The Great Cyber-Warfare Scam

China-bashing made easy

by Justin Raimondo, ANTIWAR.COM

Cyber-SecurityThe War Party never sleeps: there are always new variations of war propaganda coming ’round the bend. With the coming of the internet, the latest manufactured “threat” to rear its head is “cyber-warfare,” which is now being touted by the Obama administration and its media fan club as the Next Big Scary Thing – but what are the facts?

The first fact we need to integrate into our analysis is that “cyber-security” isn’t a science, it’s an industry: that is, the entities issuing alarming reports of this lurking threat are for profit companies mainly if not exclusively concerned with selling a product. And while the “threat landscape,” as the jargon phrases it, is potentially very diverse, with a number of countries and non-state actors potential combatants, our cyber-warriors have targeted China as the main danger to our cybernetic security – the Yellow Peril of the Internet Age. They’re stealing our technology, our secrets, and infiltrating our very homes! This is largely baloney, as Jeffrey Carr, founder of Project Grey Goose and Taia Global, a cyber-security firm, and author of Inside Cyber Warfare, points out:

“[I]t’s good business today to blame China. I know from experience that many corporations, government and DOD organizations are more eager to buy cyber threat data that claims to focus on the PRC than any other nation state. When the cyber security industry issues PRC-centric reports like this one without performing any alternative analysis of the collected data, and when the readership of these reports are government and corporate officials without the depth of knowledge to critically analyze what they’re reading (i.e., when they trust the report’s authors to do the thinking for them), we wind up being in the position that we’re in today – easily fooled into looking in one direction when we have an entire threat landscape left unattended. We got into that position because InfoSec vendors have been left alone to define the threat landscape based upon their product offerings. In other words, vendors only tell customers to worry about the threats that their products can protect them from and they only tell them to worry about the actors that they can identify (or think that they can identify). This has resulted in a security awareness clusterfuck of epic proportions.”

The “cyber-threat” from China has been much in the news lately, and any number of self-proclaimed “experts” with a financial stake in hyping this latest bogeyman have been pointing an accusing finger at Beijing whenever some government agency or big corporation discovers cyber-vandals in its domain. The latest is a report issued by a private cyber-security firm, Mandiant, which claims these attacks are occurring under the auspices of the People’s Liberation Army (PLA). It is, of course, just a coincidence that this accusation limns a recent National Intelligence Estimate, which – according to the New York Times, itself supposedly victimized by Chinese hackers – “makes a strong case that many of these hacking groups are either run by army officers or are contractors working for commands like [PLA] Unit 61398.”

Yet, as Carr discusses here, the Mandiant report has several analytic flaws. To begin with, the “mission area,” i.e. the nature and alleged goal of these intrusions, is supposed to identify China as the culprit because the latest APT (cyber-security jargon for “advanced persistent threat”) “steals intellectual property from English-speaking organizations,” and that these thefts coincide with the technical requirements of China’s current Five-Year Plan.

This kind of “logic” ought to make your BS-detector go haywire, recalling Carr’s warning that there’s a bad case of perception bias at work here: that’s because other nations, and non-state actors such as criminal gangs, also launch cyber-attacks on English-speaking organizations, which in many instances parallel the interests contained in China’s Five-Year Plan. Russia, France, Israel, and a number of other countries have advanced cyber-warfare capabilities, and haven’t hesitated to use them for purposes of industrial espionage, among other reasons: Eastern European gangsters are also players in this game. Yet there is no mention of these alternatives in the Mandiant report: according to them, it’s all about China.

Mandiant claims that because the rash of recent intrusions have involved operations requiring hundreds of operators, that only a nation-state with “military-grade operations” could possibly have carried them out. Yet more than 30 nations are currently running “military-grade” operations, as Carr informs us: why pick on China?

Well, says Mandiant, because the intrusions they analyzed used a Shanghai phone number to register an email account, for one. Yet this proves exactly nothing. Okay then, what about the fact that “two of four network ‘home’ Shanghai blocs are assigned to the Pudong New Area,” where the PLA’s Unit 61398 is located? This also proves exactly nothing: the Pudong New Area has over 5 million inhabitants. It is smack dab in the center of China’s booming commercial and hi-tech metropolis. Ask yourself how many IP addresses originate from this area. Oh, but one of the “PLA” hackers’ “self-identified location is the Pudong New Area.” Really? So what? Aside from the demographic information supplied above, one has to wonder if these people really believe everything they see on the Internet is true. C’mon, guys!

The New York Times has been pushing the Yellow Cyber-Peril theme ever since their computer system was hacked, but the question of who exactly was responsible for that intrusion is by no means proved. In a Times piece on the subject – with the rather whiney headline “Hackers in China Attacked The Times for Last 4 Months” – we again come across Mandiant pointing to the Chinese military as the culprit, but their case against the PLA falls apart under the most cursory inspection. For example, Mandiant’s “analysis” is based in part on the observation that these alleged Chinese

“Hacker teams regularly began work, for the most part, at 8 a.m. Beijing time. Usually they continued for a standard work day, but sometimes the hacking persisted until midnight. Occasionally, the attacks stopped for two-week periods, Mandiant said, though the reason was not clear.”

Bull hockey. There are a number of other countries in the same time zone that have active hacker communities. The idea that the timing of these attacks somehow pinpoints “Chinese hackers” associated with the PLA is laughable. As Carr puts it:

“The hackers could have been from anywhere in the world. The time zone that Mandiant imagines as a Beijing workday could easily apply to a workday in Bangkok, Singapore, Taiwan, Tibet, Seoul, and even Tallinn – all of whom have active hacker populations.”

