The report comes on the heels of warnings from U.S. lawmakers -- and
from Mandiant itself -- that Chinese hackers have been behind a startling wave
of cyber attacks on U.S. entities.
Rep. Mike Rogers, R-Mich., who has co-authored cyber security
legislation pending in Congress, said in a panel discussion on "Face the
Nation" earlier this month that hackers are intent "every single
day" on "shutting down our financial services or finding other ways
to destroy material in companies that won't allow them to function on a
day-to-day basis."
His remarks came after three of the U.S.'s biggest newspapers and
Twitter were all targeted by hackers. The New York Times and The Washington
Post said the attacks were believed to have originated in China. On Tuesday, CNET reported that Apple was also the target of hackers along with those
aforementioned companies.
Speaking to The New York Times for an article published Tuesday, Mandia
said his company published its report to alert the U.S. public and government
that, "it's not just freelance people in China doing these attacks, it's
attacks directed by the government. So that means these attacks can be more
advanced they can be more funded, they can be more pervasive, and they will
probably continue unabated. It could be the new normal."
Mandia told CBS News correspondent Bob Orr earlier this month that the
number and sophistication of the attacks on U.S. organizations is so daunting,
it would be futile to try and prevent them all.
"These attacks are inevitable, so let's make sure we keep these
attackers from our crown jewels," said Mandia.
To bolster the U.S. defenses against such cyberattacks on vital
infrastructure and defense systems, Mandia said it was crucial that entities
targeted by hackers start sharing the information on the attacks more fluidly,
stressing that "everybody needs to get smarter from each breech, almost
like a neighborhood watch."
President Obama signed an executive order on Feb. 12 aimed at boosting the nation's cybersecurity by enabling the
government to share information with private firms more easily, and
establishing mandatory reporting on security threats from government agencies
to U.S. corporations at risk. Congress, however, has been unable to agree on
any legislation to set new laws on cybersecurity.
In the wake of attacks on the U.S. newspapers, Orr reported that the
Pentagon was pushing to expand its cybersecurity forces. The U.S. military's
so-called Cyber Command will grow five-fold over the next few years, from 900
employees at present, to about 5,000 civilian and military personnel, Orr
reported.
CYBERNATIONLISTS AND HACKERS
Cybernationalists seize on anything seen as
anti-Chinese and attack those who are perceived of instigating it.There is
little hard evidence that the elite hackers have ties with the Beijing
government although it is widely believed they are.
As the attack on Google in January 2010 showed the
victims of cyber attacks are just as likely to be private companies as military
or government targets with the aims being to steal computer source codes,
company secrets and strategies, and intellectual property or to implant spyware
or disruptive malware or otherwise disrupt the target company .
Tools used by hackers include malware that can record
keystrokes, steal and decrypt passwords, and copy and compress data so it can
be transferred back to the attacker's computer. The malware can then delete
itself or disappear until needed again. According to experts, the malicious
software or high-tech tools used by the Chinese haven't gotten much more sophisticated
in recent years. But the threat is persistent, often burying malware deep in
computer networks so it can be used again and again over the course of several
months or even years. The hackers often use a “1,000 grains of sand” approach,
meaning they collect every bit of information they can and sift through it for
intelligence. Many companies that are victims of such attacks regard them as an
embarrassment and keep quiet about them. [Source:
Lolita Baldor, Associated Press, December 12, 2011]
See international, Tibet
Hacker Attacks from China
Hackers from China have attacked dozens of websites in
Japan, Taiwan and the United States, often seeking out military, government or
conservative political sites. A series of attack on Japan—said to have been
prompted by Japanese nationalism and Japan’s position on some disputed islands—
temporally shut down the sites of the Japanese Foreign Ministry Defense Agency
and National Police Agency.
In the United States, hackers from China have
successfully beached hundreds of unclassified networks in the U.S. Defense
Department and other U.S. agencies. It is not clear whether the breaches were
the work of a concerted attack supported by the government or the work of
individual hackers acting on their own. Secret copying of data from an
unattended laptop computer belonging to U.S. Commerce Secretary Carlos
Gutierrez occurred during his visit to Beijing in December 2007 and the data
was use to hack into Commerce Department computers.
Hackers from China and Taiwan often invade and alter
websites in each other’s countries. The Taiwanese national anthem, complete
with music, for example, was placed on a web page for the Chinese Ministry of
Railways. Chinese hackers responded by placing a mainland flag in the site for
the Taiwan National Assembly.
Cyber attacks originating in China have become very
common in recent years, said Bruce Schneier, chief security technology officer
at telecommunications company BT. "It's not just the Chinese government.
It's independent actors within China who are working with the tacit approval of
the government," he said. Beijing's response has been that it is unfairly
accused by countries unhappy with its economic rise and that it has also been a
victim of cyber attacks.
Military Hackers in China
Chinese military planners have determined the greatest
weakness the United States military has is its reliance on computer and
satellite systems. It has developed strategies to take advantage of these
systems. Hackers in the PLA have worked out plan aimed disabling an aircraft
carrier battle group. A “virtual guidebook for electronic warfare and jamming"
was developed by the PLA after carefully studying American and NATO military
manuals.
There are two primary kinds of cyber attacks: 1)
“fishing trips’ for sensitive information; and 2) outright attacks that are
aimed at destroying data or disrupting computer systems. Even a relatively
unsophisticated hacker can download ready-to-use software from a Chinese site
and use it to enter a victim’s computer and use the webcam to spy on the
victim. The red light can deactivated, with the attacker often waiting until
the victim gets up to go to the bathroom and get something to eat to steal
information or attack the system. Cyber warfare expert Mike McConnell said,
“Every nation with advanced technology is exploring options... to use this new
capability to wage war. Everyone. All the time.”
The aim of military hackers is to attain “electronic
dominance over each if its global rivals by 2050.” There are plans to cripple
satellite communications system and bring financial markets to their knees. A
massive cyberattack could leave the United States without electrical power for
six months and cause a shut down of many of it military operations systems.
Chinese hackers began launching cyber attacks on U.S.
government and military targets in 2003, including a coordinates series of
attacks code-named Titan rain. . In 2007 the Chinese military successfully
hacked into the Pentagon’s computer network, raising alarms that China could
disrupt American military operations. The attack took place in June 2007 after
several months of planning and shut down the computer system serving 1,500
Pentagon computers including the one used by of the Secretary of Defense.
After the Pentagon attack hundreds of computers had to
be taken offline for months. Hackers also disrupted the U.S. Naval War College
network. Chinese military hackers have also penetrated computers in the British
military, the German government, including the offices of German Chancellor
Angela Merkel, and top U.S. military contractors.
Most of the attacks appear to have been aimed at
collected information and probing defenses, possibly to prepare for a real
cyber-war in the future. A report by the congressional U.S.-China commission
noted Chinese espionage is sometimes “straining the U.S. capacity to respond.”
The report focused on one attack and concluded that it was supported and
possibly orchestrated by the Chinese government.
In 2010, the PLA announced that it was setting up a
special command to handle cyberwar threats , but added that the department was
for defensive purposes. The US created a similar centre in 2009. The US and
Israel are also widely believed to have been responsible for the Stuxnet virus,
which reportedly disrupted Iran's nuclear program.
Chinese Military Suspected in Hacker Attacks on the
U.S.
According to a 2009 U.S. Congressional report
“individuals participating in ongoing penetrations of U.S. networks have
Chinese language skills and have well established ties with the Chinese
underground hacker community,” although it acknowledges that “these
relationships do not prove any government affiliation.”
According to a 2011 U.S. Congressional report China “conducted
and supported a range of malicious cyber activities.” It said that evidence has
emerged that tied the Chinese military to a decade-old cyber attack on a
U.S.-based website of the Falun Gong spiritual group.
Chinese officials long have denied any role in
computer attacks. The commission has “been collecting unproved stories to serve
its purpose of vilifying China’s international image over the years,” said Wang
Baodong, a spokesman for the Chinese Embassy in Washington, in a statement.
China “never does anything that endangers other countries’ security interests.”
Defense Department reports of malicious cyber
activity, including incidents in which the Chinese weren’t the main suspect,
rose to a high of 71,661 in 2009 from 3,651 in 2001, according to the draft.
This year, attacks are expected to reach 55,110, compared with 55,812 in 2010.
