China & Global Cyber SA for 16AUG2013

Good Friday Everyone!

What sort of cyber situation awareness do we have today? Much news about the People’s Republic of China – it is relentless…we now have Frutas and news of other exploits taking advantage of poorly secured systems and infrastructure…

Enjoy!

China China China hack hack hack redux | Beyond The Beyond | Wired.com
http://www.wired.com/beyond_the_beyond/2013/08/china-china-china-hack-hack-hack-redux-2/
NY Times website down for HOURS. Hacked by People’s Republic of Hacking…err…China again?
http://blogs.computerworld.com/ny-times-website-down-hacked-china-22652-itbwcw
They’re ba-ack: Hacker gang that infiltrated NYT for months returns
http://arstechnica.com/security/2013/08/theyre-ba-ack-hacker-gang-that-infiltrated-nyt-for-months-returns/
The Chinese hacker group that hit the N.Y. Times is back with updated tools
The APT 12 hacker group has updated its malware programs to evade network-level detection

http://www.computerworld.com/s/article/9241577/The_Chinese_hacker_group_that_hit_the_N.Y._Times_is_back_with_updated_tools?taxonomyId=17

Frutas RAT…Targeted Attacks Delivering Fruit |
http://www.symantec.com/connect/blogs/targeted-attacks-delivering-fruit
8,700 Chinese detained for online crime–China Economic Net
http://en.ce.cn/National/Politics/201308/14/t20130814_1186553.shtml
Information consumption to fuel People’s Republic of China’s economic growth – Xinhua | English.news.cn
http://news.xinhuanet.com/english/china/2013-08/15/c_132633835.htm
All the facts and stats on the People’s Republic of China’s 591 million web users (INFOGRAPHIC)
http://www.techinasia.com/china-591-million-web-users-infographic-2013/?
Merger spree hits People’s Republic of China’s Internet giants–China Economic Net
http://en.ce.cn/Insight/201308/15/t20130815_1221087.shtml
People’s Republic of China: Language and Censorship in State Media – China Digital Times (CDT)
http://chinadigitaltimes.net/2013/08/social-media-language-and-censorship-in-state-run-media/?
The new president’s “rule of law” campaign apparently doesn’t apply to the Communist Party.
http://www.globalpost.com/dispatch/news/regions/asia-pacific/china/130813/no-james-madisons-here-china-arrests-dozens-citizens

People’s Republic of China could target oil firms, telecoms, banks in price probes: report
http://www.reuters.com/article/2013/08/15/us-china-antitrust-ndrc-idUSBRE97E04U20130815
People’s Republic of China’s Lenovo Sells More Mobiles Than PCs Now As It Rides High On Chinese Demand | TechCrunch
http://techcrunch.com/2013/08/15/lenovo-sells-more-mobiles-than-pcs-now-as-it-rides-high-on-chinese-demand/
New iPhone, 4G technology may mean Apple, China Mobile tie-up closer
http://www.reuters.com/article/2013/08/14/us-chinamobile-apple-idUSBRE97D18Y20130814
WeChat passes 100 million users outside the People’s Republic of China =Hacker Force Multiplier…
http://www.telegraph.co.uk/technology/10244264/WeChat-passes-100-million-users-outside-China.html
HTC Changes China Chief
http://blogs.wsj.com/digits/2013/08/15/htc-changes-china-chief/?

Guam to host security conference: National experts and intelligence analysts to discuss US, Asia strategies
http://www.guampdn.com/article/20130815/NEWS01/308150006/1002/NEWS01

Western defense firms refuse Chinese buyers to deter copycats|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130815000117&cid=1101

People’s Republic of Chain’s PetroChina poised to dominate Iraqi oil–China Economic Net
OIL = Operation Iraqi Liberation

http://en.ce.cn/Business/Enterprise/201308/14/t20130814_1186662.shtml

People’s Republic of China’s banking assets top 23 trln USD by June 2014 –China Economic Net
http://en.ce.cn/Industries/Financial-services/201308/14/t20130814_1187002.shtml
People’s Republic of china’s Zhongguancun may host private bank–China Economic Net
http://en.ce.cn/Industries/Financial-services/201308/14/t20130814_1187005.shtml

The Trauma of Colonialism…People’s Republic of China says”Now it is China’s prerogative”
Operation Middle Kingdom = People’s Republic of China’s colonization of the West…

http://www.nytimes.com/2013/08/15/opinion/global/the-trauma-of-colonialism.html?

People’s Republic of China probe into optical fibers from India–China Economic Net
http://en.ce.cn/Business/ti/201308/15/t20130815_1224772.shtml

Taiwanese firm faces patent infringement probe in US|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1204&MainCatID=12&id=20130623000023

People’s Republic of China strongly condemns Japan over shrine visit – Xinhua |
http://news.xinhuanet.com/english/china/2013-08/15/c_132633571.htm
People’s Republic of China urges Japan to respect victims of wartime ‘aggression’ –
http://english.sina.com/china/2012/0815/496714.html
Beijing urges Japan to reflect on wartime aggression|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1101&MainCatID=11&id=20130815000153
Taiwan urges Japan not to hurt feelings of its neighbors|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1101&MainCatID=11&id=20130815000144
Right-wing Japan challenging postwar order, experts warn|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1101&MainCatID=11&id=20130815000141

Iranian Internet Infrastructure and Policy Report
http://smallmedia.org.uk/IIIPJune.pdf
Syrian Electronic Army Hacks Washington Post
http://www.security-vision.co.uk/?p=3456&doing_wp_cron=1376589588.6183819770812988281250

IT Security Industry To Expand Tenfold
http://www.forbes.com/sites/richardstiennon/2013/08/14/it-security-industry-to-expand-tenfold/
Aggressive defence needed against cyber threats…from Canada no less…
http://www.ottawacitizen.com/news/Aggressive+defence+needed+against+cyber+threats+expert+says/8789398/story.html

Browlock Ransomware Targets New Countries –
http://www.f-secure.com/weblog/archives/00002590.html
Researchers figure out how to hack tens of thousands of servers
http://www.washingtonpost.com/blogs/the-switch/wp/2013/08/14/researchers-figure-out-how-to-hack-tens-of-thousands-of-servers/

How A ‘Deviant’ Philosopher Built Palantir, A CIA-Funded Data-Mining Juggernaut
http://www.forbes.com/sites/andygreenberg/2013/08/14/agent-of-intelligence-how-a-deviant-philosopher-built-palantir-a-cia-funded-data-mining-juggernaut/

Latest NSA Archive Release…The Secret History of the U-2 & other treats…
1) US Spy Planes Targeted China to Help India; Used British Crews to “Confuse the Soviets” and Overflew French Nuclear Sites
2) Groom Lake/Area 51 Finally Declassified
Less Redacted CIA History Released Under FOIA
3) National Security Archive Electronic Briefing Book No. 434

http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB434/

Enjoy my curious friends!!!

Semper Fi,

謝謝
紅龍

15AUG…Tomorrow’s Cyber SA Today…People’s Republic of Hacking…

Good morning Folks –

It’s Mid-August 2013 and the our news from cyber-land today the 15th of AUG 2013 is relentless – pay particular attention to the blossoming new of the People’s Republic of China’s Operation Middle Kingdom…

Look also for the Firewalls and Firefight article below – great stuff!

Of mot curious news is the firm Booz Allen Hamilton, who gave us the United States, our latest traitor, was awarded $6 B-EEE-LLION USD for a contract to secure our country – does anyone else think that is simply ridiculous….?

