Is Cyber Warfare Imminent, Or Is the Hype Overblown?

    April 3, 2012
    Abby Johnson
    Comments are off for this post.

Is cybersecurity one of your top concerns? Whatever your opinion might be, the government has taken a particularly strong interest in it lately, as security breaches appear to be on the rise. In recent years, the U.S. has seen corporations such as Sony and Citibank hacked as well as various divisions of the government including the Senate and the Pentagon.

As a result of this influx of attacks, Congress is currently weighing legislation that would attempt to prevent cyber warfare. In fact, more than fifty bills have been introduced in Congress toward this effort.

Should cybersecurity be a top priority for the government? Share your thoughts.

Last year, WebProNews reported that cyber warfare was a very real threat and that social media played a significant role in it. Charles Dodd, a U.S. government consultant on cyber defense, told us then that terrorists are recruiting hundreds and thousands of people every couple of months through social media.

“Cyber will be the next generation warfare,” he said.

For more on his perspective, check out his complete interview:

Jerry Brito, Director of Technology Policy Program at George Mason University One analyst, however, believes the rhetoric is being overblown. Jerry Brito, the Director of the Technology Policy Program at George Mason University, told us that, while there are some very real cybersecurity concerns, the issues that the proponents of legislation are pushing are misleading.

Senator Jay Rockefeller is one lawmaker that is aggressively pushing for legislation, and he spoke about the urgency of it in a hearing earlier this year.

“The threat posed by cyber attacks is greater than ever, and it’s a threat not just to companies like Sony or Google but also to the nation’s infrastructure and the government itself,” Rockefeller said at a Senate Intelligence Committee hearing.

“Today’s cyber criminals have the ability to interrupt life-sustaining services, cause catastrophic economic damage, or severely degrade the networks our defense and intelligence agencies rely on. Congress needs to act on comprehensive cybersecurity legislation immediately.”

According to Brito, the evidence doesn’t match what’s being said. What the evidence does show, he pointed out, is distributed-denial-of-service (DDoS) attacks, which happen when a server is overwhelmed. This type of attack, he explained, is what happened to the Senate and CIA and is typically from a state actor or from a group like Anonymous.

Shawn Henry, the executive assistant director of the FBI, recently gave a grim summation of the U.S.’s efforts to fight these attacks, saying: “We’re not winning.” Brito, however, believes that cybersecurity should not be measured in terms of winning or losing. While a loss of information is never good, he told us that government officials are focusing on the wrong areas.

“The threat that they [proponents of legislation] cite is that a cyber attack could cause a critical infrastructure to fail, causing blackouts,” said Brito.

“This is a very real threat – it’s bad, but when you look at what sort of damage it causes, [but] more than anything else, it is an inconvenience,” he continued.

Cyber espionage is another threat that is happening, for instance, between the U.S. and China. In an effort to prevent the threats from getting worse, the U.S. government is expected to crack down in this regard this year. However, Brito told us that while cyber espionage is a serious concern, it doesn’t result in mass casualties.

The third type of cybersecurity threats and the one that is the most dangerous is kinetic cyber weapons. Stuxnet, which was said to have targeted Iranian organizations, is an example of this type of threat. Although these weapons are extremely dangerous, Brito pointed out that even Stuxnet is yet to have any known casualties.

“There really is little evidence for us to believe that we are on the brink of real calamity,” said Brito.

At the Homeland Security and Government Affairs Hearing recently, the White House performed a classified demonstration of how the government would respond to an attack on New York City’s electrical grid. While details are classified, several people have speculated that the simulation resulted in a blackout and mass casualties. Speaking at the hearing, Senator Joe Lieberman, who is also advocating legislation, has equated the current threats to September 10th, 2001, or the eve of the tragic September 11th attacks.

“The system is blinking red – again. Yet, we are failing to connect the dots – again,” he said.

Brito, although admitting that the simulation was confidential, again, does not believe the evidence matches the rhetoric. As he explained to us, numerous blackouts have happened in history, but they have not had devastating outcomes.

“Something like a blackout, while something that is bad and something we should definitely try to avoid, it is not the end-of-the-world scenario that a lot of folks would portray it to be,” said Brito.

“If a blackout is to cause mass chaos and a panic, we’re in big trouble not just in a cyber event but just if a tree branch falls and causes a blackout,” he added.

