| Opinion/The Review

Larger text Larger text Smaller text Smaller text | Order Photo Reprints

Another cyber 'intrusion': Is an attack next?

Email Newsletters

Click here to sign up for one of our email newsletters.

Letters home ...

Traveling abroad for personal, educational or professional reasons?

Why not share your impressions — and those of residents of foreign countries about the United States — with Trib readers in 150 words?

The world's a big place. Bring it home with Letters Home.

Contact Colin McNickle (412-320-7836 or

Daily Photo Galleries

'American Coyotes' Series

Traveling by Jeep, boat and foot, Tribune-Review investigative reporter Carl Prine and photojournalist Justin Merriman covered nearly 2,000 miles over two months along the border with Mexico to report on coyotes — the human traffickers who bring illegal immigrants into the United States. Most are Americans working for money and/or drugs. This series reports how their operations have a major impact on life for residents and the environment along the border — and beyond.

Sunday, May 5, 2013, 9:00 p.m.

A Chinese hack of a database that details vulnerabilities of about 8,100 major U.S. dams reveals President Obama's recent executive order to boost infrastructure protection and cyber security as mere talk — and America's cyber defenses as still inadequate.

The Washington Free Beacon reports U.S. intelligence agencies have traced the unauthorized January intrusion into the Army Corps of Engineers' National Inventory of Dams to China's government or military. That's a distinction without a difference.

About 2,500 U.S. dams generate hydroelectric power, so this hack heightens concerns that go beyond just dams' security, as former National Counterintelligence Executive Michelle Van Cleave wrote in an email to The Beacon.

“In the wrong hands, the Army Corps of Engineers' database could be a cyber attack roadmap for a hostile state or terrorist group to disrupt power grids or target dams in this country,” she said.

And with the Obama administration aiming to expand “green” hydroelectric power by 15 percent, it should view this hack as Chinese reconnaissance for a cyber attack targeting long-term U.S. energy security, too.

Chinese hands definitely are “the wrong hands” to hold this information. The Obama administration must go beyond empty rhetoric to prevent Chinese cyber attacks or repel them before sensitive data can be stolen.

Subscribe today! Click here for our subscription offers.



Show commenting policy

Most-Read Editorials

  1. Regional growth
  2. So, where’s the I-70 ‘Welcome to Pennsylvania’ sign on the Pa.-W.Va. border?
  3. At the VA: The waiting dead
  4. The Fiat Chrysler mess: Government’s virus
  5. Yes, the IRS targeted conservatives