Enoy!

People’s Republic of China ~ 中華人民共和國

People’s Republic of China Asks: Who gave America the right to launch network assaults? – People’s Daily Online
http://english.peopledaily.com.cn/90777/8363341.html
谁给了美国网络攻击权?(望海楼)…Who gave the United States the right to cyber attacks?
http://paper.people.com.cn/rmrbhwb/html/2013-08/12/content_1281844.htm
Chinese Underground Creates Tool Exploiting Apache Struts Vulnerability | Security Intelligence Blog | Trend Micro
http://blog.trendmicro.com/trendlabs-security-intelligence/chinese-underground-creates-tool-exploiting-apache-struts-vulnerability/?
People’s Republic of China Opposes Cyber Attacks
http://www.news.cn/english/special/wlaq/

USAF’s New Idea for Spying on People’s Republic of China: Swarms of Tiny Bug Drones
Prediction: AB Kadena experiences Massive DDos in next 30 days…

http://killerapps.foreignpolicy.com/posts/2013/08/13/the_air_forces_new_idea_to_spy_on_countries_like_china_swarms_of_tiny_bug_drones

Operation Middle Kingdom is alive and motivated…Ignore the doomsayers: Beijing is playing the long game to win | Bangkok Post: business
http://www.bangkokpost.com/business/news/364563/ignore-the-doomsayers-beijing-is-playing-the-long-game-to-win
Australia-China scientific collaboration benefits each other: chief scientist – Xinhua |
People’s Republic of China succeeds in Phase V Operation Middle Kingdom ~ colonizing Australia…

http://news.xinhuanet.com/english/china/2013-08/14/c_132631141.htm
Chinese Dream – Special Report – English.news.cn
http://www.xinhuanet.com/english/special/chinesedream/

Electromagnetic catapult touted for People’s Republic of China’s next aircraft carrier|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130814000008&cid=1101
Chinese national appointed UN assistant secretary-general|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1101&MainCatID=11&id=20130814000128

People’s Republic of China ‘hacking websites in hunt for Tibetan dissidents’ – Telegraph
http://www.telegraph.co.uk/news/worldnews/asia/china/10240404/China-hacking-websites-in-hunt-for-Tibetan-dissidents.html
India: Hackers Attack Web Site of Tibetan Government in Exile
http://www.nytimes.com/2013/08/14/world/asia/india-hackers-attack-web-site-of-tibetan-government-in-exile.html?
Chinese Internet Celebrities Agree to Self-Censor
http://www.techinasia.com/chinese-internet-celebrities-agree-selfcensor/?
People’s Republic of China’s Huawei begins colonization of Myanmar…
Myanmar Telecom War: Huawei Main Supplier For Telenor And Other Myanmar Telecom Operators

Norway’s Telenor also doormat for China as Huawei helps colonize Norwegina market for the homeland…
http://www.ibtimes.com/myanmar-telecom-war-huawei-main-supplier-telenor-other-myanmar-telecom-operators-1383503?ft=a73y7

People’s Republic of China to launch fresh pharmaceutical bribery probe: Xinhua
http://www.reuters.com/article/2013/08/14/us-china-bribery-probe-idUSBRE97D0BW20130814
What does the ‘world’s best China strategist’ say about the place now?
http://www.globalpost.com/dispatch/news/regions/asia-pacific/china/130812/jing-ulrich-jp-morgan-china-investment-opportunities
Carmakers Get A Taste Of China’s Changing Business Climate
http://chinabystander.wordpress.com/2013/08/13/carmakers-get-a-taste-of-chinas-changing-business-climate/
Does China’s crackdown on corporate wrongdoing mark the arrival of CSR?
Following a series of accusations against global companies such as Apple and BMW, Simon Zadek argues China’s CSR moment is here

http://www.theguardian.com/sustainable-business/china-corporate-social-responsibility

China’s Review of Multinational Pharma Companies 跨国药企游说政府能力强大:高薪吸高干子弟Powerful multinational pharmaceutical companies in the People’s Republic of China
http://finance.sina.com.cn/chanjing/cyxw/20130812/142616419768.shtml

Islamic Republic of Iran

The cyber capabilities of Iran can hit US
http://securityaffairs.co/wordpress/17064/cyber-warfare-2/the-cyber-capabilities-of-iran-can-hit-us.html?

Global Cyber Activity…yes other countries have cyber capabilities….

August 2013 global threats
http://www.scmagazine.com/august-2013-global-threats/slideshow/1502/#0
Friend or Foe? When IoT Helps You Get Hacked by Your Security
http://blogs.cisco.com/ioe/friend-or-foe-when-iot-helps-you-get-hacked-by-your-security

From Vietnam with tens of millions of harvested emails, spam-ready SMTP servers and DIY spamming tools
http://blog.webroot.com/2013/08/14/from-vietnam-with-tens-of-millions-of-harvested-emails-spam-ready-smtp-servers-and-diy-spamming-tools/

JAPAN: “LNK” Attacks are Back Again | Symantec Connect Community
http://www.symantec.com/connect/blogs/lnk-attacks-are-back-again

Codefellas: North Korea Targets Dubstep With Nasty Computer Virus | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/08/codefellas-north-koreas-computer-virus/
North Korea ‘behind hacking attack’
http://www.bbc.co.uk/news/world-asia-23324172
South Korea blames North for cyber attack
http://www.presstv.com/detail/2013/07/16/314049/s-korea-blames-north-for-cyber-attack/

The Snowden Revelations and Cybersecurity
http://www.lawfareblog.com/2013/08/the-snowden-revelations-and-cybersecurity/
N.S.A. Leaks Make Plan for Cyberdefense Unlikely
http://www.nytimes.com/2013/08/13/us/nsa-leaks-make-plan-for-cyberdefense-unlikely.html?&pagewanted=all
Don’t Get Hacked — Tools to Fight Cyber Attacks
http://www.entrepreneur.com/article/227815
Firewalls & Firefights….
http://www.economist.com/news/business/21583251-new-breed-internet-security-firms-are-encouraging-companies-fight-back-against-computer
Stop Thinking That Tech Hacks Will Fix Our Surveillance Problems |
http://www.wired.com/opinion/2013/08/yah-surveillance-sucks-but-technology-isnt-the-only-solution/

Booz Allen to Lockheed Win Part of $6 Billion Cyber Award
Yeah – this makes sense … NOT.
http://www.bloomberg.com/news/2013-08-13/booz-allen-to-lockheed-win-part-of-6-billion-cyber-award.html

GCHQ Launches Twin-Track Approach to Cyber Incident Response Scheme
http://www.infosecurity-us.com/view/33979/gchq-launches-twintrack-approach-to-cyber-incident-response-scheme/?

London Police Commissioner’s cyber-crime open letter laughed at by industry
http://www.computerworlduk.com/in-depth/security/3463524/london-police-commissioners-cyber-crime-open-letter-laughed-at-by-industry/

A Framework for Aviation Cybersecurity
http://www.aiaa.org/uploadedFiles/Issues_and_Advocacy/AIAA-Cyber-Framework-Final.pdf

Enjoy!

Semper Fi,

謝謝
紅龍

Cyber SA for 14AUG2013….

Good Morning Folks … 早安, おはようございます-

It’s Wednesday 14 AUG 2013 and there is a tremendous amount of cyber situation awareness (SA) to share today!

