Send a Tweet
Most Popular Choices
Share on Facebook 8 Share on Twitter Printer Friendly Page More Sharing
General News    H2'ed 4/27/21

Tomgram: John Feffer, America Hacks Itself

By       (Page 1 of 4 pages) (View How Many People Read This)   1 comment
Author 3598
Follow Me on Twitter     Message Tom Engelhardt
Become a Fan
  (30 fans)

This article originally appeared at TomDispatch.com. To receive TomDispatch in your inbox three times a week, click here.

Let me try to put this in context: it was just months ago that I gave up my old flip phone and reluctantly got an iPhone. And though I can indeed make calls on it and use it to check how far I've walked each day, footstep by footstep, it's remarkable how much I can't do. Don't ask me to send you a photo of anything or check my email on it or hail an Uber with it. In other words, call me a relic of another age, of a world in which telephones were significant-sized objects that sat somewhere in your house and that you hustled over to pick up when they rang. No one was capable of carrying them around in their pockets or checking the news on them, no less using them to text friends.

I've been introducing articles at TomDispatch for 18 years now a strange form that developed because, once upon a time in another age, it was a listserv in which I gathered pieces from publications around the world and introduced them to my readers, email by email. And let me say that, in more than 18 years of writing such introductions for original articles at this website, I've never felt quite as inadequate or unprepared as I do for today's remarkable piece by John Feffer.

Yes, in those years when I was growing up, our duck-and-cover thoughts often turned apocalyptic, given the looming threat of nuclear destruction then. But if, as I crouched under my school desk then waiting for a Russian nuclear bomb to explode, someone had told me that someday life could essentially be brought to a raging stand-still by a "cyber-apocalypse" (and you had explained to me what that was), I would have thought you the most inventive science-fiction writer of our times. And yet here we are. This is us, as John Feffer, author of the Dispatch novel Songlands (to be published June 1st), the final volume of his Splinterlands trilogy, makes clear today. Sci-fi is, it seems, now the essence of our lives. Welcome to the twenty-first century. Tom

Waiting for the Cyber-Apocalypse
The Cold War Has Already Turned Hot on the Internet

By

America has a serious infrastructure problem.

Maybe when I say that what comes to mind are all the potholes on your street. Or the dismal state of public transportation in your city. Or crumbling bridges all over the country. But that's so twentieth century of you.

America's most urgent infrastructure vulnerability is largely invisible and unlikely to be fixed by the Biden administration's $2 trillion American Jobs Plan.

I'm thinking about vulnerabilities that lurk in your garage (your car), your house (your computer), and even your pocket (your phone). Like those devices of yours, all connected to the Internet and so hackable, American businesses, hospitals, and public utilities can also be hijacked from a distance thanks to the software that helps run their systems. And don't think that the U.S. military and even cybersecurity agencies and firms aren't seriously at risk, too.

Such vulnerabilities stem from bugs in the programs and sometimes even the hardware that run our increasingly wired society. Beware "zero-day" exploits so named because you have zero days to fix them once they're discovered that can attract top-dollar investments from corporations, governments, and even black-market operators. Zero days allow backdoor access to iPhones, personal email programs, corporate personnel files, even the computers that run dams, voting systems, and nuclear power plants.

It's as if all of America were now protected by nothing but a few old padlocks, the keys to which have been made available to anyone with enough money to buy them (or enough ingenuity to make a set for themselves). And as if that weren't bad enough, it was America that inadvertently made these keys available to allies, adversaries, and potential blackmailers alike.

The recent SolarWinds hack of federal agencies, as well as companies like Microsoft, for which the Biden administration recently sanctioned Russia and expelled several of its embassy staff, is only the latest example of how other countries have been able to hack basic U.S. infrastructure. Such intrusions, which actually date back to the early 2000s, are often still little more than tests, ways of getting a sense of how easy it might be to break into that infrastructure in more serious ways later. Occasionally, however, the intruders do damage by vacuuming up data or wiping out systems, especially if the targets fail to pay cyber-ransoms. More insidiously, hackers can also plant "timebombs" capable of going off at some future moment.