Mandiant – hired by the Times to investigate the intrusion, and currently in negotiations with the New York Times Company over a possible ongoing business relationship – cites the fact that the intrusions supposed originated at some of the “same universities used by the Chinese military to attack U.S. military contractors in the past.” Yet there are many universities located in the Jinan area Mandiant homes in on, and geolocation in this instance, as Carr says, “means absolutely nothing.” He also raises an important point: if the Chinese military was behind the Times hack, then why would they launch these attacks from a location previously identified with the PLA? That’s seems rather too obvious, especially in view of the lengths to which hackers go to cover their tracks. Wouldn’t China’s Ministry of State Security, their official intelligence agency, be assigned that task? Yet their facilities are located in Beijing, over 200 miles away from Jinan.

Most people are ignorant of the technical details utilized by commercial enterprises like Mandiant to gin up an alleged “threat.” One supposedly scary tool used by the “Chinese” hackers is a Remote Access Tool, and we are told that the specific methods used in the past by alleged Chinese hackers are matched to the Times intrusion. This is just plain wrong, however, as Carr explains:

“The article mentioned the hackers use of a Remote Access Tool (RAT). One such widely used tool is called GhostRAT. The fact that it was used in an attack against the Dalai Lama in 2008 (GhostNet) doesn’t mean that all of the later attacks which used this tool originated with the same group. In fact, even the GhostNet researchers refrained from attributing this attack to China’s government.

“Another tool whose use is often blamed on Chinese hackers is the ‘xKungFoo script.’ Like GhostRAT, the xKungFoo script is widely available for anyone to use so even if it was originally created by a Chinese hacker, it doesn’t mean that it is used by Chinese hackers in all instances. I personally know Russian, English, and Indian hackers who write and speak Chinese.”

This is simple logic: you don’t have to be a cyberwarfare “expert” to realize there are many possibilities when it comes to identifying the people behind the methods. If you’ve already decided who is the perpetrator, however, then Mandiant’s accusations directed at Beijing fit neatly into the available “evidence.” That’s how confirmation bias works.

The major piece of “evidence” supposedly pointing to the Chinese government is the timing of the intrusion: just as research for a Times story on the financial dealings of a top Chinese government official, Wen JaiBo, was “nearing completion.” According to the Times, the hackers gained access to email accounts belonging to Shanghai bureau chief David Barboza, author of the Wen expose, as well as Jim Yardley, bureau chief covering South Asia. Yet the Wen connection is contradicted in the very next paragraph of the Times‘s own account, which says:

“’Computer security experts found no evidence that sensitive e-mails or files from the reporting of our articles about the Wen family were accessed, downloaded or copied,’ said Jill Abramson, executive editor of The Times.”

So what’s the connection to the Wen story? In addition, Yardley had nothing to do with the Wen story, and yet his email was also breached, along with the passwords of 53 employees who are not in the Times newsroom. So what does this add up to? A big fat zero, as far as evidence of China’s involvement is concerned. China is merely the go-to cyber-villain of the moment, and this is certainly true where Mandiant is concerned.

The same kind of dicey “evidence” is being used to accuse Iran – you saw this coming, didn’t you? Again, the tech-ignorant New York Times is in the lead, with a story echoing the claims of US officials that Tehran was behind the recent cyber-attacks launched against several American banks. You can almost hear the spooky music in the first two paragraphs of the piece, by Nicole Perlroth and Quentin Hardy, which gives an account of how the hackers slowed down and disabled banking sites, and then goes on to say:

“There was something disturbingly different about the wave of online attacks on American banks in recent weeks. Security researchers say that instead of exploiting individual computers, the attackers engineered networks of computers in data centers, transforming the online equivalent of a few yapping Chihuahuas into a pack of fire-breathing Godzillas.”

Godzilla’s on the loose! And it’s an Iranian Godzilla! Yikes!

“The skill required to carry out attacks on this scale has convinced United States government officials and security researchers that they are the work of Iran, most likely in retaliation for economic sanctions and online attacks by the United States.

“’There is no doubt within the U.S. government that Iran is behind these attacks,’ said James A. Lewis, a former official in the State and Commerce Departments and a computer security expert at the Center for Strategic and International Studies in Washington.”

The skill required to carry out these attacks was minimal. As Roel Schouwenberg, senior researcher at Kaspersky Labs, put it:

“We can confirm that the attacks being reported are happening; however, the malware being used, known as ItsOKNoProblemBro, is far from sophisticated. It’s really rather simple. It’s also only one part of the puzzle but it seems to be effective, which is all that matters to the attackers. Going strictly by the publicly known technical details, we don’t see enough evidence that would categorize this operation as something only a nation-state sponsored actor could pull off.”

More “evidence” offered in support of the “Iran-did-it” theory is that these attacks did not garner any information: no data systems were breached. It was, in short, pure cyber-malice directed at American banks. If this is supposed to somehow prove the Iranians are the culprits, then it is weak tea indeed: because there are any number of groups who hate American bankers, including, I would venture, the vast majority of the American people. These DDOS attacks seem more like the sort of thing we might expect from a group like “Anonymous” than from a state actor such as Iran.

Of course, the paucity of evidence didn’t stop Sen. Joe Lieberman from declaring:

“I don’t believe these were just hackers who were skilled enough to cause disruption of the websites. I think this was done by Iran … and I believe it was a response to the increasingly strong economic sanctions that the United States and our European allies have put on Iranian financial institutions.”

