SHORT-CIRCUITING CHINA’S CYBERSNOOPING – THE PRESIDENT’S RULE BOOK SHOULD INCLUDE PENALTIES

Washington Times on June 14, 2013, published a commentary by Duncan Hunter on the persistent activity by Chinese cyberspies revealing just how vulnerable America remains to digital security breaches. In the cyberworld, the playing field has leveled, and the United States, without the fortified cyberprotections to match the threat, remains target No. 1. Excerpts below:

This fact makes President Obama’s recent message to Chinese President Xi Jinping even more disappointing. When the two recently met in California, Mr. Obama elected for a softer approach and cited the need to establish “common rules of the road,” in some way implying that the obligation to secure America is a two-way street.

The president should have taken cues from Secretary of Defense Chuck Hagel, who just the week before in Singapore took China to task, publicly stating that the latest string of cyber-attacks against the United States “appear to be tied to the Chinese government and military.” Mr. Hagel’s predecessor,Leon E. Panetta, was equally assertive in calling attention to the cyberthreat, warning of a “cyber Pearl Harbor,” capable of causing “physical destruction and loss of life, paralyze and shock the nation, and create a profound sense of vulnerability.”

In fairness, the distinction between the defense secretaries’ pronouncements and the president’s call for a mutually agreeable rule book might be the design of a broader strategy among the president and his security team. If so, a new plan is needed desperately, though. Reports from the meeting between Mr. Obama and Mr. Xi predictably highlighted China’s refusal to take responsibility for multiplying cyber-attacks, despite abundant evidence of Beijing’s complicity.

The cyberthreat against U.S. industry and government targets is too serious for the commander in chief to pass off to surrogates.

In the meantime, China is expanding its focus from news organizations, private companies, government agencies and even political campaigns. Computer-based attacks are targeting military programs with greater frequency, with significant consequence to U.S. security.

The latest major breach by cyberspies provided China with access to designs for dozens of U.S. weapons systems, many of which are integral to the shift in U.S. global defense strategy to the Pacific region. By gaining access to information on systems that include missile defenses, combat aircraft and vessels, China is better positioned to counter specific weapons.

The claim by Edward Snowden, now in public view for revealing information about classified intelligence programs, is that the National Security Agency has engaged in 61,000 cyber-operations of its own, including the targeting of Chinese assets. While unconfirmed, Mr. Snowden’s claim underscores the prevalence and depth of cyber-operations in a fully digitized world, in addition to the necessity for the United States to maintain an aggressive and forward-leaning cyberstrategy.

Building and strengthening cybersecurity is a must…Cooperative agreements, while potentially beneficial on much a smaller scale, are no match for the neutralizing effect of enhancing the exposure of China’s military and government.

For this to happen, the president must show the muscle to stand firm against China’s cyber-infiltrations.

Rep. Duncan Hunter is a California Republican

Tags: , , , ,

2 Responses to “SHORT-CIRCUITING CHINA’S CYBERSNOOPING – THE PRESIDENT’S RULE BOOK SHOULD INCLUDE PENALTIES”

  1. Alexandra Says:

    Thanks for one’s marvelous posting! I truly enjoyed reading it, you can be a great author.I will be sure to bookmark your blog and will come back at some point. I want to encourage you to continue your great posts, have a nice weekend!

  2. nitrofocusfacts.com Says:

    You should be a part of a contest for one of the most useful sites
    on the internet. I will recommend this blog!

Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


%d bloggers like this: