{"id":22716,"date":"2014-01-15T07:33:54","date_gmt":"2014-01-15T15:33:54","guid":{"rendered":"http:\/\/antiwar.com\/blog\/?p=22716"},"modified":"2014-01-15T07:35:22","modified_gmt":"2014-01-15T15:35:22","slug":"the-hypocritical-us-position-on-cyber-warfare","status":"publish","type":"post","link":"https:\/\/www.antiwar.com\/blog\/2014\/01\/15\/the-hypocritical-us-position-on-cyber-warfare\/","title":{"rendered":"The Hypocritical US Position on Cyber-Warfare"},"content":{"rendered":"<p>The <a href=\"http:\/\/mobile.nytimes.com\/2014\/01\/15\/us\/nsa-effort-pries-open-computers-not-connected-to-internet.html?hp&amp;_r=2&amp;referrer=\"><em>New York Times<\/em><\/a> is out with a story about how the NSA has the capacity to surreptitiously install software on specific computers that\u00a0allow the agency to mount cyber attacks and\u00a0carry out surveillance, even when the targeted computers are not connected to the internet. The <em>Times<\/em> reports that the NSA has done this to some 100,000 computers around the world.<\/p>\n<p>This again brings up the issue of the NSA engaging in cyber-warfare, an activity that the U.S. is a veritable pioneer in, but which Washington relentlessly condemns other nations for engaging in.<\/p>\n<p>The &#8220;tracking malware&#8221; discussed for the first time in the<em> New York Times<\/em> piece, &#8220;is a pursuit played most aggressively with the Chinese,&#8221; the report says. The U.S. has targeted Chinese Army units and &#8220;has set up two data centers in China \u2014 perhaps through front companies \u2014 from which it can insert malware into computers.&#8221;<\/p>\n<p>Granted, the Chinese engage in cyber-warfare against the U.S. as well, but to frame U.S. cyber operations against China as purely a response to Chinese cyber threats is disingenuous. There is <a href=\"http:\/\/cryptome.org\/echelon-ep-fin.htm#10\">documentation<\/a> of U.S. cyber-warfare going back decades &#8211; and the U.S. has always been, needless to say, way ahead of China on this front, technologically speaking.<\/p>\n<p>&#8220;U.S. intelligence services carried out 231 offensive cyber-operations in 2011, the leading edge of a clandestine campaign that embraces the Internet as a theater of spying, sabotage and war,&#8221; <em>The Washington Post<\/em> <a href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents-show\/2013\/08\/30\/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html\">reported<\/a> in August, based on documents leaked by Edward Snowden. The key word there is &#8220;offensive.&#8221;<\/p>\n<p>The hypocrisy of the official U.S. position on cyber-warfare is made clear in two recent Washington Post articles&#8230;<\/p>\n<p>The<em>\u00a0Post<\/em>\u00a0<a href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/us-official-says-cyberattacks-can-trigger-self-defense-rule\/2012\/09\/18\/c2246c1a-0202-11e2-b260-32f4a8db9b7e_story.html\">reported<\/a>\u00a0in September 2012: \u201cCyberattacks can amount to armed attacks triggering the right of self-defense and are subject to international laws of war, the State Department\u2019s top lawyer said Tuesday.\u201d<\/p>\n<p>And in A<a href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/black-budget-summary-details-us-spy-networks-successes-failures-and-objectives\/2013\/08\/29\/7e57bb78-10ab-11e3-8cdd-bcdc09410972_story.html\">ugust 2013<\/a>: \u201cThe CIA and the NSA have begun aggressive new efforts to hack into foreign computer networks to steal information or sabotage enemy systems, embracing what the budget refers to as \u2018offensive cyber operations.'&#8221;<\/p>\n<p>Either Washington&#8217;s logic is airtight and they admit that China, Iran, and other countries targeted by our cyber-warfare now have the right to respond militarily in self-defense&#8230;or, the real logic is that the U.S. considers offensive cyber-warfare to be illegal for everyone except Uncle Sam. Which is it?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The New York Times is out with a story about how the NSA has the capacity to surreptitiously install software on specific computers that\u00a0allow the agency to mount cyber attacks and\u00a0carry out surveillance, even when the targeted computers are not connected to the internet. The Times reports that the NSA has done this to some [&hellip;]<\/p>\n","protected":false},"author":86,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[],"coauthors":[],"class_list":["post-22716","post","type-post","status-publish","format-standard","hentry","category-news"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"meta_box":{"disable_donate_message":"","custom_donate_message":"","subtitle":""},"_links":{"self":[{"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/posts\/22716","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/users\/86"}],"replies":[{"embeddable":true,"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/comments?post=22716"}],"version-history":[{"count":2,"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/posts\/22716\/revisions"}],"predecessor-version":[{"id":22718,"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/posts\/22716\/revisions\/22718"}],"wp:attachment":[{"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/media?parent=22716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/categories?post=22716"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/tags?post=22716"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.antiwar.com\/blog\/wp-json\/wp\/v2\/coauthors?post=22716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}