There are distinct geographic section regarding cyber news in the following areas below you should review…including of course, the People’s Republic of China ~ 中華人民共和國, India, North Korea & Russia Cyber activities, various Intelligence Agencies & Cyber, and naturally, cyber news related to Hackers & Compromising Systems

Enjoy!

People’s Republic of China ~ 中華人民共和國

The People’s Republic of China’s Emerging C4ISR Revolution
http://thediplomat.com/2013/08/13/chinas-emerging-c4isr-revolution/?all=true
People’s Republic of Hacking…Survival of the Fittest: New York Times Attackers Evolve Quickly
http://www.fireeye.com/blog/technical/2013/08/survival-of-the-fittest-new-york-times-attackers-evolve-quickly.html
Infosecurity – Go Ahead, Blame the People’s Republic of China
http://www.infosecurity-magazine.com/view/33963/go-ahead-blame-china/
People’s Republic of China’s Huawei and the UK’s critical national infrastructure
http://www.infosecurity-magazine.com/view/32810/chinas-huawei-and-the-uks-critical-national-infrastructure/

How Censorship Hurts Chinese Internet Companies
http://www.theatlantic.com/china/archive/2013/08/how-censorship-hurts-chinese-internet-companies/278587/
Wikipedia Refuses to Comply with China’s Censorship
http://thediplomat.com/china-power/wikipedia-refuses-to-comply-with-chinas-censorship/
People’s Republic of China’s Huawei in push to ease concerns over national security
http://www.theage.com.au/it-pro/business-it/huawei-in-push-to-ease-concerns-over-national-security-20130812-hv1cn.html

New York Times Hackers, thought to be Chinese, Back With Smarter Malware…
http://www.techweekeurope.co.uk/news/new-york-times-hackers-return-improved-malware-124549?
Tibetans Targeted As Dalai Lama Site Hacked To Serve Malware
http://www.techweekeurope.co.uk/news/tibetans-dalai-lama-hackers-malware-124547?
Dalai Lama’s China site hacked, infects others
http://www.reuters.com/article/2013/08/12/net-us-tibet-cyberattack-idUSBRE97B0QU20130812
Central Tibetan Administration Website Strategically Compromised as Part of Watering Hole Attack
http://www.securelist.com/en/blog/9144/Central_Tibetan_Administration_Website_Strategically_Compromised_as_Part_of_Watering_Hole_Attack

People’s Republic of China: Russia Remains On The Target List
http://www.strategypage.com/qnd/china/articles/20130813.aspx

Any Chinese Buyers for BlackBerry?
http://blogs.wsj.com/digits/2013/08/12/any-chinese-buyers-for-blackberry/
People’s Republic of Chain’s ZTE rumored to announce its own ARM based processor next month
http://www.androidauthority.com/zte-new-processor-255274/
People’s Republic of China’s Sina Corp in surprise loss
http://www.bbc.co.uk/news/business-23677939
What’s China got against the US Constitution?
http://www.globalpost.com/dispatch/news/regions/asia-pacific/china/130811/china-democracy-political-reform
People’s Republic of China set to pass U.S. as top oil importer
http://money.cnn.com/2013/08/13/news/economy/china-oil-imports/index.html?
Red Tide…Just how strong is the People’s Republic of China’s navy, really?
http://www.foreignpolicy.com/articles/2013/08/12/red_tide_how_strong_is_the_chinese_navy?page=full

India, North Korea & Russia Cyber –

Cyber attacks point to India
http://webreprints.djreprints.com/3175410055735.html

Anatomy Of A Russian Cybercrime Ecosystem Targeting Android
http://www.darkreading.com/attacks-breaches/anatomy-of-a-russian-cybercrime-ecosyste/240159365?
Cybercrime-friendly underground traffic exchange helps facilitate fraudulent and malicious activity
http://blog.webroot.com/2013/08/13/cybercrime-friendly-underground-traffic-exchange-helps-facilitate-fraudulent-and-malicious-activity/

North Korea’s Vast Cyber Warfare Army
http://english.chosun.com/site/data/html_dir/2013/08/13/2013081300891.html?

Intelligence Agencies & Cyber –

Infosecurity – Mutually Assured Cyber Destruction
http://www.infosecurity-magazine.com/view/33962/mutually-assured-cyber-destruction
The NSA Is Commandeering the Internet
http://www.theatlantic.com/technology/archive/2013/08/the-nsa-is-commandeering-the-internet/278572/
Irony Alert: Pentagon Now Sees Big Data as ‘National Security Threat’
http://killerapps.foreignpolicy.com/posts/2013/08/12/irony_alert_pentagon_now_fears_a_big_data_national_security_threat
U.S. sets up intelligence surveillance technology review body
http://www.reuters.com/article/2013/08/12/us-usa-security-review-idUSBRE97B0UT20130812
First 100 Pages of Aaron Swartz’s Secret Service File Released | Threat Level | Wired.com
http://www.wired.com/threatlevel/2013/08/swartz-foia-release/
Exclusive: After Multiple Denials, CIA Admits to Snooping on Noam Chomsky
http://thecable.foreignpolicy.com/posts/2013/08/13/after_multiple_denials_cia_admits_to_snooping_on_noam_chomsky
The NSA is turning the internet into a total surveillance system
Now we know all Americans’ international email is searched and saved, we can see how far the ‘collect it all’ mission has gone

http://www.theguardian.com/commentisfree/2013/aug/11/nsa-internet-surveillance-email

Israeli military intelligence unit drives country’s hi-tech boom
Unit 8200, Israel’s ‘GCHQ’, has spawned more technology millionaires than many business schools
http://www.theguardian.com/world/2013/aug/12/israel-military-intelligence-unit-tech-boom
Is This Iran’s First ICBM Launch Site?
http://killerapps.foreignpolicy.com/posts/2013/08/08/is_this_where_iran_will_launch_its_first_icbm_from

Hackers & Compromising Systems –

Coming Soon: The Cybercrime of Things
Once everything in your house contains a computer, everything in your house can be hacked…

http://www.theatlantic.com/technology/archive/2013/08/coming-soon-the-cybercrime-of-things/278409/
Hackers called into civic duty
http://online.wsj.com/article/SB10001424127887324263404578613850076916028.html
Monitoring digital footprints to prevent reputation damage and cyber attacks |
http://www.wired.co.uk/news/archive/2013-07/01/digital-shadows-alastair-paterson
XP’s retirement will be hacker heaven
Hackers will bank bugs until after Microsoft retires Windows XP in April 2014; expect attacks, say security experts

http://www.computerworld.com/s/article/9241585/XP_s_retirement_will_be_hacker_heaven?taxonomyId=17

Enjoy!

Semper Fi,

謝謝

紅龍

Cyber SA…Global Perspectives

Good Monday Folks;

Much news from Cyber~Land today – and thus, you may enjoy the most recent Global Perspectives of Cyber Situation Awareness (SA)…
Of particular note – information loss in the People’s Republic of China…now a crime bubbling to the service…Kenyan PC’s with Chinese malware and so much more in the China Section below, including missing US CBP & China cooperation posts; Iran’s Cyber Motivations & Actions…and of course, German and French Governments respond to PRISM…

All the cyber SA you might want in one dose!

中國人民共和國 – People’s Republic of China….