As is the case with Iran’s alleged nuclear weapons program, which our own spooks have said does not presently exist, the technical details are obscure to most of us, and therefore this realm is given over to “experts,” both real and imagined. To Sen. Lieberman and all too many in the media, it’s just a matter of picking and choosing your “experts,” and making the “facts” fit your preconceived notions.

Aside from ginning up conflict with the War Party’s chosen targets, the whole cyber-war scare-mongering campaign, whether the alleged “threat” is said to be emanating from China, Iran, or wherever, is also very convenient for proponents of Internet regulation who want to install back doors on every web site, and every software system, so the feds can “trace” these alleged “cyber-terrorists.” It is, in short, a scam, part and parcel of a political campaign to rein in the wild and wooly – and largely unregulated – Internet, and make it more amenable to the interests of our wise rulers.

The mystification of science, and the culture of “expertise,” has greatly aided the War Party in their propaganda efforts. Instead of making up stories about babies being bayoneted in their cribs – although there is still some of that – we are given mind-numbingly technical explanations that point to purported acts of “cyber-terrorism” carried out by China, Iran, or the villain-of-the-moment. Except that the supposed “evidence” turns out to based on non-credible assumptions and faulty technical analysis.

Remember, we’ve been through this sort of thing before: all the “intelligencesupposedly pointed to the irrefutable “fact” that Iraq possessed “weapons of mass destruction,” which it was about to launch against its neighbors. That turned out to be a lie. Much of this baloney came wrapped up in impressive-sounding technical jargon, and was validated by the media’s chosen “experts.”

Has anybody learned anything from that experience? I’m thinking in particular of the members of the Fourth Estate, otherwise known as “journalists.” The answer, unfortunately, seems to be no.

ABOUT THE AUTHOR
Justin Raimondo is the editorial director of Antiwar.com, and a senior fellow at the Randolph Bourne Institute. He is a contributing editor at The American Conservative, and writes a monthly column for Chronicles. He is the author of Reclaiming the American Right: The Lost Legacy of the Conservative Movement [Center for Libertarian Studies, 1993; Intercollegiate Studies Institute, 2000], and An Enemy of the State: The Life of Murray N. Rothbard [Prometheus Books, 2000].

addendum

Cyberwarfare: US uses Hacking Allegations to Escalate Threats against China

By Barry GreyWorld Socialist Web Site

Theme: US NATO War Agenda

The Obama administration is utilizing unsubstantiated charges of Chinese government cyber-attacks to escalate its threats against China. The past two days have seen allegations of hacking into US corporate and government web sites, hyped by the US media without any examination of their validity, employed to disorient the American public and justify an expansion of the Obama administration’s drive to isolate China and prepare for an eventual military attack.

The accusations of hacking against China will also be used to justify increased domestic surveillance of computer and Internet communications, as well as an expanded use of cyber warfare methods internationally.

The New York Times, functioning once again as a conduit for the Pentagon and the CIA, has taken the lead in the latest provocation against Beijing. On Tuesday it published a bellicose front-page article headlined “China’s Army Seen as Tied to Hacking Against US,” and carrying the ominous subhead “Power Grid is a Target.”

The article drips with cynicism and hypocrisy. It is well known that the United States is the world’s most ruthless practitioner of cyber warfare. The article itself acknowledged that the US worked with Israel to disrupt the Iranian nuclear program by introducing the Stuxnet virus into Iran’s computer systems. That bit of sabotage—itself an illegal act of aggression—was accompanied by a series of assassinations of Iranian scientists carried out by Israel with Washington’s support.

The sprawling front-page article, which continued on an entire inside page of the newspaper, was based on a 60-page report released that day by a private computer security firm with close ties to the Times, as well as to the US military and intelligence agencies. The report by Mandiant—founded by a retired Air Force officer and based in Alexandria, Virginia—provides no real evidence to substantiate its claim that a unit of China’s People’s Liberation Army based in Shanghai is directing hacking attacks on US corporations, organizations and government institutions.

In its report, Mandiant claims to have tracked 141 cyber attacks by the same Chinese hacker group since 2006, 115 of which targeted US corporations. On the basis of Internet footprints, including Internet provider addresses, Mandiant concludes that 90 percent of the hacking attacks come from the same neighborhood in Shanghai. It then notes that the headquarters of Unit 61398 of the People’s Liberation Army is located in that neighborhood. From this coincidence, Mandiant draws the entirely unwarranted inference that the cyber-attacks are coming from the PLA building.

As the Times admits in its article, “The firm was not able to place the hackers inside the 12-story [PLA Unit 61398 headquarters] building…” The newspaper goes on to report that “Mandiant also discovered an internal China Telecom memo discussing the state-owned telecom company’s decision to install high-speed fiber-optic lines for Unit 61398’s headquarters.” One can only assume that Mandiant “discovered” this memo by carrying out its own hacking of Chinese computers.

Chinese spokesmen have denied any involvement by the government or the military in hacking attacks and dismissed the Mandiant report as lacking any proof of its charges. The Chinese Ministry of Defense released a statement Wednesday pointing out that Internet provider addresses do not provide a reliable indication of the origin of hacking attacks, since hackers routinely usurp IP addresses. A Foreign Ministry spokesman pointed out that China is constantly being targeted by hackers, most of which originate in the US.

The Chinese position was echoed by Dell Secureworks cyber-security expert Joe Stewart, who told the Christian Science Monitor: “We still don’t have any hard proof that [the hacker group] is coming out of that [PLA Unit 61398’s] building, other than a lot of weird coincidence pointing in that direction. To me, it’s not hard evidence.”

