The AOC Parody Account Is Back From the Dead
House Freedom Caucus Gets Its Revenge for Debt Deal
Karine Jean-Pierre Ends White House Briefing After Question About Biden's Falls
Colorado's Latest Gun Control Antics Might Be the Most Brazen Attempt to Ban...
There Are New Details About the Plane Crash That Triggered a Military Response...
He's Back: Tucker Carlson Releases the First Episode of His New Show
Video From FL's Migrant Flight to CA Pokes Holes in 'Kidnapping' Claims
CNN Continues to Collapse, DeSantis Scorn for Having a POC Friend, and The...
Shark Tank Star Explains How Target Saga Will Lead to a 'Complete Change'...
Chris Christie Has Officially Gotten into the Presidential Race, and Trump Definitely Has...
Democrats Still Complain About SCOTUS as Attorney for Harlan Crow Offers to Meet
This International Charity Sure Has Picked a Heck of a Way to '#ProtectThePride'
Federal Judge Issues a Ruling in Florida State Law Banning Trans 'Medical Care'...
Teachers Are Divided on Whether Arming Themselves Would Make Schools Safer: Poll
Human Rights Campaign Goes Even Further With Its New 'State of Emergency'

Two Big Stories in 2010

The opinions expressed by columnists are their own and do not necessarily represent the views of

Two topics ought to rate persistent headlines in 2010: governmental corruption and cyber security.

We know corruption is pervasive, a pan-human affliction, but in the developing world endemic corruption truly robs the present, steals the future and keeps oppressed populations mired in poverty. As it saps fragile economies and sows cynicism, corruption seeds conflict. Corruption in Afghanistan, Pakistan and Iraq has frustrated American and allied war-fighters (and the frustrated allies include Afghanis, Pakistanis and Iraqis). The Mexican government's Cartel War is both a war on narcotics traffickers and internal political corruption.

Going Rogue by Sarah Palin FREE

As for cyber security? Cyber crime obviously overlaps with certain types of criminal corruption, but the world's increasing dependence on vulnerable digital networks makes deterring computer crime and computer snooping key domestic and international goals.

A recent report from Kenya provides a hideous example of corruption robbing the present and future. The Voice of America reported on Dec. 22 that $1.3 million "disappeared" from a national fund which supports primary school education for Kenyan children. The fund had received almost $100 million "to help pay for textbooks, curriculum development and teacher training until 2010."? The theft was discovered in June (likely with a nudge from Britain). Two-dozen officials are "under investigation," but there have been no arrests.

This is more than a sad story about cheating children. Disgust with governmental corruption combined with ethnic distrust added emotional fuel to political violence ignited by Kenya's disputed December 2007 national election. One thousand two hundred people died in the post-election turmoil. Many Kenyans understand the threat. One Kenyan group described the scandal as "so egregious, there could be mass unrest unless the government acts quickly to identify and punish those responsible for the theft."

Al-Qaida's survival strategy relies on corruption. Payoffs to warlords buys protection in Somalia and Pakistan. So do its war plans. A terrorist with financial wherewithal (say, money provided by wealthy Persian Gulf "donors") can buy tips from a corrupt police official or military officer. Who says? The Iraqi government does.

Public anger at governmental corruption undermines political and economic development. This year, the Pakistani government objected to aid restrictions mandated by Congress designed to thwart corruption. The U.S. State Department mangled the diplomacy, but ensuring aid goes into field projects and not Swiss bank accounts is a must. Attacking corruption is vital to winning the War on Terror, but that, too, is a long-term struggle.

In December, Afghanistan's President Hamid Karzai chaired a conference on combating corruption in his own government and throughout Afghanistan. AFP quoted Karzai as saying: "I know that corruption in our government and society cannot be eliminated overnight. We cannot even eliminate it in years."

Like I said, as a news story, corruption has legs.

Ten observant minutes on a street corner or a college campus illustrates the pervasiveness of personal digital devices. Human beings lead what pop sociologists have called an increasingly "digitally centered life." It doesn't matter if the device is a mobile phone, laptop computer or digital camera -- they all create and share digital data.

Cyber crime and its brother, cyber warfare, involve stealing data, altering data, denying data,or destroying data. Tapping personal phone conversations or emails is crime enough, but modern "information age" financial institutions, defense ministries and communications companies absolutely depend on the reliable and secure transmission of digital data.

Electrical power grids also rely on computers, and these computer systems may be vulnerable to cyber vandalism. Using a computer virus to knock out a power grid prior to a robbery or even an attack by a terrorist or enemy power also worries cyber defense experts.

The fears are not theoretical. Bonnie and Clyde were small-change chumps compared to cyber bank thieves. On Dec. 22, The Wall Street Journal reported that the FBI is investigating a "computer security breach" at Citibank. Several "tens of millions of dollars" were filched by hackers who may be "linked to a Russian cyber gang."

Though this is still five or six major steps from taking down a nation's banking system (which interests cyber warriors), the crime itself demonstrates the terrible possibilities.

The digitally centered life and digitally centered economy are in the bull's-eye.

Join the conversation as a VIP Member


Trending on Townhall Video