Infosecurity – Report: China Uses Taiwan as Test-Bed for US Cyber-Espionage Attacks
http://www.infosecurity-magazine.com/view/33553/report-china-uses-taiwan-as-testbed-for-us-cyberespionage-attacks/

People’s Republic of China: 1,213 arrested for personal information trafficking – People’s Daily Online
“… 468 gangs and arrested 1,213 people for suspected personal information trafficking, according to a statement released Sunday by the Ministry of Public Security.”

http://english.peopledaily.com.cn/90882/8360132.html
Stronger laws urged to protect personal information – People’s Daily Online
http://english.peopledaily.com.cn/90882/8305906.html
People’s Republic of China ‘top source’ of malicious software in Kenyan computers
http://www.nation.co.ke/business/news/China+top+source+of+malicious+software/-/1006/1944356/-/rj5e4/-/index.html
People’s Republic of China New York Times hackers strike again with evolved malware
http://www.v3.co.uk/v3-uk/news/2288076/new-york-times-hackers-strike-again-with-evolved-malware

Censorship, external authentication, and other social media lessons from China’s Great Firewall
http://www.techinasia.com/china-social-media-lessons-from-great-firewall/

China’s Xiaomi sells 100,000 units of new $130 phone in 90 seconds, chalks up 7.45m reservations |
http://thenextweb.com/asia/2013/08/12/chinas-xiaomi-sells-100000-units-of-new-130-phone-in-90-seconds-chalks-up-7-45m-reservations/
Xiaomi Beats Samsung To Top China’s Smartphone Charts | TechCrunch
http://techcrunch.com/2013/08/12/xiaomi-beats-samsung-to-top-chinas-smartphone-charts/

CBP – U.S. Customs and Border Protection / U.S., China Announce Results of First Joint Intellectual Property Operation
http://www.noodls.com/view/E418DA4AF877ADF8970BBEE9B0E38FDDAB89AC35
This original CBP Press relaese was removed from the web here:
http://www.cbp.gov/xp/cgov/newsroom/news_releases/local/07312013_7.xml

Also removed from South China Morning Post:
http://www.scmp.com/news/china/article/1293516/china-us-team-seize-fake-apple-samsung-dr-dre-electronics
U.S., People’s Republic of China team up to seize counterfeit goods in joint operation
http://www.reuters.com/article/2013/07/31/us-china-usa-counterfeit-idUSBRE96U0X120130731

HUAWEI…

Intelligence: People’s Republic of China Dodges Accusations
Chinese telecommunications equipment manufacturer Huawei continues to be dogged by accusations that it is acting as an economic and military espionage agent for the Chinese military.

http://www.strategypage.com/htmw/htintel/articles/20130810.aspx
People’s Republic of China’s Economy Slows but Its Influence Rises
http://blogs.cfr.org/asia/2013/08/12/chinas-economy-slows-but-its-influence-rises/
People’s Republic of China Rising, Huawei Team For Secure Virtualization Solutions – ChinaTechNews
http://www.chinatechnews.com/2013/08/12/19562-chinas-rising-huawei-team-for-secure-virtualization-solutions
People’s Republic of China’s Huawei partners w/Telematics to bolster Unified Communications capabilities in UAE, Qatar –
http://english.mubasher.info/DFM/news/2377832/Huawei-partners-with-Telematics-to-bolster-Unified-Communications-capabilities-in-UAE-Qatar
Serbian Railways Opts for People’s Republoc of China’s Huawei Solutions
http://enterprisechannels.com/ContentDetails.aspx?Moduleid=12159&&ModuleType=Serbian%20Railways%20Opts%20for%20Huawei%20Solutions
People’s Republic of China Blames Cisco for Huawei’s U.S. Woes
http://channelnomics.com/2012/10/12/china-blames-cisco-huaweis-u-s-woes/

It’s Not Just the People’s Republic of China: Indian Hacker Group Spied On Targets In Pakistan, U.S. And Europe – Forbes
http://www.forbes.com/sites/andygreenberg/2013/05/21/its-not-just-china-indian-hacker-group-spied-on-targets-in-pakistan-u-s-and-europe/
Pakistan Intelligence Agency ISI hacks India’s largest telco BSNL Systems by Social Engineering
http://www.thehackerspost.com/2013/08/pakistan-intelligence-agency-hacks-bsnl.html

Escalation Cause: How the Pentagon’s new strategy could trigger war with the People’s Republic of China
“…according to Air-Sea Battle, U.S. forces would launch physical attacks and cyberattacks against the enemy’s “kill-chain” of sensors and weaponry in order to disrupt its command-and-control systems, wreck its launch platforms (including aircraft, ships, and missile sites), and finally defeat the weapons they actually fire. The sooner the kill-chain is broken, the less damage U.S. forces will suffer — and the more damage they will be able to inflict on the enemy.”

http://www.chinausfocus.com/peace-security/escalation-cause-how-the-pentagons-new-strategy-could-trigger-war-with-china/
A Future Without War for the People’s Republic of China & the US |
http://www.chinausfocus.com/foreign-policy/a-future-without-war-for-china-and-the-us/
People’s Republic of China among top five countries on US’ surveillance list – TruthDive
“…the list of NSA’s spying targets, China, Russia, Iran, Pakistan and North Korea are of prime importance for surveillance, Der Spiegal reports.

According to the report, the US is especially interested in gathering intelligence related to the countries’ foreign policy, international trade and economic stability along with topics related to new technology and energy security which score low level priority.”

http://truthdive.com/2013/08/11/Pak-China-among-top-five-countries-on-US-surveillance-list.html
H-6K bombers used by PLA capable of reaching Hawaii: Kanwa Defense Review
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130812000082&cid=1101
The untold truth behind the US rebalancing policy…WantChinaTimes.com
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130811000079&cid=1703

People’s Republic of China investigates France’s Sanofi for alleged bribery: Xinhua
http://www.reuters.com/article/2013/08/10/us-sanofi-china-idUSBRE97902L20130810

ISLAMIC REPUBLIC OF IRAN ~ Cyber

Iran’s cyber warfare could hit public more than military: report
http://www.washingtontimes.com/news/2013/jul/29/irans-cyber-warfare-could-hit-public-more-military/
Iran’s Covert Cyber War
http://blog.heritage.org/2013/08/07/irans-covert-cyber-war/

INTERNATIONAL HACKING>>>

Inside the Tor exploit | ZDNet
http://www.zdnet.com/inside-the-tor-exploit-7000018997/
Hackers put a bull’s-eye on small business | PCWorld
http://www.pcworld.com/article/2046300/hackers-put-a-bulls-eye-on-small-business.html
Reported data breached records in US from 2005 to present exceed 500 million | ZDNet
http://www.zdnet.com/reported-data-breached-records-in-us-from-2005-to-present-exceed-500-million-7000018991/
Meet Darknet, the hidden, anonymous underbelly of the searchable Web | PCWorld
http://www.pcworld.com/article/2046227/meet-darknet-the-hidden-anonymous-underbelly-of-the-searchable-web.html

The Classifieds
“Are American spies the next victims of the Internet age?”

http://www.foreignpolicy.com/articles/2013/08/09/the_classifieds_open_source_intelligence_prieto?page=full
Deutsche Telekom and United Internet launch ‘made in Germany’ email in response to PRISM | ZDNet
http://www.zdnet.com/deutsche-telekom-and-united-internet-launch-made-in-germany-email-in-response-to-prism-7000019266/
Spy or Die – Can corporate suicide stop the NSA?
http://www.foreignpolicy.com/articles/2013/08/09/spy_or_die_nsa_lavabit_silent_circle?page=full

HACKSURFER
http://hacksurfer.com/
Fort Disco: The new brute-force botnet | ZDNet
http://www.zdnet.com/fort-disco-the-new-brute-force-botnet-7000019126/#%21
The Danger of Mixing Cyberespionage With Cyberwarfare
http://insights.wired.com/profiles/blogs/the-danger-of-mixing-cyberespionage-with-cyberwarfare#axzz2bmMnUKxL

France has its own PRISM system: Report | ZDNet
As the US and the UK admit that they are intercepting data for intelligence purposes, an investigative report has revealed that the French government is doing the same.

http://www.zdnet.com/france-has-its-own-prism-system-report-7000017694/

Enjoy!

