China and Saudi Arabia together, What does it mean for the US…

China Arabia Whats Next?
China Arabia Whats Next?

What happens when East meets Middle East? Who wins and who loses?

Sitting here in Southeast Asia as I write this, the news seems to be all about Chinese Premier Wen Jiabao visit to the Saudi kingdom as tensions appear to grow over Iran’s nuclear ambitions.  At stake for the Saudi Kingdom is $58.5 billion which is the amount China spent on oil with the Arab Kingdom in only the first 11 months of 2011.  To add to this, at least 11 percent of the oil hungry China’s imports come from the rogue Islamic republic of Iran.  Therefore it’s clear as the west moves to lobby sanctions upon Iran, the big losses may in fact be China.

What’s concerning here is what kind of sports will the Chinese be about this, well if I had to bet dollars to donuts, would say not good.  As memories grow old, the pacific component of World War II was driven by the embargoing of materials into Japan and while I’m not trying to say this will be World War III, it surely could lead to an economic show down on a global scale.

What folks especially in the United States are missing is that all roads are crossing in the east. As we drive our large cars and consume all that gasoline, our dollars flow east.  Then as we fill those SUVs at the super stores with goods manufactured in China, more of our dollars end up in the East as in middle with China passing the “buck” along.  This is creating an increasingly large void in the American economy as we run out of cash.  Yes we’ve waxed on this before, yet it’s growing like a malignant tumor with no end in sight other than the consumption of the American economy upon itself.

As come upon the 2012 election year, there will be discussions of illegal immigration, terrorism, and my favorite healthcare.  Yet there is one thing which matters and its critical, that one thing is the repatriation of cash and not going to be easy as it will mean a return to a greater self-sufficiency upon energy being new nuclear developments as well as a greater attempt at oil recovery in the continental US.    While yes what I say is social as well as environmental blasphemy, the fact is the horse is out of the barn and we aren’t going to revert to Amish ways in mass and forego those things which make modern life modern…

 

With this said the win here is to make the best out of what we have learned from the past as the future is all we have left…

Stuxnet…

Payload...

What amazes me every day is how life seems to match that of a b-rate science fiction movie as in the 60’s I had never thought Dick Tracy’s wrist watch phone would be a reality let alone toss in video and internet too!  However there seems to be a darker side to all of this too as each movie also has a villain as hey what fun would it be without one right?  However this too exists today in the form of a dark angel if you will serving the perceived right by doing wrong and that is “Stuxnet”.

For those that may not have heard, the uranium enrichment plant in Iran was struck by a computer bug and not a normal bug at that.  This one had a unique appetite if you will for specialize (real world) control hardware used to run the actual plant.  Matter a fact this was “hardware” which was stand alone in that it didn’t come in contact with the internet and wasn’t even wired to a local network of sorts, yet it became infected and was severely damaged.

Well you might be saying so what there are virus’s all over the internet and what’s the big deal about this as you hear it all the time in the popular media.  Well there are two things which make this different and very different, which leads to the scary part of the discussion as the aspect to consider is this virus affects the real world.  As until now, a computer infection only caused soft damage as in stealing credit card data, deleting personal files, or logging things like user IDs and passwords.  However “Stuxnet” is different as it has the programmatic ability to “damage” the real world by autonomous control and do these deeds nefariously even under the oversight of a human operator.

Think about it this way as a premium class automobile now has over 100 million lines of code to drive the multiple microprocessors embed throughout the vehicle, and guess what many of these are even linked to internet!  Thus making them far more likely targets then highly protected PLC’s (Program Logic Controllers) running a nuclear fuel refinement facility.  This concept (attack) in turn can be cascaded to obviously airplanes, trains and any other devices with an embedded microprocessor in it which is just about everything in our modern world.

It use to be in the past we felt all safe and cozy that since these devices where not commonly connected like our personal computers to the internet that we were safe and malicious mishaps where not a reality as they lack possibly.  However we now have found this to be wrong as “Stuxnet” has done what we all once thought was impossible and is the virus equivalent of what “Trinity” was to the explosive world.  Yes it’s on the same plane as unleashing the atom.  Why such a bold statement you ask, as its hard to get any bolder however it’s the second aspect and potentially most lethal too is its delivery system.

Think about it this way as we will use the old adage of needing to find a needle in a hay stack as the only way to infect these stand alone devices is via the computer which is used to connect to them via a hard line, so therefore you need to first infect those systems (the ones used for configuration), so how does one do that?   First you have to infect a lot of devices, second it needs to autonomously spread and finally it has to be buried very deep to avoid being discovered.  In essence this is the cruise missile of the virus world; just far more accurate if you will as to strike a target like this is an amazing feat.  Again, “so what” as who cares, well let’s look at this again.

This virus is like a multistage rocket which can shed pieces of itself yet releasing new payloads to continue the march forward.  Second is how deep within the OS (Operating System) it had to be to not be found as it could even be on your computer now, you could have a silent carrier as to hit its target a vast and I do mean vast number of machines needed to be infected to increase the chances that the machine used to configure the controller would come into contact with it (the virus).

One final thought on this is the potential existence of “back door” if you will in the OS code base, BIOS sets or hardware itself which allow the silent passing of data by parties (governments) in the know.  This would be akin to the kill switch the US builds into the military hardware it sells abroad as a protection measure should the purchaser decide unwisely to use it against America.

Regardless of how you package it, much like the splitting of the atom let the genie out of the atomic bottle, “Stuxnet” has now let the genie our the virus bottle in a big way…