In response to the growing threat of cyber attacks, two bills have been introduced to Congress. Sens. Lieberman, Rockefeller, and Susan Collins wrote the Cybersecurity Act of 2012, which would require companies to meet certain security standards. Senator John McCain has also introduced a bill called the Secure IT Act that focuses on information sharing instead of regulatory enforcement.

Brito told us that he does not support legislation that would compel businesses to secure their networks in a particular way. According to him, companies are aware of the problems that exist and are more than capable of taking the security steps they need to protect themselves without the government intervening.

“There is no real need it seems for companies to be told how to secure their own networks,” he said.

Instead of legislation that regulates companies, he thinks the barriers that prevent the private sector from sharing information about cyber threats with the government should be removed. Brito believes this would be a more effective approach than legislation, as long as consumer privacy is maintained.

Richard Clarke, Cybersecurity Expert Incidentally, in the April 2012 edition of Smithsonian, U.S. cybersecurity advisor Richard Clarke discussed these very issues, and specifically, addressed the threats with cyber espionage.

“My greatest fear,” Clarke says, “is that, rather than having a cyber-Pearl Harbor event, we will instead have this death of a thousand cuts. Where we lose our competitiveness by having all of our research and development stolen by the Chinese. And we never really see the single event that makes us do something about it. That it’s always just below our pain threshold. That company after company in the United States spends millions, hundreds of millions, in some cases billions of dollars on R&D and that information goes free to China….After a while you can’t compete.”

Ron Rosenbaum, who wrote the report, closed it by making a comparison similar to the one from Senator Lieberman:

“I left Clarke’s office feeling that we are at a moment very much like the summer of 2001, when Clarke made his last dire warning. ‘A couple people have labeled me a Cassandra,’ Clarke says. ‘And I’ve gone back and read my mythology about Cassandra. And the way I read the mythology, it’s pretty clear that Cassandra was right.'”

Where does the evidence point: toward cyber warfare or manageable cyber threats? We’d love to hear your thoughts in the comments.

  • Clifford

    I think it is eminent.

  • Clifford

    I think it is Imminent

  • laurie

    already started! don’t you people read?

  • lior Ramati

    As the guy quoted said. almost all of the increase in attacks has been of the dDoS type. there is no good way to stop it. an analogy would be making a prison transfer protocol as safe as possible. It wouldn’t help securely transfer inmates in and out of the prison if somebody built a 10 foot wall around the perimeter of the prison. That’s the equivalent of dDoS. No cyber security will help when they’re only trying to overload the server with requests. It’s like when your computer freezes up because you tried to open too many things at once. Same idea, but over the internet.

    • http://primacomputing.co.nz Pete Dashwood

      There ARE ways to stop it but they are generally not being implemented. DDoS attacks can be prevented by proper analysis of incoming mail and reflecting malicious mail to the sender. Mail servers can have enough “smarts” to throttle down the incoming stream when it goes outside acceptable parameters. Valid messages will not get processed as quickly as they would have done, but they WILL get processed.

      We can usually do something about almost anything in IT; the question is identifying what needs to be done then applying imagination and skill to do it.

      Where a DDoS attack is truly “distributed” it is much harder to deal with but NOT impossible. The attacking servers can be identified and retaliated against.

      The whole question of Cyber security is a marketing opportunity for people with a vested interest in it. The ONLY real defence is knowledge and skill.

  • Big Rich

    Espionage and crime are here and, until the penalties are ramped up to dissuade the perpetrators, are here to stay.

    90% of CyberWar is hype, largely supported by the business development community of the defense industrial base (and the leaders who have to deliver sales/profit at their companies), who view CYBERWAR as the new market opportunity that will help their business plans recover from the cuts in defense and intelligence community spending.

    Happened before. As defense budgets drew down under Clinton, PDD-63 and the hope of new Critical Infrastructure Protection funds had every major defense firm tooling up their Info Assurance marketing teams to capture the windfall. Nada, except incumbents selling encryption. A couple years ago, as the defense and intel community started to insource work and ask for 15% cutback in support contractors, the CNCI came about and every major defense firm tooled up to capture the windfall. Nada, except incumbents working highly classified programs.

    CYBERWAR! will be the mantra as long as current business plans for sales/profit in the defense community are not achievable without the “miracle” dream of new cyberwar funds.