Semper Fi,

謝謝
紅龍

Cyber-Mania & Situation Awareness in the Binary Worlds…

Good Friday Afternoon Folks;

In today’s issue of the latest cyber news we have quite a bit in the way of Cyber-Mania & Situation Awareness in the Binary Worlds…

Pay particular attention to the immediate section below and the latest items of interest from the People’s Republic of Cyber Espionage…er, sorry, China…
There are a couple of interesting items regarding cuber attacks and a cuber timeline from NATO…yeah OTAN…go figure!
And yes the F-B-I is looking for Hacker love…be sure to use a condom … or those executable files ail ruin your weekend…:-)

People’s Republic of China allows spies to plunder companies
http://www.news.com.au/business/chinese-inaction-over-industrial-spies/story-e6frfm1i-1226693898798
Slight shift seen in official Chinese attitude on cybersecurity
http://www.fiercegovernmentit.com/story/slight-shift-seen-official-chinese-attitude-cybersecurity/2013-08-07
People’s Republic ofChina firmly pursues peaceful development: defense minister
http://english.qstheory.cn/news/201308/t20130801_255078.htm
How America Is Fighting Back Against Chinese Hackers |
http://gizmodo.com/how-america-is-fighting-back-against-chinese-hackers-754599685
President Xi inspects Chinese Academy of Sciences in Beijing _ Qiushi Journal
http://english.qstheory.cn/news/201307/t20130718_250255.htm
People’s Republic of China’s Huawei Looks to Build Up Enterprise-Network Business
http://online.wsj.com/article/SB10001424127887323977304578654840024408084.html

NATO History of Cyber Attacks – A Timeline
http://www.nato.int/docu/review/2013/Cyber/timeline/EN/
Fitting cyber attacks to jus ad bellum — Consequence-based approachPart III
http://resources.infosecinstitute.com/fitting-cyber-attacks-to-jus-ad-bellum-consequence-based-approachpart-iii/?
Cyberattacks devastated my business!
http://money.cnn.com/gallery/smallbusiness/2013/05/28/cybercrime
NSA behind cyber attacks the took down ‘Dark Web’ used by online pedophiles
http://bbb-news.com/blog/2013/08/09/eric-eoin-marques-nsa-behind-cyber-attacks-the-took-down-dark-web-used-by-online-pedophiles/
Defendant in Romanian Cyber Crime Ring Convicted of Wire Fraud and Identification Document Fraud Conspiracies
http://www.fbi.gov/newyork/press-releases/2013/defendant-in-romanian-cyber-crime-ring-convicted-of-wire-fraud-and-identification-document-fraud-conspiracies?

Are Black Hats and White Hats Really Grey Hats?
http://www.digitalcommunities.com/articles/Are-Black-Hats-and-White-Hats-Really-Grey-Hats.html

FBI director calls on private sector to help with cyber threat
I’ll be sure to send him a .pdf with an executable file in it – oh wait the Minneapolis Cyber Field Office already received it….Nyarch!
http://arstechnica.com/tech-policy/2013/08/fbi-director-calls-on-private-sector-to-help-with-cyber-threat/
CIA, FBI and NSA Leaders Ask for Help Fighting Cyberattacks
http://mashable.com/2013/08/08/cia-fbi-nsa-cyberattacks/?
The Government Wants to Create Cybersecurity Insurance
http://gizmodo.com/the-government-wants-to-create-cybersecurity-insurance-1046375980
IPv6 is latest tool for stealing credit card numbers and passwords
http://www.v3.co.uk/v3-uk/news/2286734/ipv6-is-latest-tool-for-stealing-credit-card-numbers-and-passwords

Semper Fi,

謝謝
紅龍

8/8…八/八 Cyber Situation Awareness…People’s Republic of Hacking…

Good day Folks;

Today is usually considered an auspicious day in the People’s Republic of China…八八…8/8 ~ the number 8 being lucky, auspicious while the eight day of the eighth month doubles your good fortune…unfortunately for a couple of our favorite state owned enterprises (SOE), Huawei and Sinovel are in today’s issue of Chinese Cyber SA as they have been linked to economic cyber espionage … naughty, naughty…

People’s Republic of China’s Sinovel charged with cyber espionage in US…|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130808000097&cid=1206
Chinese inaction gives technology thieves a shield…FACT: People’s Republic of China supports commercial economic cyber espionage
http://www.seattlepi.com/business/technology/article/Chinese-inaction-gives-technology-thieves-a-shield-4716698.php
Breaking Down the China Chopper Web Shell – Part I – 推酷
http://www.tuicool.com/articles/zURZnm
Report: Joint U.S.-China Aviation Ventures Are More Prone to Cyber Intrusions than U.S. Firms
Hey – infosec boyz @ Boeing in Seattle – you paying attention to this….!?

http://www.nextgov.com/cybersecurity/2013/08/report-joint-us-china-aviation-ventures-are-more-prone-cyber-intrusions-us-firms/68225/?oref=ng-skybox
People’s Republic of China has a massive Windows XP problem
How do you say ‘cyber target rich environment’? Outdated OS in China….

http://www.computerworld.com/s/article/9241429/China_has_a_massive_Windows_XP_problem
NSA spy server in Chongqing could be used to bury Bo Xilai: Duowei
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130808000136&cid=1101

People’s Republic of China’s Huawei: We’re not a security threat, we’re just a pawn | Digital Trends
http://www.digitaltrends.com/mobile/huawei-were-not-a-security-threat-were-just-a-pawn/
People’s Republic of China’s Huawei Seeks Foothold in Enterprise Market
http://blogs.wsj.com/digits/2013/08/08/huawei-seeks-foothold-in-enterprise-market/
People’s Republic of China’s Huawei unveils SDN programmable switch, taking aim at Cisco | PCWorld
http://www.pcworld.com/article/2046185/chinas-huawei-unveils-sdn-programmable-switch-taking-aim-at-cisco.html#tk.rss_all
Taiwan’s animators ridicule People’s Republic of China over cozy SOE relationships…ZTE & Huawei
http://appleinsider.com/articles/13/08/08/taiwans-animators-ridicule-china-over-pr-smear-campaign-against-apple-inc

Rumor: Apple planning development center in Taiwan for future iPhones…Bye-Bye People’s Republic of China…
http://appleinsider.com/articles/13/08/08/rumor-apple-planning-development-center-in-taiwan-for-future-iphones

Time to break the hegemony of western discourse – People’s Daily Online
From News of the Communist Party of China…
http://english.cpc.people.com.cn/206972/206977/8353120.html
Reflections on “The China Threat”
http://www.strategicstudiesinstitute.army.mil/index.cfm/articles/Reflections-on-The-China-Threat/2013/08/01
Where There is Smoke, There is Fire: South Asian Cyber Espionage Heats Up
http://www.threatconnect.com/news/where-there-is-smoke-there-is-fire-south-asian-cyber-espionage-heats-up/

DNS Servers of 3 Dutch Hosting Firms Hijacked, Thousands of Sites Serve Malware
http://news.softpedia.com/news/DNS-Servers-of-3-Dutch-Hosting-Firms-Hijacked-Thousands-of-Sites-Serve-Malware-373308.shtml

Special Ops Mined Social Media for Data to Advance Mission
http://www.nextgov.com/defense/whats-brewin/2013/08/special-ops-mined-social-media-data-advance-mission/68216/

U.S. Cybersecurity Policy: Problems and Principles
http://heartland.org/sites/default/files/08-01-13_titch_policy_brief_cybersecurity.pdf

Enjoy!

