Thursday, May 30, 2013

BROODING CYNYX REACH MILESTONE



20,000 UNIQUE VIEWERS SINCE JANUARY 2013




(Thursday May 30, 2013 TBC - HQ, NYC)  Thank you; thank you all.  As of 7 O’clock PM this evening you, our loyal and faithful readers and casual visitors alike, made possible an important milestone.  It was just an hour ago that we exceeded 20,000 unique visitors to our blog for the year. Yes, 2013 has been very kind to The Brooding Cynyx thus far. We thank you; we thank you all for taking the time over these past five months for taking the time to read our posts, share our perspective, comment on what we write, and generally support us in this nebulous media of cyberspace.  We greatly appreciate every one of you out there who has clicked on a link that brought you to us, those of you who sought us out specifically, those who have stumbled upon us tangentially, as well as everyone who has found us by accident and then become an ardent supporter. 

We realize we are not for everyone; that our reporting, commentary, observation and opinion is not palatable to many.  However, we do appreciate all of those who have become regular consumers of our product and, in particular, the 1900 plus readers who have left comments, sent e-mails or just “liked” us where they found us.  That is the beauty of this medium.  For every one of you out there who has taken the time to read and comment on what we have written we send a bouquet of salutes and good wishes.  There was a day not too far in the past that we never imagined we would have reached this milestone.  We have been hacked and attacked.  We have been virtually assailed, verbally assaulted but also amazingly encouraged, promoted and inspired by your support. 

Of all the rewarding elements of this milestone perhaps most elevating is the fact that our readership is global; our statistics indicate that we have an appeal that easily transcends the borders of the United States of America.  We are actually an active, vocal member of the “global community”.  The “traffic sources” and “audience” indicators provided by our host site, Google Blogspot, clearly illustrate the diversity nature of our readership and visitors. It is as affirming to us as it is humbling; we are ever mindful that our words are read far and wide beyond the place this computer sits.  We are cognizant of the responsibility that is associated with having a global audience.  We strive for balance in our reporting and diversity of opinion in our commentary and editorials.  We provide a wide range of links to mainstream as well as new-stream media for virtually all of the posts that are not satirical or parodies.  We try to “tag” each post as accurately as possible to minimize the potential for misunderstanding.

Most importantly, we welcome and appreciate all the comments we receive be they for or against a position we have taken, an opinion we’ve expressed, or anything that appears on our blog.  We encourage more audience participation in terms of connecting with us, contacting us, and sharing your own thoughts and opinions.  We see our blog as a dynamic forum rather than a static collection of articles and essays.

As we look ahead to providing even a wider range of news and opinion, we are open to suggestion.  One reader proposed that we print the “tags” for each post above the actual text rather than at the end as we have been doing.  We may do this on a trial basis and would appreciate your feedback.

Again we say thanks to all of you who have allowed us to realize this milestone.  We look forward to the next 20,000 unique viewers and page hits.  We will do our best to not disappoint.

Be well.

Brooding Cynyc



Copyright The Brooding Cynyx 2013 © All Rights Reserved

Tuesday, May 28, 2013

CHINESE HACKERS STRIKE YET AGAIN



FROM CRUISE MISSILES TO CURSORS:
THE EVOLVING FACE OF THE HARDWARE OF WARFARE
US Military and private sector networks under almost constant attack from China





National Security & Intelligence Special Report


(Tuesday May 28, 2013 Washington, DC)  In this day of ultra-high tech warfare, drones, “smart” bombs and all the sophisticated military hardware and software in the United States arsenal, why is the most recent episode of Chinese hackers breaching some of most sensitive defense networks not the front page leading story in every newspaper and every newscast in the country?  Given how much of our national security and military systems exist in cyberspace, the fact that Chinese hackers have once again been able to gain entry to these networks and steal information about our most closely guarded secrets arguably, can be perceived as an act of “war”.  This latest intrusion by the Chinese into our military networks has perhaps been the single most significant incursion of its kind. 

