<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
xmlns:rawvoice="http://www.rawvoice.com/rawvoiceRssModule/"
>

<channel>
	<title>Beijing Cream &#187; Hacking</title>
	<atom:link href="http://beijingcream.com/tag/hacking/feed/" rel="self" type="application/rss+xml" />
	<link>http://beijingcream.com</link>
	<description>A Dollop of China</description>
	<lastBuildDate>Fri, 09 Apr 2021 11:18:55 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	
<!-- podcast_generator="Blubrry PowerPress/5.0.8" mode="advanced" -->
	<itunes:summary>A Dollop of China</itunes:summary>
	<itunes:author>Beijing Cream</itunes:author>
	<itunes:explicit>yes</itunes:explicit>
	<itunes:image href="http://beijingcream.com/wp-content/uploads/2013/06/BJC-The-Creamcast-logo.jpg" />
	<itunes:subtitle>A Dollop of China</itunes:subtitle>
	<itunes:keywords>China, Beijing, Chinese, Expat, Life, Culture, Society, Humor, Party, Fun, Beijing Cream</itunes:keywords>
	<image>
		<title>Beijing Cream &#187; Hacking</title>
		<url>http://beijingcream.com/wp-content/uploads/2013/06/BJC-The-Creamcast-logo.jpg</url>
		<link>http://beijingcream.com</link>
	</image>
	<itunes:category text="Society &amp; Culture" />
		<rawvoice:location>Beijing, China</rawvoice:location>
		<rawvoice:frequency>Weekly</rawvoice:frequency>
	<item>
		<title>China Phished European Diplomats By Offering Nude Carla Bruni Pics</title>
		<link>http://beijingcream.com/2013/12/china-phished-diplomats-offering-nude-carla-bruni-pics/</link>
		<comments>http://beijingcream.com/2013/12/china-phished-diplomats-offering-nude-carla-bruni-pics/#comments</comments>
		<pubDate>Tue, 10 Dec 2013 18:36:04 +0000</pubDate>
		<dc:creator><![CDATA[Anthony Tao]]></dc:creator>
				<category><![CDATA[By Anthony Tao]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Hacking]]></category>

		<guid isPermaLink="false">http://beijingcream.com/?p=20738</guid>
		<description><![CDATA[The New York Times reports that the foreign ministries of the Czech Republic, Portugal, Bulgaria, Latvia and Hungary have been hacked by the Chinese ("traced to Chinese hackers"). As we've said before, however, "hacked," as used in popular media, is an incredibly broad term meant to encompass a wide variety of malicious online activity, when in fact its actual connotation is much narrower, signifying a sort organized, targeted attack against an individual or institution. In our digital age, we'd do well to employ more specific words when the occasion calls for it -- "phishing," for instance, which is what appears to have happened with the above European countries.]]></description>
				<content:encoded><![CDATA[<a href="http://beijingcream.com/wp-content/uploads/2013/12/Carla-Bruni.jpg"><img class="alignnone  wp-image-20739" alt="Carla Bruni" src="http://beijingcream.com/wp-content/uploads/2013/12/Carla-Bruni.jpg" width="286" height="398" /></a>
<p><a href="http://www.nytimes.com/2013/12/10/world/asia/china-is-tied-to-spying-on-european-diplomats.html?_r=0" target="_blank">The New York Times reports</a> that the foreign ministries of the Czech Republic, Portugal, Bulgaria, Latvia and Hungary have been hacked by the Chinese (&#8220;traced to Chinese hackers&#8221;). As we&#8217;ve <a href="http://beijingcream.com/2013/02/apple-and-facebook-report-being-hacked-maybe-or-maybe-not-by-the-chinese/">said before</a>, however, &#8220;hacked,&#8221; as used in popular media, is an incredibly broad term meant to encompass a wide variety of malicious online activity, when in fact its actual connotation is much narrower, signifying a sort organized, targeted attack against an individual or institution. In our digital age, we&#8217;d do well to employ more specific words when the occasion calls for it &#8212; &#8220;phishing,&#8221; for instance, which is what appears to have happened with the above European countries.<span id="more-20738"></span></p>
<p>Phishing, as defined by <a href="http://en.wikipedia.org/wiki/Phishing" target="_blank">Wikipedia</a>, is the act of attempting to obtain sensitive information &#8220;by masquerading as a trustworthy entity in an electronic communication.&#8221; So how exactly did the Chinese phish foreign diplomats?</p>
