Jump to content
Washington DC Message Boards
Guest Black Sun

The Chinese Cyber-Invasion - Using American Computer Firms

Recommended Posts

Guest WW-III 2010

Boycott Twitter, Google, MSN, etc. that openly collaborate with the U.S. military - this monster needs to go or else WW-III with no future for mankind ...

Share this post


Link to post
Share on other sites
Guest Luke

The "Black Hawk Safety Net" website taught hacking techniques and provided malicious software downloads for its 12,000 members in exchange for a fee, the Wuhan Evening News newspaper reported this weekend, citing police in Huanggang, just east of Wuhan.

Share this post


Link to post
Share on other sites
Guest Human

Alot of this stuff is inter-related of which our own government does not understand about, and that's the problem.

 

I told the U.S. military about a certain web site out there that they did not know even existed. <Had to make certian folks look real smart in order for the information to click with the military>

 

[still trying to make folks look smart with other web sites out there.]

 

 

------------------------------------------------------------------------------------------------

The "Black Hawk Safety Net" website taught hacking techniques and provided malicious software downloads for its 12,000 members in exchange for a fee, the Wuhan Evening News newspaper reported this weekend, citing police in Huanggang, just east of Wuhan.

Share this post


Link to post
Share on other sites
Guest Human

In any case, I don't think that you will have to worry about whether the Chinese will watch this web site or not. It won’t be just the Chinese; a whole host of governments are watching this web site.

 

At least I do have one thing to console me, and that is if the American people have any brains what so ever, they will not re-elect obama, or consider Hillary ever again. [At least it's my hope, because I'm hopeful that the American people out there GOT IT. That making the case for nuclear energy for other countries WAS A REALLY BAD IDEA.]

Share this post


Link to post
Share on other sites
Guest Ai Weiwei

Stopping the free exchange of information ultimately hampers economic growth and opportunity, which is the Chinese government’s main claim to legitimacy.

Share this post


Link to post
Share on other sites
Guest Chessman

I found a amazing VPN software called Puff at

 

http://www.erights.net/.

 

Give it a try! You call watch youtube videos with no buffers at all!! This is not an ad, cause it's free.

 

Puff is a secure proxy software & service, it is provided AS IS without any warranty. Download Commercial version: Puff 0.05 (it works in China) Download FREE xmas version: Puff 0.03x updated:12-22-2009

Share this post


Link to post
Share on other sites
Guest Human

Great Idea there about that free flow. hummmm!!!! Maybe we should give the chinese people all the free flow that the chinese government can't handle.

------------------------------------------------------------------------------------------------

I found a amazing VPN software called Puff at

 

http://www.erights.net/.

 

Give it a try! You call watch youtube videos with no buffers at all!! This is not an ad, cause it's free.

 

Puff is a secure proxy software & service, it is provided AS IS without any warranty. Download Commercial version: Puff 0.05 (it works in China) Download FREE xmas version: Puff 0.03x updated:12-22-2009

Share this post


Link to post
Share on other sites
Guest Ispy

An investigation into the cyber attacks on Google and other corporations has led to computers based at two universities in China, Shanghai Jiaotong University and the Lanxiang Vocational School. The New York Times reports:

 

Computer security experts, including investigators from the National Security Agency, have been working since then to pinpoint the source of the attacks. Until recently, the trail had led only to servers in Taiwan.

 

If supported by further investigation, the findings raise as many questions as they answer, including the possibility that some of the attacks came from China but not necessarily from the Chinese government, or even from Chinese sources.

 

Tracing the attacks further back, to an elite Chinese university and a vocational school, is a breakthrough in a difficult task. Evidence acquired by a United States military contractor that faced the same attacks as Google has even led investigators to suspect a link to a specific computer science class, taught by a Ukrainian professor at the vocational school.

 

http://www.nytimes.com/2010/02/19/technology/19china.html

Share this post


Link to post
Share on other sites
Guest BlacKSun

http://au.news.yahoo.com/thewest/a/-/world/6844839/google-to-restart-china-talks-report/

 

Google and Chinese officials will resume talks about whether the US firm can deliver unfiltered Internet search results in the world's most populous country, the Wall Street Journal reported Tuesday.

 

It was unclear whether any progress was being made in the talks, or whether Google would be forced to follow through on its January threat to shut down its Chinese-language search engine googlespam rather than bow to government censors.