Semper Fi,

謝謝

紅龍

People’s Republic of China Cyber Situation Awareness for 7 AUG 2013

Good day folks;

Today’s edition of the People’s Republic of China Cyber Situation Awareness for 7 AUG 2013 includes some very interesting tidbits on the more claims of Intellectual Property theft by Chinese State Owned Enterprises…Sinovel for example…stay tuned for some interesting analysis regarding the world’s largest wind farm in Panama and the ties to the People’s Republic of China via the good ‘ol USA…

People’s Republic of China SOE SINOVEL, paid insider ‘to kill my company…’ 謝謝您, @zenrandom 紅龍
http://investigations.nbcnews.com/_news/2013/08/06/19566531-chinese-firm-paid-insider-to-kill-my-company-american-ceo-says#comments
Chinese Comment Crew caught taking over a fake Water Plant
http://securityaffairs.co/wordpress/16961/hacking/chinese-comment-crew-caught-taking-over-a-fake-water-plant.html
Flipboard is Now Blocked In China, But Chinese Edition Of App Is Left Unmolested
http://www.techinasia.com/china-great-firewall-blocks-flipboard/?
People’s Republic of China’s evolution on North Korea…”…No more petulance or obstinate behaviour…”
http://koreajoongangdaily.joins.com/news/article/article.aspx?aid=2975673
Is the People’s Republic of China a challenge to the existing international order? |
http://www.opendemocracy.net/openglobalrights/jiangnan-zhu/is-china-challenge-to-existing-international-order
People’s Republic of China funding development of Gwadar Port in Pakistan
http://www.dnaindia.com/india/1871210/report-china-funding-development-of-gwadar-port-in-pakistan-antony
Fighting corruption in the People’s Republic of China backfires by driving resistance
http://www.chinapost.com.tw/commentary/the-china-post/frank-ching/2013/08/07/385770/Fighting-corruption.htm
People’s Republic of China’s Huawei recruiting City workers for new London finance centre
http://www.computerworlduk.com/news/it-business/3462369/huawei-recruiting-city-workers-for-new-london-finance-centre/
China’s People’s Daily continues attack on US constitution
http://www.scmp.com/news/china/article/1294861/peoples-daily-continues-attack-us-constitution

Cybercrime as a Service
http://resources.infosecinstitute.com/cybercrime-as-a-service/

Enjoy Folks!

Semper Fi –

謝謝

紅龍

Cyber Situational Awareness (SA) for 6AUG2013

Good day Folks;

Below are series of very interesting and relevant cyber situational articles for reading and study.

Please pay particular attention to an uptick in the news regarding two of the People’s Republic of China’s significant State Owned Enterprises (SOE) Huawei and Lenovo…

The Diversified Employment of China’s Armed Forces
http://goo.gl/kN10J8
People’s Republic of China’s C919 commercial jet to have maiden flight in 2015|
Hey Airbus & Boeing, these are not the airframe copies you are looking for…

http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130806000083&cid=1102
Wiki reboot: Chinese Wikipedia makes comeback after early censorship
A censorship blackout lost Chinese Wikipedia many of its users. Now a new generation of mainland volunteers is resuscitating the site

http://www.scmp.com/lifestyle/arts-culture/article/1293878/wiki-reboot-chinese-wikipedia-makes-comeback-after-early
Is the People’s Republic of China’s vast Web monitoring actually helping to grow democracy?
http://www.washingtonpost.com/blogs/worldviews/wp/2013/08/05/is-chinas-vast-web-monitoring-actually-helping-to-grow-democracy/
People’s Republic of China’s Ministry of Truth: Worse Than the Soviet Union
WAR IS PEACE • FREEDOM IS SLAVERY • IGNORANCE IS STRENGTH

http://chinadigitaltimes.net/2013/08/ministry-of-truth-worse-than-the-soviet-union/
People’s Daily chief moves to State Council Information Office
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1601&MainCatID=16&id=20130512000014
Lu Wei, People’s Republic of China’s new internet chief
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1601&MainCatID=16&id=20130513000005
‘Father of Great Firewall’ steps down from Beijing university|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130719000080&cid=1601
People’s Republic of China: Internet playing a major role in US military strategy|
http://www.wantchinatimes.com/news-subclass-cnt.aspx?cid=1501&MainCatID=15&id=20130620000124
French Gvmt Report Warns of Money Laundering by Chinese, Russians in Wine Deals-Caijing
http://english.caijing.com.cn/2013-08-06/113135788.html
AirSea Battle, A2/AD and the Offense-Defense Balance
http://thediplomat.com/flashpoints-blog/2013/08/06/airsea-battle-a2ad-and-the-offense-defense-balance/?all=true
Decoding Xi Jinping’s ‘China Dream’
http://www.csmonitor.com/World/Asia-Pacific/2013/0726/Decoding-Xi-Jinping-s-China-Dream
People’s Republic of China’s Huawei $44 Million Connection Between Pakistan & China; Will it Be Censored?
http://www.techinasia.com/huawei-lay-44-million-fiberoptic-cableconnecting-pakistan-china/?
Despite spy raps, Filipino DepEd taking China computers from People’s Republic of China’s Huawei
http://technology.inquirer.net/27799/despite-spy-raps-deped-taking-china-computers
India…Foreign vendors (HUAWEI) won’t share design details of telecom equipment
http://www.thehindu.com/news/national/foreign-vendors-wont-share-design-details-of-telecom-equipment/article4993082.ece
US a high-risk place for data theft, second only to People’s Republic of China, say German companies
http://www.wired.co.uk/news/archive/2013-08/06/germany-fears-us-surveillance

Where Hackers and Spooks Mingle
Seeking to Boost Their Ranks, Government-Security Experts Try to Woo Tech-Minded Rebels at Two Vegas Conferences

http://online.wsj.com/article/SB10001424127887323420604578648401799914658.html
Companies ‘not aware’ of being hacked
http://www.news24.com/Technology/News/Companies-not-aware-of-being-hacked-20130802

New cyber range promotes cyber warfare…in Hawaii, closer to the People’s Republic of China…
http://www.kaleo.org/news/new-cyber-range-promotes-cyber-security/article_fea371f2-fd7b-11e2-8312-0019bb30f31a.html

The Future of US Cyber Command
http://rpdefense.over-blog.com/the-future-of-us-cyber-command

NSA Revelations Hurt Collaboration With Hackers Who Now Feel Betrayed
http://www.businessinsider.com/nsa-revelations-hurt-collaboration-with-hackers-who-now-feel-betrayed-2013-8?
XKeyscore a ‘God-terminal’ into Internet | Germany | DW.DE | 03.08.2013
http://www.dw.de/xkeyscore-a-god-terminal-into-internet/a-16994780

