• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
    • Our Mission
      • Political Islam
    • Areas of Expertise
      • Economic Warfare
        • Cyber Security
      • U.S. Policy
      • Anti-Corruption
      • Foreign Election Observing
      • Supporting Free Speech
        • Legislation
      • Impact of ACD’s Work
      • Free Speech Celebration, U.S. Senate
    • Board of Directors & Advisors
    • Our Team
    • Contact Us
    • Subscribe
  • Our Impact
    • Endorsements
    • Additional Praise
  • Media
    • Recent Interviews
    • Events
      • Coming Events
    • Radio
    • Television
    • Rumble / Youtube
  • Publications
    • All Posts Archive
    • ACD Presentations
    • Articles
    • Books
    • Papers
    • Recommended Readings
  • Free Speech
    • Legislation & Support
    • Impact of ACD’s Work
      • FREE SPEECH Act Celebration, U.S. Senate, September 20, 2010
      • Some Congressional Testimonies
  • Economic warfare
    • The Impact of Purposeful Interference on U.S. Cyber Interests
    • Cyber/Space, EMP Insecurity- Current and Future Threats
    • The Existential EMP Threat
    • New Strategies to Secure U.S. Economy from Cyber Attacks
    • Economic Warfare Subversions July 9, 2012
    • CyberSpace Security – Papers And Articles
    • Cyber Security
    • Da’esh “lite” North America Islamist – Sources
    • The Muslim Brotherhood and Da’esh “Lite” in North America
  • Support ACD
    • Donate
    • Subscribe
    • Contact
American Center for Democracy

American Center for Democracy

  • facebook
  • twitter
  • youtube
  • linkedin
  • Free Speech
  • U.S. Policy
    • U.S. Foreign Policy
  • Political Islam
    • Canada
    • Hamas
    • Iran
    • Islam
    • Muslim Brotherhood
    • Palestinian
    • United States
  • Narco-Terrorism
  • Middle East Conflicts
    • Iran
    • Israel
  • Global Conflicts
    • China
    • North Korea
    • Russia
    • Ukraine
  • Soros
You are here: Home / ACD/EWI Blog / Cyber Insecurity

Cyber Insecurity

February 12, 2013 by Rachel Ehrenfeld, Ken Jensen

China’s celebrations of the New Year of the Snake was preceded by countless successful performances of Chinese cyber-snakes slithering out of their holes to attack U.S. government, public and private entities.

Incredibly, the Obama Administration has yet to curtail, never mind deter, such attacks.

Instead, Obama’s lame executive order on cybersecurity, to be released on Wednesday, will call on critical private-sector industries to voluntarily and publicly report on hacking incidents. In turn, the U.S. government will share information with companies to help them protect their computers from hacking.

Chinese cyber attacks have been noticeably escalating since 2008, with little or no response from the government. Last July, the Justice Department initiated training of hundreds of prosecutors in an effort to increase the department’s ability toidentify and respond to criminals engaging in cyber espionage and cyber terrorism. However, this administration classifies terrorism — actions carried out by foreign elements against our national interests — merely as criminal offenses, not as acts of war.

Indeed, a prevailing view in Washington is that state-sponsored cyber attacks “fall below the thresholds of justifiable force in self-defense.” Therefore, goes the argument, a military reaction is “largely irrelevant.”

James Andrew Lewis, director of the CSIS’s technology and public policy program, states in a recent paper thatcyberattacks could become an “existential threat to the U.S.”

To mitigate this threat, Lewis proposes that the U.S. could make a “carefully managed diplomatic effort” that would inform the Chinese government that it would “take appropriate countermeasures against Chinese firms.” Such warning, he reasons, would help deter the Chinese. In addition, Lewis proposes that the U.S. notify the World Trade Organization “that it would exercise force majeure to stop honoring WTO commitments on the grounds that other signatories — China — have failed to honor them.”

