Highbrow Magazine - cyber attacks https://www.highbrowmagazine.com/cyber-attacks en Cyber Infrastructure: Who Are the Invisible Warlords? https://www.highbrowmagazine.com/23203-cyber-infrastructure-who-are-invisible-warlords <div class="field field-name-field-cat field-type-taxonomy-term-reference field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/news-features" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">News &amp; Features</a></div></div></div><span class="submitted-by">Submitted by tara on Wed, 01/04/2023 - 15:24</span><div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="https://www.highbrowmagazine.com/sites/default/files/styles/large/public/field/image/1cybercrime.jpg?itok=G6qyRYW6"><img typeof="foaf:Image" src="https://www.highbrowmagazine.com/sites/default/files/styles/large/public/field/image/1cybercrime.jpg?itok=G6qyRYW6" width="480" height="320" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p> </p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif"><strong><em>“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.” —Stephane </em></strong><strong><em>Nappo</em></strong></span></span></p> <p> </p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">In our networked world, cyberattacks pose a tremendous threat to governments, private companies, and individuals alike.                      </span></span></p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">Our societies have become tremendously dependent on information and communications infrastructure. Both private and public institutions depend on cyber infrastructure to function efficiently. Energy, transportation, communications, and financial services depend on IT systems, and they are all at risk.                                         </span></span></p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">Failing technology, unauthorized access, data manipulation, and system breakdown threaten the integrity of our society. Hacking anything from elections to national banks, cybercriminals have caused tremendous damage over the last few years.                                            </span></span></p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">Delinquent governments have notably initiated large-scale, politically and financially motivated attacks on numerous countries, including the U.S. North Korea’s government stands alone as the only nation to focus on hacking for monetary gain. Its military intelligence division, the Reconnaissance General Bureau (RGB), actively trains hackers to attack foreign banks and other financial institutions worldwide. Recently, American journalists conducted a lengthy investigation that revealed the RGB’s inner workings. China, North Korea, and Russia are home to some of the world’s most brilliant coders, and those talents are routinely weaponized to harm our nation’s interests.</span></span></p> <p> </p> <p><img alt="" src="https://www.highbrowmagazine.com/sites/default/files/2cybercrime.jpg" style="height:507px; width:316px" typeof="foaf:Image" /></p> <p> </p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">In North Korea, children who excel at mathematics are recruited at an early age and put into special programs that lead to a position in the RGB. According to <em>The New Yorker</em>, this results in a life of virtual slavery for young men who are qualified enough to get some of the most coveted positions in technology companies.                                                     </span></span></p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">The magazine referred to North Korea’s cybercrime program as “hydra-headed,” focusing on everything from hacking banks to stealing millions of dollars’ worth of cryptocurrency from online exchanges. According to a United Nations report that made headlines in 2019, North Korea’s criminal cyberattacks have “generated an estimated $2 billion for its weapons of mass destruction programs.”                                                            </span></span></p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">Meanwhile, China has done its share of stealing patents, and Russia has been accused of attempting to influence elections in several countries, including the U.S.                           </span></span></p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">China was allegedly behind one of the largest data breaches in history. Between 2014 and 2018, Marriott International’s system was hacked, compromising personal and financial information about 500 million customers. <em>The New York Times </em>attributed the attack to “a Chinese intelligence-gathering effort that also hacked health insurers and the security clearance files of millions more Americans.”  In 2018, the newspaper spoke to intelligence officials who said the government-sponsored Chinese hackers had been working to build a database of U.S. government officials with security clearances.</span></span></p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">Since the Marriott hack was discovered, threats have only escalated, especially during the COVID-19 pandemic. In this scenario, catastrophic cyberthreats are more pressing than ever.