Relying on the Internet
The Chinese military also has been focused on its U.S.
counterpart, which it considers too reliant on computers. In a conflict, the
Chinese would try to “compromise, disrupt, deny, degrade, deceive or destroy”
U.S. space and computer systems, the draft says. “This could critically disrupt
the U.S. military’s ability to deploy and operate during a military
contingency,” according to the draft.
Other cyber intrusions with possible Chinese
involvement included the so-called Night Dragon attacks on energy and
petrochemical companies and an effort to compromise the Gmail accounts of U.S.
government officials, journalists and Chinese political activists, according to
the draft.
Often the attacks are found to have come from Chinese
Internet-protocol, or IP, addresses. Businesses based in other countries and
operating in China think that computer network intrusions are among the “most
serious threats to their intellectual property,” the draft says.The threat
extends to companies not located in China. On March 22, U.S. Internet traffic
was “improperly” redirected through a network controlled by Beijing-based China
Telecom Corp. Ltd., the state-owned largest provider of broadband Internet
connections in the country, the draft said. In its draft of last year’s report,
the commission highlighted China’s ability to direct Internet traffic and
exploit “hijacked” data.
Chinese Military Suspected in Hacker Attacks on U.S.
Satellites
Computer hackers, possibly from the Chinese military,
interfered with two U.S. government satellites four times in 2007 and 2008
through a ground station in Norway, according to a congressional commission,
Bloomberg reported in October 2011. The intrusions on the satellites, used for
earth climate and terrain observation, underscore the potential danger posed by
hackers, according to excerpts from the final draft of the annual report by the
U.S.-China Economic and Security Review Commission. The report is scheduled to
be released next month. [Source: Tony Capaccio and Jeff Bliss, Bloomberg,
October 26, 2011]
“Such interference poses numerous potential threats,
particularly if achieved against satellites with more sensitive functions,”
according to the draft. “Access to a satellite‘s controls could allow an
attacker to damage or destroy the satellite. An attacker could also deny or
degrade as well as forge or otherwise manipulate the satellite’s transmission.”
A Landsat-7 earth observation satellite system
experienced 12 or more minutes of interference in October 2007 and July 2008,
according to the report. Hackers interfered with a Terra AM-1 earth observation
satellite twice, for two minutes in June 2008 and nine minutes in October that
year, the draft says, citing a closed-door U.S. Air Force briefing. The draft
report doesn’t elaborate on the nature of the hackers’ interference with the
satellites.
U.S. military and intelligence agencies use satellites
to communicate, collect intelligence and conduct reconnaissance. The draft
doesn’t accuse the Chinese government of conducting or sponsoring the four
attacks. It says the breaches are consistent with Chinese military writings
that advocate disabling an enemy’s space systems, and particularly
“ground-based infrastructure, such as satellite control facilities.”
In the October 2008 incident with the Terra AM-1,
which is managed by the National Aeronautics and Space Administration, “the
responsible party achieved all steps required to command the satellite,”
although the hackers never exercised that control, according to the draft. The
U.S. discovered the 2007 cyber attack on the Landsat-7, which is jointly
managed by NASA and the U.S. Geological Survey, only after tracking the 2008
breach.
The Landsat-7 and Terra AM-1 satellites utilize the
commercially operated Svalbard Satellite Station in Spitsbergen, Norway that
“routinely relies on the Internet for data access and file transfers,” says the
commission, quoting a NASA report. The hackers may have used that Internet
connection to get into the ground station’s information systems, according to
the draft.
While the perpetrators of the satellite breaches
aren’t known for sure, other evidence uncovered this year showed the Chinese
government’s involvement in another cyber attack, according to the draft. TV
Report A brief July segment on China Central Television 7, the government’s
military and agricultural channel, indicated that China’s People’s Liberation
Army engineered an attack on the Falun Gong website, the draft said.
The website, which was hosted on a University of
Alabama at Birmingham computer network, was attacked in 2001 or earlier, the
draft says. The CCTV-7 segment said the People’s Liberation Army’s Electrical
Engineering University wrote the software to carry out the attack against the
Falun Gong website, according to the draft. The Falun Gong movement is banned
by the Chinese government, which considers it a cult.
After initially posting the segment on its website,
CCTV-7 removed the footage after media from other countries began to report the
story, the congressional draft says.
China Cyber Capability Endangers U.S. Forces: Report
In March 2012 Reuters reported: Chinese cyberwarfare
would pose a genuine risk to the U.S. military in a conflict, for instance over
Taiwan or disputes in the South China Sea, according to report for the U.S.
Congress. Operations against computer networks have become fundamental to
Beijing's military and national development strategies over the past decade,
said the 136-page analysis by Northrop Grumman Corp. It was released on
Thursday by the congressionally created U.S.-China Economic and Security Review
Commission. [Source: Jim Wolf, Reuters, March 8, 2012]
The report, based on publicly available information,
said Chinese commercial firms, bolstered by foreign partners, are giving the
military access to cutting-edge research and technology. The military's close
ties to large Chinese telecommunications firms create a path for
state-sponsored penetrations of supply networks for electronics used by the
U.S. military, government and private industry, the report added. That has the
potential to cause a "catastrophic failure of systems and networks
supporting critical infrastructure for national security or public
safety," according to the study.
On the military side, "Chinese capabilities in
computer network operations have advanced sufficiently to pose genuine risk to
U.S. military operations in the event of a conflict," it said. Deputy
Defense Secretary Ashton Carter, without referring to the report, said that he
was not even "remotely satisfied" with U.S. ability to deal with
cyberwarfare. Pentagon spending on cyber capabilities was not really
constrained by scarce funds, Carter told an industry conference hosted by
Credit Suisse and consultancy McAleese and Associates. "I'd dare say we'd
spend a lot more if we could figure out productive ways of doing it."
China is "fully engaged in leveraging all
available resources to create a diverse, technically advanced ability to
operate in cyberspace," and computer network operations are being broadly
applied to assist with long-term national development, the report said.Such operations,
as defined by the report, include attack and defense as well as network
"exploitation," for instance for intelligence collection. The
analysis did not go into reciprocal U.S. military efforts to gain an edge in
cyberspace, which the Pentagon in recent years has defined as a potential
battle zone like air, sea, space and land.
Keyboard-launched tools that China could use in a
crisis over Taiwan or in the South China Sea could delay or degrade a potential
U.S. military response, partly because of "the vagaries of international
law and policy surrounding nation-state responses to apparent network
attack," the report said. The analysis was a follow-up to one that
Northrop Grumman, one of the Pentagon's top five suppliers by sales, did for
the commission in 2009. That study said Beijing appeared to be conducting
"a long-term, sophisticated, computer network exploitation campaign"
against the U.S. government and its military contractors. Since then, official
U.S. concern has grown over alleged Chinese espionage via computer
penetrations. In October, the Office of the National Counterintelligence
Executive, a U.S. intelligence arm, said in a declassified report to Congress
that "Chinese actors are the world's most active and persistent
perpetrators of economic espionage."
Beijing in the past has complained about what it called
unfair vilification by the 12-member bipartisan commission set up by Congress
in 2000. The body investigates national-security implications of U.S. trade
with China, the world's second-largest economy.
Top American Electronic Espionage Expert on China
One of the most knowledgeable people about China’s
cyber warfare capabilities is Mike McConnell, who was director of the National
Intelligence, the supreme authority over U.S. intelligence, from 2007 to 2009,
and head National Intelligence Agency (NSA), from 1992 to 1996. He told Nathan
Gardels in the Global Viewpoint column, the Chinese “are determined to be the
best. Probably the best in the cyber realm are the United States, then the
Russians, the British, the Israelis and the French. The next tier is the
Chinese.”
“The Chinese,” McConnell said, “are exploiting our
systems for information advantage—looking for characteristics of a weapon
system by a defense contractor or academic research on plasma physics, for
example—not in order to destroy the data and do damage. But, for now, I believe
they are deterred from destroying data both by the need to export to the U.S.
and by the need to maintain a stable currency and stable global markets.”
Chinese “intelligence collection is coordinated,”
McConnell presumes. “But just as in the U.S., there are competing bureaucracies
carrying out the cyber-exploitation mission. In China today, there are
thousands of people in a sustained efforts to collect intelligence, many of
them on an entrepreneurial basis, as it were, within competing bureaucratic
structures.”
