im sure china has done all kinds of stuff, but israel is still the worst country when it comes to hacking into our government systems and stealing sensitive information.
us and israel are the best when it comes to this stuff. this is what my cousin does for a living. he likes his job!
just saying cant really point out one country when everyone else, including urself, but u would think the US would have better tech then china to prevent this stuff
Hacking is more preserverence then anything else. You put 1,000,000 hackers working every day to hack something, they will make some progress. And I think you can totally point out a country, especially when it gets caught red-handed (no pun intended). Just saying everyone does it doesn't make it ok. If you get caught for a speeding ticket - do you say everyone does it as a defense? Or if you hit someone, can't you say someone else has hit someone and gotten away it? No. China has done something very severe here, and there should be reprecussions.
Well, should be. Except for the fact that the United States probably IS doing the same thing and will act accordingly (i.e not at all). Yay politics! "France and Germany have imposed restrictions on senior officials using BlackBerries out of concerns that US intelligence agencies could intercept sensitive emails." Seriously, the only thing alarming about this is that US technology seems to have fallen behind the curb. I can understand the Japanese hacking American gouvernment offices...but the Chinese? Eh...eh.
Is this a way to get more defense budget? Oh, the Chinese upgraded their military to our levels in 70's or early 80's, we need some hundreds of billions of more dollars to protect our great way of life. I am just curious, how could they be sure it's PLA, not Chinese State Safty Office, not Chinese technology firms, or, simply some random Internet hackers, just like those Germans, Russians, Americans, and Indians, and Chinese, who represented the majority of the hacker world? I guess the hacker sent a message says "I am a Chinese military hacker, and I am hacking Pentagan's unclassified network, like janitor's blogs, under the direct order of President Hu." "Trojan Horse"? Gosh, those PLA hackers aren't very original, are they? Could it be some Pentagon guys are checking out porno sites at work and got infected? Or it's standard manoeuvre of brave American intelligence officers to fight the information war by leaving virus after they hack foreign countries? I know, when a German young man landed a small plane in Red Square, it was his own action, has nothing to do with his country. When several American soldiers raped students in Korea, those were rare crimes done by individuals, and it has nothing to do with that great nation. But when there is a hacker attacking Pentagon's unclassified network, whose IP is from China, it surely is a PLA official attempt to harm the great American way of life. I am eager to see when I catch cold next time, somehow got my co-workers sick, and I end up on top story - "Deep covered Chinese spy started biological warfare on American soil." Chinese learn their ways to read "news" after Culture Revolution. Americans have been getting lots of opportunities to exerice lately as well, especially during Bush's tenure.
That's pretty new to me. I didn't know that you are a hacker expert and made some breakthrough in that area. Are you saying that China and India will control the whole world, since they are having the most manpower in numbers? Of course, India will prevail on the end, due to its English language advantage and broader IT world? Sure, all outsourcing projects to China should be re-directed to India.
I don't think we're hacking into Chinese military instillations to steal Chinese technology. I'd bet a decent amount of money on that considering that Chinese military technology isn't considered more advanced, so your justification for this crime is illegitimate. Blackberries by the way are a Canadian technology, not American.
PRC is best at this based on everything I read specifically in terms of focused military directed hacking. More subtle things as you would see with the NSA and other general intelligence sources is probably different but they aren't really interested in discussing what they do. New Yorker actually is right about the value of persistance, despite what you may think of him. I actually do have some older professional interest in the subject. I am certanly not an expert, but I do know enough to say that he is correct. To me, ultimately, this is no different than flying spy planes just outside China's international borders. They shouldn't get upset at us if their communications leak into the public sphere, and we shouldn't get pissed if our network security isn't sufficent to prevent our data from spilling out into the public internet sphere. If you aren't able to protect your crap from spilling out, it isn't someone else's fault.
well at least they do in the open, unlike some countries who just stab you in the back once you share stuff.