<blockquote><p>The attackers sent their targets emails with a link that claimed to contain naked photos of Carla Bruni-Sarkozy, wife of former President Nicolas Sarkozy of France.</p></blockquote>
<p>Please take this sage advice <a href="http://www.thewire.com/global/2013/12/china-spying-g20/355956/" target="_blank">offered by the Wire</a>: &#8220;Web safety pro tip #1: Don&#8217;t click on sketchy, porny, emailed links from someone you&#8217;ve never met. Especially when using your government-issued work laptop.&#8221;</p>
<p>This account is unverified, of course, as no one wanted to talk to the Times. Still, knowing human nature, it makes sense: even diplomats, who we think of in the dourest of terms, have an innate interest in nekkid celeb pics.</p>
<p>The world is a better &#8212; stronger, more united &#8212; place if this story is true.</p>
<p><a href="http://www.nytimes.com/2013/12/10/world/asia/china-is-tied-to-spying-on-european-diplomats.html?_r=0" target="_blank"><em>China Is Tied to Spying on European Diplomats</em></a> (NY Times, <em>h/t <a href="http://www.twitter.com/alicialui1" target="_blank">Alicia</a>) (Image <a href="http://www.sofeminine.co.uk/celebrities/carla-bruni/album839986/carla-bruni-fan-club-album-20742609.html#p52" target="_blank">via</a>)</em></p>
]]></content:encoded>
			<wfw:commentRss>http://beijingcream.com/2013/12/china-phished-diplomats-offering-nude-carla-bruni-pics/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Hackers Post Anti-CCP Mooncakes To Shaoxing Government Website</title>
		<link>http://beijingcream.com/2013/09/hackers-post-anti-ccp-mooncakes-to-shaoxing-website/</link>
		<comments>http://beijingcream.com/2013/09/hackers-post-anti-ccp-mooncakes-to-shaoxing-website/#comments</comments>
		<pubDate>Tue, 17 Sep 2013 14:09:25 +0000</pubDate>
		<dc:creator><![CDATA[Anthony Tao]]></dc:creator>
				<category><![CDATA[By Anthony Tao]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Mooncakes]]></category>
		<category><![CDATA[Protest]]></category>

		<guid isPermaLink="false">http://beijingcream.com/?p=18216</guid>
		<description><![CDATA[Hackers have infiltrated the local government website of the city of Shaoxing, Zhejiang province (sx.gov.cn) and replaced four of the five pictures in the "featured images" slider with mooncakes that display unflattering messages against the Chinese government.]]></description>
				<content:encoded><![CDATA[<a href="http://beijingcream.com/wp-content/uploads/2013/09/Mooncake-anti-CCP.png"><img class="alignnone  wp-image-18221" title="Anti-CCP mooncake" alt="" src="http://beijingcream.com/wp-content/uploads/2013/09/Mooncake-anti-CCP.png" width="343" height="290" /></a>
<p>Hackers have infiltrated the local government website of the city of Shaoxing, Zhejiang province (<a href="http://sx.gov.cn/" target="_blank">sx.gov.cn</a>) and replaced four of the five pictures in the &#8220;featured images&#8221; slider with mooncakes that display unflattering messages against the Chinese government.<span id="more-18216"></span></p>
<p>As first noticed by <a href="https://twitter.com/YaxueCao/status/379963672975515648" target="_blank">Yaxue Cao</a>, here are screenshots of the website and the offending mooncakes, which read: &#8220;Bite to Death the CCP&#8221; (Communist Party of China), &#8220;Overthrow CCP,&#8221; &#8220;Bitterly Hate CCP,&#8221; and &#8220;Get Lost, CCP.&#8221;</p>
<a href="http://beijingcream.com/wp-content/uploads/2013/09/Mooncake-Bite-to-Death-the-CCP.jpg"><img class="alignnone size-large wp-image-18217" alt="Mooncake - Bite to Death the CCP" src="http://beijingcream.com/wp-content/uploads/2013/09/Mooncake-Bite-to-Death-the-CCP-530x279.jpg" width="530" height="279" /></a>
<a href="http://beijingcream.com/wp-content/uploads/2013/09/Mooncake-Overthrow-CCP.jpg"><img class="alignnone size-large wp-image-18220" alt="Mooncake - Overthrow CCP" src="http://beijingcream.com/wp-content/uploads/2013/09/Mooncake-Overthrow-CCP-530x277.jpg" width="530" height="277" /></a>
