This is not ture. It was picked up and reported by several news websites in China. In contrast, Wen's family wealth piece was blocked in China.
Talking about the government is not the same as talking about the people themselves. Why you running around behind my posts looking like a fool so much - just let it go Swoly. Don't worry be happy. DD
http://online.wsj.com/article/SB100...6413319639782.html?mod=WSJ_hps_LEFTTopStories This is getting interesting.
It's obvious that this stuff is going on. As JV pointed out, I don't doubt that we're doing it ourselves. Who's better at it is another question entirely, and one I can't answer.
It's not that hard, and they use professionals to catch them. http://www.businessweek.com/articles/2013-02-14/a-chinese-hackers-identity-unmasked#r=rss
No, it's not that hard. I hope companies with uber-secret materials refrain from having these in digital format. It almost would seem like writing things on paper and storing them in a secure location would be the best way to protect your trade secrets.
I don't know anything about cyber attack or espionage. Some of the Chinese hacking/stealing stories just don't make sense to me. For you techies out there, please shed some light if you will. Question 1. If the Chinese hackers are savy enough to find their ways from China all the way to America, and pass through the security "walls" (which I assume exists in every decent company), why can't they wipe out their trails so that no one can track them back? Question 2. These hackers seem really dumb to me. The only thing they do is to get in systems and copy some files and leave trails every step of the way. Why not reformat the hard drive, wire the money and turn the whole dame computer system off? What's stopping them? Question 3. Apparently, we are smart enough to know we've been hacked, and we can track who/where the hackers are, but there is just NO WAY to put up a protection against these activities. How does that make sense? I mean, if they can get in any computer system, are our bank account safe? Can we protect ourselves??? Question 4. Hackers do their works on the Internet. Is there any reason that the Chinese government put all of them under one building? The commanders of the People’s Liberation Army (PLA’s) Unit 61398 who are in charge of this will be fired. I gurantee you that Last question: We did heck of a job finding that building in Shanghai, and figure out it who belongs to. It means we have at least equal capability. Why don't we returned favor (or maybe we already have )?
The mediant report was a result of extended period of mouse and cat games across many networks of US companies, according to the report itself. What's reported is plausible IMO. Many incidents of security breaches were monitored live by mediant as the hackers were messing around. There are triggers installed inside networks that can alert potential intrusions even under guide of legitimate access the ough someone's account that has been compromised. The hackers were probably very careful cleaning up their trails, but certain things are probably out of their control when more than one layers of security measures are registered at software and hardware level. Again, the report on that regard is plausible. The report alleges self replicated programs were used by sending seemingly legit email to executives of US companies. Lastly, I doubt the shanghai building functions like an office building where all hackers report for duty 9 -5. Likely, if true, the building is a hub where the servers come out of or where the routers are located. In any case, the report appears to provide a lot of circumstantial evidences but none is of smoking gun sort of speaking. Read the report if you are really curious.
Also the mediant report mentions that there are clear set of rules of engagement the hackers follow, like they don't wipe out data o cause havoc on the systems they broke into. This may suggest that the hackers are not ad hoc groups, but rather operate with strict and consistent disciplines.
personally think that both countries are hacking the **** out of each other. but, i think china is probably the bigger victim as far as overall hacking. i have seen how people use computers over there. most of them don't have a freaking clue how things work. i wouldn't be surprised that most of the computers in china are filled with virus and possibly controlled by others overseas. that said, every country hacks. there are really no official rules or anything like that. us is just trying cook this thing up to create more funding or whatever.
Evidence that the players recognize each others capabilities, but resist the urge to deploy them, like some kind of cyber-MAD clause. You wipe out data expect your data to be wiped or worse. Maybe expect the lights to go out and spark chaos.
But you gotta give it to the shame and blame game with such a detailed report. There are some damages already done to China.
Possible, but not more likely than that the there is an organized effort to diff through US trade secrets. Do you guys recall Japan was accused of doing the same in the 70s and 80s?
It will be news if the proposed trade sanction against China and the corporate cyber security act become reality. I think this is just prelude.
It may be about letting steam out of the China steam boat, and get some leverages on the US side in competing with China. The US is letting China know I am not the sucker. Again, recall Japan.