Oh my god, the Pentagon networks get probed hund*reds of times a day?!!! That's like ... as many times as my linux box at uni gets probed everyday, and my linux box is still perfectly fine after being online for 5 years. You cannot seriously call these "probes" serious and dangerous hacking? Honestly, does anyone here actually have a clue on how hacking works? There are generally 3 ways someone can hack into your computer and take control of it: (1) Guess your username and password combo. (2) Exploiting an engineering flaw of your networking software (3) Tricking you into downloading a trojan horse software. Most OS have special fixed usernames such as "Administrator" on Windows and "root" on linux, and it's elementary safety procedure to disable remote logging-in using any of these usernames. So, as long as you do so and mandate 8-character or more passwords, there would be at least 94^8 possible passwords, and if you setup increasing delays after every single unsuccessful log-in attempt, it would be practically impossible for anyone to log into your computer system remotely. I doubt that the American government networks would be blameless if they had not even taken the most elementary safety precautions to guard their computer networks. To exploit engineering flaws of any software, the hacker needs to have the source code/assembly code of the software, otherwise he wouldn't even know where to begin other than the generic public interface ... but surely the American government wouldn't be so careless that they leave security holes in the public interfaces of their vital networks, would they? The Trojan horse attack works exactly like how its name suggests --- you have to download and run it on your computer in order for it to harm you. So, how exactly is the Chinese military making the US government employees download and run Chinese Trojan horse software? Seriously, the American government cannot be that stupid to not follow the basic network safety protocols and use badly designed networking software on their vital networks. You can get free linux distributions that by default prevent all of these elementary security risks, and the only source of attack would then be Trojan horses, and even Trojan horse software wouldn't be able to harm your entire system unless they are run by the administrator of the network under super user privileges. The record of a computer getting probed after the first time it got brought online is like 2 minutes. I doubt the American government computers would still be functional had elementary safety procedures not been followed, and if such procedures had been followed, that would leave only Trojan horse attacks, and the victims of Trojan horse attacks only have themselves to blame.
Actually there a 4 standard ways of doing it, 4th one being........ (4) Go to your nearest retail store, buy a $20 axe, find the physical location of the console, and start hacking away anyway.....I'm not surprise at all, since I recall china have like atleast 10K military hackers (Tho, I'm pretty sure its a hell lot more then that)
10k military hackers? Let's say you have 10 million hackers each on a separate IP trying to remotely log into a single computer protected by a 8-character password system, and suppose they can try a password every single second, it would take them more than 19 years to crack the password! Do you reckon this is likely?
I have a xp3000 cpu (its like 5-6 years old?), and it can brute force at 70 millions pass per seconds for a DES encyption, offline (Des only take 8 digit max). Imagine if you have a super computer that run a thousand time faster There are countless way to exploit stuff (as there is no such things as 100% perfect/secure), and its a 100x easier to break something then to create it.
Some of you guys really don't know much about this topic. Others know quite a bit. This isn't the movies. Most of the work done buy the hacker in this case is done by the computer itself. This ain't some 14 year old, future computer programmer, messing around. These are coordinated attacks that are planned out months in advance. It's really as simple as their supercomputer running a series of programs. Some of you guys need to add a few more zeros to your numbers. Your out dated. To the guy who thinks this is a conspiracy theory to get more money... Read and research. The attack they are talking about happened in early June. The Chinese hacked into the Pentagon's email system. It is an unclassified network. The only reason we found out about it is because they shut down the entire network when they discovered the intruder, which was automated. This probably all took place in fractions of a nanosecond. How do they know it was the PLA? LOL Remember this if nothing else. You can't hide the signal. It's like the movies. You don't have to keep the signal active to trace it to it's source. Once you made the connection, it can be traced back to it's source. It only takes time. You don't believe me... Go hack a bank from your home and then log off immediately. The FBI will find you. And the FBI has nothing on the NSA. To those who are taking this lightly... Oh boy... China has stolen quite a bit of classified information from the US via hacking. It's paid off quite well for them. I've read a couple of the stories and I'm sure there is plenty I didn't read. The ones I read had the Chinese stealing information important to the minaturization process involved in making nuclear weapons... well... smaller. They also stole plans on a torpedo that rides in a bubble of air to increase speed and decrease the noise it creates. This was reported years ago. I'm sure they have stolen more than that, reported on or not. If you still think light of this, think of it in dollar value. Those two things alone is 100's of millions maybe... Even if it's less it's not less than 10's of millions. Think of it that way. China stole 50 million from US military. It's not such a minor threat if you think of it that way. I would like to add this one last thing to "New Player". The Chinese and their hundreds of port scans a day. That's not an attack. That's just a scan. If the Chinese decided to attack your Linux box you would see your box slow to 1 calculation per minute.