Generational Dynamics: Forecasting America's Destiny Generational
Dynamics
 Forecasting America's Destiny ... and the World's

 |  HOME  |  WEB LOG  |  COMMENT  |  FORUM  | 
 |  DOWNLOADS  |  FOURTH TURNING ARCHIVE  |  ABOUT  | 

Generational Dynamics Web Log for 31-Dec-2016
31-Dec-16 World View -- Hacking of Democratic National Committee computers - I blame the victim

Web Log - December, 2016

31-Dec-16 World View -- Hacking of Democratic National Committee computers - I blame the victim

It's almost always the victim's fault when computer networks are hacked

by John J. Xenakis

This morning's key headlines from GenerationalDynamics.com

Obama and Putin play bizarre diplomatic game after expulsion of Russian spies


Barack Obama and Vladimir Putin
Barack Obama and Vladimir Putin

So President Obama is pissed off because Russian hackers hacked into the Democratic National Committee, and so, just three weeks before he's leaving office, he ordered 35 Russian diplomats to leave the country.

Russia's president Vladimir Putin, who always permits his security people to threaten and harass American diplomats just for the fun of it, announced on Friday that Russia would not reciprocate. Instead, Putin invited the children of US diplomats in Moscow to a New Year's party in the Kremlin.

In the back and forth between Obama and Putin, I sometimes feel as if I'm watching the psychodrama of delusional politicians -- a tale rooted in old grudges and revenge plots hatched in one-sided peace negotiations over Ukraine and Syria over eight long years -- played out on the international stage. Russia Direct (5-May) and Belfast Telegraph

Related Articles

It's almost always the victim's fault when computer networks are hacked

As a Senior Software Engineer who has developed many web sites, I'm pretty much in the camp of "blame the victim" when a company's networks get hacked. At one company where I worked several years ago, I told my managers that they needed to encrypt the social security numbers in their database, and I even told them how to do it easily. I reminded them again after one of their servers got hacked. But the problem is that protecting your networks doesn't generate sales, and Gen-X managers think that when a Boomer software engineer tells them what to do, they'd rather eat mud than do it.

So that's one reason there's a news story almost every week about another company whose networks have been hacked. I write about these every now and then.

However, the real monster hack, the mother of all hacks, was announced last year. Chinese hackers stole the personal and security information of many millions of Americas from the servers at the U.S. Office of Personnel Management (OPM) and Department of the Interior. That hack included the SF-86 forms that everyone fills out when applying for security clearances.

There is little doubt that the Chinese military is still sifting through this massive amount of data and using it in a variety of ways -- from simple blackmail and extortion of individuals to the creation of sophisticated "spear phishing" e-mail messages used to hack into networks of other agencies and corporations. This massive collection of espionage data will be a powerful weapon in any future military confrontations.

OK, so the DNC hack hurt President Obama's feelings, while the OPM hack is putting the survival of the country at risk. So which is more important? Why, the DNC hack is more important, because President Obama's feelings are always more important than the survival of the country. That's why there have been no expulsions of Chinese diplomats.

I was really appalled when I read the stories about Hillary Clinton's home server and other flagrantly stupid violations of common sense. Apparently the same stupidity pervaded all of the networks of the Democratic National Committee, so it's not surprising at all that they got hacked. The CIA and other intelligence agencies have concluded that the perpetrators were linked to Russia's government, and I believe them, but the DNC servers were apparently so poorly protected that the hacker could have been from anywhere.

I last wrote about the hack of the DNC's computers in July. At that time, I made the following points:

So my personal conclusion is that most likely explanation of what happened was that the hacker tried to hack both parties' servers, but succeeded only with the Democratic party servers, and then released the e-mails because that's what hackers do, and probably didn't care who won the election.

It's not always the victim's fault when computers are hacked, of course. Hacking is a huge worldwide industry, and hackers are always finding new ways to get around firewalls or to install malware or ransomware. A good idea is to keep separate backups of all your data, so that if you're hacked then you still have the backup. All you can do is reduce the probability that you'll be hacked, and for that you need to be totally paranoid. Lawfare (11-Mar-2016)

Related Articles

(Comments: For reader comments, questions and discussion, see the 31-Dec-16 World View -- Hacking of Democratic National Committee computers - I blame the victim thread of the Generational Dynamics forum. Comments may be posted anonymously.) (31-Dec-2016) Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal

Web Log Pages

Current Web Log

Web Log Summary - 2017
Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004

Web Log - December, 2017
Web Log - November, 2017
Web Log - October, 2017
Web Log - September, 2017
Web Log - August, 2017
Web Log - July, 2017
Web Log - June, 2017
Web Log - May, 2017
Web Log - April, 2017
Web Log - March, 2017
Web Log - February, 2017
Web Log - January, 2017
Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004


Copyright © 2002-2016 by John J. Xenakis.