Cybersecurity for Dummies
While reading this uneventful account of another recent cyberattack — supposedly orchestrated by the Chinese — on the computers of a U.S. Senator (this time it was Bill Nelson), I stumbled upon this factoid about some earlier attacks: That same year [2006], Chinese hackers infected the systems at the Commerce Department’s Bureau of Industry and ...
While reading this uneventful account of another recent cyberattack -- supposedly orchestrated by the Chinese -- on the computers of a U.S. Senator (this time it was Bill Nelson), I stumbled upon this factoid about some earlier attacks:
While reading this uneventful account of another recent cyberattack — supposedly orchestrated by the Chinese — on the computers of a U.S. Senator (this time it was Bill Nelson), I stumbled upon this factoid about some earlier attacks:
That same year [2006], Chinese hackers infected the systems at the Commerce Department’s Bureau of Industry and Security, which controls technology export rules, forcing the computers to be replaced altogether.
Now, what can beat this as a cybersecurity strategy? Let’s tell the enemy we could replace computers faster than they could attack us! But what if the old models are being replaced by the Chinese-made Lenovo computers? Hmmm…
More from Foreign Policy

Can Russia Get Used to Being China’s Little Brother?
The power dynamic between Beijing and Moscow has switched dramatically.

Xi and Putin Have the Most Consequential Undeclared Alliance in the World
It’s become more important than Washington’s official alliances today.

It’s a New Great Game. Again.
Across Central Asia, Russia’s brand is tainted by Ukraine, China’s got challenges, and Washington senses another opening.

Iraqi Kurdistan’s House of Cards Is Collapsing
The region once seemed a bright spot in the disorder unleashed by U.S. regime change. Today, things look bleak.