    10% of Cyberwar is NOT hype. This is the assymetric warfare plans of a potential adversary such as China. It’s long been a published strategy that using Cyberwar to attack US commercial infrastructure may stop the US population from having the stomach to ship the USN over to defend Taiwan; also, using Cyberwar to attack the industrial base that supports the logistics needed to get the USN over to defend Taiwan.

  • John

    Cyber privacy from government should be the main concern.

  • http://www.Globalcrossroadscapital.com SinCityFinancier

    Note the bookworm that says the issue is overblown is likely never actually been involved with national security hands on.

    For those who are part of the real world and have been involved with national security can affirm that cyberwarfare isn’t just imminent but has already begun.

    • Big Rich

      Note the wannabe “warriors” who prefer the safety of cyber to a real mission, and who say “the Cyberwar has begun!” is likely to not grasp the difference between CYBER ESPIONAGE and CYBERWAR. They are not the same – just as traditional espionage has nothing to do with CYBERWAR. Yes … traditional espionage was just as much a “preparation of the battlefield” (just like SIGINT is … or any intelligence discipline) as what China and others MAY be doing with their espionage. But traditional espionage is NOT warfare, and neither is what’s been happening till now cyberwar.
      PS – DDOS on a government website is a nuisance and a chuckler, not “warfare” … so don’t bring up Estonia ..

      • Chad R

        Accordijng to Big Rich

  • http://watching-the-world.com/ Doug Wilson

    “There is nothing new under the sun…”

    Follow the money. If there is a profit to be made then CyberWar is imminent. EX: War on Drugs, Cancer etc.

  • David H

    Wow, there are some real chuckleheads even reading WebProWorld!

    To the dimmest responders who think this is an overblown issue and simply point to Denial of Service Attacks as “proof” it is nothing serious — whoa, what are you smoking when you should be investigating the Big Picture?

    Cyber Warfare is about a whole ARSENAL of tools! China, for one, the USA, for another, I am sure, has been PROBING and TESTING and building up their technical internet breakers.

    Just because you can get your email and send out Twitters does not reveal what is going on behind the scenes with hundreds of millions and millions of government dollars and Chinese yen poured into creating attack and disable tools and multi-faceted strategies.

    What you dullards don’t know is that Already, even NOW, this minute, enough strategies and tools are already at our disposal to launch a “Cyber War” that would put your ATM’s out of business, shut down the bank transfer of funds, disable utilities, take out whole cellular antenna arrays all over the world, shut down the internet for all intents and purposes because of the extreme vulnerabilities that exist in DNS servers, etc, etc.

    Just a tip of the iceberg. And this could happen NOW with just the opposing government resources that exist even at this “coming out of the cave and playing with fire” moment in communications infrastructures.

    It IS serious and since when have you ever seen any other pattern but “Oh, MiGOD! I can’t believe this is HAPPENING!” Followed by furious citizens demanding to know why our government didn’t WARN us sufficiently and in time.

    Serious times are coming and preventative technologies simply are not in place sufficiently to protect us.

    Never before in the history of the world have we ALL been so dependent on core technologies to make “Life work” in technologically advanced countries. It is our Achilles heel and is more vulnerable to attack with each day.

    Things have great potential to get seriously life-threatening.

    Particularly when emergency services suddenly stop working and disaster relief can not be coordinated by any communications other than smoke signals and semaphores.

    • http://primacomputing.co.nz Pete Dashwood

      I found your piece very interesting, David.

      I think you’re mostly right insofar as there is already activity going on which really shouldn’t be. And your careful distinction between espionage and war is also a point well taken.

      Yes, there are already enough means at our disposal to bring the Western civilizations to a halt (at least for a while) and there probably isn’t enough being done to prevent that scenario.

      But anyone who designs a system that is totally dependent on technology has to recognize the risks and ameliorate them. Have a fallback to smoke signals and semaphores…:-)

    • dandare

      Chinese Yen?

      Do the Japanese know the Chinese have stolen thier currency?

  • Chad R

    Considering the fact that our politicians have already allow China to get patents & military secrets (even WH members allowed foreigners to have all kind of access {and that is just Clinton years}) what is the point. We already have Iran downing our drones and the US government reaction is to make a drone hot with a nuke……do you really think they will see the logical side because I don’t.

  • Greg

    Maybe the groups would not be so worried – or be attacked – if they did not engage in such abusive behaviors and bully tactics. For the rest of us the arrogance of such individuals hired by the FBI etc who spout off like they are gods with security just invites a little humbling.