<a href="http://beijingcream.com/wp-content/uploads/2013/09/Mooncake-Bitterly-Hate-CCP.jpg"><img alt="Mooncake - Bitterly Hate CCP" src="http://beijingcream.com/wp-content/uploads/2013/09/Mooncake-Bitterly-Hate-CCP-530x277.jpg" width="530" height="277" /></a>
<a href="http://beijingcream.com/wp-content/uploads/2013/09/Mooncake-Get-Lost-CCP.jpg"><img class="alignnone size-large wp-image-18219" alt="Mooncake - Get Lost, CCP" src="http://beijingcream.com/wp-content/uploads/2013/09/Mooncake-Get-Lost-CCP-530x277.jpg" width="530" height="277" /></a>
<p>As of this moment, the subversive mooncakes are still on the website&#8217;s frontpage. Let&#8217;s see how long it takes someone to notice.</p>
<p>Mid-Autumn Festival is Thursday, during which mooncakes are given as gifts and subsequently re-gifted, and re-gifted again, and again, until someone throws them away.</p>
]]></content:encoded>
			<wfw:commentRss>http://beijingcream.com/2013/09/hackers-post-anti-ccp-mooncakes-to-shaoxing-website/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>Anonymous&#8217;s Attempt To Hack North Korea Failed Sadly</title>
		<link>http://beijingcream.com/2013/06/anonymouss-attempt-to-hack-north-korea-failed-sadly/</link>
		<comments>http://beijingcream.com/2013/06/anonymouss-attempt-to-hack-north-korea-failed-sadly/#comments</comments>
		<pubDate>Thu, 27 Jun 2013 07:30:50 +0000</pubDate>
		<dc:creator><![CDATA[Anthony Tao]]></dc:creator>
				<category><![CDATA[By Anthony Tao]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[North Korea]]></category>

		<guid isPermaLink="false">http://beijingcream.com/?p=13790</guid>
		<description><![CDATA[North Korea Tech and Tech in Asia have a wonderful story about the perils of hacking -- you can end up hooking the wrong fish. 

On June 25 -- the anniversary of the Korean War -- affiliates of Anonymous sought to take down North Korea websites, but wound up spraying fire at friends. "Confusion at start of attack," writes North Korea Tech:]]></description>
				<content:encoded><![CDATA[<a href="http://beijingcream.com/wp-content/uploads/2013/06/Anonymous-tries-to-hack-North-Korea.png"><img class="alignnone  wp-image-13805" alt="Anonymous tries to hack North Korea" src="http://beijingcream.com/wp-content/uploads/2013/06/Anonymous-tries-to-hack-North-Korea-530x274.png" width="424" height="219" /></a>
<p>North Korea Tech and Tech in Asia have a wonderful story about the perils of hacking &#8212; you can end up hooking the wrong fish.</p>
<p>On June 25 &#8212; the anniversary of the Korean War &#8212; affiliates of Anonymous sought to take down North Korea websites, but wound up spraying fire at friends. &#8220;Confusion at start of attack,&#8221; <a href="http://www.northkoreatech.org/2013/06/25/hackers-attack-north-south-korean-websites/" target="_blank">writes North Korea Tech</a>:<span id="more-13790"></span></p>
<blockquote><p>Perhaps a sign of the chaotic nature of the Anonymous hacker collective came shortly after the attacks got underway at midnight local time in Korea. One of the first targets turned out to be one of the most vocal Anonymous members on Twitter.</p></blockquote>
<p>And then the <em>South </em>Korean president&#8217;s website was hit.</p>
<p>And then, eventually, Shandong province, China:</p>
<blockquote><p>Although the reason is unclear, OpNorthKorea hackers attacked a government website for Zibo City, a provincial city in Shandong, China.</p></blockquote>
<p>As Charlie Custer of <a href="http://www.techinasia.com/anonymous-hack-north-korea-accidentally-hacks-blasts-bunch-unrelated-sites/" target="_blank">Tech in Asia writes</a>:</p>
<blockquote><p>At the risk of incurring the wrath of the hacker collective, I must say that while I’m personally in favor of increased transparency from <em>all</em> governments, I’m not all that impressed by the mass website defacement that seems to be the group’s raison d’etre these days.</p></blockquote>
]]></content:encoded>