Feds Are Suspects in New Malware That Attacks Tor Anonymity | Threat Level |
http://www.wired.com/threatlevel/2013/08/freedom-hosting/

Triangle universities strengthen cybersecurity as hackers grow bolder | Technology |
http://www.newsobserver.com/2013/08/04/3081674/triangle-universities-strengthen.html
Hacker’s Mysterious Death Prompts Concerns About Pacemakers
http://www.wtma.com/common/more.php?m=58&ts=1375709704&article=A5AE5E8FFDCF11E286DEFEFDADE6840A&mode=2
Malicious Bank of America (BofA) ‘Statement of Expenses’ themed emails lead to client-side exploits and malware
http://blog.webroot.com/2013/08/06/malicious-bank-of-america-bofa-statement-of-expenses-themed-emails-lead-to-client-side-exploits-and-malware/
Anatomy of a cryptographic oracle – understanding (and mitigating) the BREACH attack
http://nakedsecurity.sophos.com/2013/08/06/anatomy-of-a-cryptographic-oracle-understanding-and-mitigating-the-breach-attack/?
Freedom Hosting arrest and takedown linked to Tor privacy compromise
http://nakedsecurity.sophos.com/2013/08/05/freedom-hosting-arrest-and-takedown-linked-to-tor-privacy-compromise/?

Inside Japan’s invisible army
http://tech.fortune.cnn.com/2013/08/05/inside-japans-invisible-army/

The Dangers of a Sensationalist Portrayal of Veterans
http://atwar.blogs.nytimes.com/2013/08/05/the-dangers-of-a-sensationalist-portrayal-of-veterans/?src=recg&_r=1&

Enjoy!

Semper Fi;

謝謝
紅龍

US Concocting People’s War to Hype China Cyber Fears – FreeBeacon is Wrong…People’s Republic of China Rebuttal….

US Concocting People’s War to Hype China Cyber Fears – FreeBeacon is Wrong…People’s Republic of China Rebuttal….

http://world.huanqiu.com/exclusive/2013-08/4195091.html

U.S. media reports the magazine when the internal network fabricated Chinese people’s war planning

RedDragon’s Insight…there have been very few if any ‘cyber’ madness stories pointing the finger at the People’s Republic of China (中華人民共和國) since the traitorous Snowden left for Hong Kong and ended up in Russia working for the Soviet version of Facebook…This latest amplification by Gertz’ ‘Washington Free Bacon sorry Beacon…is yet another attempt by the unknowing and ignorant to cause controversy where there isn’t any…maybe the Free Bacon needs press, I expect the China hyperbole is the ticket..

Nonetheless, below is a story from within the People’s Republic of China indicating that Free Bacon is both incorrect (I wonder if Mr. Gertz speaks or understands Chinese or he is simply manufacturing a new enemy for the DIB?) and full of mis and dis- information…

The suggestion is to read the news story below and decide for yourself…having met with China’s Elite Hackers I can tell you they pout the trousers on one leg at a time just like we do….

                                                         Semper Fi –

                                                           謝謝您  紅龍

At 07:19 on August 1, 2013 Source: Global Times Author: Chen Chong Sun Micro Flow Limei Wang Xiaoxiong Roshan love Tu draft selection: Wei Zheng

  Original title: U.S. media reports the magazine when the internal planning cyber war concocted China

  LONDON August 1 message: “Chinese military theorists are the tactics of Mao’s peasant uprising to the United States for the next war,” U.S. “Washington Freedom Beacon” July 30 come to the surprising conclusion, is trying to set off another one pair of “Chinese cyber warfare,” the siege. However, the “Global Times” reporter found that the report mentioned in the article is not what the “internal defense report,” U.S. media’s most in-depth study of the U.S. cyber warfare theory originated from China just for grafted to the sensational.

  ”Washington Freedom Beacon” July 30 reported that China an internal defense report noted that China’s military is preparing for the cyber warfare, including the launch of the satellite from space attacks and the use of military and civil personnel initiating digital ” people’s war. ” The newspaper said the report, “Space Network warfare research,” the report by the Shanghai Research Center of a home defense drafted four engineers, including disclosure of Chinese cyber warfare and space warfare plans for further details, “This report makes the outside world a rare Beijing to peep into the most secret military projects: Future plans cyber warfare against the United States. ” The report concludes that, in the past, nuclear war strategy is based, but in the information age, with a strategic war should be cyber warfare. “Due to rely on information warfare in space, cyberspace will become a fight for control of the network hotspots.”

  ”China’s cyber warfare capabilities and anti-satellite missiles and interference projects, the PLA hide the deepest secrets. Held earlier this month in China-US Strategic and Economic Dialogue, the topic of cyber warfare by the U.S. and Chinese military defense officials instituted.” ” Washington Freedom Beacon “In reaching this conclusion, but re-claimed the newspaper received a copy of a translation of the report, marked above dates are December 2012, published in the” Aerospace Electronic Warfare “journal . The journal is the China Aerospace Science and Industry Group 8511 Nanjing Institute publications.

  ”Washington Freedom Beacon” really got China’s internal defense report yet? “Global Times” reporter July 31 telephone interview, “Aerospace Electronic Warfare” magazine. The magazine one person familiar with the situation told reporters, “Aerospace Electronic Warfare” is a publicly issued bimonthly, anyone want to see you can get this magazine, which is a little secret the contents of the article are not, let alone is the “internal defense report.” Specific to the thing I read entitled “Space Cyber ​​warfare research,” the article, by the Shanghai Institute of Satellite Engineering of Huanghan Wen and other four people to write, mainly for the Chinese readers “Space cyberwar” no unified concept, the lack of clear understanding of the U.S. space-related cyber warfare concepts, definitions introduced to China, is not what the Chinese military theorists in the study of people’s war in cyberspace.

  ”Global Times” reporter easily downloaded from the Internet this article. In the reporter seems more like a science article describes, beginning on several U.S. cites the definition of cyber warfare. Which describes the characteristics of cyber war, said: “Cyber ​​warfare is not limited to military personnel to participate, with the information systems expertise and skilled personnel, can be implemented cyber warfare, cyber warfare can be said to be a people’s war.”

  China National Innovation Strategy Research and Development Center for Strategic Studies cyberspace Renqin An 31, 2011, the “Global Times” said that the people’s war and cyber warfare irrelevant, network warfare is “elite war”, how could become the “People’s war “?