 

Google launched the ultimatum over what it said were cyberattacks aimed at its source code and at the Gmail accounts of Chinese human rights activists around the world.

 

Recent reports have quoted US analysts as saying they believe a Chinese freelance security consultant with government ties was the author of the code used in the hack attacks on Google and more than 30 other companies.

 

Unnamed investigators have also been cited as saying the cyberattack trail led back to computers at two schools in China. The Chinese government and the schools have denied involvement in any cyberespionage.

 

US President Barack Obama said last month that he was "troubled" by the cyberattacks on Google and wanted answers from China.

 

Meanwhile, Google has continued to filter search results in China and remained tight-lipped regarding discussions with officials in that country.

 

Google representatives and Chinese officials were to resume talks in the coming days after a break for China's Lunar New Year holiday, according to the Journal.

 

A spokeswoman for Google China, Marsha Wang, told AFP that she did not have any update on plans for talks when asked about the report.

Share this post


Link to post
Share on other sites
Guest HUMAN

My oh My!! How the internet has changed. In further research it seems that in the Chinese trying to hack Google, and there being government contracts to that equation.

 

There is another equation? International Governments ARE using Google as a window to their databases.

 

The intranet IS merging with the internet. I was hoping that inter-governmental agencies would not be that stupid "Sadly I was right".

 

 

------------------------------------------------------------------------------------------------

Share this post


Link to post
Share on other sites
Guest Netizen

Ever since Google disclosed in January that Internet intruders had stolen information from its computers, the exact nature and extent of the theft has been a closely guarded company secret. But a person with direct knowledge of the investigation now says that the losses included one of Google’s crown jewels, a password system that controls access by millions of users worldwide to almost all of the company’s web services, including e-mail and business applications.

 

The program, code named Gaia for the Greek goddess of the earth, was attacked in a lightning raid taking less than two days last December, the person said. Described publicly only once at a technical conference four years ago, the software is intended to enable users and employees to sign in with their password just once to operate a range of services.

 

http://www.nytimes.com/2010/04/20/technology/20google.html

Share this post


Link to post
Share on other sites
Guest Human

You know whose fault this really is?

 

The Administrators to the tech departments out there.

 

They should have kept what is in-house? In-house, and a separate server for the internet with hardware firewalls coming out the ying yang. Not a hardware firewall, but multiple hardware firewalls with multiple offensive firewalls.

------------------------------------------------------------------------------------------------

Ever since Google disclosed in January that Internet intruders had stolen information from its computers, the exact nature and extent of the theft has been a closely guarded company secret. But a person with direct knowledge of the investigation now says that the losses included one of Google’s crown jewels, a password system that controls access by millions of users worldwide to almost all of the company’s web services, including e-mail and business applications.

 

The program, code named Gaia for the Greek goddess of the earth, was attacked in a lightning raid taking less than two days last December, the person said. Described publicly only once at a technical conference four years ago, the software is intended to enable users and employees to sign in with their password just once to operate a range of services.

 

http://www.nytimes.com/2010/04/20/technology/20google.html

Share this post


Link to post
Share on other sites
Guest Fly Jockey

Another common problem is allowing users to operate a computer system (consoles, servers, etc.) with more permissions than required. User accounts used for interactive logon should be carefully evaluated for the lowest set of permissions necessary.

Share this post


Link to post
Share on other sites
Guest human

Don't you just love cyber-wars?

 

 

-------------------------------------------------------------------------------------------------------http://www.nationaldefensemagazine.org/blog/Lists/Posts/Post.aspx?ID=363

 

Cyberwars Should Not Be Defined in Military Terms, Experts Warn

 

NATIONAL HARBOR, Md. — Military leaders have repeatedly proclaimed that they cyberspace should be considered a “battle domain,” like land, sea, air and space.

 

But that may be the wrong approach to cybersecurity, said Martin Libicki, senior management scientist at the RAND Corp. It also would be a mistake for the U.S. government to assume that “cyber deterrence” can work to avert attacks, the scientist said March 31 at the Air Force Association’s CyberFutures symposium.

 

The United States already has a strong deterrent in the form of the world’s most powerful military, Libicki said. And while cyberwar contains elements of electronic warfare, special operations and terrorism, activities in cyberspace are unique and not related to other forms of warfare, Libicki said.

