Of Google, hackers and hairdressing schools

By John Sexton
0 CommentsPrint E-mail China.org.cn, February 23, 2010
Adjust font size:

US Cyber Strategy

In May 2009, the Pentagon created a new military command for cyberspace. The New York Times remarked that it revealed "preparations by the armed forces to conduct both offensive and defensive computer warfare."

In December 2009, as the attacks on Google were taking place, Obama appointed former Microsoft executive Howard Schmidt as Cyber-security Czar

A White House Cyberspace Policy Review published in June 2009 was peppered with references to public-private partnerships and will have made computer security firms salivate at the prospect of becoming fully-fledged members of the military-industrial complex.

In fact, another great source of bloodcurdling quotes on the Google affair has been computer security experts who have every interest in keeping the story alive.

The CEO of data encryption company PGP went so far as to compare Obama's cyber plans to President Eisenhower's order of the day on D-Day, calling it a "blueprint of what is required for us to achieve victory in this conflict," adding "as Ike [Eisenhower] said, we can accept nothing less than 'Victory!'"

Missile Gap

No-one should blame managers of security firms for taking the White House cyber strategy seriously. After all, there is serious money to be made. But journalists have a duty to be skeptical of government agents and those may profit from a story.

Fifty years ago, in his presidential campaign, John F Kennedy pointed to a "missile gap" between the Soviet Union and the US. President Eisenhower denied the Soviets had an advantage, but the Sputnik program had spooked the public and no-one believed him. By the time the missile gap was revealed as a myth it had played its political role.

2008 was not 1960. Obama's cyber strategy played a very small part in his campaign. But the Google hacking storm has come as a welcome diversion from domestic difficulties. The rest of us would all do well to remember that the balance of power in cyberspace remains heavily weighted in favor of America and that hysteria about Chinese hackers is overblown.

 

 

   Previous   1   2  


Print E-mail Bookmark and Share

Go to Forum >>0 Comments

No comments.

Add your comments...

  • User Name Required
  • Your Comment
  • Racist, abusive and off-topic comments may be removed by the moderator.
Send your storiesGet more from China.org.cnMobileRSSNewsletter
主站蜘蛛池模板: 久久精品7亚洲午夜a| 人妻免费久久久久久久了| 亚洲性图第一页| 在线观看中文字幕2021| 一级**毛片毛片毛片毛片在线看| 日本人视频jizz69页码| 亚洲av成人片在线观看| 欧美精品国产综合久久| 免费人妻精品一区二区三区| 久9这里精品免费视频| 极品videossex日本妇| 冲田杏梨在线中文字幕全集| 西西人体444rt高清大胆| 国产欧美亚洲专区第一页| japanese酒醉侵犯| 成人三级精品视频在线观看| 久久亚洲精品无码VA大香大香 | 久久久久性色av毛片特级| 曰批全过程免费视频网址| 人妻18毛片a级毛片免费看| 精品福利视频导航| 国产aⅴ一区二区三区| 韩国一级做a爱性色毛片| 国产成人一级片| 黄色永久免费网站| 在线看欧美成人中文字幕视频| www.日本在线观看| 日本视频网站在线www色| 亚洲H在线播放在线观看H| 欧美亚洲另类视频| 亚洲国产精品乱码在线观看97| 欧美综合婷婷欧美综合五月 | 亚洲欧洲精品成人久久曰| 永久看一二三四线| 亚洲精品在线播放| 老色鬼久久综合第一| 国产乱子经典视频在线观看| 青青艹在线观看| 国产偷亚洲偷欧美偷精品| 韩国一区二区三区视频| 国产六月婷婷爱在线观看|