American Elephants


Talking Tough! by The Elephant's Child

obama-angry-8-560x350Chinese President Xi Jinping is due for a visit to the United States shortly to be honored at a State Dinner.

Chinese government hackers have reportedly stolen commercial data from many U.S. companies, and personal data about many American government employees — including those with security clearances, plus private data from Americans’ health-care companies. Obama has done little or nothing to stop this coast-to-coast raiding of Americans’ property, but has instead worked elsewhere to boost the Democratic party’s political power.

In the Pacific, China’s government is building new island-bases in internationally disputed waters, while Obama focuses his foreign-policy efforts on completing his nukes-and-cash sellout to the deepening alliance of Iran and Russia.

Surely by now, we must have teams working in each government department to harden off their computer files to prevent hacking?The State Department’s lack of control (or concern) over the Secretary of State’s use of a personal computer might argue that there is something more to be desired.

The Daily Mail (UK) just published ( July 15) this “secret”  NSA map of cyber attacks from Chinese hackers  over the past five years. (Click to enlarge). Did the Daily Mail hack NSA to get their “secret map?”

2AFE309A00000578-3181179-image-a-1_1438343690518

Silicon Valley is the most attacked. Seattle has Boeing and Microsoft, but I can’t imagine what that one lonely dot on the NW coast is. Iron Springs Resort? The Office of Personnel Management hack got 22.1 million people’s Social Security records, everyone who has ever applied for a government job, and their personal references. The IRS hack in May gave them over 100,000 tax records.

President Obama is not taking this lying down. He refused to stay at the Waldorf Astoria Hotel during the U.N. General Assembly this month. (A Chinese conglomerate now owns the hotel.) And he’s really talking tough in a visit to Ft. Meade, speaking about Chinese cyber attacks.

We’ve made very clear to the Chinese that there are certain practices that they’re engaging in that we know are emanating from China and are not acceptable,” Obama said in an appearance at Ft. Meade. “And we can choose to make this an area of competition – which I guarantee you we’ll win if we have to – or, alternatively, we can come to an agreement in which we say, this isn’t helping anybody. Let’s instead try to have some basic rules of the road in terms of how we operate.”

China is really getting the ultimate threat in the Obama arsenal:  “These practices are not acceptable.” That should get their attention.

China responded:

“We hope that the U.S. stops its groundless attacks against China, start dialogue based on a foundation of mutual respect, and jointly build a cyberspace that is peaceful, secure, open and cooperative,” said a Chinese foreign ministry spokesman.  “Maintaining cybersecurity should be a point of cooperation rather than a source of friction between both China and the United States.”

ADDENDUM: During the President’s trip to Alaska, Chinese warships which had been exercising with the Russians in the Arctic traveled 3,000 miles out of their way to broach the 12 mile territorial limits just, by coincidence, when the President was on a 3 day visit to Alaska, and of course they knew his schedule because they had hacked the White House computers.
Violating another nation’s territorial limits just isn’t done, unless it is meant as a provocation. The U.S, brushed it off as unimportant.


Leave a Comment so far
Leave a comment



Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s



%d bloggers like this: