WikiLeaks Reveals that China Already Knows What WikiLeaks Reveals

I’ve been bitching and bitching and bitching and bitching about DOD’s refusal to fix the gaping holes in its network security even while it cries that Bradley Manning allegedly downloaded a bunch of cables using those gaping holes. As I point out, if all it took Manning to get all these databases was one Lady Gaga CD, then presumably our enemies can and do get what they want pretty easily, too.

As citizens, we just don’t ever find out about those other data breaches.

Well, apparently someone leaked a set of previously unreported WikiLeaks cables to Reuters, which used them as one of many sources to report on how much data China is just hacking from our government networks, including the sieve-like DOD ones.

Secret U.S. State Department cables, obtained by WikiLeaks and made available to Reuters by a third party, trace systems breaches — colorfully code-named “Byzantine Hades” by U.S. investigators — to the Chinese military. An April 2009 cable even pinpoints the attacks to a specific unit of China’s People’s Liberation Army.

Privately, U.S. officials have long suspected that the Chinese government and in particular the military was behind the cyber-attacks. What was never disclosed publicly, until now, was evidence.

U.S. efforts to halt Byzantine Hades hacks are ongoing, according to four sources familiar with investigations. In the April 2009 cable, officials in the State Department’s Cyber Threat Analysis Division noted that several Chinese-registered Web sites were “involved in Byzantine Hades intrusion activity in 2006.”

[snip]

What is known is the extent to which Chinese hackers use “spear-phishing” as their preferred tactic to get inside otherwise forbidden networks. Compromised email accounts are the easiest way to launch spear-phish because the hackers can send the messages to entire contact lists.

The tactic is so prevalent, and so successful, that “we have given up on the idea we can keep our networks pristine,” says Stewart Baker, a former senior cyber-security official at the U.S. Department of Homeland Security and National Security Agency. It’s safer, government and private experts say, to assume the worst — that any network is vulnerable. [my emphasis]

Oh, okay.

Our government has apparently conceded it can’t keep its networks secret from China.

I’m not surprised, mind you. While I assume the problems at DOD are a worst case scenario (because of its size and logistical issues stemming from all the wars we’re running), the size of the gaping holes at DOD (and the lackadaisical attitude DOD has about closing them) shows how low a priority network security is in our government generally.

Plus, Chinese hackers are that good.

But the confirmation that China can basically just take what it wants at will really raises new questions about our government’s treatment of Bradley Manning specifically and its hyper-secrecy more generally.

If we’re not keeping all these secrets from China, our biggest rival, who are we keeping them from? If our adversaries can just go and get whatever they want off our networks, then why has the government treated Bradley Manning’s allegedly doing the same a capital offense? And if our government has just conceded that China can take what it wants, then why won’t it let its own citizens know what China presumably already knows?

image_print
  1. marc says:

    I have always assumed that the database Bradley Manning is alleged to have copied was so insecure that virtually all of the intelligence services of our enemies had already done it themselves.

    • emptywheel says:

      Right. Exactly. I mean, given how gaping these holes are, it’d be shocking if they didn’t have the databases. (Though note that the State cables that were accessible via SIPRNet only represent 10% of the total universe of those State cables.)

  2. twobeers says:

    China apparently isn’t the enemy. The American citizens must be the enemy.

    The American govt and the Chinese govt are allies in a war against us folks.

    The international class war cuts across all borders: the oligarchs versus the people.

      • earlofhuntingdon says:

        As Digby notes, the Chinese hold 9.5% of USG debt. The Japanese another 6.5% Inside the Pillage, that would make them no more an enemy than Wall Street.

        In reality, they are a competitor, not an enemy, that is very good at orchestrating resources – including direct and indirect political influence – across the world and putting them to work. That’s why I chuckle when analysts talk about US debt held by China as if the Chinese viewed it only as a financial investment, like 100 shares of Goldman, GE or GM.

  3. orionATL says:

    those last two paragraphs would form a fine basis for questions to prez obama by an energetic white house press corp.

  4. orionATL says:

    misswiki says

    phishing is an example of “social engineering” techniques…

    live by the sword, die by the sword.

  5. JohnLopresti says:

    I read one account of the hacker work group at the China military office as being effective because of more than some coder mystique. The depiction was one of simple logistics; that China military has hired expansive numbers of hackers and set them to work in shifts round the clock, trying hack exploits, and with good equipment. But I think there are other issues, similar to the questions raised about hardening the cyber security of microtrades in the stock market; namely, that China might be wanting to have physical proximity to their targets, too; just as microtraders in Chicago would be disadvantaged by the number of microseconds it takes a light signal to reach the stock trader board in distant New York. James Lewis covers China a lot in his classical interview, there, cited previously. Lewis in the interview linked has some funny jokes, like he hopes Nasa space shuttle design gets hacked because it is obsolete and the hackers would set back their own space program by stealing that data; he also says cyber security folks inside the Beltway typically begin reverse engineering any hack event by basing it on the asumption that even if one domestic pet in Washington DC takes ill it is the fault of China military hackers. He also refuses to complete sentences by adding the caveat that the interview is on the record in the public media. He gives a China military hack example about a US public business entity data system that got hacked in a way that made it obvious the hackers were trying to locate some free speech advocates in Tibet; Lewis thought it improvable that many countries other than China would sponsor that narrow a hack scope.

    On Manning, in a first amendment lecture, Balkin presented March 23, 2011, there is an interesting review of the juggernaut theory of cyber security from a journalistic and citizen perspective. The prof has published the lecture sequentially by topics covered; the Manning discussion appears in several segments, perhaps the most interesting or relevant to the post is the fourth in the series, there.

    The RSA conference last month doubtless had some interesting interchanges about cyber security in the cloud computing era ostensibly on the tech horizon. I think it would be funny if Gates* replacement and the president decide on emphasizing cyber security as an administration achievement, and getting congress to approve new initiatives for that purpose; I wonder if Congress even can embark on a similar path; the senate judiciary committee Republicans themselves were caught hacking Democratic members* email as recently as that report from 2004, concerning a yearlong hack which took place continuously from Spring 2002 thru at least April 2003, according the the Boston Globe article linked.

  6. alank says:

    Speaking of hacker:

    Jim Hacker: “Who knows Foreign Office secrets, apart from the Foreign Office?”
    Bernard Woolley: “That’s easy. Only the Kremlin.”

  7. manys says:

    Speaking of coder mystique, the first thing that came to mind with the codephrase “Byzantine Hades” was that “B.H.” actually stood for “broken host” or “basic hack.”

  8. eCAHNomics says:

    This is hysterically funny in a perverted way. I shoulda guessed.

    I don’t suppose USG hackers are good enough to get at China’s databases.

    • Synoia says:

      I’m sure there are Anonymous hackers in the US who could get into China’s databases.

      If they can understand Chinese.

      Gives new meaning to the phrase “It’s all Chinese to me”.

      • eCAHNomics says:

        Heh. USG prolly has next to no one who speaks Chinese.

        I know two people who are pretty competent in Chinese. Don’t know whether they would describe themselves as fluent.

        But neither is a programmer.

    • jedimsnbcko19 says:

      i am with U

      the USG hacks every nation on the planet!

      the chinese are a high school football team in the hacking game

      the USA is a NFL team in the hacking game

      • eCAHNomics says:

        Why do you think the USG is so good at hacking? Do you have some particular knowledge of it or are you guessing?

        From what I’ve read about the NSA (Bamford’s two books) they look for needles in haystacks by adding more hay (or looking for needles in needle stacks as another wag put it). Also, I think Bamford said that the software used to search for words & phrases in their stored data is Israeli. Sounds pretty incompetent to me.

        On edit: Using the NSA as an analogy to what the rest of the USG might be like.

        • jedimsnbcko19 says:

          the USA military is all about mis-direction!

          don’t ever believe the USG, ever.

          the chinese are not spying on the USA to learn less

          when U did deeper in the Military Industrial Complex, U may have un-learn everything.

          the “IRON TRIANGLE” is real

        • Watt4Bob says:

          “But for the Carlyle Group, doing business at the murky intersection of Washington politics, national security, and private capital has come at a price. According to some, the Carlyle Group is a company that epitomizes corporate cronyism, conflicts of interest, and war profiteering-and they may be right.”

          From: The Iron Triangle: Inside the Secret World of the Carlyle Group by Dan Briody.