McConnell said one of the primary motivating forces
behind China’s aggressive cyber activities was the shock that Chinese leaders
experienced when they saw U.S. smart bombs in action in Iraq in the first
Persian Gulf War. By “linking computer technology with weaponry to attain
precision...we owned the ability to locate and see targets...We could take a
valuable target out with one bomb at the time of our choosing...I believe the
Chinese concluded...that their counter approach had to be to challenge
America’s control of the battle space by building capabilities to knock out our
satellites and invading it’s cyber networks.”
McDonnell said, China’s “cyber war capability is part
and parcel of their growing military might. The Chinese have developed the
capacity to shoot-down satellites. They have developed over-the-horizon radar
capabilities. They have missiles that can be retargeted in flight. In short,
they are seeking ways to keep us at bay in the event of a conflict, to not let
us approach China. In time, as their power, influence and wealth grows, China
likely will develop ‘power projection’ weapons systems...They see the Middle
Kingdom as the center of the world. They have gone from what they describe as
the ‘the century of shame’ to ‘our century’ going forward, and they want to
protect that from the U.S. or anybody else. The Chinese want to dominate this
information space. So, they want to develop the capability of attacking our
‘information advantage’ while denying us this capability.”
How the Hacking Attacks from China Are Coordinated
James Glanz and John Markoff wrote in the New York
Times, “ Precisely how these hacking attacks are coordinated is not clear. Many
appear to rely on Chinese freelancers and an irregular army of ‘patriotic
hackers’ who operate with the support of civilian or military authorities, but
not directly under their day-to-day control, the cables and interviews suggest.
[Source: James Glanz and John Markoff, New York Times, December 4, 2010]
Diplomatic cables involving China leaked by Wikileaks
in December 2010 revealed “some suppositions by Chinese and Americans passed
along by diplomats. For example, the cable dated earlier this year referring to
the hacking attack on Google said: ‘A well-placed contact claims that the
Chinese government coordinated the recent intrusions of Google systems.
According to our contact, the closely held operations were directed at the
Politburo Standing Committee level.’
The cable goes on to quote this person as saying that
the hacking of Google ‘had been coordinated out of the State Council
Information Office with the oversight’ of Mr. Li and another Politburo member,
Zhou Yongkang.’ Mr. Zhou is China’s top security official.
But the person cited in the cable gave a divergent
account. He detailed a campaign to press Google coordinated by the Propaganda
Department’s director, Liu Yunshan. Mr. Li and Mr. Zhou issued approvals in
several instances, he said, but he had no direct knowledge linking them to the
hacking attack aimed at securing commercial secrets or dissidents’ e-mail
accounts — considered the purview of security officials. Still, the cables
provide a patchwork of detail about cyberattacks that American officials
believe originated in China with either the assistance or knowledge of the
Chinese military.
For example, in 2008 Chinese intruders based in
Shanghai and linked to the People’s Liberation Army used a computer document
labeled ‘salary increase — survey and forecast’ as bait as part of the
sophisticated intrusion scheme that yielded more than 50 megabytes of e-mails
and a complete list of user names and passwords from a United States government
agency that was not identified.
The cables indicate that the American government has
been fighting a pitched battle with intruders who have been clearly identified
as using Chinese-language keyboards and physically located in China. In most
cases the intruders took great pains to conceal their identities, but
occasionally they let their guard down. In one case described in the documents,
investigators tracked one of the intruders who was surfing the Web in Taiwan
‘for personal use.’
Wikileaks Revelations About Chinese Hacker Attack on
U.S. Government Sites
James Glanz and John Markoff wrote in the New York
Times that U.S. diplomatic cables involving China leaked by Wikileaks in
December 2010 revealed “at least one previously unreported attack in 2008,
code-named Byzantine Candor by American investigators, yielded more than 50
megabytes of e-mails and a complete list of user names and passwords from an
American government agency, a Nov. 3, 2008, cable revealed for the first time.
[Source:James Glanz and John Markoff, New York Times, December 4, 2010]
In June 2009 during climate change talks between the
United States and China, the secretary of state’s office sent a secret cable
warning about e-mail ‘spear phishing’ attacks directed at five State Department
employees in the Division of Ocean Affairs of the Office of the Special Envoy
for Climate Change.
The messages, which purport to come from a National
Journal columnist, had the subject line ‘China and Climate Change.’ The e-mail
contained a PDF file that was intended to install a malicious software program
known as Poison Ivy, which was meant to give an intruder complete control of
the victim’s computer. That attack failed.
The cables also reveal that a surveillance system
dubbed Ghostnet that stole information from the computers used by the exiled
Tibetan spiritual leader, the Dalai Lama, and South Asian governments and was
uncovered in 2009 was linked to a second broad series of break-ins into
American government computers code-named Byzantine Hades. Government
investigators were able to make a ‘tenuous connection’ between those break-ins
and the People’s Liberation Army.
The documents also reveal that in 2008 German
intelligence briefed American officials on similar attacks beginning in 2006
against the German government, including military, economic, science and
technology, commercial, diplomatic, and research and development targets. The
Germans described the attacks as preceding events like the German government’s
meetings with the Chinese government.
Lockheed Martin Corp, the U.S. government's top
information technology provider, said last week it had thwarted "a
significant and tenacious attack" on its information systems network,
though no signs pointed to a Chinese origin.
McAfee Reports on Chinese Hackers Attacks
In February 2011, the Internet security company McAfee
released a report that hackers operating from China stole sensitive information
from Western oil companies through a “coordinated, covert and targeted” attack
that began in February 2011. McAfee did not identify the companies but said
hackers stole information in operations, bidding for oil fields and financing.
The hackers worked through servers in the United States and the Netherlands and
exploited vulnerabilities in the Windows operation system.
In August 2011, McAfee claimed it had uncovered the
biggest series of cyber-attacks to date and believed a state actor was
responsible. The security company said it had discovered a five-year long
campaign of cyber attacks on the networks of governments, organisations and
businesses. It did not name the "state actor" it believed was behind
the attacks but several experts pointed the finger at China. McAfee said the 72
victims in the hacking campaign included the governments of the United States,
Taiwan, India, South Korea, Vietnam and Canada. Other targets were the United
Nations, the Association of Southeast Asian Nations, the International Olympic
Committee; and an array of companies from defence contractors to hi-tech
enterprises. [Source: Reuters, The Guardian August 5, 2011]
China's leading state newspaper dismissed as
"irresponsible" suggestions that Beijing was the "state
actor" behind massive internet hacking of governments and companies. The
People's Daily disputed the suggestions. "Linking China to internet
hacking attacks is irresponsible," it said. "The McAfee report claims
that a 'state actor' engaged in hacking for a large-scale internet espionage
operation, but its analysis clearly does not stand up to scrutiny."
TV Program Shows Clip of Chinese Cyber Attack?
Tania Branigan wrote in The Guardian, “China's state
broadcaster has screened footage that apparently shows army-labelled software
for attacking US-based websites, security experts have said. ..The analysts
warned that the six-second clip could be a mock-up by the broadcaster, CCTV,
and that, if genuine, it was probably around 10 years old. The footage emerged
as the Pentagon's annual report to Congress on the Chinese military said the
People's Liberation Army (PLA) had closed some key technological gaps and was
on track for modernisation, including thorough investment in cyber
capabilities, by 2020. The Chinese state news agency, Xinhua, denounced the
document as a scaremongering "cock and bull story". [Source: Tania
Branigan The Guardian August 25, 2011]
The footage shown by CCTV was part of a cybersecurity
documentary screened on its military channel last month and removed from its
website after US security analysts wrote about it. The programme includes a
detailed discussion of cybersecurity by Senior Colonel Du Wenlong, of the PLA's
academy of military sciences. A narrator then talks about methods of attack as
the screen shows software being operated by an unseen user. The Chinese
characters indicate an option for a distributed denial of service attack—a
crude form of attack that disrupts access to a site by bombarding it with
requests for data.
Another shot shows the words "attack system"
and "PLA Electronic Engineering Institute" on screen. The user
chooses a name, minghui.org, from a list of sites belonging to the banned Falun
Gong spiritual movement and clicks on a button reading "attack". The
security-focused China SignPost site suggested the footage, if genuine, was
likely to be more than a decade old because the method was so basic and because
there were several such attacks on Falun Gong sites in 1999 and 2000.
