Thursday, 20 June 2013

Julian Assange supporters stand by their man - Features - Al Jazeera English

Julian Assange supporters stand by their man - Features - Al Jazeera English

China and North Korea

Pondering Pyongyang: Beijing's problem child


By Kristie Lu Stout, CNN
June 19, 2013 -- Updated 0854 GMT (1654 HKT)

On China: N. Korea as 'problem child'

STORY HIGHLIGHTS
  • Pyongyang reacted angrily to tougher sanctions after its third nuclear test
  • Chinese trade with North Korea has been a lifeline for the isolated regime
  • But Beijing has struggled to control the angry rhetoric from its neighbor
  • Expert: China fears a North Korean collapse would spark a refugee crisis
Editor's note: Episode 9 of On China with Kristie Lu Stout focuses on China-North Korea relations -- Wednesday, June 19: 0530 ET, 1230 ET. Watch in Hong Kong at 1730 HKT, 0030 HKT.
Hong Kong (CNN) -- The naughty step is not working.
After the United Nations slapped tougher sanctions on North Korea after its third nuclear test in February this year, Pyongyang screamed in defiance. It canceled its hotline with South Korea, withdrew its workers from the Kaesong industrial complex it jointly operates with Seoul, and carried on with its over-the-top threats.
China may have backed those sanctions but the economic lifeline is still there. Trade goes on between North Korea and China. In 2011, before some of these trade embargoes began, China accounted for an estimated 67.2% of North Korea's exports and 61.6% of imports, according to the CIA World Factbook.
"If you talk to officials at the border, there's no change," says Stephanie Kleine-Ahlbrandt, the North Asian head of the International Crisis Group.
On China: China's influence on N. Korea
On China: Preventing a nuclear N. Korea
China changing tone on North Korea?
China's influence in the N. Korea crisis
"And a lot of that trade is conducted by government trading companies especially on the North Korean side," adds the Los Angeles Times' Beijing Bureau Chief Barbara Demick. "There's a lot more China could do that it has chosen not to."
So why is China not using its economic leverage to rein in the nuclear threat and proliferator next door?
In a word -- fear.
There's fear of a North Korean collapse that would lead to instability and a refugee crisis along its 1,400 kilometer (880 mile) border with North Korea. And then there's the far greater fear of an all-out conflict that would redraw the geopolitical map.
"Their end goal might be similar in terms of denuclearization, but China is looking at preventing war on the peninsula, which would allow a pro-Western government right on its border," says Kleine-Ahlbrandt.
And there's something else holding Beijing back -- the historic and symbolic relationship with Pyongyang that is hard to give up.
"The Chinese Communist Party thinks of North Korea as this small state that is in its own image," says Demick. "The structure of the North Korean government is very similar to the Chinese government and, in a way, it's the pure Communist state.
"It's just really hard psychologically to dump North Korea."
It's just really hard psychologically to dump North Korea.
Barbara Demick
"They treat North Korea a bit like a wayward child," adds Kleine-Ahlbrandt. " You want to be the one to punish your child, but you're not going to turn them over to police."
But for many people in China, enough is enough.
"Their rhetoric is increasing the number of Chinese who feel very, very disgusted by their behavior, their psyche and their regime," says Zhu Feng, professor of International Relations at Peking University.
"China's government is seriously under fire because I think the majority of Chinese really, really feel that North Korea's bad behavior will inevitably endanger China."
Beijing has mastered the art of "scream-free parenting" with Pyongyang. It has learned to lower its voice and control its emotional reaction with every new threat or missile test.
But public opinion is shifting and China's new leadership is recognizing the need to re-evaluate how it manages its troublesome neighbor.
In a sign of Beijing's evolving approach toward North Korea, Chinese President Xi Jinping recently offered this veiled criticism: "No one should be allowed to throw a region and even the whole world into chaos for selfish gains."
The pressure is on for China to spell out -- and carry out -- the consequences for North Korea's bad behavior.

Wednesday, 19 June 2013

Obama's 'Stasi' scandal in German spotlight - Features - Al Jazeera English

Obama's 'Stasi' scandal in German spotlight - Features - Al Jazeera English

US has commenced cyberwar around the world

(CNN) -- Today, the United States is conducting offensive cyberwar actions around the world.
More than passively eavesdropping, we're penetrating and damaging foreign networks for both espionage and to ready them for attack. We're creating custom-designed Internet weapons, pre-targeted and ready to be "fired" against some piece of another country's electronic infrastructure on a moment's notice.
This is much worse than what we're accusing China of doing to us. We're pursuing policies that are both expensive and destabilizing and aren't making the Internet any safer. We're reacting from fear, and causing other countries to counter-react from fear. We're ignoring resilience in favor of offense.
Bruce Schneier
Bruce Schneier
Welcome to the cyberwar arms race, an arms race that will define the Internet in the 21st century.
Presidential Policy Directive 20, issued last October and released by Edward Snowden, outlines U.S. cyberwar policy. Most of it isn't very interesting, but there are two paragraphs about "Offensive Cyber Effect Operations," or OCEO, that are intriguing:
"OECO can offer unique and unconventional capabilities to advance U.S. national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging. The development and sustainment of OCEO capabilities, however, may require considerable time and effort if access and tools for a specific target do not already exist.
"The United States Government shall identify potential targets of national importance where OCEO can offer a favorable balance of effectiveness and risk as compared with other instruments of national power, establish and maintain OCEO capabilities integrated as appropriate with other U.S. offensive capabilities, and execute those capabilities in a manner consistent with the provisions of this directive."

