panetta, the outgoing (anytime, now) Secretary of Defense used the term “cyber Pearl Harbor”.  Because, we know that Google, Yahoo, Lockheed Martin, Northrop Grumman, the Pentagon, Aramco, the New York Times, the Wall Street Journal, the US Chamber of Commerce, and our firm (at least we are in good- or bad- company) have been attacked by cyber-piracy.

Russia wages cyberwar against Estonia and Georgia.  Someone (US? Israel?) wages war against the nuclear forays of Iran.

The National Intelligence Estimate identifies Russia, Israel, France, and China as hackers seeking economic intelligence.  It’s no longer the James Bonds or the KGB  that are eliciting such actions.  No, most often when America is the target, it’s China that is permeating our networks, seeking out data for its economic gain (and to stifle political opposition).

Oh, China denies it.  Like any good spy.  Mandiant Intelligence published a 60 page report detailing how the Chinese Army is attacking, penetrating, and devouring our data systems.

But, this is not new.  Since the early 80’s (last century) China has been employing means (any means, by the way) to acquire Western Technology.  And, it’s not just the government  intelligence services or armed forces, but private companies, that exploit family ties to China or the need for cash to have folks yield insider access to American corporations.  Via eMail, USB (thumb) drives, or direct transfer.  (US Report here.)

Admittedly, most of the efforts by China were aimed at military hardware and software.  But, they’ve been branching out, as you can see by the laundry list quoted above. And, we are not talking about chump change- cyberwar/espionage is costing us between $ 25 and $ 100 billions- about 0.1-0.5% of our gross domestic product (GDP) at a minimum- and growing.

But, Congress refused to pass laws mandating security procedures.  (Are you surprised?)  Because it would cost too much money. Instead, they (it was almost completely the Republican party members) want litigation waivers, when a company acknowledges it has been hacked.  (See a pattern there yet?)

Which is why President Obama issued an executive order- for voluntary standards that cover critical private-sector computer systems (those grids I mentioned above).  No regulations were part of that authority.  No regulatory or “police-type” authorities.  Instead, we hope that the Commerce Department can create a “framework” of standards within the year. And, only apply these new rules to those industry sectors that are under federal regulation- electrical power grids, banking entities, etc. And, only the critical functions- that means trading systems and not the consumer banking websites (like the ones at Capital One, PNC Bank, BBT) that were taken down by hackers.

I’m sure the cyber-pirates are shaking in their boots!

Share this:
Share this page via Email Share this page via Stumble Upon Share this page via Digg this Share this page via Facebook Share this page via Twitter
Share

8 thoughts on “Yo, Ho, Ho and a Bottle of Rum!”

  1. Technology is too complicated for most people to understand what is necessary and how to do it. Even those who know and understand are likely to differ in their approaches. One can only hope “the right thing” is done. I for one am not holding my breath.

    1. Obviously, some of us techies take umbrage with that statement, Alessa. Yes, many folks employ items with which they are not familiar. Which is why we need our government to protect those folks. It’s no different than traveling on an ocean liner and being subject to hijacking…folks don’t own or know how to pilot that ship, but expect to be safe and secure in their passage.

  2. I don’t care what develops there is always someone out there looking to use it in a malicious way for their own benefit. It’s disheartening. I’ve been “hacked” before in ages past and I think…why pick me out of the billion of people on the planet. Answer me this, Roy…why must we constantly fight each other? I don’t understand it. There is plenty of space for everyone, especially on the net. I’ll never forget the first time I asked my mom and dad why there are wars. I can remember where I was, and I was only like 4 years old. No answer given to me made sense then, and it still doesn’t. Why the pirates? I understand now…because it takes less talent to steal than it does to make. blurgh. Great post, shared!
    Lisa recently posted..Jeweled Cross Light 2 Dark Version by Lisa Brandel

    1. Well, now, Lisa, it depends on who is doing the piracy. China desperately wants to become a first world nation (ok, it wants to be THE superpower). And, as such, it needs the technology and capability that exists elsewhere to be part and parcel of their arsenal. The malicious miscreants who torment others by stealing twitter and eMail passwords just love getting their jollies making you (and me) frown…

Comments are closed.