For years now there have been officials in the Pentagon, FBI and CIA warning of the real and present threat of a “Cyber Pearl Harbor”; a massive sneak attack on a particular military network that could render some of the most advanced weaponry in our arsenal useless.  The same threats exist to the networks controlled by the private sector such as the big banks and financial institutions that conduct billions of transactions daily in nanosecond long bursts through the intricately interconnected global economy.  The private sector in America also owns virtually all our utilities, electrical grids, water delivery systems, transportation that moves people and goods around the world.  So much of Americas vital infrastructure that is totally reliant on computer hardware and software is privately held that anyone could suffer a cyber-attack and not even report it to government officials until well after the fact.  In this sense a cyber-attack is similar to the “not immediately seen’” dynamics of a biological weapons strike.  In both cases it would take days if not weeks for evidence of a strike to manifest itself.

Conventional weapons are overt; their affects immediately seen and felt.  This is simply not so if an attack were to be launched by a foreign or, for that matter, a domestic adversary.  Yes, given the particulars of any given malicious foray into our networks, it might be immediately obvious that someone has done something.  But it could take long days before the nature of what would seem to be some ‘glitch’ or systemic dysfunction was in fact recognized for what it really was – an attack from the outside.  Just as if a biological agent were to be introduced into a population it would only be recognized after the incubation period of the specific biological agent passed and people began appearing in doctors’ offices and hospitals in unusual numbers with very similar symptoms.  The medical surveillance effort that all hospitals participate in since the terrorist attack of September 11, 2001 serves as the mechanism by which a biological (or chemical) attack has been perpetrated.  These are just some of the challenges that keep government and private sector security officials up late at night.  Since time is always of the essence when an attack or violent crime of any kind has been made, the very nature and dynamics of the cyber world and epidemiology take more valuable time to reveal themselves.

Vigilance, constant, rigorous monitoring of our networks is the single most important step that can be taken to thwart would-be hackers.  Despite best efforts up to now the Chinese, Iranians, and a host of “non-state” entities have made numerous incursions into all of our networks.  Some of these incursions appeared to be simple exploratory raids to test the vulnerability of a network while others, such as this latest full frontal assault by China, was a blatant act of hostility and theft.  The intelligence they extracted from the military networks they breached provides them with a wealth of information that affords them a distinct advantage if we were to deploy certain weapons systems in a conflict with them. 

A LINE IN THE SILICONE

Presidents and Prime Ministers are fond of using metaphor to describe criteria for military action.  In 1990 then President George H.W. Bush drew a “line in the sand” indicating how far Saddam Hussein’s invading Army could go in the invasion of neighboring Kuwait before Bush intervened militarily.  More recently Israeli Prime Minister Benjamin Netanyahu showed a chart to the UN General Assembly with a “red line” that allegedly represented how close Iran is to having nuclear capabilities.  All sorts of DMZ’s, red zones, buffer zones, security fences and other similar boundaries are easily erected and defined in the physical world.  The question is fast becoming for this President, what it the threshold criteria that must be met before he takes some form of action against these hostile Chinese cyber warfare raids?  What is the proverbial “line in the silicon” to be drawn and where does it exist in terms of constituting predicates for retaliation?   If the Administration, Pentagon of Military Cyber Command has established such a “tipping point” they have yet to say so publically.  Perhaps there has been back channel communications from our State Department and the White House to the Chinese government; at least one would hope so.  Arguably and, to many in the Military, China has already crossed that nebulous line.

An equally salient question to be asked is what sort of line in the silicon has been established in the private sector?  Clearly this is a very important question because, as previously written, the private sector owns and operates the majority of our computer networks and many of them have already been attacked.  There is the possibility if not probability that the private sector would retaliate covertly without so much as informing the appropriate government agencies they have done so.  After all, they have so much at stake; the security of the entire global banking, investing and financing apparatus is just as important to protect in many ways as are the military systems.  Any large scale attack on the financial sector could immediately send our already shaky economy plummeting into rapid ruin. Such an attack would be as effective in crippling America as was the atrocities of September 11, 2001.  Fortunately, in that case, the financial and transportation institutions recovered quickly after only a short delay.

