Tired of All The Whining About China

I don’t know about you, but I am so tired about all the whining about China. 


– They are stealing our intellectual property. 


– They are hacking into our systems. 


– They are unfairly forcing us to transfer technology to them.


– They aren’t opening up their market to us. 


OMG stop the complaining already!


If you don’t like what they are doing, then do something about it. 


Tariffs are a start, but just a small one. 


Seriously, if you can’t incentivize them to stop the harassment and unfair trade practices by adding them to the World Trade Organization, investing in them, and partnering with them, then you need to actually compete with China. 


– They steal our sh*t–you help yourself to a generous serving of theirs.  


– They break into our systems–you find your way into their systems.


– They try to unfairly take away our markets and jobs–you take away theirs big time.  


Everyone knows that to deal with bully, you must fight back!


The more we are scared into inaction, the worse it gets.


This doesn’t mean that we should get into a military exchange with China, but we do need to get into a confrontation over what economic and global partnership should mean and look like. 


China is an old and truly great nation and their people should be highly respected.


However, the USA should also be treated right, and if that means it’s time for a heart to heart and some evening up of the playing field then that is what has to happen. 


We have to restore respect to America, not by becoming bullies ourselves, but by standing up to them when we are being taken advantage of.  😉


(Source Photo: Andy Blumenthal)

Perception Is Reality

Hook.jpeg

Sometimes, one person’s clothing hook is another person’s elephant trunk.


Or maybe it’s the other way around that some creative person looked at an elephant and thought:

“Oh my that trunk of his would make a great clothing hook.”


Life mimics art and art imitates life.


And that is flattery both ways. 


Either way perception is reality. 😉


(Source Photo: Andy Blumenthal)

Returning Our US Drone

chinese

So I love and respect China, and think they are one of the greatest nations of the world.


However, it is wrong that their military stole a US drone in international waters. 


Bullying and theft is a violation of the rule of law and a challenge to America on the international stage. 


So far, our leadership from behind approach has again done virtually nothing, except like a child, ask for it back (after they have already taken whatever they wanted from it). 

Moreover, this is not the first time China has captured our assets and people–less than 6 years ago, they collided into one of our EP-3E surveillance aircraft and captured, interrogated , and held the crew for 11 days!


And hence our planes and ships keep getting buzzed, our citizens captured and humiliated, our assets confiscated illegally, and our secret intellectual property unabashedly hacked and copied.


Moreover, we are seeing a resurgent Russia in Georgia, Ukraine and Syria; a militarized China expanding and weaponizing the South China Sea, a belligerent North Korea with ever further reaching ballistic nukes, and an Iran that violates their nuclear deal at will and now runs amuck with military operations from Iraq to Syria, Lebanon, Yemen, and more. 


Oh, and surely let’s not forget ISIS and the global wave of Islamic terrorism that is unabated from Paris to Orlando. 


Despite our outspending the next leading 8 nations combined on the military, we continue to be the laughing stock internationally with world leaders calling our Presidents everything from the devil to an SOB


No one would dare do this with Putin’s Russia!


Why? Because they know the ridiculous price they would pay. 


We have long since passed the time when we should’ve stopped the whining, begging, and acting the victim, and instead start to do something real to defend ourselves and once again establish a no-nonsense deterrent, rather than a joke of red lines and hollow threats.


Our Commander-in-chief, instead of laying blame at the doorstep of Congress or world leaders doing the wrongdoing, should start to act his position. 


Perhaps, just perhaps, it’s a single phone call to whoever has our drone that says something like, “You have exactly 2 hours to return the drone unharmed or the ship that was responsible for stealing it will pay the consequences–and the clock starts ticking now!”


The funny-sad thing is that bullies don’t stop bullying until you stand up to them once and for all. 


A real Commander In Chief protects his nation and his people and doesn’t let them be victimized in a endless cycle of violence and shame…and he does it before something really bad can happen. 😉


(Source Photo: Andy Blumenthal)

Why Can’t We Keep Our Secrets

keepign-secrets-jpeg

Well after the now notorious email scandal and other information security mishaps galore, this advertisement in Washington, DC is really quite the rage. 

“Keeps classified data classified.”


As parents tell their children about keeping private things private:

“If you can’t keep it a secret, then how do you expect the other kids to keep it to themselves?”


There are lots of secrets in DC, but there are also a lot of big mouths, security negligence, and even corruption. 


This gives our adversaries the opportunities they need to get our countries vital information. 