          They’re effective enough to make lots of money, they’re not effective enough to keep secrets, and they don’t really care about core competence because making money is the first and only rule.

          They’re the kind of people who would fuck themselves if they could, and they don’t care who knows it.

        • eCAHNomics says:

          My Wall St. experience comports with this. I found the MOTU pretty incompetent, except leverage and inside info allowed them to make scads of money.

        • Watt4Bob says:

          I think the accelerating rate at which these guys have been making money has had the effect of making them ever more reckless.

          They think they’re invincible, I just wish there was some way to properly insulate the rest of us from the effects of their fuck-ups.

        • eCAHNomics says:

          Yes to becoming more reckless, but I would attribute the main culprit to the moral hazard of the USG that bails them out no matter what they do.

        • Watt4Bob says:

          I should have said hysterical, instead of reckless.

          They were reckless in the 1980’s, now they’re just plain nuts.

          And you’re right, as far as the USG is concerned, it doesn’t matter what they do.

          You or I would think it embarrassing to be owned by crazy people but it doesn’t seem to faze our pols.

  9. eCAHNomics says:

    I have also argued on these threads forever, that foreign govts and peeps already know what’s in the leaks, and those of us here in the U.S., while not knowing a lot of it for sure, are not surprised by anything we’ve learned since they were released.

    So the only point of keeping the docs secret is to keep them from U.S. people.

    It’s a game govts play that’s as old as the hills.

  10. ComradeRutherford says:

    “assume the worst — that any network is vulnerable.”

    Every hacker has known that for decades. If a computer is connected to another, then it’s vulnerable to exploitation. Any computer connected to the internet is open to attack. To pretend otherwise is to live in fantasy-land.

  11. NorskeFlamethrower says:

    AND THE KILLIN’ GOEZ ON AND ON AND…

    Citizen emptywheel:

    Unfuckin’ believable…the entire security state couldn’t keep the stink on shit and they’re holdin’ a fuckin’ PFC patriot in solitary confinement because he let the American people know what the Chinese have known since Mrs. McClinton kissed the Big Dog “goodnight”. Unfuckin’ believable…our entire government is so corrupt it makes the Borgias look like the 12 apostles.

    And you wonder why I keep hammerin’ about the wars bein the ONLY issue left in our politics…gettin ta look a lot like 1968, ain’t it?!!

    KEEP THE FAITH AND PASS THE AMMUNITION, THIS WAR BELONGS TO US SO LET’S END IT!!

    • Watt4Bob says:

      Unfuckin’ believable…our entire government is so corrupt it makes the Borgias look like the 12 apostles.

      Exactly, and that’s the answer to most of our questions.

      I was just about to mention that cronyism is the main reason that our cyber security is so lax, the government in general, and the DOD in particular most often funnel contracts to it’s ‘friends’ without regard to real capabilities, and anyone who cares to know that, knows it.

      I’d be willing to bet that DOD doesn’t treat the contracting of cyber-security with any more care than FEMA does trailer homes.

      The fact that we routinely trust ATM machines and often purchase things on line without fear of losing the entire contents of our bank accounts puts the lie to the proposition that networks cannot be secured.

      Our government just doesn’t give a shit, because things work well enough for their purposes, which are mainly short-sighted criminal shennanigans.

      • jerryy says:

        The fact that we routinely trust ATM machines and often purchase things on line without fear of losing the entire contents of our bank accounts puts the lie to the proposition that networks cannot be secured.

        Where to begin… where to begin!?!

        You are demonstrating almost classically why social engineering hacks work so easily for those that use them. It really is not safe to think and act as if things must be okay because you do not know otherwise. (A classic logical error.)

        For some time now ATM networks and individual machines have been hacked by enterprising capitalists. In spite of getting lots of press in computer groups, the MSM usually ignores this stuff. One reason may be because sometimes the credit agencies ‘cover’ the losses to your wiped out bank account (this is when several folks get tagged at the same time). But safe, ehh, not so much.

        The ATM networks offer convenience, so folks put up with the security problems, not the other way around.

        If you wish, search on ‘ATM hack’ or ‘ATM sniffer’ etc.

        • PJEvans says:

          Some ATMs are more vulnerable than others – if you can, use one that’s in a market, rather than on the side of a bank building. More people around, more of the time, and odd things are more likely to be noticed.