    The beauty of the Internet is it allows individuals to combat the propaganda given out by governments – just look at Wiki leaks and the sick behavior coming from elected officials.

    It is obvious that the US just invents what they need to invade or do what ever they want – why should anyone believe a US elected official.

    So the article calls it WAR … maybe for some more ratings … the rest of us may prefer to think of it as a group of people showing bullies that they can not always get their way just because they have a big stick.

    The attacks hardly counter the loss of life Bush caused with his weapons of mass destruction and other lies – is he not a war criminal based on these peoples arguments?

  • http://www.captaincyberzone.com Cap’n Cyberzone

    When you’re short on brains pass a law and make believe that all is well again.
    How about doubling the efforts on security instead.

  • Cj

    By all means a nation should protect it’s communication infrastructure via technical means. More Government regulation will only pave the way for more ‘Cyber war’.

  • Dalton

    Everyone seems to be arguing over whether the term should be called “War” or “Espionage” or arguing whether or not it’s real. When maybe what we should be focusing on is what can be done about it in case it is real. Imposing laws to make it “illegal” surely won’t help. As if a hacker from another country is going to be intimidated by one of our laws that doesn’t carry any international weight and even if it did, they couldn’t call themselves a decent hacker if they can be traced. I don’t believe requiring corporations to enact some arbitrary minimum of cyber security would do much to combat the problem either. Companies already know what they need to do to protect their own information and practically everything that can be done is already being done. With that said, is any of these companies still vulnerable to getting hacked? The answer is yes.

    There is much we can do to keep out the low to medium level hacker. But let’s face it; it is inevitable that anyone or any system can be hacked if the hacker is skilled enough to do it. This fact is unavoidable and has been known for decades. I believe the Government knows this as well. Especially, the Senators and Congresspersons that are writing the proposed legislation.

    I would expect that there are underlying circumstances to why these individuals would want to write such legislation when they know it is doomed to fail and could not achieve its goal no matter what. I would expect that these circumstances would have more to do with political favors for companies that specialize in Cyber Security to create a market or increase sales for these companies. The other possible reason would be that Anonymous has hacked either them or friends of theirs (corporations like big banks) and they are angry and this is the first step toward retaliation against Anonymous.

    Let’s face it. Our government officials and police can’t even make a dent into internet fraud and yet they are acting, now, as if they can do something about such a large scale attack that they are trying to scare us into believing is happening or could be happening?! Our government has the world’s best hackers working for them and it is their job, daily, to hack into our own systems to find the holes so that they can be patched. I seriously doubt China or any other country will ever have the same level of hackers working for them as our government has and that they will ever be able to infiltrate any of our government systems.

    And don’t think for a second that the drug companies, oil barons, and big banks don’t have some of the best hackers working for them as well because they do. I think we can all smell the fear the GOP is trying to muster up in us when Joe Lieberman and Clark are, once again, trying to use 9/11 as a reason to do anything. It seems to me that the only one’s who would gain from such legislation are the companies that are lining the pocket books of these politicians with heavy donations so that they can increase their sales of their products.

    I also feel it’s laughable and something straight out of AMC’s series “The Walking Dead” to think that a mere power outage (blackout) would cause such chaos and destruction anywhere in the world, especially here as our government is trying to make us believe would happen.

  • RC

    I’m just as concerned about the government’s “denial of freedom” & “denial of privacy” attacks in the name of ‘protecting’ us from whatever or whoever we’re supposed to be living in fear of this week.

  • http://bestwebsitename.com Glenn Madden

    Simple, pull the plug. Make critical areas only accessible locally.
    Too many doors have been set up just for the convenience of rich lazy people spending tax payers dollars the wrong way.

    There is no way to secure a door 100%.

    Build a wall with no cyber doors until you go through a real door.

    Then to breach security the hackers have to pass by real security guards with real guns.

    Isolate the core from any access except local.

    Then you might say what about systems like traffic lights throughout the entire city. I say again a bunch of lazy people spending tax payer dollars the wrong way. All of this was done very well before networking came along.

    Take systems that do not have to be online, offline.

    Then it may take some thinking of protocols but even systems like say a bank online access could be done securely.

    The real information is isolated. The available information is connected by real people uploading the data from the physically isolated servers.

    This is not a new idea and many systems are using it.

    But the rich want easy access. So too many systems are much more open than they have to be just for convenience.