美媒把杂志当内部报告 编造中国筹划网络人民战争

【环球时报综合报道】“中国军方理论学者正在将毛泽东的农民起义战术用于未来对美战争”,美国《华盛顿自由灯塔报》7月30日得出的惊人结论,正试图掀起另一轮对“中国网络战”的围攻。然而,《环球时报》记者调查发现,文章中提到的报告根本不是什么“内部防务报告”,美国媒体把美国研究最深入的网络战理论嫁接到源于中国只是为了耸人听闻。

  《华盛顿自由灯塔报》7月30日报道称,中国一份内部防务报告指出,中国军方正在为网络战争做准备,其中包括从太空对卫星发起袭击,并利用军事和民间人员发起数字化的“人民战争”。该报称,这份名为“空间网络战研究”的报告由上海某家国防研究中心的4名工程师起草,其中披露了中国网络战和太空战计划的详细细节,“这份报告使得外界罕见地窥视到北京最为秘密的军事项目:未来针对美国的网络战计划”。这份报告认为,过去,战略战争是以核武器为基础,但在信息时代,具有战略意义的战争应该是网络战。“由于信息战要依赖于太空,网络空间将成为争夺网络控制权的热点。”

  “中国的网络战能力与反卫星导弹和干扰项目一样,是解放军隐藏最深的秘密。在本月初召开的中美战略与经济对话中,网络战的话题被美国和中国军事防务官员提起。”《华盛顿自由灯塔报》在得出这一结论时,却又转口声称,该报获得了这份报告的翻译件复印件,上面标注的日期是2012年12月,发表在《航天电子对抗》期刊上。这份期刊是中国航天科工集团南京8511研究所的出版物。

  《华盛顿自由灯塔报》真的搞到中国的内部防务报告了吗?《环球时报》记者7月31日电话采访了《航天电子对抗》杂志。该杂志一名熟悉情况的人士告诉记者,《航天电子对抗》是一份对外公开发行的双月刊,任何人只要想看就可以得到这份杂志,里面的文章一点涉密内容都没有,更不可能是“内部防务报告”。具体到那篇题为“空间赛博战研究”的文章,是由上海卫星工程研究所的黄汉文等4人写的,主要针对的是中国读者对“空间网络战”没有统一的概念,缺乏明确的认识,把美国有关空间网络战的概念、定义介绍给中国,根本不是什么中国军方理论家在研究网络空间的人民战争。

  《环球时报》记者轻易地从网上下载了这篇文章。在记者看来,文章更像是一篇科普介绍,开头就引用了几个美国对赛博战的定义。其中介绍赛博战特点时说:“赛博战并不限于军人参加,具备信息系统专门知识和技能的人员,都可以实施赛博战,可 以说赛博战是一种人民战争 。”

  中国国家创新与发展战略研究会网络空间战略研究中心主任秦安31日对《环球时报》说,人民战争与网络战风马牛不相及,网络战是“精英战”,怎么可能变成“人民战争”?

  【环球时报驻美国、英国特约记者 谌庄流  孙微 环球时报记者 屠丽美 王晓雄 罗山爱】

Cyber & Information Security Situation Awareness (SA)

Good Monday Morning Folks;

Many cyber situational stories to entertain and tantalize you with this morning!
Pay particular attention to the growing militarism within the People’s Republic of China…in their Naval, Ground and yes, Cyber Forces…
You’ll note also some cybernia news out of the Soviet-bloc…
And lastly, but certainly not least – the American Bar Assoc has a new handbook about cyber…yikes – when lawyer and cyber get mixed together…well you get the picture…

Enjoy today’s cyber news!

PLA (中國人民解放軍) urged to reform, upgrade to fight hi-tech wars in future
http://www.scmp.com/news/china/article/1294071/pla-urged-upgrade-fight-hi-tech-wars-and-tackle-corruption

FIGHT ON UNTIL U.S. IMPERIALISM IS WILLING TO GIVE UP – Mao Tse T’ung 1953解放军报专题
http://english.pladaily.com.cn/special/mao/txt/m5.htm
Long march and unending victories
http://eng.mod.gov.cn/Opinion/2013-08/02/content_4460598.htm

Chinese Hacking Team Caught Taking Over Decoy Water Plant | MIT Technology Review
http://www.technologyreview.com/news/517786/chinese-hacking-team-caught-taking-over-decoy-water-plant/

People’s Republic of China’s Beijing hacking combine exposed
http://www.usatoday.com/story/cybertruth/2013/08/02/beijing-hacking-combine-exposed/2611307/

Why Hating the People’s Republic of China Is Futile
http://www.forbes.com/sites/kenrapoza/2013/08/01/why-hating-china-is-futile/

Beijing launches platform to debunk online rumors
http://www.wantchinatimes.com/news-print-cnt.aspx?MainCatID=11&cid=1103&id=20130803000006

People’s Republic of China will become the world’s largest space power: US professor
http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20130805000106&cid=1101

Choosing Sides: Who’s Partnered with Who in People’s Republic of China’s Internet War?
http://www.techinasia.com/choosing-sides-in-china-internet-wars/

Chinese telecoms giant Huawei has hit back at allegations by a former CIA chief that the company spies for Beijing, labeling them “defamatory” and “baseless”.
http://www.securityweek.com/huawei-lashes-out-ex-cia-chief-over-spying-claims
People’s Republic of China’s Most Irrelevant Search Engines to Merge? Chinese Government Search Engines|
http://www.techinasia.com/chinas-irrelevant-search-engines-merge-government-takes-swing-search/
If governments ban China-based Lenovo, should companies?
U.S., several other countries have banned computers from Lenovo after finding backdoors in hardware in firmware, report says

http://www.csoonline.com/article/737586/if-governments-ban-china-based-lenovo-should-companies-
False People’s Republic of China’s Lenovo Security Report Only Strengthens World’s Top PC Maker
http://www.computerworld.com/s/article/9241326/False_Lenovo_Security_Report_Only_Strengthens_World_39_s_Top_PC_Maker?

People’s Republic of China stresses its defensive military policy
http://eng.mod.gov.cn/DefenseNews/2013-08/02/content_4460650.htm
Digital Dao: Aviation companies twice as likely to be hacked if they do business in China
Ask me about my Boeing China Aviation Research and their denial – er, response….

http://jeffreycarr.blogspot.com/2013/07/aviation-companies-twice-as-likely-to.html

Meet the NSA’s New Data Centers: Russia, People’s Republic of China, and Venezuela
http://blog.foreignpolicy.com/posts/2013/07/31/meet_the_nsas_new_data_centers_russia_china_venezuela

Attackers turning to legit cloud services firms to plant malware
http://www.computerworld.com/s/article/9241324/Attackers_turning_to_legit_cloud_services_firms_to_plant_malware?

Understanding the Global Risk of Cybercrime
http://www.scl.org/site.aspx?i=ed32886
New ‘Hacked shells as a service’ empowers cybercriminals with access to high page rank-ed Web sites
http://blog.webroot.com/2013/08/02/new-hacked-shells-as-a-service-empowers-cybercriminals-with-access-to-high-page-rank-ed-web-sites/

The Soviet-Era Strategy That Explains What Russia Is Doing With Snowden
Whataboutistm: a rhetorical defense that alleges hypocrisy from the accuser. And it’s going to make it a lot harder to criticize Moscow on human rights.

http://www.theatlantic.com/international/archive/2013/08/whataboutism-the-soviet-era-strategy-that-partly-explains-why-russia-took-snowden/278314/
Russian Cyber Criminals selling hacked websites access in Underground stores
http://thehackernews.com/2013/08/russian-hackers-underground-hacking-websites.html

FBI Has Been Developing Cyber Hacking Tools for Over a Decade to Attack Criminals
http://www.hngn.com/articles/9332/20130804/fbi-developing-cyber-hacking-tools-over-decade-attack-criminals.htm
Disposable Spy Computers Are Disturbingly Easy and Cheap to Make
http://gizmodo.com/disposable-spy-computers-are-disturbingly-easy-and-chea-1014343556
Latvia Refuses To Extradite The Creator Of Gozi Trojan
The country’s Foreign Minister says the 67-year prison term facing hacker Deniss Calovskis is too severe
http://www.techweekeurope.co.uk/news/latvia-refuses-to-extradite-the-creator-of-gozi-trojan-123725?
ABA Cybersecurity Handbook
http://www.lawfareblog.com/2013/08/aba-cybersecurity-handbook/

Semper Fi,

謝謝
紅龍