CURSORS AND CRUISE MISSILES

It may very well be that our ill-fated, ill-conceived, preemptive war of choice in Iraq will mark the last war where there was a large conventional fighting force deployed overseas to fight an asymmetrical war from city to city, often from street to street and across vast open valleys and desserts.  Our technologic superiority and advancement has effectively all but eliminated the need for such full-scale troop deployments.  Certainly conflicts ahead will at some point require our troops to do battle in far off lands but they will be a much “leaner” fighting force consisting primarily of Special Operations Forces.  As is demonstrated weekly our utilization of unmanned drone aircraft is a very effective means of both offense and defense.  (The legality and morality of armed drone strikes in sovereign nations has yet to be fully vetted.  See http://broodingcynyx.blogspot.com/2013/05/obama-redfines-war-on-terror.html ).

We have for many decades possessed the capability to engage, neutralize and kill combatants – be they nation/state armies or terrorists – from afar.  From the huge nuclear stockpile assembled throughout the Cold War to Intercontinental Ballistic Missiles (ICBM), Long Range Cruise Missiles and the entire array of ever advanced “smart bombs”, Laser Guided Munitions, satellite based reconnaissance, drones and all the rest, our technology has made it possible to remove our troops from the field as never before imagined.  There are positive and negative outcomes that are still being defined as new metrics are required to assess their effectiveness, efficiency, and costs.  Being able to “reach out and touch someone” from half a world away is a daunting reality to our adversaries no matter who they may be.  But, in this age of asymmetry, as we have seen, a small band of committed individuals with some technological skill, funding and basic computer equipment can be as lethal as any physical weapon.

All levels of our government from the Military, Intelligence, National security and Law Enforcement agencies need to step up their games and recognize what these repeated hacking episodes represent; they are more than warning “shots across the bow”.  They pose a real and present danger to our security just as does any belligerent provocative military actions conducted by a nation who opposes us for whatever reason.

TAGS: CHINESE HACKERS, CHINA HACKS INTO US MILITARY NETWORKS, CHINA STEALS SENSATIVE WEAPONS PLATFORMS INTELLIGENCE, CYBER-WARFARE, NATIONAL SECURITY CHALLENGES, CHANGING FACE OF WARFARE, PRIVATE SECTOR NETWORK VULNERABILITIES, PENTAGON, CIA, DOD, DOI, FBI, NSA, NRO, DRONES



LINKS: (Updated)







Copyright The Brooding Cynyx 2013 © All Rights Reserved

Monday, May 27, 2013

KEEPING MEMORIALS IN MEMORIAL DAY




Members of the elite United States Army 3rd Infantry Regiment guard the


Tomb of the Unknowns 24/7 365 days a year, year in year out


without interruption for any reason



“A memorial is an object which serves as a focus for memory of something, usually a person (who has died) or an event

The most common type of memorial is the gravestone or the memorial plaque.
 Also common are war memorials commemorating those who have died in wars.
 Memorials in the form of a cross are called intending crosses.”
(From Wikipedia)





(Monday May 27, 2013 Arlington National Cemetery, VA) In a sense every man or woman who ever donned a uniform of a branch of the United States military is an unknown soldier. Here there is a special tomb containing the literal remains of unknown soldiers from almost every war this country has ever fought. Not far from that stolid marble structure, seemingly endless rows of white crosses each a stark icon marking a grave of a fallen soldier, sailor, airmen or marine. The names of those buried beneath these simple white crosses and Stars of David, are cataloged; the identity of the occupant of each plot is recorded in a master ledger.