</span></span></p> <p><br /> <span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">With enough knowledge and resources, hackers could plunge whole cities into darkness or tamper with water supplies and shut down critical pipelines. In fact, some of these things have already happened on U.S. soil, and unless we ramp up our cybersecurity efforts, they are not going to stop.</span></span></p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif"> </span></span></p> <p><img alt="" src="https://www.highbrowmagazine.com/sites/default/files/3cybercrime.jpg" style="height:289px; width:650px" typeof="foaf:Image" /><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">                                                   </span></span></p> <p> </p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif"><strong>America vs. Cyber Threats</strong>                                          </span></span></p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">America currently faces serious national security threats on several fronts. Terrorism is rampant around the world; armed conflicts put our interests at risk; and various foreign nations are developing weapons of mass destruction. Money-laundering and fraud affect Americans and drain U.S. taxpayer dollars, while drug-trafficking spreads violence and death across our nation.    <br /> <br /> Dealing with these threats costs billions of dollars every year, yet the fastest, most invisible threat does not involve weapons, killing, or hostage situations. Cyberthreats have the potential to cause a financial collapse, health crises, and influence local elections. Countries like China and Russia have already demonstrated they have armies of hackers at their disposal.                   </span></span></p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">Terrorists and hostile governments alike could hack into government networks and leave entire cities without power. They could hack into financial institution networks and completely disrupt finance. Beyond Earth, they could potentially cause satellites to crash and rockets to change their course.      </span></span></p> <p> </p> <p><img alt="" src="https://www.highbrowmagazine.com/sites/default/files/4cybercrime.jpg" style="height:654px; width:467px" typeof="foaf:Image" /><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">                          </span></span></p> <p> </p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">In the popular French TV show, <em>The Bureau</em>, a group of Russian hackers stationed in Cambodia hack into European networks. Among other things, they render an entire German hospital’s systems useless. Unable to use life signs monitoring, doctors fear that patients could die if administrators do not regain access to their computers.</span></span></p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">In the end, a security expert fixes the problem, but the hackers have already cloned the hospital’s system without leaving a trace. The only thing in the episode that seemed unrealistic is that a single security expert could quickly fix the issue. The rest is frighteningly real.</span></span></p> <p><br /> <span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">Innovation has changed the face of the Earth over the last decade, but our increasing reliance on the internet has also made us vulnerable. The cyberattacks we have already endured have proved that we are not doing enough to secure our government networks and data. We are losing billions of dollars to cybercrime every year, and there is no telling how far a malicious attack could undermine our national security.</span></span></p> <p> </p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">U.S. politicians have often disagreed about how to deal with cyberthreats. While some lobby for more stringent federal rules, others argue that regulations are not dynamic enough to respond to fast-changing threats. The danger of implementing hard rules, the latter believe, is that it could create a false sense of security, thus making organizations more vulnerable to sophisticated attacks. This mindset doesn’t seem very helpful in the light of the latest devastating attacks. Considering the dangers that loom on the horizon, doing nothing is not an option.</span></span></p> <p> </p> <p><img alt="" src="https://www.highbrowmagazine.com/sites/default/files/5cybercrime.jpg" style="height:432px; width:652px" typeof="foaf:Image" /></p> <p> </p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">In February 2021, a bipartisan group of legislators introduced the Cyber Diplomacy Act of 2021, which proposes an approach that greatly differs from the Trump administration’s strategies to counter cyberthreats. The act vows to promote U.S. leadership in the cybersecurity field, establishing an Office of International Cyberspace Policy within the State Department.</span></span></p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">According to one of its sponsors, House Democrat Jim Langevin (RI), the bill will “best position the United States to reclaim its role as a global leader inside the diplomacy realm, which is  particularly urgent given the ever-changing array of threats that we face.”