CBS Removes Trans Mandates From Its Reporting; NY Times Accuses War Crimes With...
Anti-ICE Protesters Try to Shame an Agent — It Backfires Spectacularly
For the Trans Activist Class, It’s All About Them
Ilhan Omar Claims ICE Isn’t Arresting Criminals. Here's Proof That She's Lying.
'The Constitution of a Deity' RFK Jr. on President Trump's Diet
Father-in-Law of Renee Good Refuses to Blame ICE, Urges Americans to Turn to...
Iranian State Media Airs a Direct Assassination Threat Against President Trump
US Halts Immigrant Visas From 75 Countries Over Welfare Abuse Concerns
Tricia McLaughlin Defends ICE's Visible Presence
California Man Pleads Guilty to Laundering Over $1.5M and Evading Taxes on $4M
Venezuelan Man Shot After Assaulting ICE Agent With Shovel
House Committee IT Staffer Charged With Stealing 240 Government Phones Worth $150K
Justice Department Challenges Minnesota’s Affirmative Action Hiring Requirements
Founder of LGBTQ+ Nonprofit Casa Ruby Sentenced in Federal Fraud Case
DC Rapper 'Taliban Glizzy' Sentenced to Over 18 Years for Multi-State Jewelry Heists
OPINION

Two Big Stories in 2010

The opinions expressed by columnists are their own and do not necessarily represent the views of Townhall.com.

Two topics ought to rate persistent headlines in 2010: governmental corruption and cyber security.

We know corruption is pervasive, a pan-human affliction, but in the developing world endemic corruption truly robs the present, steals the future and keeps oppressed populations mired in poverty. As it saps fragile economies and sows cynicism, corruption seeds conflict. Corruption in Afghanistan, Pakistan and Iraq has frustrated American and allied war-fighters (and the frustrated allies include Afghanis, Pakistanis and Iraqis). The Mexican government's Cartel War is both a war on narcotics traffickers and internal political corruption.

Advertisement

Going Rogue by Sarah Palin FREE

As for cyber security? Cyber crime obviously overlaps with certain types of criminal corruption, but the world's increasing dependence on vulnerable digital networks makes deterring computer crime and computer snooping key domestic and international goals.

A recent report from Kenya provides a hideous example of corruption robbing the present and future. The Voice of America reported on Dec. 22 that $1.3 million "disappeared" from a national fund which supports primary school education for Kenyan children. The fund had received almost $100 million "to help pay for textbooks, curriculum development and teacher training until 2010."? The theft was discovered in June (likely with a nudge from Britain). Two-dozen officials are "under investigation," but there have been no arrests.

This is more than a sad story about cheating children. Disgust with governmental corruption combined with ethnic distrust added emotional fuel to political violence ignited by Kenya's disputed December 2007 national election. One thousand two hundred people died in the post-election turmoil. Many Kenyans understand the threat. One Kenyan group described the scandal as "so egregious, there could be mass unrest unless the government acts quickly to identify and punish those responsible for the theft."

Al-Qaida's survival strategy relies on corruption. Payoffs to warlords buys protection in Somalia and Pakistan. So do its war plans. A terrorist with financial wherewithal (say, money provided by wealthy Persian Gulf "donors") can buy tips from a corrupt police official or military officer. Who says? The Iraqi government does.

Advertisement

Public anger at governmental corruption undermines political and economic development. This year, the Pakistani government objected to aid restrictions mandated by Congress designed to thwart corruption. The U.S. State Department mangled the diplomacy, but ensuring aid goes into field projects and not Swiss bank accounts is a must. Attacking corruption is vital to winning the War on Terror, but that, too, is a long-term struggle.

In December, Afghanistan's President Hamid Karzai chaired a conference on combating corruption in his own government and throughout Afghanistan. AFP quoted Karzai as saying: "I know that corruption in our government and society cannot be eliminated overnight. We cannot even eliminate it in years."

Like I said, as a news story, corruption has legs.

Ten observant minutes on a street corner or a college campus illustrates the pervasiveness of personal digital devices. Human beings lead what pop sociologists have called an increasingly "digitally centered life." It doesn't matter if the device is a mobile phone, laptop computer or digital camera -- they all create and share digital data.

Cyber crime and its brother, cyber warfare, involve stealing data, altering data, denying data,or destroying data. Tapping personal phone conversations or emails is crime enough, but modern "information age" financial institutions, defense ministries and communications companies absolutely depend on the reliable and secure transmission of digital data.

Electrical power grids also rely on computers, and these computer systems may be vulnerable to cyber vandalism. Using a computer virus to knock out a power grid prior to a robbery or even an attack by a terrorist or enemy power also worries cyber defense experts.

Advertisement

The fears are not theoretical. Bonnie and Clyde were small-change chumps compared to cyber bank thieves. On Dec. 22, The Wall Street Journal reported that the FBI is investigating a "computer security breach" at Citibank. Several "tens of millions of dollars" were filched by hackers who may be "linked to a Russian cyber gang."

Though this is still five or six major steps from taking down a nation's banking system (which interests cyber warriors), the crime itself demonstrates the terrible possibilities.

The digitally centered life and digitally centered economy are in the bull's-eye.

Join the conversation as a VIP Member

Recommended

Trending on Townhall Videos

Advertisement
Advertisement
Advertisement