Cyber Warfare II News, Pics, Views

SamuraiBlue

Captain
Didn't know which I should post this news whether it be here or in the "What the heck?" thread, in any case here it is.

The number of member of the so called "50 cent Army" is over 10 million

This is an article on the Chuo Nippo, a Korean newspaper's Japanese version and reports about the so called 50 cent Army(wǔmáo dǎng) which posts comments on various forums on the internet.
Article reports that the member are mostly part-timers who obtain 5 Mo or 0.5 yuan per post.
There are 10 million 520 thousand personnel posting which amounts to 1 in 64 people who are connected to the internet(based on 2014 survey) in mainland china are member of the this army.
The break down is 4 million are students and the most are from the Shandong providence amounting to 780 thousand followed by Sichuan providence with 680 thousand.
The army started in 2006 by the Anhui providence Propaganda department.
b8b82391.jpg

Please, Log in or Register to view URLs content!
 

AssassinsMace

Lieutenant General
I always get accused of being a soldier of the 50 cent army when I post comments out there and then I reply "if I just spanked you because you can only insult instead of making an argument, does it matter if I'm a part of the 50 cent army or not? It doesn't make you less wrong."
 

plawolf

Lieutenant General
The so called 50 cent army seems like another deliberate exaggeration or downright fabrication.

It always fills me with wry amusement how no one in the western media or establishment ever demands any sort of proof about negative stories about China.

On what basis does this 10m number comes from exactly? Never explained.

From a purely logistical standpoint, that seems plainly absurd. As not only do you need to pay all those people, you also need people checking their posts and approving payment.
 

Quickie

Colonel
This 50 cents army must be doing a pretty bad job, at least in the English language media. I've come across many negative comments about China, things Chinese in general every now and then, and most of the time the comments are left as it is without a trace of these so-called 50 cents army in sight.

IMO, the internet censorship itself in China has prevented the Chinese themselves from seeing these criticisms and robbed them the opportunity to defend themselves or to tell their side of their stories.
 

Equation

Lieutenant General
This 50 cents army must be doing a pretty bad job, at least in the English language media. I've come across many negative comments about China, things Chinese in general every now and then, and most of the time the comments are left as it is without a trace of these so-called 50 cents army in sight.

IMO, the internet censorship itself in China has prevented the Chinese themselves from seeing these criticisms and robbed them the opportunity to defend themselves or to tell their side of their stories.

They could get that from their relatives and friends living outside of China. Plus many more students returning to China has already discussed about it.
 

AssassinsMace

Lieutenant General
Anybody read about the Great Internet Cannon of China lately? China is being vilified for possessing this internet attack weapon. But now after being vilified for devising such a weapon, the Wall Street Journal is claiming it was stolen from the US via Edward Snowden. Yeah China could not come up with such a weapon on its own.

Please, Log in or Register to view URLs content!


Here's the article. I first read about it on another site but for some reason I cannot access it. Maybe someone else can but then maybe this weapon is being used right now.
 

SamuraiBlue

Captain
Anybody read about the Great Internet Cannon of China lately? China is being vilified for possessing this internet attack weapon. But now after being vilified for devising such a weapon, the Wall Street Journal is claiming it was stolen from the US via Edward Snowden. Yeah China could not come up with such a weapon on its own.
Fairly unlikely that Snowden had any involvement since he was an analysis not a programer. That is the reason why he had so many communication documents.
Programing and analyzing are two complete different set of skills.
 

Equation

Lieutenant General
CIA and the MSS working together at one time.

Please, Log in or Register to view URLs content!

On Thursday, the U.S. Defense Secretary Ashton Carter
Please, Log in or Register to view URLs content!
that Russian hackers had infiltrated into Pentagon’s computer network earlier this year. It was the latest high-profile hack of the U.S. government networks by
Please, Log in or Register to view URLs content!
. Over the past few months, Washington has also
Please, Log in or Register to view URLs content!
of hacking the U.S. satellite network, weather systems, and the U.S. Postal Service network.

Please, Log in or Register to view URLs content!


The book sheds light on some of the CIA’s darkest secrets
But, not too long ago, the CIA was actively working with Chinese intelligence agencies to target Russia. According to a recently published book
Please, Log in or Register to view URLs content!
by former Pentagon official Michael Pillsbury, the covert CIA-China cooperation was part of Washington’s program to destroy the Soviet Union and then Russia.