Russia, China, North Korea, and Iran have all hacked into this country's infrastructure to steal corporate secrets, pilfer personal information, embarrass federal agencies, make money, or influence elections. For its part, the American government is anything but an innocent victim of such acts. In fact, it was an early pioneer in the field and continues to lead the way in cyberoperations overseas.

This country has a long history of making weapons that have later been used against it. When allies suddenly turn into adversaries like the Iranian government after the Shah was ousted in the 1979 revolution or the mujahideen in Afghanistan after their war against the Red Army ended in 1989, the weapons switch sides, too. In other cases, like the atomic bomb or unmanned aerial vehicles, the know-how behind the latest technological advances inevitably leaks out, triggering an arms race.

In all these years, however, none of those weapons has been used with such devastating effect against the U.S. homeland as the technology of cyberwarfare.

Next Page  1  |  2  |  3  |  4

(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).

 

Rate It | View Ratings

Tom Engelhardt Social Media Pages: Facebook page url on login Profile not filled in       Twitter page url on login Profile not filled in       Linkedin page url on login Profile not filled in       Instagram page url on login Profile not filled in

Tom Engelhardt, who runs the Nation Institute's Tomdispatch.com ("a regular antidote to the mainstream media"), is the co-founder of the American Empire Project and, most recently, the author of Mission Unaccomplished: Tomdispatch (more...)
 

Go To Commenting
The views expressed herein are the sole responsibility of the author and do not necessarily reflect those of this website or its editors.
Writers Guidelines
Contact AuthorContact Author Contact EditorContact Editor Author PageView Authors' Articles
Support OpEdNews

OpEdNews depends upon can't survive without your help.

If you value this article and the work of OpEdNews, please either Donate or Purchase a premium membership.

STAY IN THE KNOW
If you've enjoyed this, sign up for our daily or weekly newsletter to get lots of great progressive content.
Daily Weekly     OpEdNews Newsletter
Name
Email
   (Opens new browser window)
 

Most Popular Articles by this Author:     (View All Most Popular Articles by this Author)

Tomgram: Nick Turse, Uncovering the Military's Secret Military

Noam Chomsky: A Rebellious World or a New Dark Age?

Andy Kroll: Flat-Lining the Middle Class

Christian Parenti: Big Storms Require Big Government

Noam Chomsky, Who Owns the World?

Rebecca Solnit: Why the Media Loves the Violence of Protestors and Not of Banks

Comments

The time limit for entering new comments on this article has expired.

This limit can be removed. Our paid membership program is designed to give you many benefits, such as removing this time limit. To learn more, please click here.

1 people are discussing this page, with 1 comments


Maxwell

Become a Fan
Author 4952
(Member since Feb 15, 2007), 3 fans, 4627 comments (How many times has this commenter been recommended?)
Facebook page url on login Profile not filled in Twitter page url on login Profile not filled in Linkedin page url on login Profile not filled in Instagram page url on login Profile not filled in

  New Content

You can't do those things with your iPhone because you don't know how, right? Not because it isn't capable.

I know there's going to be a flurry of anti-"Russiagate hoax" comments here, but let me just say hacking John Podestra's email didn't require the skills of some "elite" hacker. His email password was not only a dictionary word, but super-obvious: "password". Any script kiddie could have done it. And it's hard to make an honest case--whether "hacked" or "stolen"--that these released emails had any impact on the 2016 election.

Yes, having major infrastructure things on the public facing Internet is extremely stupid. Of course the "stuxxnet" worm presumably didn't reach the Iranian centrifuges directly through the Internet, but through ubiquity. It was simply everywhere, but would have no effect on you unless you happened to be running a controller for that type of centrifuge. The fear that some day all of modern civilization will be brought to a screeching halt by such a worm is probably more realistic than the "Y2K" scare.

Submitted on Wednesday, Apr 28, 2021 at 10:54:51 AM

  Recommend  (0+)
Flag This
Share Comment More Sharing          
Commenter Blocking?