  12. earlofhuntingdon says:

    You’re right, the Chinese are that good. Roughly, they graduate more computer grads every year than the number of Americans who speak Chinese. It’s h/w and s/w infrastructure is superb and geographically widely dispersed, meaning that have expertise in depth.

    As for the army’s participation, it could do that directly, through its own resources. It also has the equivalent of an equity stake in what has been estimated as 30% of China’s largest companies, and “liaisons” working in more, so it could orchestrate hacking any number of ways.

    China’s ability to monitor corporate and private telecoms puts even the US government to shame. If a company puts too good protective s/w on its system, it may find its telecoms lines cut off unless it gives the government the access codes.

    Another issue is where is the demarcation between USG and private contractor databases for intel data? If the US has outsourced up to 70% of its intelligence work, that demarcation may be as porous as many of those systems themselves.

  13. California Sherry says:

    Marcy, re your conversation tonight with ret. Ambassador John Campbell about security, diplomacy and democracy. (6pm pacific|9pm eastern http://bit.ly/h9PxP1) I wonder how he’ll react to the DOD incompetence and how it will connect to his ideas about how secrecy is essential to diplomacy. Do I have that right?

  14. earlofhuntingdon says:

    The lack of adequate computer security at the DoD ought rationally to mitigate any post-conviction punishment Bradley Manning is subjected to.

    It’s one thing to break into a locked and guarded warehouse, monitored 24/7 by video surveillance. The thief who pulls that off is pretty good and a considerable threat. The thief who picks up a stack of bills off an unguarded pallet at Baghdad airport, or who downloads a complete database from the equivalent of the staff library, is opportunistic and exposing more problems than he is causing.

    • lettherebelight2011 says:

      “The thief who picks up a stack of bills off an unguarded pallet at Baghdad airport, or who downloads a complete database from the equivalent of the staff library, is opportunistic and exposing more problems than he is causing.” Wow nice rationalization, your don’t rapists make the same argument when a women is dressing provacatively? FYI, if that is the thrust of Manning’s case in mitigation and extenuation he is in trouble.

      • earlofhuntingdon says:

        How silly.

        My obvious point was that one kind of criminal can be much more dangerous than another. Some crimes merit greater sanction. Neither of my examples included physical violence, unlike the absurd comparison with rape. A more accurate use of “rape” as a metaphor would be to say that the USG is raping Mr. Manning of his civil rights by imposing pre-conviction punishment that would be illegal post-conviction.

        • lettherebelight2011 says:

          I hope you are never burglarized and the police tell you we are going to let the criminal free because you didn’t deadbolt the front door. I’m sure this argument will play well in front of a senior military panel. FYI, this is the precise argument that former FBI agent, Mr. Hanssen, made . . . and he got life without parole.

  15. California Sherry says:

    Meant to mention Virtually Speaking has

    IRC (internet relay chat) You can be part of the conversation – and ask questions – while listening to Marcy and Amb. Campbell.

    Connect to irc.freenode.net or http://webchat.freenode.net/ 
    Enter #vspeak into the channel field.
    While listening to the live program on BlogTalkRadio, type comments and questions into the text field. Read what others write.
    Begin your question with QUESTION so it is easy for the host to spot.

  16. greengiant says:

    When someone from Fudan University wants to be linkedin is that a clue?

    And what about the paranoid theory that Bradley Manning is the fall guy for another operation, false flag, Red China, or US chamber of commerce?

    • eCAHNomics says:

      Adrian Lamo is certainly a kook, so how he got involved in it smacks of USG incompetence. (Haven’t followed that part of story closely though.)

  17. donbacon says:

    Why has the government treated Bradley Manning’s allegedly doing the same a capital offense?

    What Pfc. Manning has alleged to have done would be a threat to the authority of people in the government, and these people are primarily concerned with their own position, power and prestige within the government. These are what a subordinate leaker would threaten. The information that was released is a minor sub-consideration.

  18. gordonot says:

    One morning, as Gregor Samsa was waking up from anxious dreams, he discovered that in his bed he had been changed into a monstrous verminous bug.