The Obama administration followed up the Times article, which sparked a wave of frenzied media reports of Chinese cyber-attacks, by announcing on Wednesday that it would step up diplomatic pressure and consider more punitive laws to counter what it described as a wave of trade secret theft by China and other countries. The Associated Press reported that the administration was discussing “fines, penalties and tougher trade restrictions” directed against China.

The latest propaganda attack points to an escalation of the US offensive against China that went by the name “pivot to Asia” in Obama’s first term. That policy included whipping up territorial disputes in the East China and South China seas between China and a series of countries in East Asia, including Japan, Vietnam and the Philippines.

It has also included the establishment of closer military ties and new US installations in a number of countries, including India and Australia, to militarily encircle China.

The Times concluded its article by reporting that “The mounting evidence of state sponsorship… and the growing threat to American infrastructure are leading officials to conclude that a far stronger response is necessary.” It cited Rep. Mike Rogers, the Republican chairman of the House Intelligence Committee, as saying that Washington must “create a high price” to force the Chinese to back down.

In an editorial published Wednesday, the Times noted that the administration has decided to give US Internet providers and anti-virus vendors information on the signatures of Chinese hacker groups, leading to a denial of access to US networks for these groups. It also reported that President Obama last week signed an executive order authorizing increased sharing of information on cyber threats between the government and private companies that oversee critical infrastructure, such as the electrical grid.

The Wall Street Journal in its editorial called for “targeted sanctions” against Chinese individuals and institutions.

The background to this new salvo of anti-China propaganda underscores that it is part of an aggressive expansion of US military capabilities, both conventional and cyber-based. Obama raised the issue of cyber war in his February 12 State of the Union address, accusing US “enemies” of seeking to “sabotage our power grid, our financial institutions, our air traffic control systems,” and insisting that action be taken against such attacks.

In the same speech, he defended his drone assassination program, which is based on the claim that the president has the unlimited and unilateral power to order the murder of anyone anywhere in the world, including US citizens.

Last October, Obama signed an executive order expanding military authority to carry out cyber-attacks and redefine as “defensive” actions that would previously have been considered acts of aggression—such as the cutting off of computer networks. Around the same time, Defense Secretary Leon Panetta gave a bellicose speech in which he warned of a “cyber Pearl Harbor.” Panetta told Time magazine: “The three potential adversaries out there that are developing the greatest capabilities are Russia, China and Iran.”

At the end of January, the New York Times accused Chinese authorities of hacking into its news operations, a charge that was quickly seconded by the Washington Post and the Wall Street Journal. That same week, the Washington Post reported that the US military had approved a five-fold increase of personnel in its Cyber Command. Days later, the Times reported on its front page that the Obama administration had concluded that the president had the power to authorize pre-emptive cyber war attacks.

This bellicose posture toward China and expansion of cyber warfare methods goes hand in hand with growing threats to democratic rights at home. The cyber war plans include options for military action within the US. The Times reported earlier this month that the military “would become involved in cases of a major cyber-attack within the United States” under certain vaguely defined conditions.

Efforts to increase government control of the Internet and surveillance of Internet communications are being stepped up. Just last week, Rep. Rogers of Michigan and Democratic Senator Dutch Ruppersberger of California reintroduced the Cyber Intelligence Sharing and Protection Act (CISPA). The bill died in the Senate last year in the midst of protests over provisions allowing the government to spy on emails and other Internet-based communications.




US preparations for cyber war against China

Acting Commerce Secretary Rebecca Blank explains President Obama's cybersecurity policy after an executive order designed to combat cyber-terrorism was issued last week. Photo: Ann Heisenfelt, Associated Press

Acting Commerce Secretary Rebecca Blank explains President Obama’s cybersecurity policy after an executive order designed to combat cyber-terrorism was issued last week. Photo: Ann Heisenfelt, Associated Press

Peter Symonds, wsws.org

The Obama administration, working hand-in-hand with the American media, has opened up a new front in its aggressive campaign against China. A slew of articles, most notably in the New York Times, has appeared over the past week purportedly exposing the involvement of the Chinese military in hacking US corporations and hinting at the menace of cyber warfare to vital American infrastructure such as the electricity grid.

The Times article on Tuesday based itself on the unsubstantiated and self-serving claims of a report prepared by cyber-security company Mandiant alleging that a Chinese military unit based in Shanghai had been responsible for sophisticated cyber-attacks in the US. (See: “US uses hacking allegations to escalate threats against China”). The rest of the media in the US and internationally followed suit, with articles replete with comments from analysts, think tanks and administration officials past and present about the “Chinese cyber threat”, all but ignoring the emphatic denials by China’s foreign and defence ministries.

This set the stage for the release on Wednesday of Obama’s “Administration Strategy on Mitigation of Theft of US Trade Secrets,” which, while not formally naming China, cited numerous examples of alleged Chinese cyber espionage. In broad terms, the document laid out the US response, including “sustained and coordinated diplomatic pressure” on offending countries and the implied threat of economic retaliation via “trade policy tools.”

US Attorney General Eric Holder warned of “a significant and steadily increasing threat to America’s economy and national security interests.” Deputy Secretary of State Robert Hormats declared that the US had “repeatedly raised our concerns about trade secret theft by any means at the highest levels with senior Chinese officials.”

