Espionage involving China

delft

Brigadier
There's a reason Linux has been around for decades, but hasn't gone mainstream yet. Linux is designed for "geeks", not everyday users. It's unrealistic to just expect another OS to replace Windows, and the Chinese have not gone that route. They're probably still sticking with XP and Windows 7.
Windows XP isn't being maintained anymore and Windows 7 and Vista also have a limited lifespan. Microsoft programs are mostly closed source and so can be full of back doors. With the eventual loss of the Chinese market Microsoft has past the first half of its life span.
Linux was developed by geeks for geeks but that was long ago. In the mean time nearly all super computers and the Android devices use Linux. The German city Munich has upgraded from Microsoft to Linux and is saving million of Euros every year that way. All large web sites, Google, Facebook, etc., run on Linux.
Btw there are other open source operating systems among which FreeBSD ( which is also the basis of MacOS X ), NetBSD and OpenBSD are the largest. OpenBSD is developed to be the safest and I suppose the most geeky. By using a less known one you might avoid an attack against an operating system that is popular and therefore a lucrative target.
The application programs are available for the free operating systems. They can easy use programs developed for another systems. You just need the software companies to support the users of those programs and these companies are now growing.
 

TerraN_EmpirE

Tyrant King
And Retaining older Windows basis on a newer computer would make security a joke. They will try and move to there own OS on government Computer's. It's the most logical move it can be based on a Lunix or other Freeware customized to there wants.
There Hope would be that through this move they would make infiltration and work around to beyond the great firewall more difficult.
 

solarz

Brigadier
And Retaining older Windows basis on a newer computer would make security a joke. They will try and move to there own OS on government Computer's. It's the most logical move it can be based on a Lunix or other Freeware customized to there wants.
There Hope would be that through this move they would make infiltration and work around to beyond the great firewall more difficult.

You're thinking too much into this. 99.99% of government employees are civil servants who can barely find the start button.

Software is only a small part of cyber security. Far more important are good security practices, which those 99.99% are not even aware of, never mind practice.

I highly doubt this move was about security, I'm thinking it's more of a pressure tactic against Microsoft.
 

Quickie

Colonel
Looks like the hornet nests have been stirred. It seems to go further than just the OS. Now IT products and services are also targeted.

Please, Log in or Register to view URLs content!


China Focus: China to start security vetting IT products
English.news.cn 2014-05-22 14:50:20 More
BEIJING, May 22 (Xinhua) -- The Chinese government is to start cyber security vetting major IT products and services for use by national security and public interests, the State Internet Information Office announced on Thursday.

The vetting is aimed at preventing suppliers from taking advantage of their products to illegally control, disrupt or shut down their clients' systems, or to gather, store, process or use their clients' information, according to a statement from the office.

Companies that fail the vetting will be stopped from supplying products and services in China, the statement said.

Ensuring that IT technologies and cyberspace are "safe and under control" is vital to China's national security, economic and social development as well as people's legitimate rights and interests, said Jiang Jun, the office's spokesman.

"For a long time, governments and enterprises of a few countries have gathered sensitive information on a large scale, taking the advantage of their monopoly in the market and technological edge," he said. "They not only seriously undermine interests of their clients but also threaten cyber security of other countries."

China's government departments, public institutions, enterprises, universities and backbone networks of its telecom firms have suffered extensive invasion and wiretapping, according to Jiang.

Documents leaked by former Central Intelligence Agency contractor Edward Snowden last June rang alarm bells over the cyber security of many countries, the spokesman said, adding that the affair reminded people how crucial cyber security is to national security.

"It shows that without cyber security, there's no national security," he said.

Having the world's biggest number of Internet users, China is duty bound to tighten cyber security measures and make sure security vetting of major IT products is effective, Jiang said.

IT products and services from both domestic and foreign providers will be vetted, said Li Jingchun, chief engineer with National Research Center for Information Technology Security.

"The vetting will focus on IT products and services used in communications, finance, energy and other key industries that concern national security and public interests," Li said, adding that existing products will also be vetted.

A State Internet Information Office official who did not wish to be named said China has been considering this vetting system for years, in which third-party assessors will now be involved.

"Personnel are technologically prepared to carry out the vetting," Li said.

China is not the first country to adopt such security vetting. In 2012, the U.S. House Permanent Select Committee on Intelligence conducted security investigation on Chinese IT firms.

The U.S. administration also asks federal agencies to choose cloud computing services from service providers that have passed its security vetting.
 

TerraN_EmpirE

Tyrant King
"safe and under control" translation Aigo, Ainol, BBK Electronics BOE, BYD Electronic, Changhong, China Hualu group, Hacha, Haier, Hasee, Hisense. Hisense. Kelon. Huawei, JXD, Kejian, Konka Group, Lemote, Lenovo, Oppo Electronics, Panda Electronics. Perception Digital, Skyworth, SVA Group, TCL Corporation, TPV Technology, VTech, Wintek and of course ZTE.
 
