Wandering China

An East/West pulse of China's fourth rise from down under.

How a single spam from China ended up as an attack on the White House [Naked Security]

Naked Security: Fourth estate or instigator of us-and-them?

The construction of reality by Fox News (arguably known for their right wing tilt) on the White House comes under some light-hearted reverse compression scrutiny.

– – –

How a single spam from China ended up as an attack on the White House
by Paul Ducklin
Source – Naked Security, published October 2, 2012

FoxNews leads today with a dramatic story entitled “Washington confirms Chinese hack attack on White House computer.”

In other important news, experts confirmed that there was a “high probability” that tomorrow, 03 October 2012, due to the rotation of the earth on its axis, the sun would once again give the impression of rising in the East. They also claimed that dinosaurs would “in all likelihood” continue in their state of alleged extinction.

(You read it here first, folks!)

Do we really need major headlines of this sort? What information do their stories convey?

Fox dedicated over 660 words to the Chinese hacking story, but after careful reading it seems pretty clear that the incident, and the story, can be simplified quite significantly.

Here it is in 40 words, for a compression ratio of over 94%:

* A malicious spam from a computer in China reached a single unclassified computer in the White House Communications Agency.

* The computer may or may not have become infected as a result.

* Protection against malware and hackers is a good idea.

You may stand down from any coloured, or even lightly tinted, type of alert.

Please be careful of reading too much into tales like this. They may very well be true, but they may also merely distract you from other clear and present dangers in the computer security field.

To help you out, here are some of the tell-tale signs that a story of this sort has undergone what I will politely refer to as “reverse compression”.

1. The article has as its primary source another article which, on careful reading, is merely the same uncertainty in different clothing.

(The Fox News story relies exclusively on a Free Beacon article that, itself “reverse compressed” to over 1700 words, offers no actionable evidence.)

2. The article, and its primary source, use emotive and dramatic language even when noting assumptions and speculations.

(Examples here include words like “alarming,” “grave strategic damage”, “revolutionary military capabilities” and “most brazen cyberattack”.)

3. The article contains numerous words of caution that don’t distract from the drama but quietly confirm the uncertainty of the conclusions.

(Examples here include “sources partly confirmed”, “Free Beacon claimed” and “attempted hacking.”)

4. The article introduces a second story or issue in a way that invites you to infer a cause-and-effect relationship without actually claiming one.

(Examples here include “China recently moved maritime patrol boats into waters near the [islands disputed with Japan]” and “reportedly including systems used by the military for nuclear commands”.)

5. A convenient security expert pops up who’s willing to go on record as saying that we’re losing the battle and we need to change our game.

(Here, we have an outside expert in whose mouth the article can stash claims like “the cybersecurity industry is woefully behind the curve,” “training simply does not work,” and “we must rapidly adopt new technologies.”)

The training doesn’t work meme is commonly heard these days – we’ve covered it in a Naked Security piece that helps you decide whether it’s true, or even likely – and has become a handy watch-cry for sales guys touting a new technology that they claim can obviate the need for training at all.

I’ll leave it to you to decide whether that’s what’s happened here, and I’ll leave it to you to decide just how credulous you ought to be when you see a single malware-laden spam from a Chinese PC extrapolated into a story about a “cyberbreach [that] was one of Beijing’s most brazen cyberattacks against the United States.”

Be careful out there. Whether you’re an FDR admirer or not, he might have been speaking about cyberthreats and our twenty-first century response to them when he said, “the only thing we have to fear is fear itself.

And that’s 651 words of reverse compression all of my very own.

Filed under: Charm Offensive, Chinese Model, Communications, Cyberattack, Education, International Relations, Internet, Mapping Feelings, Media, Peaceful Development, Public Diplomacy, Soft Power, Technology, The Chinese Identity, The construction of Chinese and Non-Chinese identities, U.S., , , , , ,

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,244 other followers

East/West headlines of Rising China

East/West headlines of Rising China

About Wandering China

Click to find out more about this project

Support //WC

Support Wandering China now - buy a Tee Shirt!

Be a champ - Support Wandering China - buy a Tee Shirt!

The East Wind Wave

China in images and infographics, by Wandering China

China in images and Infographics, by Wandering China

Wandering China: Facing west

Please click to access video

Travels in China's northwest and southwest

Wandering Taiwan

Wandering Taiwan: reflections of my travels in the democratic Republic of China

Wandering China, Resounding Deng Slideshow

Click here to view the Wandering China, Resounding Deng Slideshow

Slideshow reflection on Deng Xiaoping's UN General Assembly speech in 1974. Based on photos of my travels in China 2011.

East Asia Geographic Timelapse

Click here to view the East Asia Geographic Timelapse

A collaboration with my brother: Comparing East Asia's rural and urban landscapes through time-lapse photography.

Wandering Planets

Creative Commons License
Wandering China by Bob Tan is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License.
Based on a work at Wanderingchina.org. Thank you for visiting //
web stats

Flag Counter

free counters
Online Marketing
Add blog to our directory.
%d bloggers like this: