Google Confronts China’s “Three Warfares”

作者: Timothy L. Thomas

DOI:

关键词:

摘要: In early January 2010, Google announced that a computer attack originating from China had penetrated its corporate infrastructure (in mid-December) and stolen information computers, most likely source code. The hackers also accessed the Gmail accounts of some human-rights activists infiltrated networks 33 companies. April journalist John Markoff wrote: A person with direct knowledge investigation now says losses included one Google's crown jewels, password system controls access by millions users worldwide to almost all company's Web services, including e-mail business applications. program, code named Gala for Greek goddess earth, was attacked in lightning raid taking less than two days last December, said. (1) China's recent incursions into US military cyber systems are concern when viewed isolation. They reflect more serious problem as part short-term goal conducting "preemptive reconnaissance" accommodates longer-term affecting planning or economy. Many factors indicate this may be goal. Initially, article examines context within which attacks occurred how response--abandoning censorship China--was used Chinese distract attention their planned aggression. It then analyzes 2003 regulation assisted response accusations. short, these procedures being too often causing authorities intolerant behavior. Why America Has Had Enough Journalist Josh Rogin recently listed ten incidents commonly known United States through press releases government agency briefings. All parties damaged suspect behind incursions. events are: * 2004: Titan Rain, Federal Bureau Investigation name group Guangdong province who stole labs, National Aeronautics Space Administration, World Bank, others. 2006: State Department official East Asia opens an email allows break computers at embassies over region. Representative Frank Wolf's office is attacked. He outspoken lawmaker on issues suspects attack. Commerce discard due targeted China. Naval War College took offline after major emerged main culprit. 2007: Secretary Carlos Gutierrez finds spy software his following trade mission trip 2008: presidential campaigns both President-elect Barack Obama Senator McCain spies. 2009: Bill Nelson revealed against been traced Toronto researchers find massive espionage ring using malware they call Ghostnet. 103 countries, origin Lockheed Martin's F-35 program hacked emerges suspect. (2) This list obviously does not include hundreds thousands "pings" (purpose unknown) sites have received years, nor it mention other specific incidents. And along comes Google. How Serious Attack? December 2009. Some sources state many companies were victims hack (3) Alan Paller, director well-known security training firm SANS Institute Bethesda, Maryland, indicated just invasive were, noting "the odds 25 biggest California fully compromised near zero. …