Beijing has consistently denied being behind
cyber-attacks, insisting it plays no part in hacking and is itself a victim. Dr
Andrew Erickson, an associate professor at the US Naval War College's China
Maritime Studies Institute, and Gabe Collins, a commodity and security
specialist, wrote: "It appeared to show dated computer screenshots of a
Chinese military institute conducting a rudimentary type of cyber-attack
against a United States-based dissident entity. However modest, ambiguous—and,
from China's perspective, defensive—this is possibly the first direct piece of
visual evidence from an official Chinese government source to undermine
Beijing's official claims never to engage in overseas hacking of any kind for
government purposes."
Asked whether the footage had been mocked up, CCTV 7
said it did not respond to queries from foreign media. CCTV has been caught
using misleading footage in the past, memorably in January, when shots from the
film Top Gun were inserted into a news report about PLA training exercises.
The Washington Post said Wang Baodong, a spokesman for
the Chinese embassy in Washington, had declined to comment on the video, but
added: "It's no secret that Falun Gong and its subordinate institutions
have been intensifying their subversive efforts against China in cyberspace.
And China has every legitimate right to take action against such harmful
activities to defend its national security interests." Cyber-attacks are
becoming an increasing source of concern for governments around the world. In a
strategy document earlier this year, the Pentagon said it would be willing to
use conventional military action to retaliate.
Early History of Chinese Government Hacker Activity
The Chinese government created a proxy hacking system
precisely so that it could deny state involvement in the matter. There is
evidence of hackers at Shanghai Jiaotong University working with state security
agents.
Ethan Gutmann wrote in World Affairs, “The Chinese
government set up an obscure entity known as the State Encryption Management
Commission. Its directive was that all Western encryption products in
China—i.e., software, DVDs, laptops—must be registered, inspected, scrutinized,
possibly downloaded, and, if necessary, confiscated. The target was Microsoft’s
source code, suspected to contain a Trojan horse for U.S. intelligence.
Microsoft didn’t comply and the State Encryption Management Commission
disappeared. Microsoft ultimately revealed its source code to Chinese
officials, under what the company claims were controlled conditions.[Source:
Ethan Gutmann, World Affairs, May-June 2010]
The Chinese government later set up a well-equipped,
secretive government entity known as 6-10 Office to monitor the cyber
activities of Falun Gong. Hao Feng jun, a Chinese intelligence official who
defected in 2005 to Australia, told Gutmann: “Practitioners of Falun Gong
thought of themselves as protected by the amorphous floating world in which
they traveled—a world without membership lists, central authority, or
hierarchy. Yet they were being watched, infiltrated, and studied. After the
1999 crackdown, hardcore practitioners were relentlessly persuaded, drugged,
starved, or tortured and discovered that they knew more names, connections,
address- es, and distinguishing characteristics of their fellow congregants
than they had ever realized.” [Ibid]
“Practitioners of Falun Gong thought of themselves as
protected by the amorphous floating world in which they traveled—a world
without membership lists, central authority, or hierarchy. Yet they were being
watched, infiltrated, and studied. After the 1999 crackdown, hardcore
practitioners were relentlessly persuaded, drugged, starved, or tortured and
discovered that they knew more names, connections, address- es, and
distinguishing characteristics of their fellow congregants than they had ever
realized.” [Ibid]
“Before 1999, Falun Gong practitioners hadn’t
systematically used the Internet as an organizing tool. But now that they were
isolated, fragmented, and searching for a way to organize and change government
policy, they jumped online, employing code words, avoiding specifics,
communicating in short bursts. But like a cat listening to mice squeak in a
pitch-black house, the Internet Spying section of the 6-10 Office could find
their exact location, having developed the ability to search and spy as a
result of what Hao describes as a joint venture between the Shandong Province
public security bureau and Cisco Systems. What emerged was a comprehensive
database of people’s personal information—including 6-10's Falun Gong lists—and
a wraparound surveillance system that was quickly distributed to other provinces.
“ [Ibid]
“The Chinese authorities called it the Golden Shield,
and Hao used it on a daily basis. As far as following practitioners, he said,
“The Golden Shield includes the ability to monitor online chatting services and
mail, identifying IPs and all of the person’s previous communication, and then
being able to lock in on the person’s location—because a person will usually
use the computer at home or at work. And then the arrest is carried out.”
[Ibid]
China's Domestic Internet Attacks
Internet espionage on the mainland, is used to attack
people perceived to be a threat to the state, including ordinary Chinese
citizens, scholars, human-rights workers, journalists, diplomats and
businesspeople. [Source: Paul Mooeney, South China Morning Post, September 26,
2010]
Because computerization has occurred more quickly than
computer savviness, China is particularly vulnerable to computer cyberattacks.
In 2003, according to a survey by the Evans Data Corp., a staggering 84 percent
of firms in China reported at least one cyber attack, up from 59 percent in
2002. Internet attacks thrive because Internet security is lax or nonexistent,
intellectual property theft and corporate spying are widespread, and
enforcement and punishment of Internet crimes is light.
Hackers attacked the Chinese search engine Baidu by
installing rogue programs on computers used by its trading partners. That
programs launched a wave of calls to the Baidu websites at a rate of more than
1000 a second, effectively blocking everyone else from using it for site fo 60
hours.
Ethan Gutmann wrote in World Affairs, “By 2007,
traditional fears over Internet social networking inside China (combined with a
fear of color revolutions) were stirred anew by a series of incidents: a strong
uptick in nationwide mass disturbances—i.e., riots, followed by the Tibet
upris- ing and then revelations of shoddy schoolhouse construction in the wake
of the Sichuan earth- quake. In preparation for the Olympics, officials shut
down social networking sites, and rounded up dissidents of all stripes. Most
Chinese citizens assumed these measures would be temporary. But many have
turned out to be permanent... According to Google, the Gmail break-ins (which
may indeed have been facilitated by employees) were not aimed at individuals
with military or business connections, but at Chinese journalists and Western human
rights activists. “ [Source: Ethan Gutmann, World Affairs, May-June 2010]
In 2008, Norzin Wangmo, a 30-year-old Tibetan
government worker and writer used her computer and mobile phone ago to
communicate with friends about protests in Tibet. She was detained soon after
sending the messages and was accused by officials of using the technology to
inform the outside world about civil unrest in Tibet. After months in
detention, during which her friends said she was tortured, she was given a
five-year prison term, leaving behind a young son...No one is sure how Chinese
intelligence obtained the details of her communications. [Mooeney, Op. Cit]
Many think that the Chinese government is ultimately
behind these attacks but such assertions are difficult to prove. Security
experts are careful to explain that no smoking gun has yet been found linking
the hacking and the use of malware - malicious software designed to secretly
access a computer system - to Beijing. [Mooeney, Op. Cit]
Experts say that if Beijing is not responsible for the
attacks, it has a responsibility to shut down hackers working within its
borders. “I have never and still don't make the claim that it was the
government,” the victim of one attack said. “But if China insists on internet
sovereignty and sovereignty over its territory, it has to take responsibility
for these kinds of cyber attacks. It has to show the international community
that it has taken steps to investigate, track down and end these attacks.”
[Mooeney, Op. Cit]
Chinese Government Expands Hacker Activity Overseas
“At that time, Hao could read e-mails within China and
intercept e-mails to and from overseas, but he couldn’t read overseas to
overseas messages, Ethan Gutmann wrote in World Affairs. “When the patriotic
hacking movement—the Green Army followed by the Red Hacker Alliance—began its
spontaneous growth, the Chinese leadership chose not to crush but to channel
it. Notwithstanding the hackers’ swashbuckling self-portrayals on their Web
sites, the state kept them on a leash that was slackened only for largely
symbolic skirmishes with Taiwan, Indonesia, Japan, and a few high-profile
defacements of American Web sites after China’s Belgrade embassy was bombed.
