[The Black Hat Embedded Security Summit returns on April 23 - 24 to DESIGN West 2013. The Summit will provide essential information and tools, as well as a forum for the latest solutions for securing embedded systems from threats in today's global environment. Learn more here].
Last week, China fired a verbal salvo back at the U.S., accusing it of orchestrating relentless attacks on its secure military computers, including the Chinese Defense Ministry. China was responding to the recent report by security firm, Mandiant Corp. (Alexandria, Va.), which documented how it tracked down China's advanced persistent threats, including thousands of individual cyber attacks by its 2nd Bureau of the People's Liberation Army General Staff Department's 3rd Department (Military Unit Cover Designator 61398) in Shanghai.
China, however, stopped short of accusing the U.S. of attacking civilian computers.
In traditional warfare, the U.S. has often found its military prowess being slighted for its civilian casualties—called "collateral damage" in mil-speak—that give asymmetrical-war makers like terrorists fodder for a "moral equivalency" argument. Regardless of your politics on collateral damage in traditional warfare compared to deliberate attacks on civilians by terrorists, in cyberspace the U.S. so far has escaped such criticism.
China, on the other hand, is accused of orchestrating routine attacks not just on military computers, but on civilian computers in every developed nation of the world. In fact, military and defense contractor computers are in the minority, according to Mandiant's report on China's government sponsored "economic espionage," which claims to have evidence for attacks in 20 different non-defense related industries located in every developed nation in the world. Recently, the U.S. was charged with orchestrating attacks on Iran's nuclear centrifuges with its Stuxnet virus in a book by David Sanger entitled Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power.
At DESIGN West last year, Joe Loomis, a senior research engineer at Southwest Research Institute (San Antonio, Texas) lamented the possibility of collateral infections from Stuxnet affecting civilian power grids. Despite the bare possibility exposed by Loomis, no serious collateral damage charges have yet been filed against the U.S. However, Iran has been accused of retaliating on U.S. civilians including Bank of America, J.P. Morgan Chase & Co and Citigroup Inc.
Thus the stage is set for the governments of every developed nation in the world to confront-and-conceal their covert operations in cyberspace, with the U.S., as usual, conducting military-style attacks and its adversaries responding by attacking civilians.
At the recent RSA Conference 2013 security performance management company nCircle Inc. (San Francisco) took a survey of 205 security professionals there, with 50 percent responding that they considered their company a target for state-sponsored economic espionage. The same respondents also said that China has the most advanced cyber-attack capabilities (with the U.S. coming in second). Related stories:
I have a better theory for this.
NYT was banned last year due to it's chinese leader gossip column,
it 's losing ad from it and pissed off.
this string of news 1st appeared in NYT.
NYT 's retaliation...
What was happening when this CyberSpy news came out? Answer is: Budget Cut.
That explained why the news was there -- To get and keep some budget for ***. A kind of Media Engineering, an engineering way to brainwash in the demo society.
David - That's one of my favorite Monty Python skits.
My understanding is that the name "Python" was inspired by Monty Python. Maybe the author spent too many sessions feeling like he was in a software argument clinic with the languages of the day.
I think your problem is you never lived/visited china and all your view come from sth maybe 20-50 years old.
1. chinese ppl can criticize gvt. that's how china maintain a 8% growth rate for 20 years. ppl complain about corruption, air, CPI etc and gvt will take action. many chinese policy change comes from ppl's criticism (real estate tax etc.)
2. you can't allow all information to free flow in a society. only americans are stupid enough to believe freedom will bring em all good.
we agree with american christians that one need to keep away from certain evil/unhealthy propagandas.
3. you must be a atheist to be so naive.
David Patterson, known for his pioneering research that led to RAID, clusters and more, is part of a team at UC Berkeley that recently made its RISC-V processor architecture an open source hardware offering. We talk with Patterson and one of his colleagues behind the effort about the opportunities they see, what new kinds of designs they hope to enable and what it means for today’s commercial processor giants such as Intel, ARM and Imagination Technologies.