The demonisation of China as a global cyber threat follows a well-established modus operandi: it is aimed at whipping up a public climate of fear and hysteria in preparation for new acts of aggression—this time in the sphere of cyber warfare. Since coming to office in 2009, Obama has launched a broad economic and strategic offensive aimed at weakening and isolating China and reinforcing US global dominance, especially in Asia.

Accusations of Chinese cyber theft dovetail with the Obama administration’s economic thrust into Asia through its Trans Pacific Partnership (TPP)—a new multilateral trade agreement aimed at boosting US trade at China’s expense. The protection of “intellectual property rights” is a central component of the TPP, as the profits of American corporations rest heavily on their monopoly over markets via brand names and technology. Allegations of cyber espionage will become the pretext for new trade war measures against China.

However, the more sinister aspect of the anti-Chinese propaganda is the US preparation of war against China. Under the banner of its “pivot to Asia,” the Obama administration has put in train a far-reaching diplomatic and strategic offensive aimed at strengthening existing military alliances with Japan, South Korea, Australia, the Philippines and Thailand, forging closer strategic partnerships and ties, especially with India and Vietnam, and undermining close Chinese relations with countries like Burma and Sri Lanka.

Obama’s “pivot to Asia” has already resulted in a dangerous escalation of maritime disputes in the South China Sea and East China Sea as Japan, the Philippines and Vietnam, encouraged by the US, have pressed their territorial claims against China. The focus on these strategic waters is not accidental, as they encompass the shipping lanes on which China relies to import raw materials and energy from the Middle East and Africa. The US is establishing new military basing arrangements in Australia, South East Asia and elsewhere in the region to ensure it has the ability to choke off China’s vital supplies in the event of a confrontation or war.

The Pentagon regards cyber warfare as a vital component of the huge American war machine and has devoted considerable resources towards its development, especially under the Obama administration. In May 2010, the Pentagon set up its new US Cyber Command headed by General Keith Alexander, director of the National Security Agency (NSA), drawing on the already massive cyber resources of the NSA and the American military.

US accusations of Chinese cyber espionage are utterly hypocritical. The NSA, among other US agencies, has been engaged in electronic spying and hacking into foreign computer systems and networks around the world on a vast scale. Undoubtedly, China is at the top of the list of prime targets. The Chinese Foreign Ministry claimed this week that at least 14 million computers in China were hacked by 73,000 overseas-based users last year, including many cyber attacks on the Chinese Defence Ministry.

The US has already engaged in aggressive, illegal acts of cyber sabotage against Iran’s nuclear facilities and infrastructure. Together with Israel, it infected the electronic controllers of the gas centrifuges used in Iran’s Natanz uranium enrichment plant with the Stuxnet worm, causing hundreds to spin out of control and self-destruct. This criminal activity took place alongside more traditional forms—the assassination of Iranian nuclear scientists and other acts of sabotage by Israel.

It is inconceivable that the Pentagon’s cyber capacities are being deployed for purely defensive purposes against the “Chinese threat.” Indeed, in taking over as cyber warfare chief in 2010, General Alexander outlined his credo to the House Armed Services subcommittee. After declaring that China was viewed as responsible for “a great many attacks on Western infrastructure,” he added that if the US were subject to an organised attack, “I would want to go and take down the source of those attacks.”

Last August, the US Air Force issued what was described by the New York Times as “a bluntly worded solicitation for papers advising it on ‘cyberspace warfare attack capabilities,’ including weapons to ‘destroy, deny, deceive, corrupt or usurp’ an enemy’s computer networks and other hi-tech targets. The same article referred to the Pentagon’s research arm, the Defence Advanced Research Projects Agency, hosting a gathering of private contractors wanting to participate in “Plan X”—the development of “revolutionary technologies for understanding, planning and managing cyber warfare.”

This week’s propaganda about the “Chinese cyber threat” provides the justifications for stepping up the already advanced US preparations for conducting cyber-attacks on Chinese military and civilian targets. Amid the rising tensions between the US and China produced by Obama’s “pivot to Asia”, reckless American actions in the sphere of cyber warfare only compound the danger of open military confrontation between the two powers.

Peter Symonds is a senior political writer with the wsws.org, a socialist information resource. 




US uses hacking allegations to escalate threats against China

By Barry Grey, wsws.org

A trader looks at his computer screen on

The Obama administration is utilizing unsubstantiated charges of Chinese government cyber-attacks to escalate its threats against China. The past two days have seen allegations of hacking into US corporate and government web sites, hyped by the US media without any examination of their validity, employed to disorient the American public and justify an expansion of the Obama administration’s drive to isolate China and prepare for an eventual military attack.

The accusations of hacking against China will also be used to justify increased domestic surveillance of computer and Internet communications, as well as an expanded use of cyber warfare methods internationally.

The New York Times, functioning once again as a conduit for the Pentagon and the CIA, has taken the lead in the latest provocation against Beijing. On Tuesday it published a bellicose front-page article headlined “China’s Army Seen as Tied to Hacking Against US,” and carrying the ominous subhead “Power Grid is a Target.”

The article drips with cynicism and hypocrisy. It is well known that the United States is the world’s most ruthless practitioner of cyber warfare. The article itself acknowledged that the US worked with Israel to disrupt the Iranian nuclear program by introducing the Stuxnet virus into Iran’s computer systems. That bit of sabotage—itself an illegal act of aggression—was accompanied by a series of assassinations of Iranian scientists carried out by Israel with Washington’s support.