			<wfw:commentRss>http://beijingcream.com/2013/06/anonymouss-attempt-to-hack-north-korea-failed-sadly/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Edward Snowden Will Stay In Hong Kong Because He Has &#8220;Faith In HK&#8217;s Rule Of Law,&#8221; Talks More About US Hacking</title>
		<link>http://beijingcream.com/2013/06/edward-snowden-will-stay-in-hong-kong-talks-about-hacking/</link>
		<comments>http://beijingcream.com/2013/06/edward-snowden-will-stay-in-hong-kong-talks-about-hacking/#comments</comments>
		<pubDate>Thu, 13 Jun 2013 04:10:32 +0000</pubDate>
		<dc:creator><![CDATA[Anthony Tao]]></dc:creator>
				<category><![CDATA[By Anthony Tao]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Hong Kong]]></category>

		<guid isPermaLink="false">http://beijingcream.com/?p=13506</guid>
		<description><![CDATA[Edward Snowden sat down with the South China Morning Post yesterday, causing the editors of that Hong Kong-based paper to somewhat lose their minds with SCOOP FEVER. (Which article do I link to? The 3:31 am one that has EXCLUSIVE splashed across the headline -- even though Snowden's spoken with several media outlets already -- or the one from 19 minutes later, or the one from 7:37 am on the same subject? There's another version from earlier, 12:52 am.)]]></description>
				<content:encoded><![CDATA[<a href="http://beijingcream.com/wp-content/uploads/2013/06/Edward-Snowden-political-asylum-Snia-Weibo-pic.png"><img class="alignnone size-full wp-image-13507" alt="Edward Snowden political asylum Snia Weibo pic" src="http://beijingcream.com/wp-content/uploads/2013/06/Edward-Snowden-political-asylum-Snia-Weibo-pic.png" width="486" height="302" /></a>
<p>Edward Snowden sat down with the South China Morning Post yesterday, causing the editors of that Hong Kong-based paper to somewhat lose their minds with SCOOP FEVER. (Which article do I link to? The <a href="http://www.scmp.com/news/hong-kong/article/1259335/exclusive-whistle-blower-edward-snowden-talks-south-china-morning" target="_blank">3:31 am one</a> that has EXCLUSIVE splashed across the headline &#8212; even though Snowden&#8217;s spoken with several media outlets already &#8212; or the one from <a href="http://www.scmp.com/news/hong-kong/article/1259508/edward-snowden-us-government-has-been-hacking-hong-kong-and-china" target="_blank">19 minutes later</a>, or the <a href="http://www.scmp.com/news/hong-kong/article/1259422/edward-snowden-let-hong-kong-people-decide-my-fate" target="_blank">one from 7:37 am</a> on the same subject? There&#8217;s another version from earlier, <a href="http://www.scmp.com/news/hong-kong/article/1259508/edward-snowden-us-government-has-been-hacking-hong-kong-and-china" target="_blank">12:52 am</a>.)</p>
<p>Snowden reveals to SCMP&#8217;s Lana Lam that he has been in Hong Kong since May 20, and that:<span id="more-13506"></span></p>
<blockquote><p>“I have had many opportunities to flee HK, but I would rather stay and fight the US government in the courts, because I have faith in HK’s rule of law.”</p></blockquote>
<p>And:</p>
<blockquote><p>“People who think I made a mistake in picking HK as a location misunderstand my intentions. I am not here to hide from justice, I am here to reveal criminality,” he said.</p></blockquote>
<p>Also, presented in bullet point, Snowden apparently said:</p>
<ul>
<li>US National Security Agency’s controversial Prism programme extends to people and institutions in Hong Kong and mainland China;</li>
<li>The US is exerting “bullying’’ diplomatic pressure on Hong Kong to extradite him;</li>
<li>Hong Kong’s rule of law will protect him from the US;</li>
<li>He is in constant fear for his own safety and that of his family.</li>
</ul>
<p>Finally, there&#8217;s this revelvation &#8212; which he <a href="http://beijingcream.com/2013/06/edward-snowden-on-hacking-we-hack-everyone-everywhere/">told the Guardian</a> earlier, though not with numbers &#8212; that the US government, yes indeed, hacks other countries, countries like China.</p>
<blockquote><p>Snowden believed there had been more than 61,000 NSA hacking operations globally, with hundreds of targets in Hong Kong and on the mainland.</p>