</span></span></p> <p><br /> <span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">Rep. Langevin and his co-sponsors believe that diplomacy is a vital tool to combat cyberthreats. According to former State Department cybersecurity coordinator Christopher Painter, the legislation aims to “shape a more positive environment.” While these efforts seem commendable, they are insufficient; it is unlikely that diplomacy will work with the likes of North Korea. </span></span></p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif">                                                </span></span></p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif"><strong><em>This chapter is excerpted from </em><a href="https://www.amazon.com/Reframing-Americas-Infrastructure-Renaissance-Playbook/dp/1947779311" style="color:blue; text-decoration:underline"><em>Reframing America's Infrastructure - A Ruins to Renaissance Playbook</em></a><em> by Marc Gravely. Published with permission.</em></strong></span></span></p> <p> </p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif"><strong>Highbrow Magazine</strong></span></span></p> <p> </p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif"><strong><em>Image Sources:</em></strong></span></span></p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif"><em>--Madartz Graphics (<a href="https://pixabay.com/illustrations/hacker-hacking-cyber-security-hack-1944688/" style="color:blue; text-decoration:underline">Pixabay</a>, Creative Commons)</em></span></span></p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif"><em>--Geralt (<a href="https://pixabay.com/illustrations/internet-crime-cyber-criminal-1862309/" style="color:blue; text-decoration:underline">Pixabay</a>, Creative Commons)</em></span></span></p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif"><em>--Donkey Hote (<a href="https://www.flickr.com/photos/donkeyhotey/36564446304" style="color:blue; text-decoration:underline">Flickr</a>, Creative Commons)</em></span></span></p> <p><span style="font-size:18px"><span style="font-family:Times New Roman,Times,serif"><em>--Kristina Alexanderson (<a href="https://www.flickr.com/photos/kalexanderson/5821609034" style="color:blue; text-decoration:underline">Flickr</a>, Creative Commons)</em></span></span></p> <p> </p> </div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above"><div class="field-label">Tags:&nbsp;</div><div class="field-items"><div class="field-item even" rel="dc:subject"><a href="/marc-gravely" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">marc gravely</a></div><div class="field-item odd" rel="dc:subject"><a href="/reframing-americas-infrastructure" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">Reframing America&#039;s Infrastructure</a></div><div class="field-item even" rel="dc:subject"><a href="/new-books" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">new books</a></div><div class="field-item odd" rel="dc:subject"><a href="/cyber-crime" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">cyber crime</a></div><div class="field-item even" rel="dc:subject"><a href="/cyber-attacks" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">cyber attacks</a></div><div class="field-item odd" rel="dc:subject"><a href="/cyber-ciminals" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">cyber ciminals</a></div><div class="field-item even" rel="dc:subject"><a href="/north-korea" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">North Korea</a></div><div class="field-item odd" rel="dc:subject"><a href="/russian-hackers" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">russian hackers</a></div><div class="field-item even" rel="dc:subject"><a href="/chinese-hackers" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">chinese hackers</a></div></div></div><div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">Marc Gravely</div></div></div><div class="field field-name-field-pop field-type-list-boolean field-label-above"><div class="field-label">Popular:&nbsp;</div><div class="field-items"><div class="field-item even">not popular</div></div></div><div class="field field-name-field-bot field-type-list-boolean field-label-above"><div class="field-label">Bottom Slider:&nbsp;</div><div class="field-items"><div class="field-item even">In Slider</div></div></div> Wed, 04 Jan 2023 20:24:52 +0000 tara 11572 at https://www.highbrowmagazine.com https://www.highbrowmagazine.com/23203-cyber-infrastructure-who-are-invisible-warlords#comments Uproar Over Alleged Chinese Internet Attacks Has Cybersecurity Community on Alert https://www.highbrowmagazine.com/2213-uproar-over-alleged-chinese-internet-attacks-has-cybersecurity-community-alert <div class="field field-name-field-cat field-type-taxonomy-term-reference field-label-hidden"><div class="field-items"><div class="field-item even"><a href="/news-features" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">News &amp; Features</a></div></div></div><span class="submitted-by">Submitted by tara on Wed, 02/27/2013 - 12:39</span><div class="field field-name-field-image field-type-image field-label-hidden"><div class="field-items"><div class="field-item even" rel="og:image rdfs:seeAlso" resource="https://www.highbrowmagazine.com/sites/default/files/styles/large/public/field/image/mediumcyberattacks.jpg?itok=TnJrQ7bo"><img typeof="foaf:Image" src="https://www.highbrowmagazine.com/sites/default/files/styles/large/public/field/image/mediumcyberattacks.jpg?itok=TnJrQ7bo" width="480" height="268" alt="" /></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>  </p> <p> From <a href="http://newamericamedia.org/2013/02/china-hackathon-harmful-to-american-national-interest.php">New America Media</a>:</p> <p>  </p> <p> Despite Bloomberg <em>Businessweek's</em> accusation that the Chinese army is spying on Americans, the report that led to the charges has serious flaws. These raise troubling questions about a repetition of  the "China spy syndrome."