We work too hard to develop the best intellectual property for national security and our economy as well as the critical policies for advancing human rights and democracy around the world to let it just be easy fodder for others to help themselves too. 


Technology won’t solve the gap in certain big mouths and sloppy Joes around town. 


Only vigilant, smart people can protect the nations vital information that is the fuel for our success and survival. 😉


(Source Photo: Andy Blumenthal)

Preventing Cyber Disaster

prevention

So I liked this ad from Palo Alto Networks on the side of the bus, over the windows:

“Dinosaurs react.
Professionals prevent.”

That’s some very good marketing for a cyber security company.


It’s almost a daily occurrence now to hear about the infiltrations into our networks and exfiltrations or manipulations of data that is taking place across government and industry.


Just today again, another NSA contractor accused of stealing highly classified computer code.


The day before Guccifer 2.0 and Wikileaks releases trove of stolen documents from the Clinton Foundation


And again, J&J reveals that it’s insulin pump is vulnerable to hacking following allegations in August that St. Jude heart devices were subject to life-threatening hacking. 


Certainly, we can’t afford to sit back and wait to react to the next attack…damage control and remediation is much harder than getting out in front of the problem in the first place. 


Prevention and deterrence is really the only solution…keep the hackers out and make sure they know that if they mess with us and our systems that we can identify who they are, find them, and take them out. 


These are the capabilities we need and must employ to dominate the cyber realm. 


In the presidential debates, candidates struggled to articulate how to deal with cybersecurity


But this is not a game of cyberopoly, rather national security, critical infrastructure, vital intellectual property, and our economy is at risk. 


Giving away Internet control and trying to plug leaks after the fact on a sinking cyber ship is no way to manage our vital technology resources.


It’s high time for the equivalent Cold War determination and investment that ensures we win a free and safe cyberspace with all our networks and data intact. 


This is the only way that we don’t go the way of the dinosaurs. 😉


(Source Photo: Andy Blumenthal)

Modesty And Privacy Of Body and Information

Modesty.jpeg

So modesty and privacy is very important in terms of propriety and security.


Both are intimately connected. 


Already as children, we learn not to show or talk about our “privates” to others. 


And as adults, we understand that there are certain things about ourselves that we don’t just talk about or divulge to others indiscriminately. 


Not being discrete with these and showing either your private parts or your personal information can get you in a load of trouble by giving others the opportunity to take undue advantage of you. 


Both open you up to be ridiculed or even raped of your person or information identity. 


That which is yours to use with others in propriety is instead disclosed for taking out from your control and for use against you. 


Security demands modesty of body and of information, and if not taken seriously, then no amount of lame covering will keep that which is private from public consumption. 😉

Cybersecurity Lost In Unknowns

Security

Today unveiled is a new Cybersecurity National Action Plan


This in the wake of another Federal data breach on Sunday at the Department of Justice where hackers stole and published online the contact information for 9,000 DHS and 20,000 FBI personnel


And this coming on the heels of the breach at OPM that stole sensitive personnel and security files for 21 million employees as well as 5.6 million fingerprints.


While it is nice that cybersecurity is getting attention with more money, expertise, public/private poartnerships, and centers of excellence. 


What is so scary is that despite our utter reliance on everything cyber and digital, we still have virtually no security!


See the #1 definition for security–“the state of being free from danger or threat.”


This is nowhere near where we are now facing threats every moment of every day as hackers, cybercriminals, cyber spies, and hostile nation states rapidly cycle to new ways to steal our secrets and intellectual property, commit identity theft, and disable or destroy our nation’s critical infrastructure for everything from communications, transportation, energy, finance, commerce, defense, and more. 


Unlike with kinetic national security issues–where we regularly innovate and build more stealthy, speedy, and deadly planes, ships, tanks, surveillance and weapons systems–in cyber, we are still scratching our heads lost in unkowns and still searching for the cybersecurity grail:


– Let’s share more information


– Let’s throw more money and people at the problem.


– Let’s seek out “answers to these complex challenges”


These have come up over and over again in plansreviewsinitiatives, and laws for cybersecurity.


The bottom line is that today it’s cyber insecurity that is prevailing, since we cannot reliably protect cyber assets and lives as we desperately race against the clock searching for real world solutions to cyber threats. 


Three priorities here…


1) Build an incredibly effective intrusion protection system

2) Be able to positively tag and identify the cyber attackers 

3) Wield a powerful and credible offensive deterrent to any threats 😉


(Source Photo: Andy Blumenthal)