Unless you have been in the military or are a relative, family or friend of a fallen soldier, everyone who has ever served and is serving now, is an unknown. We see on the TV news and read in the papers about battles being waged in far off lands. The “military”, as mentioned in the media, is a collectively anonymous bloc, a force of young men and women who are tasked with defending our nation; they are the latest members of a long line of patriots stretching back to our Revolutionary War.

Our history as a Nation is punctuated by wars. Our country was born out of a war and with disturbing regularity, we have found ourselves involved in conflict, conflicts were we have sent our men and women to places to endure incredible hardships, to sacrifice all and to constantly exist in an environment in which their own mortality is not an abstraction but a very real and present possibility.


 Marine saluting in Arlington National Cemetery



Those among us who have not been initiated on the field of combat cannot call on any sufficient measure of imagination to understand what war, combat, is all about; the way it feels and smells, what is sounds like and how the echoes of each firefight and dropped bomb resound forever. Battle is harsh and it is hell. It is death, destruction and darkness that test the very soul of those involved. It is not orchestrated or precise, not organized or choreographed despite the most elaborate plans crafted by the “brass” safely ensconced in Washington DC half a world away from the often ill-defined frontlines. It is confusion and fear interspersed with anger, rage and determination. It is messy, sloppy and the actuality of the most primitive of man’s instincts being called upon to persevere, to survive. After all, it is, at its core, all about making death.

We have troops here and there doing this and that while we sit comfortably on the couch and change the channel when the story becomes boring. Unless you have blood on the field it is not truly yours to embrace yet, what transpires in these far flung locations, is all about us; our nation’s safety and security is on the shoulders of those anonymous soldiers, marines, sailors and airmen; support troops of every stripe toiling for a cause greater than themselves and often beyond their full comprehension.

When the draft was suspended and ultimately eliminated by 1973, we, as a society, as a people lost the sense of a shared experience, of a commonality among us that transcended everything else; religion, race, region and beliefs were supplanted by camaraderie, cohesiveness and training and that rarest of bonds that only men and women who have fought together ever know. It was a different country when virtually all our elected officials had been in “the Service.” The sacrifices were shared, born by every family in every city, town, hamlet and village.

Now our wars are designed and conducted by men and women who have absolutely no clue of the brutality of the situations they seem to readily commit our Nation’s lives to. Wars have become political footballs tossed cavalierly from one side of the political aisle to the other, dissected from afar by experts and pundits who wouldn’t last 30 minutes under fire. It is easy to proclaim your patriotism loudly while you sit in the Senate or House chambers or behind the desk of a cable TV news program. Passion is easy to proclaim from a distance.

We collectively thump our chests, apply patriotic bumper stickers to our cars and talk about “kicking ass”. This disconnect is startling. We are a Nation still engaged after 12 years of brutal wars; American blood is shed virtually every day as it has been since October 2001 when we first sent troops to Afghanistan to route al-Qaeda and their hosts, the Taliban after the terrorist attacks of September 11, 2001. We have created a generation of warriors and we owe them a debt of gratitude that is not always paid.

We like to say that “Freedom isn’t Free” but only those who have ever slogged through the mire, choked on the dust or trekked through a distant jungle know just how much we pay, they pay, for that freedom.

We are an imperfect Nation of imperfect people governed by seriously flawed, selfish, often corrupt and evil people. We make mistakes and will continue to do so but, for any of us to think our military is not trying their hardest and forever struggling towards reasonable, practical, effectiveness and efficiency, often imperiling themselves in order to conduct themselves in the high standards of our military principles and fundamental morality that has put America unique above other nations, we should remember who it is that are on the killing fields, and all those wearing proudly their country’s uniforms.

For all who have sacrificed and all those who sacrifice today, we salute you.

Thank you for your service.


TAGS: MEMORIAL DAY, TOMB OF THE UNKNOWNS, ARLINGTON NATIONAL CEMETERY





LINKS




















Copyright The Brooding Cynyx 2013 © All Rights Reserved