With the Obama administration belatedly conceding tyranny and anarchy are each enemies of liberty, amidst the protests and power plays, the “Egyptian solution” becomes clear: a real constitution. How can this be achieved?
First, the peaceful path to freedom proceeds from reforming existing institutions from within; and, yes, the orderly exit of Egypt‘s President Hosni Mubarak. In their exuberance over Mr. Mubarak‘s first step yesterday toward relinguishing power, reformers must resist the temptation to rush into an undisciplined and chaotic transition. That would serve only to scare supporters of the old regime into an entrenched and potentially violent opposition to reform.… Seguir leyendo »
China’s cyber-attacks on Google these past several weeks were, sadly, mere replays of state-sponsored Chinese attacks on literally thousands of other American and foreign companies, human rights groups, individuals and, yes, even the U.S. government, including Congress.
A University of Toronto study last year identified more than 1,200 networks worldwide penetrated by a single Chinese-government-controlled cyber-intelligence unit. According to a Northrop Grumman investigation of Chinese military cyber-intelligence in October, secret Chinese cyber-units are organized in tight teams, working eight-hour shifts and employing penetration software that only could have come from proprietary source codes of the major American programming companies such as Microsoft and Adobe.… Seguir leyendo »