  19. lettherebelight2011 says:

    So you applaud PFC Manning for disclosing secret information and laud open access the government . . . but then lament on the lack of network security and how readily unfriendly governments could gain access to secret information. Your latter concern is precisely why the government, not some mentally-unstable private, needs to be the arbiter of what information should be released.

    • gordonot says:

      You’re missing the point. The lament is over the perverse double standard that purports that our supposed military adversaries can access these “top secret secrets” but not our own press.

      • lettherebelight2011 says:

        How is that a double standard? Such an argument only makes sense if our government was permitting our adversaries access to information and then not allowing the press access to the same information. That said, I am all for emptywheel’s argument that the government should be able to control who has access to its secrets and the ability to ensure that such information cannot be accessed . . . by private citizen, rogue military member, or foreign government.

        • PJEvans says:

          How do you know the president actually has access?
          (Remember, he gets his information from the same people who are most interested in keeping Manning locked up. You think they’re going to tell him stuff that would greatly embarrass themselves?)

    • lysias says:

      If the U.S. government is concerned about lack of communication security, they ought to give Manning a medal. While only doing minimal damage, he has pointed out to them a critical failing in their communication security.

      I speak as someone with many years of experience in military communications intelligence.

    • NorskeFlamethrower says:

      Citizen ltbl:

      Take a couple a Tylenol and a shot of Jack Daniels and then jump into bed and turn the electric blanket up to 9…that should take care of your confusion before your head explodes.

    • emptywheel says:

      Um, it’s not secret information.

      It’s information that is being withheld from taxpayer-citizens. But it is being kept widely available to the people we’re purportedly hiding it from.

      Moreover, the govt is not deciding who gets it and not. Chinese hackers are. Are you happier that they are making these decisions than American taxpayers?

      • lettherebelight2011 says:

        I doubt that anyone with a straight-face can say we are consciously permitting foreign governments access to our networks by not make them secure, but let’s say we accept this proposition . . . it sounds like your argument has melded into the contention that classified information should be available to “citizen-taxpayers”. Again, government officials should determine what is classified and what should be released to the general “citizen-taxpayer”, not soldiers or foreign powers. If you can’t trust the government officials you and your fellow “citizens-taxpayers” helped elect, go try out one of the other beautiful vistas around the world. FYI, Mrs. Clinton just released the State Dep’t reports on country conditions and may want to take a gander at those before determining they we live in some malevolent, evil empire. The US is far from perfect, but its only because of how great it is that permits whiny, malcontents to publically nitpick every action.

    • jdmckay0 says:

      (…) why the government, not some mentally-unstable private, needs to be the arbiter of what information should be released.

      Right. Every time I watch “the government” on CSPAN, I marvel at the widespread symbols of sanity represented therein.

    • PJEvans says:

      They don’t have to. They know that the USG knows what they’re doing. The USG doesn’t want us to know; we’re within reach of them.

  20. workingclass says:

    If we’re not keeping all these secrets from China, our biggest rival, who are we keeping them from?

    “We” are hiding the truth (and the facts) from “us”. Keeping Americans ignorant, divided, distracted and/or misdirected makes it easier to rob and enslave them.

    • NorskeFlamethrower says:

      Citizen workingclass:

      “Bingo”…when will some of these people figure out that our entire war machine is intended to keep the miltary safe from our citizens and the war profits safe for the plutocrats.

  21. Knut says:

    Our government has apparently conceded it can’t keep its networks secret from China.

    I suppose the natural question is whether the Chinese can keep their cyber secrets from us.

  22. lettherebelight2011 says:

    Wow, this is truly an incestuous self-congratulatory little group . . . completely clueless but together in their own ignorance. Again, if the author’s proposition is Manning should not be held legally accountable is an erroneous view of the law and a dangerous philosophical argument that permits wrong conduct if the breached party is somehow negligent or otherwise partly responsible . . . remember Nazi germany?

    • KrisAinCA says:

      Marcy made her point eloquently in the article. Apparently reading comprehension is not your strong suit. Also note that she’s one of the best legal minds in the blogosphere. She knows exactly what she’s saying and why she’s saying it, and the legal implications and references behind her statements.

      As for the thrust of the argument that you’re still missing, I’ll try to simply it for you.

      Bradley Manning allegedly accessed the same, or similar information, as the Chinese military does on a regular and ongoing basis. We are not pursuing the Chinese for these breaches in our security, so why are we pursuing Manning? Not only are we not pursuing the Chinese, we’re not even attempting to fix the holes in our security.

      None of this factors in the Federal Whistle-blower Statutes that protect Manning under the law. He allegedly exposed illegal or shameful conduct by his employer. In our society this is what you’re supposed to do. He’s entitled to equal protections under the law, same protections you’d be entitled to if your boss were price-fixing or if your VP of Operations was promoting an unsafe work environment.

      This last gem cracks me up.

      remember Nazi germany?

      Our sharing an idea supported by facts and legal precedent is certainly equivelant to killing 6 million Jews. You’re right. Here’s a thought –

      Go find a mirror, look into it, and tell yourself “I’m just like Bill O’Reilly and Glenn Beck.”

    • NorskeFlamethrower says:

      Citizen ltbl:

      Ok Citizen, that’s it…it gets real tiresome watchin’ a ~~~Edited by Moderator. Disagree without insulting~~~ in disguise and thinks he’s fooled anyone but himself.

      • RBG says:

        FWIW, pissing off the mods is probably not going to further this conversation.

        After all these years, I know you are far better than that.

  23. AitchD says:

    Levels and layers. It’s impossible (for us) to know whether or not the US pretends to prevent others from peeking. As likely as not, the Chinese (or anyone) have to work very hard to break in to Systems A, B, and C, while the real goods are in the system nobody thinks can be invented for another ten years.

    The British were excellent in WW2 at that sort of misdirection.

  24. Gitcheegumee says:

    National Corruption Index :: Li Ka-shing
    May 1, 2008 …

    Li has also financed satellite deals between American company Hughes Network … and was later sold to giant defense contractor L-3 Communications. … Despite these warnings, Hutchison Whampoa took control of two ports …
    http://www.nationalcorruptionindex.org/pages/profile.php?profile_id=16 – Cached-

    NOTE: The last four paragraphs are of particular import to the this thread;however, the entire piece is definitely worth a careful review.

      • Gitcheegumee says:

        Pretty interesting.

        I have posted on earlier occasions about the Dubai Ports deal. The Saudis wanted it, but the public reactiion was very negative toward “foreign” ownerships of American ports.

        The eventual buyer? Drumroll,please…..AIG!

        • Gitcheegumee says:

          No, I should have stated that eventually,after Congressional debate, the buyer was AIG.

          Hutchison Whampo has control of other ports elsewhere,and has longstanding,lucrative contracts with COSCO,the ubiquitous container shipping company that is seen at ports everywhere,all over the world.

        • Gitcheegumee says:

          This will be of particular interest :

          Port lease deal sinks(*)
          17 hours ago
          The Carlyle Group, a private equity firm, and Hutchison Port Holdings, which operates more than 50 ports in 25 countries and handles as much as 15 percent …Daily News – Galveston County – 3 related articles

          Also,
          Hutchison Whampoa – Wikipedia, the free encyclopediaOn March 2011, Hutchison Port Holdings Trust (HPHT) announced that the company will IPO through Singapore Exchange for about $5.4 billion. …
          en.wikipedia.org/wiki/Hutchison_Whampoa – Cached – Similar

          Port lease deal sinks(*)

          By Michael A. Smith

          The Daily News
          Published April 14, 2011
          GALVESTON — Efforts to float a master lease agreement between the Port of Galveston and a private joint venture ran aground Wednesday when marine terminal operator Hutchison Port Holdings suddenly and without explanation pulled out of the deal, port officials said.

          Hutchison’s departure prompted The Carlyle Group, which had been the money behind the joint venture, to withdraw as well, according to the port’s financial advisers, Bank of Montreal Capital Markets.

          Officials at Bank of Montreal told port officials they would contact other firms that had expressed interest in Galveston’s public docks. They also warned that only the Carlyle-Hutchison venture had offered a sweeping deal that could have transformed the island’s entire aging, underused harbor.

          The Carlyle Group, a private equity firm, and Hutchison Port Holdings, which operates more than 50 ports in 25 countries and handles as much as 15 percent of the world’s containerized cargo, in a joint venture were the lone bidders.Galveston’s proximity both to deep water and the Panama Canal, which is being enlarged to accommodate a new generation of very large container ships by 2014, made it attractive to the bidders.

