Results 1 to 9 of 9
  1. #1
    I am that guy RandomGuy's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Jun 2005
    Post Count
    50,672
    The myth of a monolithic Chinese cyberwar is starting to be dismantled. A look inside the teeming, chaotic world that exists instead -- and that may be far more dangerous.

    The autobiography of hacker SharpWinner opens on a bunch of young men in a high-rise apartment thick with cigarette smoke, in an unnamed city somewhere in China. Hacking is hard work, and this particular group, one of hundreds spread across the country, has been at it for hours. But the alpha male of the group, a "handsome and bright youth" -- throughout The Turbulent Times of the Red Hackers, SharpWinner refers to himself in the third person -- is unflappable. After he completes a backdoor intrusion into a Japanese website, he takes a break to field text messages from female admirers.

    It would be easy to dismiss SharpWinner, who has promoted his book on national television, claiming he has a movie deal in the works, as an attention-hungry stuntman. And in fact, the news that Google and dozens of other companies had been hit by a mammoth attack originating in China this past winter evoked the strong arm of the Chinese government -- not SharpWinner's amorphous world of hacker bandits. The Internet giant said the decision to go public with information on Operation Aurora, as the hack has been dubbed, "goes to the heart of a much bigger global debate about freedom of speech." The Chinese government's spying on the email accounts of human rights activists, Google intimated, was behind its threat to pull out of China. (It has yet to make good on that claim.)

    But a report released Tuesday by Atlanta security firm Damballa says the Aurora attack looks like work of amateurs working with unsophisticated tools. That revelation, along with a separate story in the Financial Times that a freelancer wrote the Aurora code, is focusing attention on China's loose web of cowboy hackers. And SharpWinner -- the leader of a coalition including anywhere from 50,000 to 100,000 civilian members and, before he disappeared from public view in 2007, a regular participant in international cyberconflicts, including the 2001 hacker war stretching from China to the White House -- is just the beginning.


    A Chinese Hacker's Manifesto
    How star codebreakers like SharpWinner, above, master their trade.

    The Aurora attacks represented an attempt by hackers apparently based in China to steal valuable information from leading U.S. companies. (So far the list of victims includes Adobe Systems and Dow Chemical, in addition to Google.* Over the weekend, a security researcher told Computerworld that Aurora might have penetrated more than 100 firms.) Investigators are still trying to understand where Aurora came from and what it means, but already some surprising clues have emerged. The Financial Times story followed on the heels of a New York Times story reporting that researchers have traced the attacks back to two Chinese universities, one of which has long been a training ground for freelance or "patriotic" hackers. Among the implications of these reports: The U.S. understanding of Chinese hacking is seriously out of date.

    Western media accounts typically overlook freelancers in favor of bluster about the Chinese government. Some pair breathy accounts of cyberwar with images dredged up from 1960s People's Liberation Army propaganda, as if to suggest China has some centrally administered cyberbureau housing an army of professional hackers. Others make improbable or unsubstantiated allegations. Two years ago, a National Journal cover story claimed Chinese hackers were responsible for the 2003 blackout that crippled much of the U.S. Northeast, an event repeated investigations have attributed to domestic negligence.

    http://www.foreignpolicy.com/article..._army?page=0,0

    Next page/chunk of article for those who are intrested:
    http://www.foreignpolicy.com/article..._army?page=0,1

    Third and final page:
    http://www.foreignpolicy.com/article..._army?page=0,2

  2. #2
    Veteran
    My Team
    San Antonio Spurs
    Join Date
    Mar 2009
    Post Count
    97,514
    http://www.zopag.com/news/china-has-...ato/15070.html

    http://www.huffingtonpost.com/jay-st...tml?view=print

    http://www.net-security.org/secworld.php?id=8911

    The US is a fat and lazy empire of dumbed down, obese, self-diseased consumers and corporate wage slaves, easy pickins for lean and hungry cyber warriors. This is one film where the "300" win.

  3. #3
    I am that guy RandomGuy's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Jun 2005
    Post Count
    50,672
    http://www.zopag.com/news/china-has-...ato/15070.html

    http://www.huffingtonpost.com/jay-st...tml?view=print

    http://www.net-security.org/secworld.php?id=8911

    The US is a fat and lazy empire of dumbed down, obese, self-diseased consumers and corporate wage slaves, easy pickins for lean and hungry cyber warriors. This is one film where the "300" win.
    Not quite the conclusion I would draw from the article.

    As it says, the reality of decentralized groups acting in a way that roughly mirrors the interest of the state is an alarming one.

    Could Operation Aurora have been written by a freelancer, picked up by a bureaucrat, and then reassigned to a freelancer with ties to Google? It is a possibility worth entertaining, at least. Some have argued that the Chinese government should have more effective means for securing intelligence than students and online misfits. But others say a decentralized approach suits Beijing just fine. "You can see the benefits of having a blurry line," says Lewis. "The Russians do it all the time with Estonia: 'Of course it wasn't us. Can you prove it was us?'"

    Ultimately, a loose connection between Beijing intelligence operatives and patriotic hackers is more troubling than a strong one. Governments operate under constraints. Gangs of young men -- as the United States has learned the hard way -- don't. "Certainly if it's government-sponsored cyberwarfare, I have someone I can deter," says Henderson. "If it's mutually assured online destruction -- OK, I can at least develop a theory on that. But with rogue Internet actors it's very difficult. They're potentially very dangerous."

  4. #4
    Veteran Wild Cobra's Avatar
    My Team
    Portland Trailblazers
    Join Date
    May 2007
    Post Count
    43,117
    The US is a fat and lazy empire of dumbed down, obese, self-diseased consumers and corporate wage slaves, easy pickins for lean and hungry cyber warriors. This is one film where the "300" win.
    Just because you are, doesn't make the rest of us that.

  5. #5
    Veteran
    My Team
    San Antonio Spurs
    Join Date
    Mar 2009
    Post Count
    97,514
    It doesn't matter whether the hackers are working for the Chinese state, or Russian or Sicilian or East Europan gangs, or working for legit corporations (industrial espionage, within a country's industries or between "allied" countries, has been huge for decades before Internet).

  6. #6
    Motivation for me... Stringer_Bell's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Apr 2009
    Post Count
    4,270
    I'd just like to know, can OUR hackers beat THEIR hackers?

  7. #7
    Double facepalm...
    My Team
    Detroit Pistons
    Join Date
    May 2006
    Post Count
    2,842
    I'd just like to know, can OUR hackers beat THEIR hackers?
    Does it matter if their hackers outnumber our hackers by 10-to-1?

  8. #8
    Cogito Ergo Sum LnGrrrR's Avatar
    My Team
    Boston Celtics
    Join Date
    Oct 2008
    Post Count
    22,399
    Thank you China.

    You will ensure that I have a job when I get out of the military.

  9. #9
    I am that guy RandomGuy's Avatar
    My Team
    San Antonio Spurs
    Join Date
    Jun 2005
    Post Count
    50,672
    I'd just like to know, can OUR hackers beat THEIR hackers?
    I would give a SLIGHT advantage to ours. We have been at it a bit longer.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •