Generational Dynamics |
|
Forecasting America's Destiny ... and the World's | |
HOME WEB LOG COUNTRY WIKI COMMENT FORUM DOWNLOADS ABOUT | |
Obama's offer to Israel may have been a hoax
China is blasting a report to the US Congress accusing China of hijacking massive amounts of internet traffic for a brief period earlier this year, including traffic to and from US military and government sites.
The Chinese government publication Global Times quotes experts as calling the accusation "ridiculous and unreasonable," pointing out that the United States, with the world's most advanced technology, controls the majority of the digital information flow.
The 316 page report on the national security implications of the trade and economic relationships between the U.S. and China was written by the U.S.-China Economic and Security Review Commission and transmitted to Congress on Thursday. Topics include economics and trade, national defense and cyberwar, energy and environment, and censorship.
The report lists two major incidents where it appears that China hijacked a large part of the internet:
When you type a name like "GenerationalDynamics.com" into a web browser, the browser contacts a "Domain Name Server" that translates the name into a web server location (IP address). Sometimes the Name Server is located in another country. In March, a Domain Name Server in China translated names into incorrect addresses. The problem continued for several days.
When data is transmitted between your browser and a web server, the data travels in several steps, or "hops," from one server to another along the way. Each server consults a "routing table" to determine the shortest path. China Telecom controls some of those routing tables, and was able to change them to fool servers in other countries into assuming that the shortest path between almost any two servers in the world was through China.
The result was that some 15% of all internet traffic was routed through these servers in China. This lasted for about 18 minutes on April 8, 2010. Nobody outside of China knows what happened to the data, but it's possible that the Chinese were performing espionage on certain types of e-mail messages or other data, and was capturing it as it went through their servers.
If we now go back to China's statement in Global Times, it looks very flimsy and defensive. It points out that "the United States, with the world's most advanced technology, controls the majority of the digital information flow." Well, what does that have to do with? They're not denying that the data was hijacked, they're not saying it was an accident, and they're not saying that they didn't capture some of it for espionage or other purposes.
As we've said before, cyber warfare is becoming increasingly prevalent. The military is now treating cyber as the "fifth domain," after the other domains -- land, sea, air and space. The bad news is that very few people in the U.S. military are trained to deal with this kind of warfare, and the other bad news is that the Chinese appear to be developing and testing out techniques to win with it.
Ireland is finally playing the game. In attempt to calm investor fears and reassure the public, Irish officials are saying that all Irish bank deposits are safe, and that Ireland can expect to receive "tens of billions" in bailout loans when bitter negotiations over Ireland's sovereignty are completed. A particular issue will be Ireland's low 12.5% corporate income tax, which the country has used to lure many American companies to build plants there. This upset other EU nations, because it put them at a competitive disadvantage. Now they're going to insist that Ireland raise the corporate income tax and give up that advantage. Bloomberg
According to the Debka subscriber-only newsletter, forwarded to me by a subscriber, the recent deal that the Obama administration offered to Israeli prime minister Benjamin Netanyahu was a hoax. (See "15-Nov-10 News -- Mideast peace talks take on a comic flavor.") Under this deal, the US would give Israel a free squadron of 20 F-35 stealth fighter jets in exchange for a moratorium on settlements in the West Bank, excluding East Jerusalem. Well, it seems that no such offer was made by the Obama administration, and Netanyahu presented it to his cabinet anyway, in the hope that if they accepted it, then he could convince Obama to go along with it. Debka
Phrases like "We have the very best auditors" and "our team" are signs that a CEO is lying. NPR. But why just CEOs? Just listen to Obama or any other politician in Washington and you can tell they're always lying as well.
There are signs that India's Maoist terrorists, known as Naxalites, are linking up with Lashkar-e-Toiba (LeT) and other Pakistani jihadi terrorist groups, but evidence to support the linkup is hard to find. Stratfor (Paragraph updated - 19-Nov)
Terrorism expert Bruce Riedel says that a jihadist coup in Pakistan is a real possibility. The most likely scenario is a coup from inside the military by jihadist sympathizers. Spiegel
Burma's Aung San Suu Kyi may be gaining support among the younger generation of soldiers in Burma's army. Several hundred lower-ranked soldiers from two Burmese army divisions traveled to Rangoon last week to witness the release of Suu Kyi from her decades of house arrest. BBC
An analysis of the geopolitics of northern Mexico shows major differences between the three northern provinces -- Baja California, Sierra Madres, and Rio Grande Basin. Foreign Policy Research Institute
(Comments: For reader comments, questions and discussion,
see the 19-Nov-10 News -- China accused of hijacking internet data thread
of the Generational Dynamics forum. Comments may be posted
anonymously.)
(19-Nov-2010)
Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal
Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004
Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004