 

“Is this really a place dominated by warriors or engineers?” he said. “Is it a domain in which superiority makes sense? Is it a domain in which you can even talk about dominating because you have your cyberspace and they have their cyberspace? . . . You can’t talk about [cyberspace] as domain No. 5 and let it go at that.”

 

Political leaders do not grasp the concepts of cyberspace and cyberwar at a level to confidently write policies, he said. “Cyberwar is a lot of magic. Try talking to high-level folks and figuring out what they actually understand about it. The best of them don’t have a clue and the worst of them think of things that have no basis in reality. So when something happens, it’s always a head-scratching event.”

 

The Stuxnet virus infected Iran’s nuclear system, but “are they 100 percent certain that they have cleaned it out?” Libicki asked. “I’m not so sure they are.”

 

In cyberspace, “you don’t know that you haven’t been hit, and you don’t know that you aren’t infected.”

 

Libicki defined cyberwar as “the use of information to attack information using information systems.” However, these actions are carried out in a malleable environment by a variety of actors, many of whom authorities can never put a finger on. The sight of Army tanks rolling makes it clear it is warfare, Libicki said. That obviousness doesn’t exist in cyberspace. Generally, the first symptom of a cyber-attack appears when someone notices that his computer is acting funny.

 

While a certain amount of forensics may be able to trace an attack back to a specific machine, that in no way proves who carried out the action, Libicki said. Sophisticated hackers rarely launch attacks through hardware that can be linked to them. Often they find ways to send worms and viruses through the computers of unsuspecting users. There would be giant ramifications to the U.S. government retaliating against the wrong party or failing to make it known to an attacker that he has been countered, he said.

 

The laws of traditional warfare say that the best defense is a good offense. But in certain cases, it wouldn’t even make sense for the United States to counter a cyber-attack with similar offensive maneuvers, Libicki said. Those capabilities must be reserved for certain state-level threats, but it remains a tricky proposition even in those cases.

 

“If you are going to use offensive cyberwarfare, you are going to have to use it against a state that has something to lose. If al Qaida took down the [u.S.] electric infrastructure, it would be rather unsatisfactory to try and take down al Qaida’s electric infrastructure because they don’t happen to have one.”

 

Because of the complexities involved, it doesn’t make sense for the United States to adopt a cyberdeterrence policy that promises anything specific, Libicki said.

 

“We have a deterrence policy simply by virtue of being the world’s most powerful military and a country with a short temper. And that will persuade a lot of folks,” he said. “Beyond there, I use the carpenter’s rule — measure twice before you cut once.”

Share this post


Link to post
Share on other sites
Guest BlackSun

From my vantage it looks like some USA companies are helping China and other foreign countries to defeat us.

 

==================================================================================

 

http://the-diplomat.com/flashpoints-blog/2011/04/17/chinas-silent-cyber-takeover/

 

China and Russia are leveraging US multinational corporations’ economic requirements to accomplish strategic goals that could quite plausibly include covert technology transfer of intellectual property, access to source code for use in malware creation and backdoor access to critical infrastructure.

 

Huawei successfully formed a joint venture with Symantec in 2007 called Huawei Symantec Technologies Co. Ltd. (HS). Huawei is the majority partner with 51 percent ownership, with the entity being headquartered in Chengdu, China.

 

Symantec, a major US information security company, is ‘assisting’ China’s cyber security research in computer network attack and defense -- research that has high potential for abuse by state and non-state actors in China.

 

In the last few months, HS has formed two new joint ventures with US companies -- SYNNEX and Force10 Networks. Why? In the case of SYNNEX, the goal is apparently to ‘distribute Huawei Symantec’s storage and security products to its resellers throughout North America.’

 

Both SYNNEX and Force10 Networks currently sell to the US government.

Share this post


Link to post
Share on other sites

Looks like the Chinese want to spam more high profile businesses with their wares and services. Do you think our government will do anything about it? I don't!

 

Chinese hackers attacked the Pentagon, the Capitol, and now the US Chamber of Commerce.

 

God forbid they get the intelligence to take over our drones. Military computer weapons have no allegiance. If a military weapon system gets hacked like the one in Iran, it can be used against us.

 

========================================================

 

A group of hackers in China breached the computer defenses of America's top business-lobbying group and gained access to everything stored on its systems, including information about its three million members, according to several people familiar with the matter.

 

http://online.wsj.co...1568535300.html

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×