When State Security became aware that the hacktivists planned a major assault
on American networks in 2002, the movement was temporarily shut down by the
Chinese leadership, which was not ready for a potential confrontation.[Source:
Ethan Gutmann, World Affairs, May-June 2010]
“However, as the internal war with Falun Gong dragged
on, and as its overseas practitioners kept bringing graphic results of torture
to the attention of the international legal system, the party felt that it had
no choice but to widen the campaign. According to Hao, this explains why the
first examples of hacking leading to widespread, sustained network disruption
outside China were not aimed at the Pentagon or Wall Street. China’s first
prolonged denial of service attack—essentially exhausting the bandwidth
capability of a Web site until it becomes unavailable—was carried out from
servers in Beijing and Shenzhen against Clearwisdom.net, the main Falun Gong
practitioner site, hosted by servers in North America. The technical signature suggested
a primitive, neophyte army; on the American side, not long after the attacks
took place, the origin was traced directly back to the address of the Public
Security Bureau in Beijing.” [Ibid]
“This picture was confirmed in my conversations with
Han Guangsheng, a former chief of the Justice Bureau in the city of Shenyang
who had spent most of his time working in a labor camp overcrowded with Falun
Gong practitioners. When I interviewed him in Toronto in 2007, he confirmed
that State Security had shifted its attention toward the over- seas Falun Gong
threat. Yet he also felt that the shift was not just about defeating Falun
Gong, but about widening China’s internal wars into the Chinese diaspora and
generating a campaign to turn anyone of Chinese blood into a de facto supporter
of the Chinese Communist Party.”
“Judging from the witnesses I interviewed in the
United States, Canada, Australia, and the United Kingdom, these sorts of
Chinese infiltration activities never met with any particular governmental or
intelligence- operational resistance in the West. It was as if the battle for
the Chinese diaspora had already been ceded. In the United States in
particular, the intelligence community was clearly distracted by terrorism, and
pacified by occasional Chinese military and intelligence cooperation on
terrorist networks, even if the information given was sketchy and
unclassifiable.” [Ibid]
Chinese Government Steps Up Cyber Attacks on U.S.
Targets
“With no one blocking them, Chinese hackers began
carrying out successful denial-of-service attacks in Taiwan in 2004,” Ethan
Gutmann wrote in World Affairs. “When, in 2005, the so-called Titan Rain
attacks began on military contractors, the U.S. Departments of Defense and
State, and NASA, the subject of Chinese hackers finally began to receive wide
press attention, but no explicit U.S. action or sanctions appeared to follow.
The rest of the world began to pay attention following the revelations of the
Ghostnet attacks (from 2007 to early 2009), which featured impressive break-ins
of government centers around the world, including the Dalai Lama’s government
in exile. But no international sanctions or penalties appeared. In the
analytical aftermath, the attacks were subtly downplayed. The Chinese hackers’
methods were understood; U.S. intelligence officials shrugged.”
“The State Department doesn’t even bother tracking
these sorts of inci- dents, but it is a positive development that they are
showing concern over Chinese military and commercial opportunism, and Chinese
spying and network intrusions. Perhaps Aurora did not threaten the best-kept
secrets of the Pentagon, but some people in intelligence recognize that it puts
the United States back in the World War II convoy position, essentially buying
ten ships of network protection for every hacker U-boat. But while the party
has discovered that the best defense against China’s internal problems is a
good offense—and therefore has little interest in the deal offered by Clinton
for an arms control agreement on Internet intrusions—there is another, final
reason for the explosion in Chinese hacking, and it contains the key to a
successful American counter-strategy.
NASA Says Was Hacked 13 Times in 2011
In March 2012, Reuters reported: NASA said hackers
stole employee credentials and gained access to mission-critical projects last
year in 13 major network breaches that could compromise U.S. national security.
National Aeronautics and Space Administration Inspector General Paul Martin
testified before Congress this week on the breaches, which appear to be among
the more significant in a string of security problems for federal agencies.
[Source: Reuters, March 2, 2012]
The space agency discovered in November 2011 that
hackers working through an Internet Protocol address in China broke into the
-network of NASA's Jet Propulsion Laboratory, Martin said in testimony released
on Wednesday. One of NASA's key labs, JPL manages 23 spacecraft conducting
active space missions, including missions to Jupiter, Mars and Saturn.
He said the hackers gained full system access, which
allowed them to modify, copy, or delete sensitive files, create new user
accounts and upload hacking tools to steal user credentials and compromise
other NASA systems. They were also able to modify system logs to conceal their
actions. "Our review disclosed that the intruders had compromised the
accounts of the most privileged JPL users, giving the intruders access to most
of JPL's networks," he said. (bit.ly/yQFSB8)
In another attack last year, intruders stole
credentials for accessing NASA systems from more than 150 employees. Martin
said the his office identified thousands of computer security lapses at the
agency in 2010 and 2011. He also said NASA has moved too slowly to encrypt or
scramble the data on its laptop computers to protect information from falling
into the wrong hands. Unencrypted notebook computers that have been lost or
stolen include ones containing codes for controlling the International Space
Station, as well as sensitive data on NASA's Constellation and Orion programs,
Martin said.
U.S. Congress Report: "Foreign Spies Stealing US
Economic Secrets in Cyberspace
In 2010, computer security firm Mandiant reported that
data was stolen from a Fortune 500 manufacturing company during business
negotiations when the company was trying to buy a Chinese company. In 2011,
McAfee traced an intrusion to an Internet protocol address in China and said
intruders took data from global oil, energy and petrochemical companies. Two
sophisticated attacks against Google's systems stole some of the Internet
giant's intellectual property and broke into the Gmail accounts of several
hundred people, including senior U.S. government officials, military personnel
and political activists. [Source: Lolita Baldor, Associated Press, December 12,
2011]
A November 2011 report by the U.S. Congress titled
"Foreign Spies Stealing US Economic Secrets in Cyberspace" said China
and Russia are using cyber espionage to steal U.S. trade and technology secrets
to bolster their own economic development, which poses a threat to U.S.
prosperity and security. So much sensitive information and research is on
computer networks that foreign intruders can collect massive amounts of data
quickly and with little risk because they are difficult to detect, the report
said.[Source: Tabassum Zakaria, Reuters, November 3, 2011]
Foreign intelligence services, corporations and
individuals increased their efforts to steal U.S. technologies which cost
millions of dollars to develop, according to the report by the Office of the
National Counterintelligence Executive, a U.S. government agency, which covers
2009-2011. "The nations of China and Russia, through their intelligence
services and through their corporations, are attacking our research and
development," National Counterintelligence Executive Robert Bryant said.
"That's a serious issue because if we fuel their economies on our
information, I don't think that's right," he said at a news conference.
Intelligence services, private companies, academic
institutions and citizens of dozens of countries target the United States, the
report said. But it only named China and Russia."Chinese actors are the
world's most active and persistent perpetrators of economic espionage,"
the report said.Russia was also singled out. "Russia's intelligence
services are conducting a range of activities to collect economic information
and technology from US targets," the report said. It acknowledged the
difficulty of determining who exactly is behind a cyber attack.
Information and communications technology, military
technologies such as unmanned aerial vehicles, and civilian technologies such
as clean energy, and healthcare and pharmaceuticals are areas that may be of
interest as foreign cyber espionage targets, the report said. Intelligence
officials say it is part of the national policy of China and Russia to try to
acquire sensitive technology which they need for their own economic
development, while the United States does not do economic espionage as part of
its national policy.
The National Science Foundation said research and
development spending by U.S. government, industry and universities was $398
billion in 2008. But there are no reliable gauges for how much is stolen
through cyber spying. "This is a quiet menace to our economy with notably
big results," Bryant said. "Trade secrets developed over thousands of
working hours by our brightest minds are stolen in a split second and
transferred to our competitors."
The pace of foreign economic and industrial espionage
against the United States is accelerating, the report said."We judge that
the governments of China and Russia will remain aggressive and capable
collectors of sensitive US economic information and technologies, particularly
in cyberspace." China and Russia are "motivated by the desire to
achieve economic, strategic, and military parity with the United States,"
the report said.
Image Sources: Human Rights Watch
Text Sources: New York Times, Washington Post, Los Angeles Times, Times
of London, National Geographic, The New Yorker, Time, Newsweek, Reuters, AP,
Lonely Planet Guides, Compton’s Encyclopedia and various books and other
publications.
Today on Newsmax TV Live's 'Steve Malzberg Show'
Famed correspondent and best-selling author Bill Gertz reveals
China’s real agenda as a new report proves China’s military is behind a wave of
sophisticated cyberattacks on U.S. computer systems.
Nuestro Destino y la Política. Por amenper.
De los vicepresidentes que asumieron el cargo por la muerte del
presidente, cuatro murieron cuando el presidente terminó su mandato
por muerte de causas naturales, uno dimitió y cuatro fueron asesinados.