The book was published after being cleared by the CIA, FBI and Pentagon, reports Bill Gertz of
Please, Log in or Register to view URLs content!
. The clandestine cooperation started in 1970s when China realized that the Soviet Union’s Marxist-Leninist economic model was doomed. Beijing started moving closer to the U.S. for economic benefits as it continued to create an overhauled communist economic system with Chinese characteristics.

Michael Pillsbury was the in-charge of covert operations. The CIA and Chinese agencies worked together on an electronic spying program code-named Chestnut that targeted the Soviet Union and then Russia. The U.S. intelligence agency also conducted covert operations to ship Chinese arms to Afghan rebels battling Soviet forces.

China sold weapons to CIA to give them to rebels
In a revelation that could embarrass China, the book mentions that the U.S. and Chinese agencies carried out an operation to arm 50,000 anti-Vietnam rebels in Cambodia starting 1982. The initial budget for this operation was $2 million a year, which was later increased to $12 million per year. “The Chinese not only sold the weapons to us to give to the rebels, but also advised us on how to conduct these covert operations,” Pillsbury said.

Pillsbury told Inside the Ring that he was “delighted” that many of the things that would have been considered classified a few years ago were approved for publishing. Ronald Reagan also provided China advanced technology under a secret directive to strengthen China. The U.S. discontinued military assistance after the 1989 Tiananmen Square massacre, but continued to provide other assistance.
 

Ultra

Junior Member
Study: China cybercensors attack outside its borders with 'Great Cannon'
By
Please, Log in or Register to view URLs content!
, CNN
Updated 0313 GMT (1013 HKT) April 13, 2015

(CNN)China's cybercensors have long used a "Great Firewall" to block its citizens from reading critical articles from Western news websites or consuming other content it disapproves of.

But it's no longer enough for them,
Please, Log in or Register to view URLs content!
. They've developed a new IT weapon and have attacked servers outside their borders, including in the United States.

The study's authors have named it the "Great Cannon," and it operates in plain sight.

Going on the attack so visibly and handily within another country's borders will probably draw international ire, the study's authors say, and Beijing may have counted on that.

"This is a powerful attack capability, and we are curious about the risk and benefit analysis that led the Chinese government to reveal it with this highly visible denial of service attack," said researcher John Scott-Railton.

Enter the Cannon
The reason Chinese censors are taking that risk: Free-speech cyberactivists have found ways to get around the Great Firewall and give Chinese readers greater access to the West's free press.

150130160746-china-internet-great-firewall-story-body.jpg


It blasts targeted Web servers with massive distributed denial of service attacks, and it uses the Web browsers of unsuspecting Web surfers to do it.

The Cannon wrecked two online services with DDoS attacks in March, say the researchers from the University of Toronto's
Please, Log in or Register to view URLs content!
, the
Please, Log in or Register to view URLs content!
, the University of California-Berkeley and Princeton University.

Many of the researchers focus on the abuse of information technology to undermine civil liberties and human rights. And they are afraid this new cyberweapon could easily be used for an array of powerful attacks beyond what they've already observed.

"A modest technical change could turn the Great Cannon into a malware delivery device for infecting the computer of a target individual anywhere in the world who visits a Chinese server," Scott-Railton said.

This might include all emails headed in and out of China, he said. "The device could replace genuine attachments with malicious files, for example."

Surprising target
One of the Great Cannon's targets that the researchers studied was an obvious one -- Greatfire.org, run by Chinese expats bent on fighting Beijing's censorship. They monitor Chinese citizens' access to international news sites such as
Please, Log in or Register to view URLs content!
or
Please, Log in or Register to view URLs content!
.

But the other target may seem odd at first glance.
Please, Log in or Register to view URLs content!
is a popular Silicon Valley hosting service used by programmers who want to share code with each other.

150324142421-on-china-facebook-00013129-medium-plus-169.jpg


The two attacks were connected, however, the study says. GreatFire.org hosted two GitHub repositories that contained computer code allowing Chinese readers to get around the Great Firewall and read
Please, Log in or Register to view URLs content!
.

Critical articles from the Times are a particular fly in the ointment for Beijing, and China has turned away at least three of the paper's reporters in short succession,
Please, Log in or Register to view URLs content!
.

GitHub said it thought the attackers were trying to coerce it into taking content offline. GreatFire.org says it suspects the attack may have been in response to
Please, Log in or Register to view URLs content!
to circumvent Chinese censors.