<p>“We hack network backbones – like huge internet routers, basically – that give us access to the communications of hundreds of thousands of computers without having to hack every single one,” he said.</p>
<p>“Last week the American government happily operated in the shadows with no respect for the consent of the governed, but no longer. Every level of society is demanding accountability and oversight.”</p></blockquote>
<p>Because it&#8217;s Hong Kong, of course there&#8217;s a <a href="http://www.scmp.com/news/hong-kong/article/1259265/hong-kong-march-support-edward-snowden-set-saturday" target="_blank">march planned</a>, for Saturday at 3 pm. More info on the <a href="http://www.supportsnowden.org/" target="_blank">Support Snowden</a> website.</p>
<p><a href="http://www.scmp.com/news/hong-kong/article/1259508/edward-snowden-us-government-has-been-hacking-hong-kong-and-china" target="_blank"><em>Edward Snowden: US government has been hacking Hong Kong and China for years</em></a> (SCMP) <em>(Image via Sina Weibo via <a href="http://www.scmp.com/news/china/article/1259148/online-appeal-give-snowden-political-asylum-china-attracts-little-support" target="_blank">SCMP</a>)</em></p>
]]></content:encoded>
			<wfw:commentRss>http://beijingcream.com/2013/06/edward-snowden-will-stay-in-hong-kong-talks-about-hacking/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Edward Snowden On Hacking: &#8220;We Hack Everyone Everywhere&#8221;</title>
		<link>http://beijingcream.com/2013/06/edward-snowden-on-hacking-we-hack-everyone-everywhere/</link>
		<comments>http://beijingcream.com/2013/06/edward-snowden-on-hacking-we-hack-everyone-everywhere/#comments</comments>
		<pubDate>Mon, 10 Jun 2013 09:36:17 +0000</pubDate>
		<dc:creator><![CDATA[Anthony Tao]]></dc:creator>
				<category><![CDATA[By Anthony Tao]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Edward Snowden]]></category>
		<category><![CDATA[Hacking]]></category>

		<guid isPermaLink="false">http://beijingcream.com/?p=13453</guid>
		<description><![CDATA[In a Q-and-A with the Guardian, Edward Snowden, the NSA whistleblower who is now in Hong Kong, talked about his motivations, the &#8220;authoritarian mindset&#8221; of spies (such as himself), and why he does not expect to ever return to the US as a free man. He also said this about hacking, specifically the hypocrisy of...  <a href="http://beijingcream.com/2013/06/edward-snowden-on-hacking-we-hack-everyone-everywhere/" title="Read Edward Snowden On Hacking: &#8220;We Hack Everyone Everywhere&#8221;" class="read-more">Read more &#187;</a>]]></description>
				<content:encoded><![CDATA[<a href="http://beijingcream.com/wp-content/uploads/2013/06/Edward-Snowden.jpg"><img class="alignnone  wp-image-13456" alt="Edward Snowden" src="http://beijingcream.com/wp-content/uploads/2013/06/Edward-Snowden-530x530.jpg" width="318" height="318" /></a>
<p>In a <a href="http://www.guardian.co.uk/world/2013/jun/09/nsa-whistleblower-edward-snowden-why" target="_blank">Q-and-A with the Guardian</a>, Edward Snowden, the NSA whistleblower who is now in Hong Kong, talked about his motivations, the &#8220;authoritarian mindset&#8221; of spies (such as himself), and why he does not expect to ever return to the US as a free man.</p>
<p>He also said this about hacking, specifically the hypocrisy of any government complaining about Chinese hacking:<span id="more-13453"></span></p>
<blockquote><p><strong>Q: What about the Obama administration&#8217;s protests about hacking by China?</strong></p>
<p>A: &#8220;We hack everyone everywhere. We like to make a distinction between us and the others. But we are in almost every country in the world. We are not at war with these countries.&#8221;</p></blockquote>
<p>Meanwhile, the Chinese government can also intercept anything and everything. If only anyone cared, or were allowed to.</p>
<p><a href="http://www.guardian.co.uk/world/2013/jun/09/nsa-whistleblower-edward-snowden-why" target="_blank"><em>Edward Snowden: the whistleblower answers the essential questions on the biggest leak in NSA history</em></a> (The Guardian, <em>h/t Jonathan Alpart</em>)</p>