Durante nuestra vida hemos tenido la oportunidad de ver dos
vicepresidentes ocupar la presidencia, uno Gerald Ford, por la dimisión de
Richard Nixon y otro Lyndon Johnson por el asesinato de John F. Kennedy.
En una forma u otra, estos cambios bruscos de gobierno, cambiaron muchos
destinos de personas y naciones, con hechos hubieran podido suceder de otra
manera.
Gerald Ford pasó sin penas ni glorias, su presidencia fue como su
persona, una comida sin condimentar. Pero lo que nos trajo para nuestro destino
fue que antes de perder las elecciones, le ganó las primarias a Ronald Reagan,
y tuvimos cuatro años de Obama Light (Jimmy Carter) hasta que en las
próximas elecciones por fin tuvimos a Reagan. Lo que fue Carter, ya lo saben,
tuvo el dudoso honor de ser el peor presidente de los Estados Unidos hasta ser
destronado por Barack Obama.
Lyndon Johnson era el demócrata de antes, que era muy aceptable.
Hubo una época antes de Roosevelt que los demócratas eran los conservadores y
los Republicanos eran los liberales. Johnson fue posiblemente el último
de los moderados demócratas. En lo social cambió su posición racista y le
dio los derechos civiles que realmente hacía falta para los negros para
terminar con la segregación. En la política internacional, cambió la política
entreguista de Kennedy. A pesar de haber heredado los problemas de
Kennedy su actuación fue siempre hacer los mejor para el país.
Cuando Fidel quiso meterse en la Republica Dominicana aprovechando la
confusión y después puso a su aliado Francisco Caamaño, Johnson, no titubeó,
dijo que no se podía permitir otra Cuba y le metió mano a Republica
Dominicana.
Cuando Fidel se quiso pasar de listo con Camarioca, como hizo más tarde
a Carter con el Mariel, Johnson se paró en la estatua de la Libertad y
dijo que todos podían entrar, pero que tenían que pasar por inmigración
americana no el relajo de venir en botes. Los botes tuvieron que volver
vacios , pero implementó los vuelos de la libertad, de una manera ordenada. http://latinamericanstudies.org/exile/refugees.pdf
En Vietnam a pesar de la oposición liberal, reanudó los bombardeos para
proteger a la infantería, y cuando protestaron los anti guerra, no cedió,
simplemente dijo que los bombardeos iban y que él no iría a la
reelección. Aunque realmente la razón que no fue a la reelección era
porque iba a perder las primarias con Robert Kennedy.
El destino, ¿que hubiera pasado si John F. Kennedy no hubiera sido
presidente? Si Lyndon Johnson le hubiera ganado las primarias a Kennedy,
o si Richard Nixon le hubiera ganado las elecciones a Kennedy, cualquiera
de los dos presidentes hubiera dado el apoyo aéreo a la invasión de Bahía de
Cochinos. Estuviéramos en Cuba. Si hubieran asesinado a Kennedy un
año antes, Lyndon Johnson no hubiera negociado la crisis de los cohetes
tramitando la lucha contra Fidel, amarrando al exilio. O ¿que hubiera
pasado si no hubieran asesinado a John Kennedy? Hubiéramos tenido un Mariel
adelantado con Camarioca, y Republica Dominicana sería Comunista.
Si no hubieran asesinado a Robert Kennedy, este hubiera sido electo
presidente, y como su hermano, hubiéramos tenido a un demócrata liberal que
hubiera avanzado la agenda conciliatoria con los Soviéticos y le hubiera sido
difícil a Nixon, Reagan o a cualquier otro arreglar el potaje, quizás
estuviéramos hablando en Ruso.
Hay personas que dicen que ellos no hablan de política que nos le
interesa. Me gustaría pensar así, es cómodo. Pero el problema es
que la política se mete y cambia nuestras vidas. Yo nunca he sido
político ni aspirado a un cargo público, pero la política ha cambiado mi vida y
mi patria.
Piensen los que hubiera pasado en nuestras vidas si las cosas con estos
políticos hubiera sido diferente .
Obama Is Not The
Legitimate President Of The United States
On election day, we know there were major problems of
voting machines switching votes from Romney to Obama —voting machines, by the way, owned and operated by a former company of Obama crony Chuck Hagel .
We know Obama suppressed the traditionally conservative military
vote .
We know thousands of military absentee ballots were
“lost”—in one case supposedly burned to a crisp in an airplane crash —although no one seems to know the details of which
plane it was, where it crashed, whether anyone was killed, etc.
We know there were dozens of precincts across the
United States where Obama received an “astronomical” amount of votes —99-100%. Or counties where there were reportedly more
votes cast than the total of actual voters registered— St. Lucie County, Florida had a 141.1% turnout !
We know GOP polling inspectors were thrown out of democratically-controlled precincts in fourteen
wards—just in Philadelphia. This was endlessly duplicated throughout the United
States.
And we know Eric Holder’s shock troops, the New Black Panther Party , were out in full force doing what they do best—intimidating anyone not
planning on voting multiple times for Barack Obama.
But this country, supposedly a nation of laws, under
the corrupt Barack Obama Administration did nothing to prosecute the massive
amount of voter fraud.
Until now.
Officials in Hamilton
County, Ohio are mounting a massive voter fraud investigation, already issuing twenty-eight subpoenas , which is just scratching the surface of a massive Obama voter fraud
operation. Dead people voting. Multiple votes by one person. Forged absentee
ballots. Poll workers hiding ballots. Just to name a few of the irregularities.
The Obama fraud poster girl in Hamilton County is Melowese Richardson, alleged to have
cast six votes for Barack Obama.
In true Barack Obama victimology fashion, she claims she filled out absentee ballots for her granddaughter, brother, and
others because they needed “help” in voting—not to mention it being Barack
Obama’s right to receive these votes.
This is only one small district in Ohio. We know the
Obama campaign was engaged in massive voter fraud throughout the United
States . Given that Obama squeaked by with barely two percent of the popular
vote and that he was engaged in massive voter fraud, it is a foregone
conclusion that Barack Hussein Obama did not win the election.
Obama’s CDC Has Stackable
Coffins Ready…
FEMA clearly is fast becoming the Obama
administration’s secret in-country military operations that is scaring citizens
out of their wits. A video narrated by Dale Bohannan has popped up online with photos of what first appear
to be porta-potties. But on closer inspection, the black plastic
containers are what the narrator reveals to be as many as 125,000 outsized
casket liners that are in no way there to service the needs of live American
citizens!
Bohannan drove down a newly cut road through a soybean
field in Madison, Georgia and spoke with the field’s owner, who told him the
Center for Disease Control (CDC) owned these coffin liners and was leasing his
land for their storage! “These are cremation containers for
multiple bodies–patent # 5,425,163–burnable, (and) generate very little
pollution. They are multi-use cremation containers,” says an unidentified commenter to this video . Further information claims that the lids have
been modified so they could be STACKED easily because “Americans can withstand
the notion of many bodies being thrown into these coffins far better than they
could the sight of bulldozers tossing bodies in big holes as was seen after the
large tsunami overseas.”
Images of these black, disposable coffins cement in
the minds of many Americans the notion that our government is not to be trusted
and that our government is not really looking out for us, but rather is looking
out for the higher ups, the politicians, and the elites in Washington, D.C.
The first Amendment guarantees “the right of the
people peaceably to assemble, and to petition the Government for a redress of
grievances.” But the newly updated manual for the 3rd Infantry
Division, 1st Brigade Combat Team now stationed in various American states
includes, for the first time, protocols for subduing civil unrest and crowd
control of US citizens. A federal manual being used by FEMA and the Joint
Terror Task Force, “…gives the government the authority to step in and
IMMEDIATELY crush any civil disturbance or turmoil which might occur.
Civil disturbances are defined as riots, acts of violence, insurrection,
unlawful obstruction or assemblage or other disorders prejudicial to public law
and order.” But who, exactly, will define “unlawful obstruction or assemblage”
or “disorders prejudicial to public law and order?”
In 1968, Operation Garden Plot was initiated by the Department of Defense for the purpose of creating
“…military preparations for suppressing domestic civil disturbance…” But
Americans have begun to ask who our government is preparing to fight and for
what reasons! Why did Janet Napolitano’s Department of Homeland Security need
1.6 billion bullets and 7000 fully automatic rifles? (By the way , when purchased for the DHS, these rifles are called “personal defense
weapons.” When you and I buy SEMI-automatic rifles, we are accused of owning
“assault weapons.”)