A lot of people don't have faith in cloud computing services securing their personal information, it's just that it can no longer be avoided. It's no surprise any government worth it's salt will insist on using proprietary systems, or for cost reasons, vetted commercial ones.
 

TerraN_EmpirE

Tyrant King
Please, Log in or Register to view URLs content!

DoD Distances Itself From US Hacking Indictment of PLA Soldiers
May. 25, 2014 - 02:28PM | By MARCUS WEISGERBER | Comments

WASHINGTON — The Pentagon is distancing itself from the US Justice Department’s charging of five Chinese People’s Liberation Army (PLA) officers with 31 criminal counts of hacking and cyber espionage against six US companies.

The indictments, handed down May 19, come as the Defense Department has been working to increase its military-to-military interactions with the Chinese. Despite the charges levied by a grand jury in the Western District of Pennsylvania, senior Pentagon officials said high-level visits, military exchanges and participation in upcoming exercises will go on as planned.

“We still desire from a military perspective to further grow and develop the military-to-military relationship and to find ways to have a more productive conversation about these very tough issues — and cyber is one of them,” Pentagon Press Secretary John Kirby said on May 20.

Kirby and other military officials last week said the indictments were a judicial matter.

Gen. Fang Fenghui, PLA chief of the General Staff, visited the US this month. During a short May 15 press conference with US Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, the word cyber was not uttered.

How the indictments affect military-to-military relations is yet to be seen.

“The degree to which these indictments affect the relationship is really up to the Chinese,” Kirby said, adding that Defense Secretary Chuck Hagel has not spoken with his Chinese counterpart, Gen. Chang Wanquan, about the indictments.

Adm. Jon Greenert, chief of naval operations, said his planned five-day trip to China in July is still on track. He is scheduled to meet with Adm. Wu Shengli — the PLA Navy commander who visited the United States in September. Greenert’s wife, Darleen, is also expected to travel to China.

Military officials hope the indictments do not hurt progress that has been made in recent years. Greenert said he hopes “we can continue the momentum that we have with the PLA” Navy.

Despite the cyber indictments, China — for the first time — is still expected to send four ships to the US Navy’s Rim of the Pacific (RIMPAC) exercise in Hawaii this summer.

Greenert and Wu had a productive visit last September, agreeing to several initiatives, including exchanges at the academies and war colleges and for intermediate-level, senior-level and medical officers. They also agreed on humanitarian and hospital ship ex*changes, as well as RIMPAC participation.

“We’ve gone as complex and comprehensive with their attendance at RIMPAC as feasible and they’re pleased with that,” Greenert said.

The US has been working to improve communications between ships operating in the South and East China seas, where officials have sought to prevent miscalculation and misunderstanding.

Last month, a number of Pacific navies, including China and the US, signed the Code for Unplanned Encounters at Sea.

While DoD and the Chinese do not “see eye-to-eye on every aspect” it is “[a]ll the more reason to keep the military-to-military communications open and keep working at this,” Kirby said.

The Charges
The US indictment says five PLA officers with the infamous cyber Unit 61398 conspired to hack into private US companies’ networks to steal trade secrets and give unfair competitive advantage to Chinese state-owned companies.

“We certainly support and stand by the Justice Department indictments,” Kirby said. “It represents activity that has to stop; activity that we don’t condone nor do we conduct.”

Robert Anderson, FBI executive assistant director for criminal and cyber crimes, said on May 19 charges like these should be looked at as “the new normal, this is what you’re going to see on a regular basis” from the US government to protect the principle of open competition in the global economic landscape.

“This case should serve as a wake-up call as to the seriousness of the cyber threat,” added John Carlin, assistant attorney general for national security. “State actors engaged in cyber espionage for economic advantage are not immune from the law just because they hack under the shadow of their country’s flag.”

Soon after the indictments were announced, the state-run People’s Daily reported that China has suspended participation with DoD in the cyber Working Group. But other joint activities are proceeding on schedule.

“It’s a decision they made and that’s a regrettable decision,” Kirby said. “It wasn’t a decision they had to make, but this is a tough issue we don’t always agree on, but it’s one that we’ve got to keep the dialogue and the conversations open on.” ■

Paul McLeary contributed to this report.
 

delft

Brigadier
I just read on a Dutch website that the US want to exclude Chinese hackers from taking part in US hacker conferences.
 

Blackstone

Brigadier
I just read on a Dutch website that the US want to exclude Chinese hackers from taking part in US hacker conferences.

Inclusion and cooperation is the better way to solve a global problem, and excluding one of the biggest hacking nations, who is also one of the biggest victim of hacking, is a mistake.
 
Top