</p> <p>  </p> <p> Beginning with <em>The New York Times</em> January 30 disclosure of Chinese hacking, every publication of note or of little note has since run one or more stories on cyber attacks emanating from China.</p> <p>  </p> <p> The release of a report by the Internet security firm Mandiant on February 18 set the stage for an announcement from the White House on February 20 that the administration was determined to protect American businesses and punish the perpetrators at home and abroad.</p> <p>  </p> <p> Is this an orchestration for a new policy initiative? Or, is this just a reinforcement of Obama’s “pivot to Asia” and “Trans Pacific Partnership,” two major initiatives aimed clearly in response to the so-called “Rise of China”?</p> <p>  </p> <p> Since the nascent art of hacking and counter measures of cybersecurity are subjects too esoteric and beyond the comprehension of most except those skilled in the craft, the media focused instead on the more lurid details taken from the so-called Mandiant Report.</p> <p>  </p> <p> The report alleged that most of the cyber attacks levied against corporate America came from a 12-story building in the Pudong neighborhood of Shanghai that belonged to a particular department – the ominously named Unit 61398 – of the People’s Liberation Army.</p> <p>  </p> <p> Since the issuer of the report is in the business of selling its services to safeguard company networks from cyber attacks, presumably it is in Mandiant’s interest to portray the attackers in ways as menacing and sinister as possible. The PLA certainly fits the bill.</p> <p>  </p> <p> However, shortly after the Mandiant Report broke the news, articles that presented contrary points of view began to appear. The most comprehensive belonged to Jeffrey Carr, a cybersecurity expert in his own right, who pointed out that there are more than 30 nations with the capability to run “military grade network operations” necessary to mount the kind of sophisticated attacks found in the report. According to the U.S. National Intelligence Estimate, Russia, Israel, and France are among the leading countries when it comes to cyber hacking activities.</p> <p>  </p> <p> Carr concluded that Mandiant was too quick to identify China as the culprit without performing rigorous analysis to eliminate other competing hypotheses and comparing its cyber espionage activities with those of other countries.</p> <p>  </p> <p> <img alt="" src="/sites/default/files/mediumwhitehouse%20%28Rob%20Young%20Wiki%29.jpg" style="width: 600px; height: 399px;" /></p> <p>  </p> <p> Two days after <em>The New York Times</em> article appeared, the U.S. edition of <em>The World Journal</em>, a Chinese-language daily, reported that 7 of the IP addresses identified by the Mandiant Report as coming from the PLA office in Shanghai were actually from Hong Kong, including one from the Hong Kong University of Science and Technology.</p> <p>  </p> <p> This should not come as a surprise since hacking can emanate from anywhere in the world and can easily be misdirected to appear as if coming from somewhere else. What was surprising was that this finding came from a little noted ethnic paper and not from the major media stars.</p> <p>  </p> <p> Maybe Al Gore did not invent the Internet but it is an inconvenient truth that the U.S. defense agency did and Americans have since led in the development and use of the Internet. As the world’s most advanced economy, the United States has invested heavily and become most dependent on networks in cyberspace and thus most vulnerable to attacks.</p> <p>  </p> <p> The United States has also led in the development and use of weapons in cyber warfare. For example, the American-developed Stuxnet virus has been credited with causing the centrifuges to spin out of control in the Iranian nuclear enhancement facility. Being the first known country to launch a cyber attack in peacetime and in the absence of any international treaty and protocol, the United States has lost the moral high ground to define appropriate conduct in cyber space.</p> <p>  </p> <p> This is of course not the first time that Washington is reaping the consequences of what it has sowed. The United States was the first (and to date) only country to use the atomic bomb. Since then, it has had to devote decades of diplomatic efforts to promote nuclear nonproliferation and now lives in fear of nuclear weapons falling into the hands of rogue nations or terrorists.</p> <p>  </p> <p> The next Pandora’s box, one the U.S. has already opened and soon will be trying to shut, is the use of drones for transnational surveillance and assassinations of terrorist suspects without due process. Friends and foes alike have seen the cost-effective capability of a drone in rendering destruction and killing and all are rushing to develop their me-too ability.