Logo

American Security Council Foundation

Back to main site

Alan W. Dowd is a Senior Fellow with the American Security Council Foundation, where he writes on the full range of topics relating to national defense, foreign policy and international security. Dowd’s commentaries and essays have appeared in Policy Review, Parameters, Military Officer, The American Legion Magazine, The Journal of Diplomacy and International Relations, The Claremont Review of Books, World Politics Review, The Wall Street Journal Europe, The Jerusalem Post, The Financial Times Deutschland, The Washington Times, The Baltimore Sun, The Washington Examiner, The Detroit News, The Sacramento Bee, The Vancouver Sun, The National Post, The Landing Zone, Current, The World & I, The American Enterprise, Fraser Forum, American Outlook, The American and the online editions of Weekly Standard, National Review and American Interest. Beyond his work in opinion journalism, Dowd has served as an adjunct professor and university lecturer; congressional aide; and administrator, researcher and writer at leading think tanks, including the Hudson Institute, Sagamore Institute and Fraser Institute. An award-winning writer, Dowd has been interviewed by Fox News Channel, Cox News Service, The Washington Times, The National Post, the Australian Broadcasting Corporation and numerous radio programs across North America. In addition, his work has been quoted by and/or reprinted in The Guardian, CBS News, BBC News and the Council on Foreign Relations. Dowd holds degrees from Butler University and Indiana University. Follow him at twitter.com/alanwdowd.

ASCF News

Scott Tilley is a Senior Fellow at the American Security Council Foundation, where he writes the “Technical Power” column, focusing on the societal and national security implications of advanced technology in cybersecurity, space, and foreign relations.

He is an emeritus professor at the Florida Institute of Technology. Previously, he was with the University of California, Riverside, Carnegie Mellon University’s Software Engineering Institute, and IBM. His research and teaching were in the areas of computer science, software & systems engineering, educational technology, the design of communication, and business information systems.

He is president and founder of the Center for Technology & Society, president and co-founder of Big Data Florida, past president of INCOSE Space Coast, and a Space Coast Writers’ Guild Fellow.

He has authored over 150 academic papers and has published 28 books (technical and non-technical), most recently Systems Analysis & Design (Cengage, 2020), SPACE (Anthology Alliance, 2019), and Technical Justice (CTS Press, 2019). He wrote the “Technology Today” column for FLORIDA TODAY from 2010 to 2018.

He is a popular public speaker, having delivered numerous keynote presentations and “Tech Talks” for a general audience. Recent examples include the role of big data in the space program, a four-part series on machine learning, and a four-part series on fake news.

He holds a Ph.D. in computer science from the University of Victoria (1995).

Contact him at stilley@cts.today.

China's Cyber Crimes

Tech Cold War

China’s Cyber Crimes are just one aspect of the Chinese Communist Party's (CCP) unrestricted warfare against the United States. “Cyber” refers to matters of the internet and computers. Recently, Microsoft and intelligence agencies identified a Chinese computer malware code, "Volt Typhoon,” which appeared in communication systems in Guam and elsewhere in the United States. It likely was aimed at disrupting U.S. communications with Asia in the event of a conflict, such as the CCP invasion of Taiwan.

Volt Typhoon was initially discovered by Microsoft's threat intelligence unit when “investigating intrusion activity impacting a U.S. port.” As Microsoft traced back the malware, they found other networks that were infected, including the communications sector in Guam.

Anne Neuberger, the Deputy National Security Advisor for Cyber and Emerging Technology, is part of a relatively new U.S. Government effort to quickly and publicly expose CCP cyber-attacks so as to burn the operations and have American firms strengthen their cybersecurity efforts. In years past, the government would classify the attacks and thus keep the public unaware of cyber-attacks. Ms. Neuberger is focusing on improving cyber security on critical infrastructure, including pipelines, rail systems, water systems, ports, and air travel.

Needless to say, the CCP denied the Volt Typhoon allegations. And needless to say, communists, as always, lie and deceive---never trust a communist. CCP Foreign Ministry spokeswoman Mao Ning described the Microsoft report as extremely unprofessional. She added that it is a collective disinformation campaign of the Five Eyes coalition countries. The Five Eyes is an intelligence alliance between the United States, the United Kingdom, Australia, New Zealand, and Canada, with origins dating back to World War II. It has now broadened its cooperation to include Germany and Japan to cover CCP activities.

