Generational Dynamics: Forecasting America's Destiny Generational
Dynamics
 Forecasting America's Destiny ... and the World's

 |  HOME  |  WEB LOG  |  COUNTRY WIKI  |  COMMENT  |  FORUM  |  DOWNLOADS  |  ABOUT  | 

Generational Dynamics Web Log for 12-Feb-2010
12-Feb-10 News - Destop PCs are still vulnerable to 'Aurora' Chinese hacker attacks

Web Log - February, 2010

12-Feb-10 News - Destop PCs are still vulnerable to 'Aurora' Chinese hacker attacks

Loony investors surge stocks after non-bailout bailout promise by EU

'Operation Aurora' attack goes far beyond Google

Operation Aurora, the name for the coordinated cyber attack on Google and 30 other corporations in January, is now found to be a much larger attack than previously thought, and is still ongoing, according to Dark Reading.

Security experts at forensics firms are getting closer to identifying the specific individuals responsible for the Aurora attack. They've found no direct evidence implicating the Chinese government, but the attack code contains trails pointing to Chinese hackers.

Those interested in the specific technical details of the Aurora attack can download the HB Gary Threat Report: Operation Aurora (PDF) from the HB Gary web site.

Protect your computer from the Aurora attack

Corporations are updating their employees' computers to block the Aurora attack, and are strongly urging their employees to update their home computers. This is important because employees frequently infect their office computers with viruses they've brought from their home computers.

Here are instructions that one corporation has sent to all its employees:

"Employees who own and use Microsoft Windows operating systems at home (2000, XP, Vista, Windows 7), and have one or more versions of a Microsoft Internet Explorer web browser installed on their computer(s) are advised to take the steps listed below to protect themselves, and to protect Departmental systems and information.

Employees are also advised to review other software on their personal computer(s) and perform security related updates as recommended by the vendor in order to minimize potential exposure to a compromise via avenues other than Internet Explorer."

This stuff is worth paying attention to, because if someone attacks your home computer, you could lose your bank account, or worse.

Attack software packages battle each other for control of your computer

Aurora isn't the only attack spyware program that's going around these days.

Zeus is an attack spyware program that's been available for several years, though newer versions have been getting more dangerous. It installs itself on your computer when you visit a web site, usually a game or porn site, set up to infect as many computers as possible. Hundreds of thousands of computers around the world are infected with Zeus.

Now a new attack software package called SpyEye is just getting started. If you'd like to become a criminal and hack other people's computers, then you can purchase a SpyEye development kit for $500.

But SpyEye has a new twist, according to Dark Reading. SpyEye contains a module called "Kill Zeus," whose apparent purpose is to delete Zeus from an infected system, so that SpyEye has the computer all to itself.

Get ready for a war!

Germany blocks EU from a bailout of Greece

Typical of the Pollyannish headlines that came out early on Thursday was this from the NY Times: "Europe Commits to Action on Greek Debt."

The statement issued by the Europeans said, "Euro area member states will take determined and co-ordinated action, if needed, to safeguard financial stability in the euro area as a whole. The Greek government has not requested any financial support."

But no details were provided; in particular, there was no word where the money would come from.

This announcement of a non-bailout was enough to boost the serotonin levels of loony investors into pushing the Dow Industrials up over 100 points, well above the 10000 level again.

However, other reports indicate that there are deep divisions among European leaders whether Greece should be bailed out at all.

The Guardian reports that the leader of the opposition is German chancellor Angela Merkel. One senior EU diplomat is quoted as saying, "Germany is stepping totally on the brakes on financial assistance, on legal grounds, on constitutional grounds and on principle." Another senior diplomat said of the Germans: "They're not waving their checkbooks."

According to Ambrose Evans-Pritchard of The Telegraph, there is talk of a "coalition of the willing," countries acting outside the EU Treaty structure to help Greece.

It's not surprising that Germany is very reluctant to participate in a bailout. For one thing, as the wealthiest country in the eurozone, Germany would end up supplying most of the bailout money. And for another thing, Germans have a very strong national memory of the hyperinflation that occurred in the early 1920s, when it took a barrel of money to buy a loaf of bread. They're well aware that a bailout of Greece would lead to demands of similar treatment from Portugal and Spain, and things could very quickly get out of control.

In fact, there's a feeling in the air that things are already spinning out of control. Even if the Greece situation can somehow be quiesced, other countries are very close to similar or even greater crises. It's just a matter of time.

Dubai may be selling off the Queen Elizabeth 2

It wasn't so long ago that the biggest problem in the world was a threat of default by the tiny little emirate of Dubai. (See "World markets plunge 3-5% as Dubai bombshell sinks in," from November.)

At that time, it was decided that Abu Dhabi would bail out Dubai, and the crisis would end.

Unfortunately, it hasn't ended yet. Dubai is being forced to sell off many of its assets, in order to make its debt payments.

CNN Money reports that one of the assets on the table is the Queen Elizabeth 2 (or QE2) ocean liner, once the largest and grandest passenger ship in the world. Dubai purchased it in 2007 for $100 million, planning to turn it into a floating hotel.

Additional Links

Times Online reports that Yemen authorities and the Houthi (Shia Muslim) rebels have agreed to the ceasefire that we described last week. From the point of view of Generational Dynamics, this ceasefire is part of the political dance that leads to a full-scale generational crisis war.

Vice President Biden recently told Larry King on CNN: "I am very optimistic about -- about Iraq. I mean, this could be one of the great achievements of this administration." This is really the limit. If we'd listened to Biden when he was in the Senate, then not only would we have left Iraq in chaos, but our troops would be embroiled in the middle of a bloody civil war in Sudan. (See "Senator Joe Biden wants to move troops from Iraq to Darfur civil war.")

A double suicide bombing near Peshawar in northwest Pakistan killed 15 people, and wounded 24 others, according to Pakistan's Daily Times. It's the third attack in the last 24 hours.

(Comments: For reader comments, questions and discussion, see the 12-Feb-10 News - Desktop PCs still vulnerable to Chinese 'Aurora' thread of the Generational Dynamics forum. Comments may be posted anonymously.) (12-Feb-2010) Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal

Web Log Pages

Current Web Log

Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004

Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004


Copyright © 2002-2016 by John J. Xenakis.