Say thanks by supporting us!

Our website is made possible by displaying online advertisement to our visitors. Please consider supporting to us by disabling your ad blocker.

Processing...

Cyberattacks have long been hard to stop because determining where they come from takes time - and sometimes the mystery is never solved.

logo
Author:
Related Quote
Show all

If there's a cyberattack from China or Russia or Romania or Mexico, it may well run through a server in another country. And it may take months before you know where it really came from.

Until Japan's economy drove off a cliff, there was a running argument in Asia about whether it would be wiser to follow the 'Japan model' - with its megacorporations, jobs for life, state control of strategic industries - or the 'American model' of largely unfettered markets.

We have spent so much time worrying about a 'cyber Pearl Harbor,'' the attack that takes out the power grid, that we have focused far too little on the subtle manipulation of data that can mean that no election, medical record, or self-driving car can be truly trusted.

When confronted with a direct threat to American security, Obama has shown he is willing to act unilaterally - in a targeted, get-in-and-get-out fashion, that avoids, at all costs, the kind of messy ground wars and lengthy occupations that have drained America's treasury and spirit for the past decades.

Even China's leaders routinely let the news media pool in, though they do their best to ignore them.

American officials sometimes dig into corporations because they are suspected to be witting or unwitting suppliers of technology to the North Koreans or the Iranians.

The Trump vision, in fact, is an America unbound by a half-century of trade deals, free to pursue a nationalistic approach in which success is measured not by the quality of its alliances but the economic return on its transactions.

In an age of reckonings, when so many bills have come due, Obama has made the case for an America that can no longer do it all. It must pick its fights.

There is no single 'China model' to running a mega-economy. Instead, it is a blend. From the Europeans and the Japanese, the Chinese have borrowed the concept of protecting essential industries.

Showcase
Show all

Cyberattacks have long been hard to stop because determining where they come from takes time - and sometimes the mystery is never solved.

Cyberattacks have long been hard to stop because determining where they come from takes time - and sometimes the mystery is never solved.

Cyberattacks have long been hard to stop because determining where they come from takes time - and sometimes the mystery is never solved.

Cyberattacks have long been hard to stop because determining where they come from takes time - and sometimes the mystery is never solved.

Cyberattacks have long been hard to stop because determining where they come from takes time - and sometimes the mystery is never solved.

Cyberattacks have long been hard to stop because determining where they come from takes time - and sometimes the mystery is never solved.

Cyberattacks have long been hard to stop because determining where they come from takes time - and sometimes the mystery is never solved.

Cyberattacks have long been hard to stop because determining where they come from takes time - and sometimes the mystery is never solved.

Cyberattacks have long been hard to stop because determining where they come from takes time - and sometimes the mystery is never solved.

Cyberattacks have long been hard to stop because determining where they come from takes time - and sometimes the mystery is never solved.

Cyberattacks have long been hard to stop because determining where they come from takes time - and sometimes the mystery is never solved.

Cyberattacks have long been hard to stop because determining where they come from takes time - and sometimes the mystery is never solved.

Cyberattacks have long been hard to stop because determining where they come from takes time - and sometimes the mystery is never solved.

Cyberattacks have long been hard to stop because determining where they come from takes time - and sometimes the mystery is never solved.

Cyberattacks have long been hard to stop because determining where they come from takes time - and sometimes the mystery is never solved.