Obama: NSA programs are transparent

Releasing NSA leaks: A public service?

NSA fallout could be 'harmful'

Could the NSA leaker defect to China?
These two paragraphs, and another paragraph about OCEO, are the only parts of the document classified "top secret." And that's because what they're saying is very dangerous.
Cyberattacks have the potential to be both immediate and devastating. They can disrupt communications systems, disable national infrastructure, or, as in the case of Stuxnet, destroy nuclear reactors; but only if they've been created and targeted beforehand. Before launching cyberattacks against another country, we have to go through several steps.
We have to study the details of the computer systems they're running and determine the vulnerabilities of those systems. If we can't find exploitable vulnerabilities, we need to create them: leaving "back doors" in hacker speak. Then we have to build new cyberweapons designed specifically to attack those systems.
Sometimes we have to embed the hostile code in those networks, these are called "logic bombs," to be unleashed in the future. And we have to keep penetrating those foreign networks, because computer systems always change and we need to ensure that the cyberweapons are still effective.
Like our nuclear arsenal during the Cold War, our cyberweapons arsenal must be pretargeted and ready to launch.
That's what Obama directed the U.S. Cyber Command to do. We can see glimpses in how effective we are in Snowden's allegations that the NSA is currently penetrating foreign networks around the world: "We hack network backbones -- like huge Internet routers, basically -- that give us access to the communications of hundreds of thousands of computers without having to hack every single one."
The NSA and the U.S. Cyber Command are basically the same thing. They're both at Fort Meade in Maryland, and they're both led by Gen. Keith Alexander. The same people who hack network backbones are also building weapons to destroy those backbones. At a March Senate briefing, Alexander boasted of creating more than a dozen offensive cyber units.
Longtime NSA watcher James Bamford reached the same conclusion in his recent profile of Alexander and the U.S. Cyber Command (written before the Snowden revelations). He discussed some of the many cyberweapons the U.S. purchases:
"According to Defense News' C4ISR Journal and Bloomberg Businessweek, Endgame also offers its intelligence clients -- agencies like Cyber Command, the NSA, the CIA, and British intelligence -- a unique map showing them exactly where their targets are located. Dubbed Bonesaw, the map displays the geolocation and digital address of basically every device connected to the Internet around the world, providing what's called network situational awareness. The client locates a region on the password-protected web-based map, then picks a country and city -- say, Beijing, China. Next the client types in the name of the target organization, such as the Ministry of Public Security's No. 3 Research Institute, which is responsible for computer security -- or simply enters its address, 6 Zhengyi Road. The map will then display what software is running on the computers inside the facility, what types of malware some may contain, and a menu of custom-designed exploits that can be used to secretly gain entry. It can also pinpoint those devices infected with malware, such as the Conficker worm, as well as networks turned into botnets and zombies -- the equivalent of a back door left open...
"The buying and using of such a subscription by nation-states could be seen as an act of war. 'If you are engaged in reconnaissance on an adversary's systems, you are laying the electronic battlefield and preparing to use it' wrote Mike Jacobs, a former NSA director for information assurance, in a McAfee report on cyberwarfare. 'In my opinion, these activities constitute acts of war, or at least a prelude to future acts of war.' The question is, who else is on the secretive company's client list? Because there is as of yet no oversight or regulation of the cyberweapons trade, companies in the cyber-industrial complex are free to sell to whomever they wish. "It should be illegal,' said the former senior intelligence official involved in cyberwarfare. 'I knew about Endgame when I was in intelligence. The intelligence community didn't like it, but they're the largest consumer of that business.'"
That's the key question: How much of what the United States is currently doing is an act of war by international definitions? Already we're accusing China of penetrating our systems in order to map "military capabilities that could be exploited during a crisis." What PPD-20 and Snowden describe is much worse, and certainly China, and other countries, are doing the same.
All of this mapping of vulnerabilities and keeping them secret for offensive use makes the Internet less secure, and these pre-targeted, ready-to-unleash cyberweapons are destabalizing forces on international relationships. Rooting around other countries' networks, analyzing vulnerabilities, creating back doors, and leaving logic bombs could easily be construed as an act of war. And all it takes is one over-achieving national leader for this all to tumble into actual war.
It's time to stop the madness. Yes, our military needs to invest in cyberwar capabilities, but we also need international rules of cyberwar, more transparency from our own government on what we are and are not doing, international cooperation between governments and viable cyberweapons treaties. Yes, these are difficult. Yes, it's a long slow process. Yes, there won't be international consensus, certainly not in the beginning. But even with all of those problems, it's a better path to go down than the one we're on now.
We can start by taking most of the money we're investing in offensive cyberwar capabilities and spend them on national cyberspace resilience. MAD, mutually assured destruction, made sense because there were two superpowers opposing each other. On the Internet there are all sorts of different powers, from nation-states to much less organized groups. An arsenal of cyberweapons begs to be used, and, as we learned from Stuxnet, there's always collateral damage to innocents when they are. We're much safer with a strong defense than with a counterbalancing offense.

Monday, 17 June 2013

The Shamed Office of the Prime Minister of Australia

Let me be very clear:


It is not that Julia Gillard is attacked as Prime Minister because she is a Woman...the fact is that the Gillard Government is the worst Government Australia has ever manufactured and this fact is mostly the Prime Minister's direct fault.
It is not that somehow immediately 'bad forces' intrinsically undermine the current Prime Minister's Office, but rather that Gillard has destroyed any decent person's respect for this, up til now, reasonably decent and usually respected role.