Guam in the Western Pacific is the home of key U.S. military assets, including Anderson Air Force Base and Navy Base Guam. It includes commands for nuclear submarines, ship repair facilities, Seabees, Coast Guard, and Naval Special Warfare. Approximately 1700 miles from Taiwan, Guam would be a strategic asset in support of Taiwan in the event of a CCP invasion. China has DF-26 “Guam killer” ballistic missiles that can reach Guam from mainland China and take out U.S. Navy carrier task forces.

To counter the growing CCP threat of invading Taiwan, the bipartisan House Select Committee on the Chinese Communist Party recommended buying more long-range missiles, fortifying and hardening military bases, speeding up the delivery of military aid to Taiwan, and improving cybersecurity. If the CCP invades Taiwan, the U.S., the Philippines, and Japan will be dragged into the conflict whether they like it or not.

Jen Easterly, the Director of the Cybersecurity and Infrastructure Security Agency, said it is “long past time for technology companies to build cybersecurity into their product design.” Unsafe technology in our computer systems is far more pervasive and dangerous than the spy balloon, yet we have allowed ourselves to accept it.

FBI Director Chris Wray said CCP cyber and espionage attacks have resulted in “one of the largest transfers of wealth in human history.” The CCP Peoples’ Liberation Army (PLA) military aircraft and ships bear a striking resemblance to U.S. military equipment. The American crown jewel fighter aircraft, Lockheed Martin’s F-35, has a twin sister in the PLA’s Shenyang J-31. In 2009, it was discovered that the F-35's sensitive and top-secret designs and electronics were compromised. (No names were cited as to who did the compromise, but we can reasonably assume it was the CCP).

The Chinese spy balloon recently shot down on the South Carolina coast after traversing across America and over military bases (it would circle the bases in figure eight patterns) had two tons of surveillance electronics on board. President Biden, at the G-7 meeting in Japan, called it a “silly balloon” that changed the terms of China and the U.S. talking to one another. Biden initially said that no communications from the balloon were sent to China, but this has since been disproved. No clear explanation has been given for why the military allowed the balloon to traverse the country, as it was steered over military installations. No information about the nature of the surveillance equipment recovered has been disclosed to the public.

Google’s Mandiant Division researchers have found that the CCP has developed sophisticated and hard-to-detect techniques that allow them to burrow into government and business networks by compromising devices on the edge of the network. The CCP even compromises the firewalls. Mandiant has found bugs in the firewall companies Fortinet, SonicWall, and Citrix.

Summary

The CCP's strategic deterrence is based on the triage of nuclear, cyber, and space capabilities. The United States strategy for national defense security is a triad of nuclear submarines, land-based missiles, and an air bomber fleet. All three of America’s triad are underfunded with aging and contain poorly maintained equipment. Recruitment levels are plummeting. China’s triage is rapidly growing, well-funded, and new. China’s military does not divert resources and sap morale with CRT, transgender, and Woke ideologies.

Chinese and American education systems both preach Marxism. The Chinese teach pride in their country and their culture. American Marxist education teaches that America is evil, capitalism is bad, and socialism is good. The Colorado teachers union convention recently adopted an anti-capitalistic polemic at their convention. America desperately needs school choice to get out from under the teacher's unions.

The United States needs virtuous leaders who believe in America. That they believe in life, liberty, and the pursuit of happiness. That they believe America was conceived in liberty and that all men and women are created equal. That our founding documents of the Declaration of Independence, Constitution, and Bill of Rights are the foundation for our freedoms. That we take increased devotion on this Memorial Day weekend to that cause for which our patriots gave their last full measure of devotion, that we highly resolve that they shall not have died in vain. That this nation, under God, shall have a new birth of freedom and that government of the people, by the people, and for the people shall not perish from the earth.

Peace Through Strength!

Laurence F. Sanford
Senior Analyst
American Security Council Foundation
www.ascf.us

Comments RSS feed for comments on this page

There are no comments yet. Be the first to add a comment by using the form below.