brad brace

12/15/2008

OLD TERROR WAVES HACKED AND SLAUGHTERED

Filed under: china,General,png,rampage,resource,usa — admin @ 8:37 am

Without a law banning export of toxic electronic waste in the United
States, there has been no way to know if old cell phones, computers or
televisions originating there didn’t end up in some poor village in the
developing world, where desperate people pull them apart by hand to recover
some of the valuable metals inside.

The Papua New Guinea jungle has given up one of its darkest secrets – the
systematic slaughter of every male baby born in two villages to prevent
future tribal clashes.

China is aggressively developing its power to wage cyber warfare and is now
in a position to delay or disrupt the deployment of America’s military
forces around the world, potentially giving it the upper hand in any
conflict.

Coordinated groups of gunmen shot and blasted their way through tourist
sites in the Indian financial center of Mumbai, killing at least 101 people
and wounding more than 200 while apparently targeting American and British
citizens for use as hostages.

Currently even when e-waste (electronic trash) goes to a “green” recycler,
the chances are high that toxic stuff from the developed world ended up in
a huge pile in the middle of some village.

By virtually wiping out the ‘male stock’, tribal women hope they can avoid
deadly bow-and-arrow wars between the villages in the future.

There has been an alarming increase in incidents of Chinese computer
attacks on the US government, defence companies and businesses. China now
has both the intent and capability to launch cyber attacks “anywhere in the
world at any time”.

The attackers swept through two luxury hotels favored by foreigners, the
Taj Mahal Palace and the Oberoi, firing automatic weapons, throwing
grenades and sending panicked guests scrambling for safety. Some guests
were trapped inside the hotels for hours, even as a series of explosions
set fire to the Taj hotel, a landmark along of Mumbai’s waterfront.

The U.S. generates an estimated three million tonnes of electronic waste,
such as cell phones and computers, each year. U.S. citizens bought some 30
million television sets this year and that number will be higher next year
as all U.S. TV networks switch to digital broadcasts Feb. 17.

‘Babies grow into men and men turn into warriors,’ said Rona Luke, a
village wife who is attending a special ‘peace and reconciliation’ meeting
in the mountain village of Goroka.

In 2007, about 5m computers in the US were the targets of 43,880 incidents
of malicious activity – a rise of almost a third on the previous year.

Although Mumbai has been the scene of several terrorist attacks in recent
years, experts said Wednesday’s assaults required a previously unseen
degree of reconnaissance and planning. The scale and synchronization of the
attacks pointed to the likely involvement of experienced commanders, some
said, suggesting possible foreign involvement.

‘It’s because of the terrible fights that have brought death and
destruction to our villages for the past 20 years that all the womenfolk
have agreed to have all new-born male babies killed,’ said Mrs Luke.

Launching their attacks after dark, the terrorists struck almost
simultaneously at the city’s domestic airport and a railway station and
sprayed gunfire at the Leopold Cafe, a restaurant popular with foreigners.
As many as 16 groups hit nine sites on the southern flank of this crowded
metropolis of 19 million.

It is estimated that 100 containers of e-waste arrive in Hong Kong every
day and are then smuggled into China. It’s all coming from the U.S. and
Canada; much of this activity is illegal in China. But it is a very big and
profitable industry so many officials in China and elsewhere are willing to
look the other way.

China’s ability to wage cyber warfare is now “so sophisticated that the US
may be unable to counteract or even detect the efforts”. Given the
dependence on the internet of key sectors of US public life, from the
federal government and military to water treatment, social security and the
electricity grid, a successful attack on these internet-connected networks
could paralyse the US.

Mumbai is South Asia’s financial hub and an entertainment capital, with
many of the glitzy targets symbolizing the new cosmopolitan face of the
world’s largest democracy. Several witnesses said the gunmen demanded to
see passports from cornered guests, separating American and British
tourists from the others. State Department spokesman Robert Wood said U.S.
officials were not aware of any American casualties but were still
checking.

‘The women have had enough of men engaging in tribal conflicts and bringing
misery to them.’ Tribal fighting in the region of Gimi, in the country’s
Eastern Highlands, has been going on since 1986, many of the clashes
arising over claims of sorcery.

There has been concern about Chinese computer espionage since 2002, when a
large-scale series of cyber intrusions was launched on US military and
government computer systems. In that attack, codenamed Titan Rain by the
US, the Chinese downloaded up to 20 terabytes of data — twice the amount
stored in the entire print collection of the Library of Congress.

In the chaos and confusion, it was difficult to confirm details or
determine the nationalities of hostages apparently being held on several
floors of the damaged hotels. India’s NDTV 24×7 news channel reported that
the gunmen were holding more than a dozen foreigners, including a Belgian
and an Indonesian.

The mountain of e-waste grows each day as new electronic devices are
created to drive an economy rooted in endless growth. And consider that 85
percent of e-waste goes in landfills or is incinerated locally,
contaminating the United States’ groundwater and air. Millions more
stockpiled computers, monitors and TV are sitting in basements, garages,
offices and homes.

The sensational claims recall the Biblical story of the Old Testament
pharaoh who ordered all midwives to kill Israelite baby boys because he
wanted to ensure there were never enough young men to fight in an army
against the Egyptians.

Much of the activity is likely to emanate from groups of hackers, but the
lines between private espionage and government-sponsored operations are
blurred. Some 250 hacker groups are tolerated, and may even be encouraged,
by Beijing to invade computer networks. Individual hackers are also being
trained in cyber operations at Chinese military bases. China is stealing
vast amounts of sensitive information from US computer networks.

Firefighters could be seen helping guests to safety, and some later reports
suggested that hostages at the Taj had been freed. Other reports said there
were attacks at two hospitals, a police station and the Mumbai office of an
ultra-Orthodox Jewish outreach group, Chabad Lubavitch.

A resident of Agibu village, Mrs Luke said she did not know how many male
babies were killed by being smothered, but it had happened to all males
over a 10 year period – and she suggested it was still happening. Choking
back tears she added: ‘It’s a terrible, unbearable crime, but the women had
to do it. ‘The women have really being forced into it as it’s the only
means available to them as women to bring an end to tribal fights.’

Beijing is investing huge resources in cyber and space missions because it
sees America’s computer networks and space assets as its “soft ribs and
strategic weaknesses”. The extent of its activities gives it the potential
to beat the US in military conflict.

Huge waves caused by king tides smashed into dozens of villages and towns
in northern Papua New Guinea, destroying homes and flooding businesses and
a hospital, local media reported.

No Comments

No comments yet.

RSS feed for comments on this post.

Sorry, the comment form is closed at this time.

Powered by WordPress