Technics: Stewart Baker: Major source on China's cyberespionage presents an important intro to his perspective
Hold on, the top foto is not porn! It's evidence of a cyber-espionage attack. That's what the author, Stewart Baker, has to tell us about the cyber war conducted by China against the USA. Mr. Baker is a former government official now practicing law. This blog-entry from his Skating on Stilts blog is the predecessor article to the "gottcha" piece already entered on refWrite page 4 today. Please read both of these very important articulations of what Baker sees as an imminent threat, not just to the USA's govt and business firms, but also to any of its institutions that, for any reason, become subject to China's apparent hack attacks. And, remember, what China is now largely aiming in the direction of the USA coud as easily be aimed at other countries, large and small, upon which it has designs. I'm thinking of Taiwan, the Philippines, Vietnam, Thailand and others. But also Russia, Germany, France. China has the advantage, indeed the hegemony, worldwide now in cyberespionage.
-- Technowlb, refWrite Backpage technics newspotter, analyst, and columnist
Skating on Stilts (Oct 07,2k12)
by Stewart Baker
Cybersecurity and Attribution --
Good News At Last?
military and aerospace companies as well as Tibetan activists. This
particular network campaign, dubbed “Luckycat” by researchers,
campaigns like this have been spotted in recent years, almost all of
around the world – it has been hard to follow them home.
overconfident. They leave bits of code behind on abandoned command-and-control computers. They reuse
Facebook had 750 million.)
notorious Chinese hacker forum and had “recruited others to join a research project on network attack and
“The owner of the alias, according to online records, is Gu Kaiyuan, a former graduate student at Sichuan University, in Chengdu, China, which receives government financing for its research in computer network defense.Mr. Gu is now apparently an employee at Tencent, China’s leading Internet portal company, also according to online records. According to the report, he may have recruited students to work on the university’s research involving computer attacks and defense.The researchers did not link the attacks directly to government-employed hackers. But security experts and other researchers say the techniques and the victims point to a state-sponsored campaign.”
domains, and command-and-control machines. Inevitably, some attackers will fail to observe perfect discipline.