Information Warfare: Why America Remains Vulnerable To China


July 9, 2015:   In June the United States revealed that there had been a major hack of U.S. government personnel databases earlier in the year. The U.S. openly named China as the chief suspect and admitted that the hackers made off with government databases containing  personal information on nearly twenty million government employees (active and retired.) This included data collected for people applying for security clearances.

The most embarrassing aspect of this incident was the revelations of how incompetent were the officials in charge of Internet security for this data. The key officials had apparently ignored years of warnings by technical personnel (both inside and outside the government) about the urgent need to do something about some very fundamental security problems. It turned out that most of the senior appointed officials didn’t understand what they were dealing with and a lot of the advice and criticism from people who did was largely ignored because it was simply not understood. This is not a new problem but it has become more common in the last few decades as new technology has become so crucial in so many areas. At the same time senior management in many firms has not adapted to these changes and all too often ignores serious problems or delegates them to subordinates who really don’t have the authority or management skills to implement changes. This is a major part of what caused the 2008 financial crises and there are warnings that another such disaster is brewing and there is still not a lot of attention being paid at the top.

The core problem for the government is that these senior Internet security positions are considered “political appointments” and even in highly technical areas the main criteria for selection remain political, not technical or managerial. Few people in government want to confront this issue openly.

This came be seen in the U.S. government response to this latest Internet security disaster. So far the official response of the American government is “full confidence” in the senior officials who presided over this epic debacle and pronouncements from these officials does not indicate any realization of what they did or, rather, did not do.

Meanwhile China has officially denied any involvement. Hackers can use this stolen information for various types of online larceny, or espionage or both. What is particularly worrisome (and making China more likely the culprit) is the fact that none of that data has shown up on the Internet black market. Aside from Internet based fraud, the other major use of that data is espionage.



Article Archive

Information Warfare: Current 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 



Help Keep Us Soaring

We need your help! Our subscription base has slowly been dwindling. We need your help in reversing that trend. We would like to add 20 new subscribers this month.

Each month we count on your subscriptions or contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage. A contribution is not a donation that you can deduct at tax time, but a form of crowdfunding. We store none of your information when you contribute..
Subscribe   Contribute   Close