Lewis proposes the WTO, admitting that the “WTO itself is not the right forum for dealing with national security issues.” Moreover, he notes that “compliance has led to a situation where the United States, which adheres more closely to the rules than its opponents, is at a disadvantage in responding to cyber espionage.” He seems to imply that compliance with WTO process takes precedence over U.S. economic and national security.

He goes on to recommend “balancing the costs and benefits of different actions” and creating “a stable international environment.” In the meantime, the U.S. economy has suffered an estimated loss of about $1 trillion.

Recent Iranian attacks on U.S. banks (Bank of America, Citibank, PNC, and others) were reported as distributed denial of service (DDoS) to online services. No retaliation is likely to spur the next wave of attacks, targeting banks’ infrastructure to steal their customers’ money.

Interviewed by the Economist, Cambridge University professor of security engineering Ross Anderson hypothesized that “If 20,000 machines [i.e., hackers’ computers] started hammering British payment gateways on the last weekend before Christmas people wouldn’t be able to shop except with cash.” In Britain, as in the U.S., this could generate a nation-wide panic, a run on the banks and the breakdown of law and order.

Chinese and Iranian cyber attacks aim to influence U.S. decision makers, both civilian and military, opined Arthur Herman in the New York Post. “As one Chinese cyber expert has put it, it’s possible to ‘make enemy commanders make wrong decisions or even stop fighting,’ or ignore an order to stop.”

Adhering to Sun-Tzu’s Art of War, cyber-war guru Wang Xiadong reasons: “‘Since thousands of personal computers can be linked up to perform a common operation … an Information Warfare victory will very likely be determined by which side can mobilize the most computer experts and part-time fans’ — meaning civilians trained in the art of hacking.'”

Indeed, “Chinese cyber experts at the Academy of Military Science know all you need to wage cyber-war is a computer, an Internet connection, time and patience — and the Chinese have plenty of all four.”

Nonetheless, the reluctance to acknowledge hacking as an act of war — economic war — prevails, thus precluding the best defense the U.S. could mount: cyber offense.

 

Our chief deficiency has been failure to engage on the question of who is responsible for protecting the country’s private sector businesses. The Obama administration’s sole concern has been private-sector-managed public infrastructure.  Businesses, because they have no alternative, have been taking that responsibility to the extent that they are able, which is not great given legal prohibitions against cyber reprisal. However, the government has been all but mute on its responsibilities for the broader private sector.

It’s not surprising to learn that 2013 will see a “fierce” lobbying effort on the part of property and casualty insurance trade groups to extend the Terrorism Risk Insurance Program Reauthorization Act (TRIPRA), which is set to expire in December 2014. The insurance industry wants the Act extended to cyberterrorism:

“As currently written, it is unclear whether the law provides the same federal backing to insurers hit with catastrophic cyber-terror claims that they would receive after more conventional terrorist attacks. … If a terrorist or group of terrorists launch a severe cyber-terror attack on the United States or businesses in the U.S., there are serious questions about what impact that would have on the market. Right now, there is no specific reference to cyber-security in the law, so there is uncertainty about what the federal government’s role would be in that kind of situation,” said Robert Gordon, senior vice president of policy development and research for the Property Casualty Insurers Association of America.”

While the U.S. lags behind, Europe is pushing forward with new regulations and initiatives, setting requirements that, according to Stewart Baker, may well affect the U.S. economy. The European Commission apparently understands that the state of the European economy is a security matter. New regulations will require companies operating in Europe (not simply European companies: hence the impact on the U.S.) to report cyber security breaches. The banking and energy sectors are included.

The proposed cybersecurity strategy “would also require EU member countries to set up national authorities charged with defending against online attacks, sharing information with each other, law enforcement agencies and data protection authorities, and issuing public warnings about impending online threats.”

