To get notices of new blogs via email, click here:

Thursday, June 2, 2011

Chinese, the usual suspects, Part II

Ah sigh. China again. Google reported the successful phishing of Gmail passwords from "…U.S. government officials, Chinese activists and journalists…" by China-based hackers. Yep. the usual suspects. Again. Back on November 11, 2011 I identified the IP addresses of Chinese attack servers waging war on my little "honey pot" Linux server. I contended then, and do so now, that this was either an official Chinese government operation or one tacitly approved by them. I have also postulated that Cyber War with China is inevitable, and that principle #7 of The Perfect Virus—Black Box Portability—will be critical to our survival. Because China is weaning itself from Western technology as fast as they possibly can  (see my March 1, 2011 posting).

At best, The Morgan Doctrine postings will get the U.S. Congress off the dime in time. At worst? I once served as chairman of the audit committee for a public company. The Morgan Doctrine will provide an audit trail to condemn institutional stupidity as we are forced into a "Plan B" rebuilding-from-the-ground-up of a completely destroyed U.S. technology infrastructure.

Thus saith The Destroying Angel.

No comments:

Post a Comment

Implementation suggestions for THE MORGAN DOCTRINE are most welcome. What are the "Got'chas!"? What questions would some future Cyber Privateering Czar have to answer about this in a Senate confirmation hearing?