]]></content:encoded>
			<wfw:commentRss>http://beijingcream.com/2013/06/edward-snowden-on-hacking-we-hack-everyone-everywhere/feed/</wfw:commentRss>
		<slash:comments>12</slash:comments>
		</item>
		<item>
		<title>Inside the mind of a young and talented yet disgruntled Chinese hacker</title>
		<link>http://beijingcream.com/2013/03/inside-the-mind-of-a-young-and-talented-yet-disgruntled-chinese-hacker/</link>
		<comments>http://beijingcream.com/2013/03/inside-the-mind-of-a-young-and-talented-yet-disgruntled-chinese-hacker/#comments</comments>
		<pubDate>Wed, 13 Mar 2013 11:29:31 +0000</pubDate>
		<dc:creator><![CDATA[Anthony Tao]]></dc:creator>
				<category><![CDATA[By Anthony Tao]]></category>
		<category><![CDATA[The East is Read]]></category>
		<category><![CDATA[Hacking]]></category>

		<guid isPermaLink="false">http://beijingcream.com/?p=10778</guid>
		<description><![CDATA[It's tough being a cyber spy. You don't get to do any real spy work -- by which we mean shoot a gun, or sneak around dark mansions, or race around in BMWs -- but instead face a daily 8 to 5:30 grind in front of computers, probably in cubicles.]]></description>
				<content:encoded><![CDATA[<p>It&#8217;s tough being a cyber spy. You don&#8217;t get to do any <em>real</em> spy work &#8212; by which we mean shoot a gun, or sneak around dark mansions, or race around in BMWs &#8212; but instead face a daily 8 to 5:30 grind in front of computers, probably in cubicles.</p>
<p>We know this because Barbara Demick and the Los Angeles Times have <a href="http://www.latimes.com/news/nationworld/world/la-fg-china-hacking-20130313,0,4812955.story" target="_blank">found a blog kept by a 25-year-old hacker</a>, a computer whiz who goes into work at 8:30 am in a military uniform and often stays late &#8212; because, you know, office jobs suck.<span id="more-10778"></span></p>
<blockquote><p>With no money and little free time, he found solace on the Internet. He shopped, chatted with friends and courted a girlfriend. He watched movie and television shows. He drew particular inspiration from the Fox series &#8220;Prison Break,&#8221; and borrowed its name for his blog.</p>
<p>The blog provides a rare peek into the secretive hacking establishment of the Chinese military, which employs thousands of people in what is believed to be by far the world&#8217;s largest institutionalized hacking operation.</p></blockquote>
<p>In the blog, the young man, surnamed Wang, does a lot of poetic complaining, par for the course for bloggers:</p>
<blockquote><p>&#8220;Fate has made me feel that I am imprisoned,&#8221; he wrote in his first entry on Sina.com. &#8220;I want to escape.&#8221;</p></blockquote>
<p>He posted about 625 entries between 2006 and 2009.</p>
<blockquote><p>&#8220;What I can&#8217;t understand is why all the work units are located in the most remote areas of the city,&#8221; Wang wrote in an entry in 2007. &#8220;I really don&#8217;t get what those old guys are thinking in the beginning. They should at least take us young people into consideration. How can passionate young people like us handle a prison-like environment like this?&#8221;</p></blockquote>
<p>And despite being very competent at his work, he received, it seems, little recognition from his superiors:</p>
<blockquote><p>&#8220;If we&#8217;re lucky enough, we might be able to complete this year&#8217;s target and earn a year-end bonus for everyone,&#8221; Wang wrote with enthusiasm.</p>
<p>Otherwise, Wang poured out his unhappiness. The hackers were required to speak English, the international language of technology, as well as an essential for phishing attacks on mostly U.S. targets. But when Wang tried to hone his English skills by reading magazines such as the Economist and Harvard Business Review, his boss rebuked him for reading too much foreign press.</p>
<p>&#8220;The boss doesn&#8217;t understand. I&#8217;ll have to be more careful,&#8221; he complained. Wang was also unhappy that supervisors refused to reimburse him for a $1 bus ticket to attend a business conference, while his boss claimed more than $100 for a bottle of liquor.</p></blockquote>