Thanks to Estonia, Europe doesn’t have to depend on the U.S for cybersecurty. In 2007, Estonia became the first country in the world to be targeted by a large-scale co-ordinated international cyberattack (from Russia). Its responses to that attack have been a model widely emulated, especially with regard to public-private partnership in protecting the national economy. In 2008, the Estonian capital Tallinn became the home of the new NATO Cooperative Cyber Defence Centre of Excellence and, in December last year, the EU’s newly founded IT Agency also set up shop in the city. Internationally, the current bible on cybersecurity is “The Tallin Manual on Cyberware”

Have you read about U.S. functional cooperation with Europe on general cybersecurity? We haven’t.

FYI—

212

FURTHER READINGS:

Daniel Udo-Akang: Cyber Attacks: Contemporary Warfare

SOLAR WINDS: Free White Paper: Cybersecurity – A Practical Approach to Actionable Intelligence

Janie Boschma: Capital Eye Opener, Jan. 29: K Street Talks Cybersecurity, Defense PACs Make Year-end Investments, and More

 

David Francis: Hackers: The Next American G.I. Joes?

Madison Ruppert: All data stored on cloud computing services can be accessed by US government without a warrant

 

LAW.COM: Calling General Counsel to the Front Lines of Cybersecurity

 

Money Jihad: Cyber-terrorists target bank software next

Filed Under: ACD/EWI Blog, Cyber

Primary Sidebar

Spotlight

website capture islamist incitement quote by j.woolsey obama signing Rachel's law chemical terrorism transportation terrorism nuclear threats on the rise winning the cyberwar gps concepts and misconceptions libel tourism

Search ACD

Recent Appearances

[9/29/2025] The Shilling Show

[9/2/2025] Wake Up Patriots

[8/29/2025] Decoding Soros

[5/1/2025] National Talk Radio with Shawn Moore

[3/11/2025] Shaun Thompson Interview

[3/10/2025] Larry Conners Interviews Rachel Ehrenfeld

[2/3/2025] The Truth About George Soros - Grey Matter Podcast

[1/22/2025] Fighting Terrorism Funding - SAM Podcast

[1/8/2025] COUNTER NARRATIVE Interview on PATRIOT.TV

[10/2/2024] The Shaun Thompson Show: Dr. Rachel Ehrenfeld

[9/30/2024] Counter Narrative: Soros Power Grab: Media Takeover & Election Manipulation |

See All Appearances

The Soros Agenda

g. soros

Soros: The Man Who Would Be Kingmaker, Part I

Rachel Ehrenfeld & Shawn Macomber

Soros: The Man Who Would Be Kingmaker, Part II

Soros: The Man Who Would be Kingmaker, Part III

Soros: The Man Who Would be Kingmaker, Part IV

More about Soros...
ORDER THE SOROS AGENDA →
Buy The Soros Agenda

Tags

antisemitism Caliphate Canada capital punishment China Christians Daniel Haqiqatjou Dawah Disinformation genocide Hamas Iran ISIS Islam Islamic Party of Ontario Islamic Relief Canada Islamic Relief Worldwide Islamization Islamophobia Israel J. Millard Burr Jews jihad Justin Trudeau LGBT liberalism Muslim Brotherhood Muslims NCCM Norman Bailey Palestine Political Islam Quran Russia Salaheddin Islamic Centre Saudi Arabia Sharia Sol W. Sanders SOROS Syria Terrorism Toronto US USA women's rights

Footer

About ACD

ACD is a New York-based 501(c)(3) not-for-profit organization, which monitors and exposes the enemies of freedom and their modus operandi, and explores pragmatic ways to counteract their methods.

Endorsements

"The ACD/EWI ability to predict future threats is second to none"

- R. James Woolsey, former Director of Central Intelligence

- - - More Endorsements - - -

Follow ACD!

  • facebook
  • twitter
  • youtube
  • linkedin

Copyright © 2025 | The American Center for Democracy is a 501(c)(3) non-profit organization. Your contribution is tax-deductible to the fullest extent of the law.