  • http://www.consciousminds.com Moorpheus

    Cyber War is on. My servers are scanned daily roughly 200 to 1000 times mainly for database and other potential holes. All I have to say is it’s a different world people, a lot different from what we have been taught. Companies like The Facebook Google etc are like their own nations. The government can do little to nothing against them they are their own governments. Since I’ve started my Consciousminds.Com project I have been followed, net laws have been written like sopa etc to stop me and I don’t even have a site up, while most of the people are asleep and can’t see that while us little guys add to the internet it costs money and Big Brother will always be able to offer their clones of our hard work for Free.

  • http://www.goldcurrent.net GoldCurrent

    HYPE. Another power grab by the same government that gave us the “Patriot” Act, NDAA, TSA, DHS, “Enemy” Expatriation Act and so on in the name of “terrorism” by boogeyman cave dwellers.

    • Arlene

      I agree! Finally someone who sees this for what it is, just another way for big brother to control and eventually profit from another scare tactic. When will the majority of people wake up?

  • https://www.searchen.com Clasione

    Give a little and lot more will be taken. It always goes further. The internet will just be regulated out of a realistic means of exisiting. The solution is to deal with the problem, tighten up, do your best, not elliminate the service – becuase everyone knows that is exactly what will happen – piece by piece, little by little, the intrernet you knnow and love will disapear.

    • https://www.searchen.com Clasione

      That’s a cool name they came up with isn’t it? The “Patriot” Act, – I feel like an American just saying it – sounds Patriotic just hearing it… All warm and fuzzy doesn’t it?

  • http://www.comodo.com/ Allen

    Cyber war approach is more emminent these days

  • Paul

    Maybe the problem lies in the definition of “war”. In a Cyber conflict of any kind, we are not speaking about Nations per’se’ but Corporations. Massively rich and multinational organisations. Ironically, so are the drug lords, terror organisations and followed by the highly publicized Governments (any of them). Earlier Laurie said (in these comments) “we already are” in Cyber War.
    Trying to persuade the “public” that a government can actually stop it, or do anything about what is happening is well, naive to say the least. The only real fear is, how long will it take before it goes to the next level, actually blowing up server bases and satellites? Happy Browsing everyone………..

  • Codex

    Distributed DDOS attacks are usually zombie computers. These computers are hacked because they are not updated, they are not protected, etc.

    Therefore the best way to stop DDOS is to make it a habit worldwide to have a secure PC. Make some laws discouraging the installation of pirated OS in Internet cafes, homes, etc.

    They pirated OS cannot be updated thus hackers exploit them like a piece of cake.

    If all people in the whole world will be using Linux, I doubt if DDOS exist.

  • http://damescribe.hubpages.com/ Gin

    I think govt computers, especially with national secrets, shouldn’t even be online. Make computers available to go online separate from those attached by intranet methods.

  • chase

    Since the “Government” intrests are controled by business intrests rather than the peoples intrest you have to take all that is said with Business intrests in mind.

    As far as I’m aware all US Government Top Secrets are held on a closed system. They’d be fools to do other wise. So that ends the China Espionoge BS.

    China is blocking many western world social sites – that ends the China spying bs further.

    China only needs ask or look at all the US companies that build there for the technologies – so that ends that bs.

    China’s cars are rated higher than the US as far as mpg so I doubt they need anything from us there.

    Korea’s had 12mp camera’s 1o years ago so they don’t care about our technology.

    Pakistan … spying on the US… they are blocking the US sites as well – and that would be the easist way to spy – just ask someone on the social networks for info. “Hey – I heard this is going on there… is it true?”

    The Feds and other Goverment sites were hit or brought down… gee i wonder why? Did something they did recently promote an attack – piss how many members off? Think real hard on that one… should take you all of a second to come up with the reasons why…

    Sony – same thing.

    Other than internet fraud – cyber attacks like DDOS are really… when you think of it – lame. So someones site went down for a few hours or even a day… big deal.

    IF there were to be a real attack / war of any magnitude… what? you turn off the server and reboot… kill the conection for a few hours…?

    And furhter more – no one would have to worry about a real threat if they weren’t doing something to piss everyone off all the time.

    There are why’s and reasons to everything.

    911 – if it really was an outside attack – over broken promises the US made and… tah dah… Oil.

    Pearl Harbor… broken promises the US made – refusal to deal and rather steal others Textiles – (India) which Japan depended on. And the US wanted.