The sprawling front-page article, which continued on an entire inside page of the newspaper, was based on a 60-page report released that day by a private computer security firm with close ties to the Times, as well as to the US military and intelligence agencies. The report by Mandiant—founded by a retired Air Force officer and based in Alexandria, Virginia—provides no real evidence to substantiate its claim that a unit of China’s People’s Liberation Army based in Shanghai is directing hacking attacks on US corporations, organizations and government institutions.

In its report, Mandiant claims to have tracked 141 cyber attacks by the same Chinese hacker group since 2006, 115 of which targeted US corporations. On the basis of Internet footprints, including Internet provider addresses, Mandiant concludes that 90 percent of the hacking attacks come from the same neighborhood in Shanghai. It then notes that the headquarters of Unit 61398 of the People’s Liberation Army is located in that neighborhood. From this coincidence, Mandiant draws the entirely unwarranted inference that the cyber-attacks are coming from the PLA building.

As the Times admits in its article, “The firm was not able to place the hackers inside the 12-story [PLA Unit 61398 headquarters] building…” The newspaper goes on to report that “Mandiant also discovered an internal China Telecom memo discussing the state-owned telecom company’s decision to install high-speed fiber-optic lines for Unit 61398’s headquarters.” One can only assume that Mandiant “discovered” this memo by carrying out its own hacking of Chinese computers.

Chinese spokesmen have denied any involvement by the government or the military in hacking attacks and dismissed the Mandiant report as lacking any proof of its charges. The Chinese Ministry of Defense released a statement Wednesday pointing out that Internet provider addresses do not provide a reliable indication of the origin of hacking attacks, since hackers routinely usurp IP addresses. A Foreign Ministry spokesman pointed out that China is constantly being targeted by hackers, most of which originate in the US.

The Chinese position was echoed by Dell Secureworks cyber-security expert Joe Stewart, who told the Christian Science Monitor: “We still don’t have any hard proof that [the hacker group] is coming out of that [PLA Unit 61398’s] building, other than a lot of weird coincidence pointing in that direction. To me, it’s not hard evidence.”

The Obama administration followed up the Times article, which sparked a wave of frenzied media reports of Chinese cyber-attacks, by announcing on Wednesday that it would step up diplomatic pressure and consider more punitive laws to counter what it described as a wave of trade secret theft by China and other countries. The Associated Press reported that the administration was discussing “fines, penalties and tougher trade restrictions” directed against China.

The latest propaganda attack points to an escalation of the US offensive against China that went by the name “pivot to Asia” in Obama’s first term. That policy included whipping up territorial disputes in the East China and South China seas between China and a series of countries in East Asia, including Japan, Vietnam and the Philippines.

It has also included the establishment of closer military ties and new US installations in a number of countries, including India and Australia, to militarily encircle China.

The Times concluded its article by reporting that “The mounting evidence of state sponsorship… and the growing threat to American infrastructure are leading officials to conclude that a far stronger response is necessary.” It cited Rep. Mike Rogers, the Republican chairman of the House Intelligence Committee, as saying that Washington must “create a high price” to force the Chinese to back down.

In an editorial published Wednesday, the Times noted that the administration has decided to give US Internet providers and anti-virus vendors information on the signatures of Chinese hacker groups, leading to a denial of access to US networks for these groups. It also reported that President Obama last week signed an executive order authorizing increased sharing of information on cyber threats between the government and private companies that oversee critical infrastructure, such as the electrical grid.

The Wall Street Journal in its editorial called for “targeted sanctions” against Chinese individuals and institutions.

The background to this new salvo of anti-China propaganda underscores that it is part of an aggressive expansion of US military capabilities, both conventional and cyber-based. Obama raised the issue of cyber war in his February 12 State of the Union address, accusing US “enemies” of seeking to “sabotage our power grid, our financial institutions, our air traffic control systems,” and insisting that action be taken against such attacks.

In the same speech, he defended his drone assassination program, which is based on the claim that the president has the unlimited and unilateral power to order the murder of anyone anywhere in the world, including US citizens.

Last October, Obama signed an executive order expanding military authority to carry out cyber-attacks and redefine as “defensive” actions that would previously have been considered acts of aggression—such as the cutting off of computer networks. Around the same time, Defense Secretary Leon Panetta gave a bellicose speech in which he warned of a “cyber Pearl Harbor.” Panetta told Time magazine: “The three potential adversaries out there that are developing the greatest capabilities are Russia, China and Iran.”

At the end of January, the New York Times accused Chinese authorities of hacking into its news operations, a charge that was quickly seconded by theWashington Post and the Wall Street Journal. That same week, theWashington Post reported that the US military had approved a five-fold increase of personnel in its Cyber Command. Days later, the Times reported on its front page that the Obama administration had concluded that the president had the power to authorize pre-emptive cyber war attacks.

This bellicose posture toward China and expansion of cyber warfare methods goes hand in hand with growing threats to democratic rights at home. The cyber war plans include options for military action within the US. The Timesreported earlier this month that the military “would become involved in cases of a major cyber-attack within the United States” under certain vaguely defined conditions.

Efforts to increase government control of the Internet and surveillance of Internet communications are being stepped up. Just last week, Rep. Rogers of Michigan and Democratic Congressman Dutch Ruppersberger of Maryland reintroduced the Cyber Intelligence Sharing and Protection Act (CISPA). The bill died in the Senate last year in the midst of protests over provisions allowing the government to spy on emails and other Internet-based communications.

ABOUT THE AUTHOR
Barry grey is a senior political analyst with the World Socialist Web Site, member of the 4th International. 




World War in Asia?