<p>Who can&#8217;t empathize?</p>
<p>He also really regretted his career choice, like a lawyer:</p>
<blockquote><p>&#8220;My only mistake was that I sold myself out to the country for some minor benefits and put myself in this embarrassing situation,&#8221; he wrote. With the help of his family, he managed to get out in 2008. He stopped writing the blog a year later.</p></blockquote>
<p>Chinese hackers: they&#8217;re just like us. Only, you know, wearing PLA uniforms in the office, and <a href="http://beijingcream.com/2013/02/scrutinizing-the-mandiant-report-a-hard-look-at-what-it-proves-and-doesnt/">hated on by Mandiant</a>, everyone else.</p>
<p><a href="http://www.latimes.com/news/nationworld/world/la-fg-china-hacking-20130313,0,4812955.story" target="_blank"><em>China hacker&#8217;s angst opens a window onto cyber-espionage</em></a> (LA Times)</p>
]]></content:encoded>
			<wfw:commentRss>http://beijingcream.com/2013/03/inside-the-mind-of-a-young-and-talented-yet-disgruntled-chinese-hacker/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Scrutinizing The Mandiant Report: Taking A Hard Look At What It Proves And, More Importantly, What It Doesn&#8217;t</title>
		<link>http://beijingcream.com/2013/02/scrutinizing-the-mandiant-report-a-hard-look-at-what-it-proves-and-doesnt/</link>
		<comments>http://beijingcream.com/2013/02/scrutinizing-the-mandiant-report-a-hard-look-at-what-it-proves-and-doesnt/#comments</comments>
		<pubDate>Thu, 21 Feb 2013 05:54:47 +0000</pubDate>
		<dc:creator><![CDATA[John Artman]]></dc:creator>
				<category><![CDATA[By John Artman]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Hacking]]></category>

		<guid isPermaLink="false">http://beijingcream.com/?p=10182</guid>
		<description><![CDATA[Groupthink is an amazing thing. The publicity surrounding attacks on the New York Times, Wall Street Journal, Washington Post, Facebook, Apple, et al. proves nothing except the saw about propaganda: if you say something often enough, it becomes truth. A quick scan through English-language China news reveals that on the basis of one report, it...  <a href="http://beijingcream.com/2013/02/scrutinizing-the-mandiant-report-a-hard-look-at-what-it-proves-and-doesnt/" title="Read Scrutinizing The Mandiant Report: Taking A Hard Look At What It Proves And, More Importantly, What It Doesn&#8217;t" class="read-more">Read more &#187;</a>]]></description>
				<content:encoded><![CDATA[<a href="http://beijingcream.com/wp-content/uploads/2013/02/China-hacking-bogeyman-Mandiant.png"><img class="alignnone size-full wp-image-10184" alt="China hacking bogeyman Mandiant" src="http://beijingcream.com/wp-content/uploads/2013/02/China-hacking-bogeyman-Mandiant.png" width="394" height="438" /></a>
<p>Groupthink is an amazing thing. The publicity surrounding attacks on the New York Times, Wall Street Journal, Washington Post, Facebook, Apple, et al. proves nothing except the saw about propaganda: if you say something often enough, it becomes truth.</p>
<p>A quick scan through English-language China news reveals that on the basis of one report, it is now indisputable fact that a Chinese military organization was responsible for the above-mentioned attacks. So far, the only substantive criticism of Mandiant’s report has come from Jeffrey Carr, CEO of the cybersecurity firm Taia Global, <a href="http://jeffreycarr.blogspot.com/2013/02/mandiant-apt1-report-has-critical.html" target="_blank">who says the report has</a> &#8220;critical analytic flaws.&#8221;<span id="more-10182"></span></p>
<blockquote>
<p dir="ltr">In summary, my problem with this report is not that I don&#8217;t believe that China engages in massive amounts of cyber espionage. I know that they do &#8211; especially when an executive that we worked with traveled to Beijing to meet with government officials with a clean laptop and came back with one that had been breached while he was asleep in his hotel room.</p>
