Generational Dynamics: Forecasting America's Destiny Generational
Dynamics
 Forecasting America's Destiny ... and the World's

 |  HOME  |  WEB LOG  |  COUNTRY WIKI  |  COMMENT  |  FORUM  |  DOWNLOADS  |  ABOUT  | 

Generational Dynamics Web Log for 6-Jun-2015
6-Jun-15 World View -- Speculation grows about China's purpose in giant government hacking breach

Web Log - June, 2015

6-Jun-15 World View -- Speculation grows about China's purpose in giant government hacking breach

Tsipras gives bitter, defiant speech to Greece's parliament

This morning's key headlines from GenerationalDynamics.com

Tsipras gives bitter, defiant speech to Greece's parliament


Alexis Tsipras giving speech to parliament on Friday (Kathimerini)
Alexis Tsipras giving speech to parliament on Friday (Kathimerini)

As expected, Greece did not make its 300 million euro debt payment International Monetary Fund (IMF) on Friday, and instead will have to pay 1.6 billion euros to the IMF on June 30. June 30 will be the end of Greece's current bailout plan, and there will be no more bailout money available under any terms.

So it seems that after several years of "kicking the can down the road," and postponing making the hard decisions, the Greece bailout crisis will finally run out of road on June 30. And whatever the outcome, it's certain to be very unpleasant.

Prime Minister Alexis Tsipras was defiant and bitter in a speech he gave to Greece's parliament on Friday:

"Time is not only running out for us, it is running out for everyone. ...

The proposals submitted by lenders are unrealistic. The Greek government cannot consent to absurd proposals. ...

I would like to believe that this proposal was an unfortunate moment for Europe, or at least a bad negotiating trick, and will very soon be withdrawn by the same people who thought it up. ...

We don’t just need an agreement, we need a definitive solution, both for Greece and for Europe, that will finally end the talk of a Greek exit from the eurozone. ...

The fiscal strangulation of a country is a moral issue that conflicts with Europe’s founding principles – which raises well-founded questions on Europe’s future."

Tsipras called on opposition parties to support him in the ongoing negotiations. The far left factions in his own Syriza party have already indicated that they won't support any plan that calls for any austerity.

Tsipras's predecessor, center right New Democracy leader Antonis Samaras, responded by telling the prime minister that he had "some nerve" asking for support at this time. He accused Tsipras of mishandling the negotiations and tipping Greece back into recession. "You have totally destroyed the country and isolated us," he said. Kathimerini and Guardian (London)

Speculation grows about China's purpose in giant government hacking breach

Chinese hackers are suspected in a massive breach compromising the computers at the U.S. Office of Personnel Management (OPM) and Department of the Interior. The personal information of 4 million U.S. current and former federal employees were compromised in the breach. The OPM is the human resources department for the federal government, and so every government agency is potentially affected. The data goes back to 1985.

As usual, the Chinese feigned outrage at anyone who could suspect them of such a thing, and complained that any such accusation would be "irresponsible and unscientific."

The perpetrators are believed to be the same Chinese hackers behind the Anthem health insurance data breach in March, where 80 million current and former customers of Blue Cross Blue Shield plans had their personal information compromised, including birthdates, addresses, and social security numbers.

Assuming that the Chinese are the perpetrators, questions are being raised about what they're planning to do with all this data. The Chinese now have a massive data base of detailed personal information on tens or hundreds of millions of Americans. What are they going to do with this?

If the Chinese want to penetrate another company, they can use detailed information from the files to craft personalized phony messages to trick workers. These are called "spear phishing" messages. A worker receiving such a message might think it's from a family member and click on something in the message that infects their computer, or which gives the hacker access to the other data bases in the company network. With this technique, the Chinese can penetrate one company after another, using the information gathered from one breach to gain access to perpetrate the next breach.

It's not known how certain government officials are that the Chinese government is the perpetrator. It's possible that they know with 100% certainty based on NSA data. However, even if they're that certain, they couldn't say so because they would be accusing China of an act of war, and a response would be required. AP and CNN and Reuters and Dark Reading

(Comments: For reader comments, questions and discussion, see the 6-Jun-15 World View -- Speculation grows about China's purpose in giant government hacking breach thread of the Generational Dynamics forum. Comments may be posted anonymously.) (6-Jun-2015) Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal

Web Log Pages

Current Web Log

Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004

Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004


Copyright © 2002-2016 by John J. Xenakis.