The Fate of a Small Country
by LINH DINH
japan-ShinzoAbe233
Japan’s PM Shinzo Abe, obediently implementing Washington’s desires.

With the Asia Pivot, the US wants to encircle China, and supply old and new allies with missiles aimed at its main rival. An amped up arms race means cash flow for the world’s biggest death dealer. If all these Asian nations buy as many American fighter planes as Taiwan, US armament workers can knock down a few more Bud Lites, and take their wives and kiddies to Ruby Tuesday twice a week even.

So far, Japan is going along with this plan. The Sensaku/Diaoyu Islands dispute was dormant until stirred up recently by Tokyo. As tension heated up, the US then shipped missiles to Japan, with the lame explanation that it was meant to deter North Korea. Newly elected Prime Minister, Shinzo Abe lost no time declaring that Japan will increase defense spending, that China is “wrong” in this dispute and there’s nothing to negotiate. By contrast, Abe said he could sit down with South Korea over another sea breeze stare down, since “both nations share liberal and democratic values, and have respect for basic human rights and the rule of law,” unlike China, that is.

Such a verbal reverse kick won’t soon be forgotten, especially from an adversary whose meat and bone crimes are still fresh. Three quarters of a century ain’t ish in Asia. The chiefs of Honda, Toyota, Mitsubishi, Sony and Sanyo, etc., must be gagging at Abe’s posturing, for it’s never wise to give your best customer the finger, and over what, a few symbolic rocks, with a fistful of tuna thrown in, wasabi not included? It’s understandable that Japan is reluctant to yield its primacy in Asia to China, but these provocations surely won’t reverse the tide, only yield dire consequences.

A chunkier China is certainly something to dread, as it has already knocked aside its first victims, the Southeast Asian flyweights bordering the South China Sea, or what is called “the East Sea” by Vietnamese. This oil rich and strategically important territory has been claimed entirely by China, including islands just off the Vietnamese coast, explored, mapped and exploited by the Nguyen Dynasty since the 17th Century. By contrast, the official Chinese map from 1904 still showed Hainan, much further North, as China’s southernmost point. Whatever. With its much improved navy, China sees precious oil within reach, so it simply shoves Vietnam, the Philippines, Malaysia and Brunei out of the way. No profit sharing agreement here. Everything will go to the new boss, same as the old boss, what East Asia has had to contend with for millennia.

If the American Empire can claim the Persian Gulf as a key territory to be defended and exploited, what’s stopping China from doing the same to the South China Sea? But this is not really about logics, only might. One does what one can get away with. America has also inserted itself into the South China Sea fracas, and has even conducted joint military exercises with its former enemies, Vietnam and Cambodia, all to counter China.

Cambodia’s Prime Minister, Hun Sen, was groomed by the Vietnamese to be their ally, after an invasion to dislodge Pol Pot, who was backed by the Chinese. For smoking Pot, Vietnam was invaded by China in 1979, during a 28-day war that caused 6,000 Chinese deaths, with Vietnamese casualties unknown. (In 1995, locals in Sapa told me everyone just ran for the hills, and the Chinese simply destroyed everything in their paths, including the church in the middle of town, and bridges they had themselves built during the Vietnam War.) Sen, once dubbed “The One-Eyed Lackey of the Vietnamese,” then became friendlier towards the deeper-pocketed Chinese, and even allowed a Chinese navy ship to dock in Sihanoukville in late 2008. Now he’s getting chummy with the US, thus pissing off China, but not totally. A very corrupt man, Sen will hug anyone or anything if you shove enough bills into his pocket, but these strange maneuvers are also not untypical of the complicated flirtation, hedging and whoring of many small countries. To survive, they must latch on to various patrons, even those who have screwed them royally not long ago.

Which brings us to Vietnam. For the last month or so, the Vietnamese blogosphere has been howling over a leaked tape by one Colonel Tran Dang Thanh, of a rambling speech he gave to Hanoi’s university professors. In it, Thanh revealed Vietnam’s stance towards Russia, Iran, North Korea and, most interestingly, China and the United States.

Thanh praised Iran and North Korea, “someone we must emulate,” for standing up to a super power, the US, but went at extreme length to explain why Vietnam must yield to China, whom he waxed poetically as “a friend whose mountain joins our mountain, whose river joins our river, who shares with us the East Sea, a mutual friendship,” then added this joke as coda, “though our hands may shake, our legs still kick furiously,” prompting chuckles from his audience. The bottom line, though, is that Vietnam can’t go to war against China because it will get its ass kicked. China is simply too big, Thanh said, stating the obvious. As for leaning on the US, Thanh declared that America is simply an unreliable ally, that it will only use Vietnam as a pawn against China. Further, “They have never been truly good towards us [!], their crimes the heavens won’t forgive, and the earth won’t pardon.” Evoking Vietnam’s struggle against the West, Thanh reminded his audience of China’s contributions, “During our four-year fight against the French, our 21-year fight against the Americans, the people and government of China had sacrificed their rice and torn from their own shirts to give us each grain of rice, each gun, each pair of sandals so that we could be victorious against the French and Americans.” Thanh did admit that China has invaded Vietnam about twenty times altogether, and is encroaching now, but still, it is a neighbor, a huge and permanent nuisance that Vietnam must forever deal with, and it would be foolish to expect help from America, a distant pseudo friend that not so long ago tried to bomb Vietnam back to the Stone Age.

Soon enough, though, we’ll see Chinese oil rigs erected off Vietnamese coastline. Humiliated by China, and pressured by domestic disgust at governmental, or rather, national impotence, Vietnam may just turn to the US to help it deal with its recurrent foe.