</p> <p>  </p> <p> The day is nigh when Americans will be troubled by the prospect of encountering drones operated remotely and in the hands of someone holding a grudge against America. We will then, again, have to expend endless diplomatic efforts in proselytizing the idea of “do as I say and not as I do.”</p> <p>  </p> <p> As for China, it has in its way been trying to tell the United States that it does not hold a grudge. In typically understated signals, China has let Washington know that it possesses silent running submarines, stealth planes and missiles capable of downing communication satellites. China even went out of its way to make sure that American intelligence got a full picture of its nuclear weapons technology, as suggested by nuclear scientist Daniel Stillman of the Los Alamos National Laboratory. The latest airshows in China are displaying a large array of domestically manufactured drones.</p> <p>  </p> <p> Indeed, China appears to be practicing a porcupine defense strategy, i.e., peaceful intentions but beware of the ability to retaliate in kind. Some have suggested that the alleged PLA hacking has been deliberately sloppy, thus leaving visible trails to let the United States know that China too possesses cyber warfare capability.</p> <p>  </p> <p> Cyber espionage and warfare are serious problems that are here to stay. Washington needs to develop effective, long-term countermeasures and a thoughtful and balanced diplomacy. Singling out China as the sole villain without critically examining what other nations are doing, including us, is counterproductive, potentially misleading and in the long run, harmful to our national interests and world peace.</p> <p>  </p> <p> <strong>Author Bio:</strong></p> <p> <em>Dr. George Koo is international business consultant and board member of New America Media. Professor Ling-chi Wang is a retired professor of Asian American history at the University of California, Berkeley.</em></p> <p>  </p> <p> <a href="http://newamericamedia.org/2013/02/china-hackathon-harmful-to-american-national-interest.php">New America Media</a></p> <p>  </p> <p> <em><strong>Photos: New America Media; Rob Young (Wikipedia Commons).</strong></em></p> </div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above"><div class="field-label">Tags:&nbsp;</div><div class="field-items"><div class="field-item even" rel="dc:subject"><a href="/chinese-cyber-attacks" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">chinese cyber attacks</a></div><div class="field-item odd" rel="dc:subject"><a href="/cyber-attacks" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">cyber attacks</a></div><div class="field-item even" rel="dc:subject"><a href="/internet-0" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">the internet</a></div><div class="field-item odd" rel="dc:subject"><a href="/cyber-security" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">cyber security</a></div><div class="field-item even" rel="dc:subject"><a href="/white-house" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">White House</a></div><div class="field-item odd" rel="dc:subject"><a href="/internet-attacks" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">internet attacks</a></div><div class="field-item even" rel="dc:subject"><a href="/hacking" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">hacking</a></div><div class="field-item odd" rel="dc:subject"><a href="/online-stalking" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">online stalking</a></div><div class="field-item even" rel="dc:subject"><a href="/mandiant-report" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">mandiant report</a></div><div class="field-item odd" rel="dc:subject"><a href="/spying" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">spying</a></div><div class="field-item even" rel="dc:subject"><a href="/chinese-army" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">chinese army</a></div><div class="field-item odd" rel="dc:subject"><a href="/intelligence-community" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">intelligence community</a></div></div></div><div class="field field-name-field-author field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">George Koo and Ling-chi Wang</div></div></div><div class="field field-name-field-pop field-type-list-boolean field-label-above"><div class="field-label">Popular:&nbsp;</div><div class="field-items"><div class="field-item even">not popular</div></div></div><div class="field field-name-field-photographer field-type-text field-label-above"><div class="field-label">Photographer:&nbsp;</div><div class="field-items"><div class="field-item even">New America Media</div></div></div><div class="field field-name-field-bot field-type-list-boolean field-label-above"><div class="field-label">Bottom Slider:&nbsp;</div><div class="field-items"><div class="field-item even">Out Slider</div></div></div> Wed, 27 Feb 2013 17:39:46 +0000 tara 2441 at https://www.highbrowmagazine.com https://www.highbrowmagazine.com/2213-uproar-over-alleged-chinese-internet-attacks-has-cybersecurity-community-alert#comments