          NOTE: Hutchison controls the Panamanian Port,btw.

  25. speakingupnow says:

    Will the Obama justice department now consider using the “Espionage Act” against China’s People’s Liberation Army?

  26. Watt4Bob says:

    Again, if the author’s proposition is Manning should not be held legally accountable is an erroneous view of the law and a dangerous philosophical argument that permits wrong conduct if the breached party is somehow negligent or otherwise partly responsible . . . remember Nazi germany?

    Is English your second language?

    BTW, I’ve read the article, and I see no indication that the author thinks Manning should not be held accountable, the point of the article is actually more like this;

    If the DOD can’t be bothered to secure its’ data from our enemies, then what is the point of torturing a man who has not been charged, let alone convicted of a crime?

    I have yet to hear anyone on these boards saying it is wrong to hold Manning accountable, but we are mostly in agreement that he is being harshly mis-treated for no good reason.

    If you want an alternative example; John Hinckley shot president Reagan, and was never put in solitary confinement or otherwise mis-treated.

    • earlofhuntingdon says:

      It would be useful to hold Mr. Manning “accountable” only for what he actually did, as proven beyond a reasonable doubt in a credible public tribunal by established procedures and rules of evidence. Holding him in order to exploit him to get at others, if that’s what’s being done, has nothing to do with a credible criminal justice system; it is illegally punishing him for the acts of others.

      If Mr. Manning did commit civil disobedience, then a sane criminal justice system, as opposed to the one he is currently being punished by, would take into consideration a host of mitigating factors.

      • Watt4Bob says:

        You see what I see.

        The Star Chamber has returned.

        The most prevalent form of terrorism on the planet is that which is practiced by the US government and is aimed at anyone who threatens to think for themselves.

  27. reddog says:

    A major problem with the DOD (and most of U.S. industry) is that it has chosen Microsoft Windows as its day-to-day desktop operating system. Windows has a history of remote exploits, and while no operating system is “unhackable”, and Windows is getting less insecure, it has a long way to go as a secure operating system because Microsoft philosophy has always been “ease of use” first. China has no such compunction and chooses to go the more-difficult-to-exploit-remotely route.

    http://en.wikipedia.org/wiki/Red_Flag_Linux

    • PJEvans says:

      They can buy firewall software that would help a lot. Hell, they could require dongles in order to use USB ports and CD burners. (No, I can’t use those at work, even though they physically exist on my computer. It can be incredibly inconvenient for legitimate work purposes.)

  28. marksb says:

    Late again. Too darn busy around here.

    Anyway, many moons ago I worked for a company that built a DDN (Defense Data Network) router at the core of much of the “secure” network. I took a call from a military network center about a base in the South that had problems. During that call I had the security officer change the login locally so I could get in and poke around, which led me to fly to the base and do some stuff to the router, which led to me helping them over a couple of days to “fix” their network so it worked and was reasonably secure. I left the officer with a couple of pages of guidelines on how to change their procedures to keep the system secure.
    A few months later while cleaning my desk I ran across the file on this account, and just for giggles attempted a remote login using my temp UID/PWD. It worked. I got in and looked around and then called the security officer, only to find out he’d retired, the junior officer had been transfered, and the place was now managed by a senior enlisted guy with a specialty in phones, waiting out his last year before retirement. I couldn’t get *anyone* anywhere to listen and pay attention and fix this hole.
    I’m sure it’s better now, but I question how much better.

    Read “The Cuckoo’s Egg” sometime. It’s old now, but it’s a great story and shows what a challenge it is to keep the network secure.

  29. orionATL says:

    earlofhuntingdon@75

    this is a legally precise, easily comprehensible summary of the way a court of law, military as well as civilian, should respond to the legitimate charges (as opposed to the pile on charges dod added recently) against pvt manning.

    if the court-martial fails to meet this standard, then it has failed to do justice to manning.

  30. orionATL says:

    markb@84

    thanks for this very interesting and informative comment.

    it points to human systems problems, not technical problems, with the dod’s (in)secure computer networks.

    that was one of manning’s complaints – soldiers sit around all day without any demands being put on them for disciplined, aka, professional, effort –

    copy music cd’s, talk to their family, watch movies, play video games,

    all while on duty!!