Such is the fate of a small country. To be born small is to have a handicap one must live with. Collectively, Americans are spared from this condition, hence our swagger, although individually, we can feel pee wee enough, especially as we are jettisoned, individually, from all collective aims that make any sense. Our economy is illusory, our government puffed up by slogans and lies, and there’s no national agenda beyond boundless corruption and endless war, against much of the world, and even ourselves.

Linh Dinh is the author of two books of stories, five of poems, and a novel, Love Like Hate. He’s tracking our deteriorating socialscape through his frequently updated photo blog, State of the Union




U.S. Intensifies Military Encirclement of China

By Rick Rozoff

The irresponsible expansion of NATO and its conversion to a naked tool for Western (US-led) imperialism is laying the groundwork for a confrontation between continents as the US increasingly threatens China and Russia. The elimination of this type of malignant leadership is now essential for the survival of humanity and the arrival of a lasting peace. Given the appalling magnitude of their crimes, their pervasive corruption, most top Western leaders now fully deserve to be brought before a Nuremberg-type tribunal. —Eds

With the emergence of China as the world’s second-largest economy and its concomitant renewal of (comparatively minor) territorial claims in the East China Sea and South China Sea, the stage is set for a U.S.-Chinese confrontation of a nature and on a scale not seen since before the Sino-Soviet split of 1960.

Following the expansion of the North Atlantic Treaty Organization throughout Europe over the past thirteen years – every European nation is now a full member of or involved in one or more partnership arrangements with the U.S.-led military bloc except for Cyrus, which is under intensified pressure to join the Partnership for Peace program – which has enforced a cordon sanitaire on Russia’s western and much of its southern frontier, it was inevitable that the U.S. and its allies would next move to encircle, quarantine and ultimately confront China.

In the past decade the Pentagon has begun conducting annual multinational military exercises in nations bordering China (Khaan Quest in Mongolia, Steppe Eagle in Kazakhstan) and near it (Angkor Sentinel in Cambodia), has with its NATO allies waged war and moved into bases in nations bordering China – Afghanistan, Kyrgyzstan, Pakistan and Tajikistan – as well as nearby Uzbekistan, and, even before the official announcement of the strategic shift to the Asia-Pacific region, acquired the use of new military facilities in Afghanistan, Kyrgyzstan, Pakistan, Australia, Singapore and the Philippines.

President Obama’s current visit to Cambodia, Myanmar and Thailand and Defense Secretary Leon Panetta’s simultaneous trip to Australia, Cambodia and Thailand are exemplary of this trend.

Early this year NATO announced the launching of its latest, and first non-geographically specific, partnership program, Partners Across the Globe, which began with the incorporation of eight Asia-Pacific nations: Afghanistan, Australia, Iraq, Japan, Mongolia, New Zealand, Pakistan and South Korea.

Since the summer of 2010 the U.S. has been courting the ten members of the Association of Southeast Asian Nations (Brunei, Cambodia, Indonesia, Laos, Malaysia, Myanmar, the Philippines, Singapore, Thailand and Vietnam), several of whom are embroiled in island disputes with China, for inclusion into a rapidly evolving Asian analogue of NATO which includes the eight above-mentioned new NATO partners and is intended to be a super-Cold War era-like bloc subsuming the former members of the Central Treaty Organization (CENTO), Southeast Asia Treaty Organization (SEATO) and Australia, New Zealand, United States Security Treaty (ANZUS) into a systematic initiative aimed against China.

The so-called Asia-Pacific pivot also entails the deployment of 60 percent of total American naval assets – quantitatively the largest and qualitatively the most technologically advanced and lethal in the world – to the Asia-Pacific region. Even before that U.S. Pacific Command’s area of responsibility has included over 50 percent of the world’s surface, more than 100 million square miles, with U.S. Central Command bordering China and India in the other direction. The U.S. Seventh Fleet, tasked to patrol the waters of the Asia-Pacific, is the largest overseas naval force in the world and will be further enhanced by the U.S. Navy’s intensified deployment to the region. The U.S. has eleven of the world’s twelve nuclear aircraft carriers and all eleven supercarriers.

Washington is also incorporating several Asia-Pacific nations into its global interceptor missile grid, in its initial avatar launched in conjunction with NATO and the so-called European Phased Adaptive Approach which will station increasingly longer-range land-based missiles in Romania and Poland and Aegis class cruisers and destroyers equipped with Standard Missile-3 interceptors in the Mediterranean and likely later in the Baltic, Norwegian, Black and even Barents Seas.

The Pentagon’s partners in the Asia-Pacific wing of the international missile system, which targets China as the European version does Russia, include to date Japan, South Korea, Australia and Taiwan, with the Philippines reported to be the future host of two Forward-Based X-Band Radar-Transportable interceptor sites of the sort deployed to Turkey at the beginning of this year and to Israel in 2008.

China is a critically important component of the two groups representing the greatest potential for a multi-polar world, BRICS (Brazil, Russia, India, China, South Africa) and the Shanghai Cooperation Organization. Russia, its partner in both, confronting the same threats from the West, must, in its own interest as well as those of world peace and equilibrium, support China against American brinkmanship and gunboat diplomacy.

ABOUT THE AUTHOR

Rick Rozoff has been involved in anti-war and anti-interventionist work in various capacities for forty years. He lives in Chicago, Illinois. Is the manager of the Stop NATO international email list at: http://groups.yahoo.com/group/stopnato/

e and elsewhere on TGP and the author’s site.

//