Ah sigh. China again.
Google reported the successful phishing of Gmail passwords from "…U.S. government officials, Chinese activists and journalists…" by China-based hackers. Yep. the usual suspects.
Again. Back on November 11, 2011
I identified the IP addresses of Chinese attack servers waging war on my little "honey pot" Linux server. I contended then, and do so now, that this was either an official Chinese government operation or one tacitly approved by them. I have also postulated that
Cyber War
with China is inevitable, and that principle
#7 of The Perfect Virus—Black Box Portability—will be critical to our survival. Because China is weaning itself from Western technology as fast as they possibly can (
see my March 1, 2011 posting).
At best, The Morgan Doctrine postings will get the U.S. Congress off the dime in time. At worst? I once served as chairman of the audit committee for a public company. The Morgan Doctrine will provide an audit trail to condemn institutional stupidity as we are forced into a "
Plan B" rebuilding-from-the-ground-up of a completely destroyed U.S. technology infrastructure.
Thus saith The Destroying Angel.
No comments:
Post a Comment
Implementation suggestions for THE MORGAN DOCTRINE are most welcome. What are the "Got'chas!"? What questions would some future Cyber Privateering Czar have to answer about this in a Senate confirmation hearing?