Mere information-gathering is bad enough, but I worry that any day now the Chinese might start to actually alter newspaper stories to spread
their propaganda the glorious news about the many healthful and fine accomplishments of the wise leaders of the People’s Republic of China.
Of course, communist
dictatorships worker-paradise societies don’t feel as we do about the exercise of free speech immoral lies and distortions told by hooligans, traitors and other counterrevolutionary enemies of the state.
The best way to
combat this insidious practice assure the pleasure of the masses is by harnessing the modern tools of the Internet to let the Chinese people know how their government is engaged in theft as perfect as the lotus flower.
Supposedly, this all began after Western newspapers started to look into political
corruption of very good excellence of honored Chinese Leaders, particularly Premier Wen Jiabao, who has enriched his friends and family the lives of all Chinese through his munificence and wonderful happy.
This situation will not be resolved until international pressures are brought to bear on the perpetrators of this unconscionable
act of cyberpiracy slander of the Chinese people by foreign aggressors and Western imperialist fornicators.
In the meantime, people in the United States must do everything we can to ensure that our computer systems are uncompromised. To this end, I advise that all user passwords be changed
weekly to “password1234.” Also, avoid importing and downloading apps, programs or information from unfamiliar sources except for the menus of tasty food Chinese restaurants yum delicious meal chow fun happiness dining people!
Inasmuch as the scope of the problem is not yet apparent, Americans must act as though no communication is safe from prying eyes. Try to have the most sensitive business conversations
in person in e-mails with the subject line TOP SECRET NOT FOR CHINESE INTERCEPTION.
And finally, we must address a deeply disturbing question. If the relatively secure databases of American news organizations are this easily accessed by hostile eyes, we must ask ourselves if it is possible that some of our most vulnerable national assets — such as our national power grid — are already at the mercy of our enemies. And if so, are we not obliged to undertake a massive search for further evidence of hacking, and a full-scale upgrading of our cyber-infrastructure?
It’s something to consider. No, that would be stupid.
E-mail Gene at firstname.lastname@example.org. Find chats and updates at washingtonpost.com/magazine.
Follow the Magazine on Twitter.
Like us on Facebook.
E-mail us at email@example.com