Friday, July 1, 2011

China Russia United State Cyber warfare no rules or morals



                        China Russia United State Cyber warfare 
                            ( War without rule and moral restriction)





 The Internet is an amazing resource. As you sit before your monitor, long after your neighbors are warm and cozy in their beds, I want you to think about this: Beyond that screen lies 4,000 years of accumulated knowledge. At any time, you can reach out into the void and bring that knowledge home.
There is something almost metaphysical about this. It's as though you can fuse yourself to the hearts and minds of humanity, read its innermost inspirations, its triumphs, its failures, its collective contributions to us all. With the average search engine, you can even do this incisively, weeding out the noise of things you deem nonessential.
For this reason, the Internet will ultimately revolutionize education. I'm not referring to home study or classes that save time by virtue of teaching 1,000 students simultaneously. Although these are all useful techniques of instruction that will undoubtedly streamline many tasks for teachers and students alike, I am referring to something quite different.

Today, many people have forgotten what the term education really means. Think back to your days at school. In every life there is one memorable teacher: One person who took a subject (history, for example) and with his or her words, brought that subject to life in an electrifying display. Through whatever means necessary, that person transcended the identity of instructor and entered the realm of the educator. There is a difference: One provides the basic information needed to effectively pass the course; the other inspires.


The Internet can serve as a surrogate educator, and users can now inspire themselves. The other night, I had dinner with a heavy-equipment operator. Since his childhood, he has been fascinated with deep space. Until recently, his knowledge of it was limited, primarily because he didn't have enough resources. He had a library card, true, but this never provided him with more than those books at his local branch. Only on two occasions had he ever ordered a book through inter-library loan. At dinner, he explained that he had just purchased a computer and gone online. There, he found a river of information. Suddenly, I realized I was no longer having dinner with a heavy-equipment operator; I was dining with an avid student of Einstein, Hawking, and Sagan. His talk was so riveting that I went away hungry for lack of having eaten.
So this much is true: The Internet is a an incredible resource for information. However, it is also an incredible resource for communication and basic human networking. Networking from a human standpoint is different from computer networking; human networking contains an added ingredient called action. Thus, individuals from all over the world are organizing (or I should say, crystallizing) into groups with shared interests. Women are organizing for equality, voters are organizing for representation, and parents are organizing for legislation to protect their children.
China Accuses the U.S. of Online Espionage
China today accused the U.S. of using internet warfare to bring down enemy governments, especially some in the Middle East. The accusations come from two military scholars who wrote that “the shadow of America” lies behind an “internet tornado” sweeping across the world. Social unrest, and a little online organization would go a long way toward real revolution in that country.


China today accused the U.S. of using internet warfare to bring down enemy governments, especially some in the Middle East. The accusations come from two military scholars who wrote that “the shadow of America” lies behind an “internet tornado” sweeping across the world. Social unrest, and a little online organization would go a long way toward real revolution in that country.
Inherent within this process is the exchange of opinions, or more aptly put, ideology. Ideology of any sort is bound to bring controversy, and controversy brings disagreement. Whether that disagreement occurs between two nations or between two individuals is irrelevant. When it occurs on the Internet, it often degenerates into warfare. That is what this chapter is about.
Much like the term information warfare, the term Internet warfare is often misunderstood. To understand Internet warfare, you must know that there are different classifications of it.


 Let's start with those classifications. From there, we can discuss warfare at its most advanced levels. The classifications are

1.  Personal Internet warfare
2.  Public Internet warfare
3.  Corporate Internet warfare
4.  Government Internet warfare

More generally, Internet warfare is activity in which one or more participants utilize tools over the Internet to attack another or the information of another. The objective of the attack may be to damage information, hardware, or software, or to deny service. Internet warfare also involves any defensive action taken to repel such an attack.



US and Russia


The United States recently changed course and began open talks with Russia regarding the role of the United Nations arms control committee towards strengthening Internet security and limiting the use of cyberspace as a military platform. Although Russia and the US have engaged in dialogue about the subject, their interpretations vary. There has been a growing concern in the Obama Administration over the increasing development of cyberweapons and their use. The goal of the US is to increase international cooperation regarding cybercrime.
The Internet war
THE INTERNET has produced a vast expansion of free speech and access to information around the world. But for China and Russia, it has also become a means for waging a covert war against other nations, including the United States -- a brazen effort to steal secrets and plant malware. For those countries and for a host of other authoritarian regimes, Internet freedom is a threat, to be countered by censorship, the imprisonment of bloggers and domestic spying.
This Story  To win the cyber-war, look to the Cold War
    

        China is world leader in hacked computers, report finds
         The Internet war



The U.S. government has been grappling with these challenges for years. But it has not done enough to fight back politically by making Internet freedom an issue in diplomatic and commercial relations and by seeking the international censure of those who violate it. That's why the speech delivered Thursday by Secretary of State Hillary Rodham Clinton was so important. Ms. Clinton made it admirably clear that abusers such as China will no longer get a free pass in U.S. public diplomacy or in international forums.

China is worthy of special attention in part because a large portion of the cyberattacks on U.S. military and other government agencies originate there and in part because of the restrictions that it places on U.S. companies that offer Internet services to its citizens. Google's announcement this month that it and many other U.S. companies had been the object of cyberattacks from China and that it would no longer censor its China-based search engine finally brought that issue to the forefront. To the administration's credit, Ms. Clinton repeated a demand that China investigate and explain the cyberattack, backed Google's stance and called on other American companies to adopt the same position.

"Censorship should not be in any way accepted by any company from anywhere," Ms. Clinton said. "American companies need to make a principled stand. This needs to be part of our national brand." This raises an immediate issue for Microsoft and Apple, two companies that continue to censor their Chinese content. The administration and Congress should explore what steps can be taken to ensure that these companies and others follow the no-censorship rule wherever they operate.

Ms. Clinton pledged that in addition to defending its own companies and cyberspace, the United States would take measures to help human rights advocates, political dissidents and civil society groups overcome their governments' censorship. Until now, the State Department has been negligent in this area; it has misspent -- or failed to spend at all -- money appropriated by Congress for firewall-busting.

A group called the Global Internet Freedom Consortium has been denied funding, even though it says that it has a proven record of breaching the firewalls of both China and Iran. A State Department official told The Post that the group was refused help because it is connected to the banned Falun Gong movement and "the Chinese would go ballistic if we did that." But other officials told us that is not the case; they said that they hoped that the consortium would apply for future funding, which the State Department sensibly plans to spread, venture-capital style, among various groups and technologies.
Russia Cyber Headquarters
US cyber Unit NSA
 Regardless of who is funded, Beijing will probably "go ballistic." A Foreign Ministry statement issued in response to Ms. Clinton's speech already threatened that the new agenda could be "harmful to China-U.S. relations." And perhaps it should be. Far better that the United States raise issues of Internet freedom, discrimination against U.S. companies and cyberwar stemming from China directly and openly with the Communist leadership than allow Beijing to poison and abuse the Internet without paying a price.
     Articular put together By DGH

No comments:

Post a Comment