What does she need all of those weapons for, all of
those bullets? Who
is the DHS preparing to kill?
Querido Lázaro, Obama sigue con su
retórica de chantaje, porque no es más que un chantaje, que diga que está
protegiendo a la clase media, y que se va a dañar la clase media., Ya! El
destruyo la clase medio, por la falta de empleo, las ayudas sin límite, los
teléfonos gratis, nadie quiere trabajar, es más fácil recibir la ayuda del Gobierno., además,
después de las concesiones que obtuvo en Diciembre con la detente del Fiscal
Clif, nada hizo por ayudar a la clase media., todos los que trabajamos y
pagamos seguro social estamos pagando un 2% mas deducido de nuestro cheque.,
solo esto en algunos trabajadores de clase media, es cerca de 100 a 200 dólares
mensuales, entonces cual es la protección de clase media.
Hecha tierra a los Republicanos de que
si no detienen el Sequester, van a dañar a los Militares no van estar listos
para cualquier crisis....
Va a cortar la inversión en Energía e
Investigación Medica (será que van a investigar que hacen los abortos?), que va
a resultar en dejar fuera de trabajo a miles de Teachers
Va a degradar la habilidad de responder
adecuadamente en los casos de Emergencia y desastres naturales., será que
cuando venga otros desastres quiere comenzar a repartir tarjetas de crédito.
Debemos motivar y contactar a nuestros
Congresistas Republicanos., que respondan adecuadamente a estas infamias que
dice Obama poniéndolos como hiso malvados de las Películas, Espero saques en tu
boletín algo al respecto. El correo que sale aquí de cjlopezc@yahoo.com es de un querido amigo de Texas que tiene un programa de
Radio titulado CON SU PERMISO, Y es trasmitido por Internet en la Radio, te
invito a escucharlo en el siguiente sitio: http://www.besamefm92.com/ saludos. William Benard...
WND EXCLUSIVE. Enviado por Olga Griñan
Muslim
accused of beheading 2 Christians IN USA
Torture, persecution of
faithful no longer reserved for Islamic nations
Published:
2 hours ago
Authorities
in New Jersey allege a Muslim man beheaded two Coptic Christians, burying their
bodies and heads and hands in separate graves near Philadelphia, bringing the
horror of the persecution of Christians in Islamic nations to the United
States.
According
to New York’s WABC-TV, the Muslim was identified as Yusuf Ibrahim, 28. He was
taken into custody after the bodies were found.
The report
said investigators alleged Ibrahim killed the victims then severed their heads
and hands, and buried the remains in the back yard of a home in Buena Vista,
N.J.
The report
said the victims were from the Coptic Christian community in the area. One of
the victims had come from Egypt not many years ago.
While the
report said police did not indicate a motive, friends of the victims wondered
if it was something to do with religion.
WABC
reporter Jeff Pegues wrote: “To members of the close knit Coptic Orthodox
church the pain is real.”
“It’s a
shock, something like this doesn’t happen to people like that,” one resident
told him.
The report
said police described the suspect as “ruthless” and “calculating” and said he
belongs behind bars.
Pamela
Geller, who blogs about Islam at Atlas Shrugs , said it “appear have been a
ritual killing, religious in nature.”
“The
victims were Coptic Christians and the murderer was Muslim (and we are
painfully aware of the status and treatment of Coptic Christians under Muslim
rule in Egypt),” she wrote.
“The
killing evokes this
passage in the Quran: ‘When thy Lord was revealing to the angels, ‘I am with
you; so confirm the believers. I shall cast into the unbelievers’ hearts
terror; so smite above the necks, and smite every finger of them!” – Quran
8:12.”
Samy
Hohareb, a friend of the victims, said, “I leave it for the police and the
investigation.”
The New York
Daily News reported Ibrahim was nabbed by detectives on Sunday after the
bodies were found.
Authorities
said the suspect was found driving a white Mercedes Benz that belonged to one
of the victims.
Ibrahim
was being held at the Atlantic County jail on charges of murder and desecration
of human remains.
WND reported
in September a jihadi writer who has praised the murderer of a
Dutch filmmaker suggested beheading as a way of curbing criticism of Islam. The
report came from the
Muhib
Ru’yat al-Rahman, a senior writer of a leading jihadi forum called Shumoukh
al-Islam, suggested that Muslims living in Denmark, Germany, the Netherlands
and the U.S. kill Westerners who criticize Islam and display their decapitated
heads along roads, according to the Jihad and
Terrorism Threat Monitor , a unit of the Middle East
Media Research Center.
“While
expressing respect for those calling to boycott European and American products
over the release of the film ‘Innocence of Muslims,’ which negatively depicts
Muhammad, Muhib insists that the best way to deter people from insulting
Muhammad and his wives is to implement his proposal,” the report said.
The writer
praised Dutch-Moroccan Muslim Muhammad Bouyeri, who killed Dutch film-maker
Theo Van Gogh in 2004 over the production of “Submission,” a film criticizing
Islam’s treatment of women. Dozens of forum members praised the post,
expressing their agreement with the writer’s suggestions, the report said.
Geller
summarized the report : “More tolerance and respect from savages demanding
tolerance, respect and submission.”
She has waged
a battle in New York, Washington and other cities to post a
pro-Israel ad after numerous pro-Palestinian ads already have appeared.
WND also
previously confirmed a Sky News Arabia report of the crucifixion of dissidents
in Egypt.
Gun
owners get a discount at Va. pizza shop
Associated Press – 3
hrs ago
Associated Press/The
Virginian-Pilot, Amanda Lucier - Denice Tarrant holds her two-week-old grandson
Maxwell Reed as she pays for dinner at All Around Pizza in Virginia Beach, Va.,
on Monday, Feb. 18, 2013, …more
VIRGINIA BEACH, Va. (AP) — A Virginia Beach pizza shop owner is
showing his support for firearm
rights by giving gun owners a 15 percent discount.
The
discount is given to anyone who brings a gun or concealed handgun permit to All
Around Pizzas and Deli.
Owner Jay Laze tells news media outlets that he'd
planned on offering the discount for a limited time. But he says the response
has been overwhelming and he might make it permanent.
Since the
discount began last Friday, Laze says 80 percent of his customers
have brought guns into the pizza shop . He says one customer came in
with an AK-47.
Laze is a gun owner and
says he's always been a supporter of the right to carry firearms.
Película de la Habana en 1930 en Ingles.
¿QUÉ
ATRASADOS ESTÁBAMOS?
Esta película fue filmada hace 82 años.
Después de que vean este film, vean
fotos de hoy y comparen estas con lo que ya existía en 1930. Los emplazo a que
me digan cuantas ciudades de esa época en América y del mundo podían compararse
con nuestra Habana. Limpieza, elegancia, progreso, alegría, y un orden especial
que quedó en el olvido.
LA FUTURA ESCLAVITUD DE obama Por José Martí.
El hombre que
quiere ahora que el Estado cuide de él para no tener que cuidar él de sí,
tendría que trabajar entonces en la medida, por el tiempo y en la labor que
pluguiese al Estado asignarle, puesto que a éste, sobre quien caerían todos los
deberes, se darían naturalmente todas las facultades necesarias para recabar
los medios de cumplir aquellos.
De ser siervo de sí
mismo, pasaría el hombre a ser siervo del Estado. De ser esclavo de los
capitalistas, como se llama ahora, ira ser esclavo de los funcionarios. Esclavo
es todo aquel que trabaja para otro que tiene dominio sobre él; y en ese
sistema socialista dominaría la comunidad al hombre, que a la comunidad
entregaría todo su trabajo.
Y como los
funcionarios son seres humanos, y por tanto abusadores, soberbios y ambiciosos,
y en esa organización tendrían gran poder, apoyados por todos los que
aprovechasen o esperasen aprovechar de los abusos, y por aquellas fuerzas viles
que siempre compra entre los oprimidos el terror, prestigio o habilidad de los
que mandan, este sistema de distribución oficial del trabajo común llegaría a
sufrir en poco tiempo de los quebrantos, violencias, hurtos y tergiversaciones
que el espíritu de individualidad, la autoridad y osadía del genio, y las astucias
del vicio originan pronta y fatalmente en toda organización humana.
