Cybersecurity

Cyber-Security2by Jon N. Hall1/18/17
There’s No Disputin’ that Old Vlad Putin  • Recently we’ve heard a lot of loose talk about how the November election was “hacked” by the Russians. If one Googles “election,” “hack,” and “Russians” without quotation marks, one is liable to get 20,100,000 hits. So, the president ordered up an investigation, and our intelligence agencies have assured us that there is “no evidence” that vote tallies were affected. These are the same agencies that assured us that the existence of WMD in Iraq was a “slam dunk.”

But Russian hacks of the Democratic National Committee’s computer and John Podesta’s email account are insignificant when compared to other targets of cyberattacks, such as those against our electric grid, banking, hospitals, and such. In “Cyberattacks Against the US Government Up 1,300% Since 2006” on June 22 last year at The Fiscal Times, Suman Bhattacharyya wrote:

Eighteen agencies identified as having “high-impact systems” — those that hold information that, if lost, could cause “catastrophic harm” to individuals, the government or the country — said that cyberattacks from other nations (think China and Russia, for example) are the most serious and most common threat they see. Phishing was the most frequent type of attack, and email was the most frequent vehicle. “During fiscal year 2014, 11 of the 18 agencies reported 2,267 incidents affecting their high-impact systems, with almost 500 of the incidents involving the installation of malicious code,” the report says.

If that’s not enough to disturb your serenity, then consider Rebecca Smith’s “Cyberattacks Raise Alarm for U.S. Power Grid” in The Wall Street Journal on Dec. 30. Or look at this Cyber Timeline put out by Nato Review magazine all the way back in 2013. Here are monthly timelines for cyberattacks at Hackmageddon. Another day, another hack attack, what’s the big deal.

It’s been said that for someone with a hammer, everything looks like a nail. If that human frailty can also apply to fixing our cybersecurity, then to an encryption expert everything may look like it needs to be encrypted. Perhaps we need to try and think “outside the box.” I mydamnself took a stab at that last year with regards to hacking elections. Although the idea I floated was by no means a complete solution to insuring election integrity, I think it’s worth considering. It involves a “physical” wall to hacking.

(By the way, if you’re interested in hacking, you might try the fourth Lisbeth Salander novel, The Girl in the Spider’s Web (2015) by David Lagercrantz. In it, the NSA is hacked. I also mention it because I ran across a familiar name in Chapter 16 (p. 210): “It was a sophisticated RSA encryption, named after the originators Rivest, Shamir, and Adleman.” I had quoted MIT guy Ron Rivest in my article, and subsequently had a few email exchanges with him. Here’s a bit about RSA encryption; seems rather cryptic.)

Clearly, America — her government, her businesses, and her people — is under siege by computer-savvy malefactors, which include governments, terrorists, criminal gangs, and individuals, even precocious kids. Even so, mainstream media hacks have spun the recent revelations for politics. If you want a more measured assessment from a non-hack, here’s Sean Hannity’s Jan. 6 monologue.

If Hillary had won the election would we even be discussing these cybersecurity threats? It’s nice that Mr. Obama is throwing some attention on this vital national issue, even if it’s at the end of his presidency. But he had no problem with his Sec. of State operating a private server for four years. And not only that, other State Department functionaries knew about it and did nothing. Obama seems to want to hold old Vladimir Putin to a higher standard than his own employees.

Because America is so vulnerable to cyberattacks, President Trump should reopen the investigation into Mrs. Clinton’s server-email scandal. For the sake of appearance, Trump should hand this off to his A.G. or a special prosecutor, and then have nothing else to do with it. But it is necessary to show that in America no one is above the law, not even a former First Lady. It would be an “object lesson.” After Mrs. Clinton goes through the judicial system, Pres. Trump might consider pardoning her if she shows sufficient contrition.


Jon N. Hall is a programmer/analyst from Kansas City. • (541 views)

Share
This entry was posted in Politics. Bookmark the permalink.

8 Responses to Cybersecurity

  1. Timothy Lane says:

    Quite often, the greatest threat to security comes from insiders. They can be disloyal (like Bradley/Chelsea Manning), incompetent (like John Podesta), or corrupt (like Hillary Clinton) and even the “best and brightest” can err in allowing too much access to people who don’t need it (like Edward Snowden). An awful lot of lost information stems from such problems. No cybersecurity can protect against such problems.

  2. Steve Lancaster says:

    I have no doubt that the Russians spy on us, after all the Soviets did for 70 years often with notable success, Rosenberg and Ames just to mention two of the most notorious. The other great talent the Soviets/Russian have is the ability to introduce confusion and misinformation into our media.

    We also spy on the Russians, British, French, Germans, Japanese, China, and Israel. The time when gentlemen do not read other gentleman’s mail is long over.

    The Aesop’s story about the frog and the scorpion seems to fit. If we offer the scorpion a ride across the river, don’t be surprised when you get stung.

    • Timothy Lane says:

      This is one reason many of us weren’t so exercised over the Russian “hack” on the DNC/Podesta e-mails. That’s why intelligence agencies do, ours and theirs. And when they’re caught, the other side squawks loudly for show.

    • David Ray says:

      Your comment about the Russian talent for spreading misinformation in our compliant media reminds me of an exceptional novel.
      It’s called “The Spike”. It shows how Russian agents managed to bribe or blackmail in order to spike news stories unfavorable to communism.

      An example: The Venona decripts showed that I. F. Stone, uncle to Weather Underground bitch Bodine, was a paid Soviet stooge known for his vicious attacks on Joe Macarthy – and no ill opinion of the Soviets.

  3. Kung Fu Zu Kung Fu Zu says:

    Two interesting articles about Susan Rice asking the intelligence service to “unmask” Americans’ names.

    Are they finally focusing in on the culprits? You can be sure this will lead to others than Rice.

    https://www.bloomberg.com/view/articles/2017-04-03/top-obama-adviser-sought-names-of-trump-associates-in-intel

    http://circa.com/politics/accountability/white-house-logs-indicate-susan-rice-consumed-unmasked-intel-on-trump-associates

    • Timothy Lane says:

      But Rice denies it — and would she ever lie to us? (Well, if you’ve carefully forgotten the word “Benghazi” . . . )

  4. Kung Fu Zu Kung Fu Zu says:

    A good article which shows the basis of the Dems’ claims regarding the Russian hacking was questionable from the very beginning and are falling apart. Yet the Dems and the media continue to push this meme.

    http://www.dailymail.co.uk/news/article-4376628/New-questions-claim-Russia-hacked-election.html

    Notice this is not published in an American paper.

    • Timothy Lane says:

      The Daily Mail is a conservative paper; I think they’re the paper Ambrose Evans-Pritchard worked for when he was reporting on the 1990s Clinton scandals. I’m not surprised that the report of the “17 intelligence agencies” (all run at the time by Obama hacks, of course) turned out to depend on a single pro-Clinton firm.

Leave a Reply

Your email address will not be published. Required fields are marked *