Both services suspected China was behind their attacks and used the Great Firewall to carry it out, according to
Please, Log in or Register to view URLs content!
Please, Log in or Register to view URLs content!
.

The Great Firewall
By triggering attacks and analyzing them, the researchers concluded that Beijing has developed a tool distinctly different from the Great Firewall. They are confident it is also in China and say it is technically similar to the Great Firewall.

The firewall, in a manner of speaking, stands aside and watches all digital traffic going in and out of China, the researchers say.

150324142119-on-china-satire-cartoonist-00003701-medium-plus-169.jpg



If it sees requests going out into the world for content it doesn't want citizens to see, the researchers say, it discreetly injects forged messages to the foreign server and the Chinese user's computer to make them stop communicating.

The user might see an HTTP 403 reply -- "Sorry, you're not authorized to see this page."

Not only does the Great Firewall monitor tons of traffic, but its systems have to do a lot of processing to discern what to block and what not, so it's work-intensive.

Great Cannon pinpoints targets
The Great Cannon takes on a much lighter load, because it doesn't care about all that traffic. Instead, it targets traffic between a handful of Web addresses. But it uses Web traffic unrelated to its targets to build its attack against them.

Users going to Baidu, one of China's most prolific Web services and most successful Internet companies, can become unknowing proxy warriors against the Great Cannon's targets, the study says.

In the overwhelming number of cases, when traffic came into China from the outside world, the Great Cannon let it through to Baidu's advertising servers.

But in a tiny fraction of the cases the researchers observed, it picked out computers it wanted to use in the attack, and sent bad code back to the user's browser. "The malicious script enlisted the requesting user as an unwitting participant in the DDoS attack against GreatFire.org and Github," the authors wrote.


Their browsers mercilessly fired requests at both sites and paralyzed them.


CCOltkDUEAAtcvf.png



"At the time of writing they number 2.6 billion requests per hour,"
Please, Log in or Register to view URLs content!
. "Websites are not equipped to handle that kind of volume so they usually 'break' and go offline."

GitHub said the March incident was the biggest DDoS attack in its history. Back then, the programmers noticed that there were
Please, Log in or Register to view URLs content!


"These include every vector we've seen in previous attacks as well as some sophisticated new techniques that use the web browsers of unsuspecting, uninvolved people to flood github.com with high levels of traffic," they wrote.

Baidu denies any involvement in the attacks and says its internal security has remained intact, the researchers said. But government cybercensors' monitoring of traffic to and from Baidu's servers could hurt its reputation as a major player in international commerce.

Fully encrypting Web traffic should help to defend against the Great Cannon, Scott-Railton said.

Xi Jinping's tightening grip
Chinese President
Please, Log in or Register to view URLs content!
is a Communist Party hardliner, and since he took office in November 2012, Chinese citizens have felt the grip tightening again on freedoms they thought they had gained,
Please, Log in or Register to view URLs content!


Xi and the Politburo "are responding to new threats by falling back on repressive tactics" rather than "experimenting with more liberal policies,"
Please, Log in or Register to view URLs content!
And repression has particularly targeted grass-roots activists, online opinion leaders and ordinary citizens on the Internet.

Xi also has a reputation for eyeing Western values with suspicion and considering American IT companies, such as Intel and Google, partners of the U.S. government.

"Deployment of the GC (Great Cannon) may also reflect a desire to counter what the Chinese government perceives as U.S. hegemony in cyberspace," the researchers write.

The authors say the United States and Great Britain already have methods for intercepting unencrypted traffic and launching attacks.


Please, Log in or Register to view URLs content!







What this means is that any time we visit a Chinese site, or someone attach a picture or photo from Chinese site, the "Great Firewall" probabloy note down the IP address of people who were reading the thread with attached photos from China (send request), and potentially, they could target these people, which means us by sending back specially crafted files that are malicious in nature to infect us.
 
Last edited by a moderator:

Jeff Head

General
Registered Member
This is a PRC Cyber Warfare Thread.

It is not a cyber warfare thread about other countries. It is not a vilify the US Thread over racial issues. It is not a general catch all for that type of thing.

Off Topic, vilification posts removed.

Stay on Topic.

This thread has had a tendency to roam like this...if it continues it will be closed.

DO NOT RESPPND TO THIOS MODERATION.
 
Top