“De mala
humanidad -dice Spencer- no pueden hacerse buenas instituciones.” La miseria
pública será, pues, con semejante socialismo, a que todo parece tender en
Inglaterra, palpable y grande. El funcionarismo autocrático abusará de la plebe
cansada y trabajadora. Lamentable será, y general, la servidumbre.
Fragmento de
escrito de José Martí, en New York, en 1884. “EMO” Lo que yo quisiera saber es
como Marti pudo preveer el gobierno de nobama. Lázaro R González Miño
“NUEVO PASAPORTE CUBANO” BLOG DE VARELA
Ahora que la gente en Cuba está agarrando pasaporte, el gobierno
cubano admite, por primera vez, que tiene un brote de cólera en la Habana. No
lo entiendo eso es como un jaque mate a la ley migratoria, como que quiere que
nadie se vaya. Ahora ningún país le dará visa a los pasaporteros y eso
convertirá a la isla en el único país del mundo donde todos sus habitantes
tienen pasaporte, pero ningún lugar a donde ir. No los admitirán ni en la Islas
Galápagos porque encima de que no
son viajeros solventes, no sólo pueden encolerizar a los habitantes del país
adonde lleguen, sino contagiarles el cólera. Es que los cubanos no van a
gastar a ningún sitio, sino pedir: albergue, sello de alimento,
atención médica y cheque mensual. El cubano tiene mala suerte, se estrena de
turista y le cae cólera. Pero vea: el gobierno cubano está cobrando $100 por
pasaporte. Cuando los 11 millones de cubanos hayan comprado su pasaporte, el
gobierno se habrá buscado mil cien millones de dólares. Qué hará entonces para
seguirle sacando dinero al jaleo, pues el reporte médico que diga que estás
limpio, que no tienes cólera y eso costará otros 100. Pero después hará el
pasaporte de
lujo, mucho más fino, con brillo y con foto holográfica. y como el cubano es
comemierda y ostentoso, lo comprará para darle “caritate” al vecino y, por
supuesto, el de lujo costará $200. Después de eso, el cuño. Anunciarán por
televisión que a todos los pasaportes les falta
un cuño, que se olvidó. El cuño costará $150. y así se creará toda una
industria del pasaporte con anuncios de cuentapropistas: "hago forros de
pasaporte, de cuero, de tela y de plástico y se venderán porta-pasaportes a
prueba de agua para que los pasaportes no se pierdan ni se mojen. Una especie
de maricona con ziper que se lleva prendida al frente en el cinto, y con una
ventanita para que se vea que uno tiene pasaporte. Incluso hay quienes le pondrán
lucecitas al porta-pasaporte. Y los exagerados le colgarán un rabo
de zorra como a las bicicletas y llegará el momento en que se te acercará un
mulato en la calle y te dirá: "te vendo un pasaporte falso" que
pudiera ser más interesante que el pasaporte verdadero porque éste tendrá un
nombre que puede viajar y si tú eres médico o deportista o militar te podrás ir
“pal carajo” con un pasaporte falso siempre y cuando, óyelo bien, tengas el
reporte médico que diga que no tienes cólera, y una visa para lugar de destino que
te acepte. Porque de lo contrario importa un carajo que el pasaporte sea de
verdad o de mentira, de lujo o regular, con o sin forro, y a nombre tuyo o de
Mariela Castro. ©varela
Armen Albert Alchian. POR
AMENPER.
Este martes murió Armen Albert Alchian. Lo importante no es que murió,
todo el mundo tiene que morirse un día. Lo importante es que la mayoría
de las personas con que he hablado, nunca se enteraron que Armen Albert Alchian
vivió por casi 100 años. Alchian nació en 1914 en Fresno California, hijo
de inmigrantes Armenios.
Es algo raro, Alchian a mi parecer entra en la categoría de los
grandes economistas como Adam Smith y Friedrich Hayek, a veces pienso que es
hasta superior a ellos, sin embargo poco se habla de Alchian. Quizás sea
por el hecho de ser americano, o quizás por haber nacido en California, y haber
estudiado y enseñado en las universidades californianas de UCLA y
Stanford, muy influenciadas por las ideas liberales.
Conjuntamente con William Allen escribió el ensayo “Cambios y
Producción” que se considera el texto directivo para la discusión e información
de los costos de transporte y la propiedad. También escribió libros que han
trazado pautas en la economía de mercado como “Derechos de la Propiedad” y la
“Enciclopedia Concisa de la Economía”.
Hoy han habido varios escritos sobre Alchian en el Wall Street Journal
con motivo de su fallecimiento. Pero en la sección “Citas Notables” hay un
párrafo de un libro de Alchian que quisiera compartir con ustedes, porque
representa algo que es esencial para comprender la economía de mercado, “la
ambición”-
La ambición es lo que mueve al ser humano, esto es aceptado, y nadie
se avergüenza de la ambición académica o de la ambición deportiva, pero por la
percepción popular de que la ambición económica representa egoísmo, muchos de
avergüenzan de la ambición de obtener bienes materiales-
No es egoísmo el desear tener y conservar una propiedad privada
honestamente.
La propiedad privada es parte de los derechos humanos del individuo, y
eso es lo que nos explica Alchian en su libro en el párrafo que sigue
Uno de los
requisitos fundamentales de un sistema económico capitalista y uno de los
conceptos más incomprendidos — es un sistema fuerte de derechos de propiedad.
Durante décadas los críticos sociales en los Estados Unidos y en todo el mundo
occidental han quejado de que los derechos de "propiedad" demasiado a
menudo tienen prioridad sobre los derechos "humanos", por lo que la
gente se trata desigualmente y tiene la desigualdad de oportunidades.
Desigualdad existe en cualquier sociedad. Pero el aparente conflicto entre los
derechos de propiedad y los derechos humanos es un espejismo. Derechos de
propiedad son derechos humanos.
La definición,
asignación y protección de los derechos de propiedad constituyen uno de los
conjuntos más complejos y difíciles de las cuestiones que cualquier sociedad
tiene que resolver, pero que debe resolverse de alguna manera. En su mayor
parte, los críticos sociales de los derechos de "propiedad" no
quieren abolir esos derechos. Por el contrario, quieren transferirlos de
propiedad privada a propiedad del gobierno....
Cualquier
restricción sobre los derechos de propiedad privada cambia el equilibrio de
poder de atributos impersonales hacia los atributos personales y hacia un
comportamiento que aprueben las autoridades políticas. Es una razón fundamental
para la preferencia de un sistema de derechos de propiedad privada fuerte:
derechos de propiedad privada protegen libertad individual
Participan en “En mi opinión”
Alberto L. Pérez “amenper”, Alexis Ortiz, Amb. Armando Valladares, Annie
González, Ing. Armando López Calleja, J. Fresno, Bárbara Fernández, Carlos
Bringuier, Efraín Sinaí, Eladio José Armesto, Enrique Enríquez, Enrique de Diego,
Erick Ruiz, Emigdio Prado, Gerardo Alfredo DeSola, Georgina López, Gustavo
Rojas, Héctor Molina, Héctor Lemange Sando, Irmende Méndez, Jesús Angulo, Jesús
Marzo Fernández, Jorge A Villalon, Jorge Aguiar , José y Marcia Caula, J
Fresno, Luis Pensado, Lili Samways, Manny Fernández, Margarita Sánchez, María
Argelia Vizcaíno, May De La Vega, Mil amigos de Holguín, Miriam Pinedo, Miriam
Dopico, Margarita Sánchez, Marlene, Martha Ruiz, María Lahullier, Olga
Griñan, Oscar Díaz, Philip V. Riggio, Raúl Barroso, Reinaldo López jr,
Ricardo Samitier, Rolando Antonio Lara, Sergio Bello, Sofía Iduate, Sonia
“Chuchin” Castell, Tony Flores, V J Marino, William Benard, Victor M Caamaño,
http://news.yahoo.com, NoticieroDigital.com , CNN Español, LaNuevaNacion.com,
TheBLAZE.com, The WesternCenterforJournalism.com, LastResistance.com,
NewsMax.com, RealClearPolitics.com,
GOPUSA.com, LIGNET.com, TheTradingReport.com, Beforeit’sNews.com, http://economyincrisis.org , http://worldnews.nbcnews.com ,
. “EN MI OPINION”.
“The Freedon never is
Free” Editor Lázaro R González Miño .
No comments:
Post a Comment