    Using the term “terrorist” in any sentence, especially after Bush and then Obama – you know they are lying and it is in the intrest of what ever the Corps fear or need or want – it has nothing to do with the people.

    You resolve the “why” – you resolve the reasons for anger and most importantly the reasons for attack.

    Till those issues related to the ‘why” are resolved, you resolve nothing with any amount of legislature. And would be security measures put in place to thwart attacks due to unresolved reasons for the attacks in the first place – in all accounts mute and pointless.
    – Because those that feel strongly enough – will continue to fight for what they feel is their right[s] and or freedoms.

    Resolve the why – resolve the problem.
    Provoke a reason, you know the why…

  • Major Wedgie

    The government are the bad guys.

  • Anon

    Quite frankly, I think this is a classic case of fear of the unknown leading these ignoramuses to write all these stupid bills that do more harm than good.

  • Yosri

    Stuxnet is a proof of what can be achieved. In this case, it target Iran nuclear ore refining system. Just substitute the refining system with medical system, ie change all bloodtype so you get wrong blood type donated, or wrong medication ie replace medication with the one you are allergic to. Waiting for it to happen by saying there is no casualty yet is plain unclever to say the least.

    • dandare

      Stuxnet worked because some donut allowed code to get to a system that was critical.

      If you have systems that are important to the Crticial National Infrastructure do the sensible thing….have an air gap.

      If you connect a Nuclear Power Stations crticial management system to a network with 100 Million plus idiots on it, what do you expect?

      Don’t spend millions of tax-payers money building defences against an attack that shouldn’t happen, or in writing laws that pay lip service to security and divery hard pressed law-enforcement resources away from real crime. Disconnect the damn machines from vulnerable networks, and properly police who can get physical access to them, and what they can put on them!


  • China Invasion

    Not sure how there can be any questions about this.

    We have seen at least a TEN fold increase (very conservative) in OFFENSIVE , SOPHISTICATED , INTENTIONAL and VERY HOSTILE server attacks originating from – uh France? no .. uh Mexico? NO.

    the Lion’s share comes from CHINA, whether masked or piggybacked on some UK hijack, the final lesson is always the same – you deal with China, you loose – period.

    Astutely observed in Mr. Dodd’s video is the rehash of every military failure the western world has suffered against Asian pseudo-commies: we have “rules”, we are still talking about defensive “Cyber Security” – China don’t give a rats about any of that – Oh yeah check out your chances of criminal extradition from China lol.

    Only an idiot doesn’t think there isn’t a war going on – one the west will loose if they keep playing nice.

  • InfoTech

    Congress, Corporations etc are trying to make “Cyber War” the next big bubble. Its criminal.

    I have been in the “arena” since about 1998. A little longer in IT. I remember working for a large Soft Ware developer how I freaked out when my lab was breached. For about 2 weeks “Cyber Warfare” was pretty bad and I disconnected(physically unplugged) computers that were not actively doing something. We eventually secured the systems. But this hype reminds me of how contractors were coming to sell their services telling us how hackers/crackers could get within our perimeter. This was some time ago. I have been in the Security field and done some work since.
    While any system I worked on had significant attacks from abroad its not something I would hire contractors(or even pay myself) more than a normal government salary to safeguard. I think all this Cyber Warfare deluge is an attempt to get some sort of sound byte thing to re-brand and charge more money for the same services and equipment. Corporate greed has become intolerable. And what congress is doing holding hearings on threats that were always around treating them as if they just became aware of them to then allow their supporters to sell the government incredibly expensive systems in typical.

    Luckily very few of the people that are the “buyers” in government or elsewhere give credence let alone buy into this stuff.

  • InfoTech

    China has always attacked computer systems. The funny thing for newbie’s is that ping packets now translate into missiles and aircraft carries coming at them. Where I worked we had a very good sandbox that kept this stuff segregated. The Chinese don’t need to come in through the wire. They are already sitting in the corporate boardrooms.

  • InfoTech

    My favorite is the White House Cyber Czar who commented that there is no Cyber War. He is right of course but how clueless do you have to be to say that in a pre-election cycle. Now all the donors will be mad. This cyber hype and frenzy notice is resulting in a boom in contractor hiring. But guess what, the jobs are not coming to the good old USA. They are, you guessed it, outsourced to monitoring centers in India. How the Chinese must be laughing. The center that’s supposed to monitor their activities is right across their border in a country where they can easily bribe or hack their way past any safeguards.