<p dir="ltr">My problem is that Mandiant refuses to consider what everyone that I know in the Intelligence Community acknowledges &#8211; that there are multiple states engaging in this activity; not just China. And that if you&#8217;re going to make a claim for attribution, then you must be both fair and thorough in your analysis and, through the application of a scientific method like ACH, rule out competing hypotheses and then use estimative language in your finding. Mandiant simply did not succeed in proving that Unit 61398 is their designated APT1 aka Comment Crew.</p>
</blockquote>
<p>And that about sums it up. With so many other actors out there, any attribution that does not conclusively exclude them (Russia, Israel, France, and others) should be taken with many grains of salt. Mandiant has made minimal effort to rule out other possibilities, demonstrating the type of confirmation bias that a wary and responsible press would do well to question.</p>
<p>On top of that, the New York Times <a href="http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?pagewanted=all&amp;_r=0" target="_blank">even admits</a> that while the email accounts of David Barboza (Shanghai bureau chief) and Jim Yardley (former Beijing bureau chief, now South Asia bureau chief) were compromised, no documents pertaining to the Wen Jiabao story “were accessed, downloaded, or copied,” in the words of Jill Abramson, executive editor at the NYT.</p>
<blockquote>
<p dir="ltr">“Computer security experts found no evidence that sensitive e-mails or files from the reporting of our articles about the Wen family were accessed, downloaded or copied.&#8221;</p>
</blockquote>
<p>And the holes proliferate. Carr <a href="http://jeffreycarr.blogspot.com/2013/01/the-new-york-times-china-hack-what.html" target="_blank">touches on several reasons</a> why the NY Times&#8217;s claims &#8212; bolstered by Mandiant, which sees China as a &#8220;go-to culprit&#8221; (Carr&#8217;s words) &#8212; don’t stand up to critical analysis. Examples:<b><b><b><br />
</b></b></b></p>
<blockquote>
<p dir="ltr">The Beijing Workday Argument. The hackers could have been from anywhere in the world. The timezone that Mandiant imagines as a Beijing workday could easily apply to a workday in Bangkok, Singapore, Taiwan, Tibet, Seoul, and even Tallinn &#8211; all of whom have active hacker populations.</p>
<p dir="ltr">The Lanxiang Vocational School Argument. The article mentioned that the hackers were traced back to the &#8220;same universities used by the Chinese military to attack U.S. military contractors in the past.&#8221; If memory serves, one of those was the Lanxiang Vocational School in Jinan, the capital of Shandong province and home to a PLA regional command center. Actually, Jinan is an industrial city of six million people and more than a dozen universities. IP Geolocation to one school means absolutely nothing.</p>
<p dir="ltr">Furthermore, even if the Chinese government was involved in cyber espionage against the New York Times, it wouldn&#8217;t use its military for that. It would use its Ministry of State Security (China&#8217;s equivalent of the CIA). And they wouldn&#8217;t be stupid enough to run the attack from their own offices, which if you&#8217;re interested in checking IP addresses, is in Beijing &#8211; 274 miles from Jinan.</p>
</blockquote>
<p>Again, this doesn&#8217;t mean that China is definitely <em>not</em> hacking. Rather, our perspective is skewed. Perhaps the question we should be asking isn’t “Who did it?” but rather “Who benefits?” So far, it appears to be US policymakers bent on <a href="http://original.antiwar.com/justin/2013/02/19/the-great-cyber-warfare-scam/" target="_blank">beefing up cyber-security legislation</a> using China as the go-to bogeyman. Naturally, lots of media have fallen in step, regurgitating a tired, not-at-all subtle narrative that we should know better than to accept at face value.</p>
<p><em><a href="http://about.me/knowsnothing" target="_blank">John Artman</a> has been China-watching and covering tech since 2010. Follow him <a href="http://www.twitter.com/knowsnothing" target="_blank">@KnowsNothing</a>.</em></p>
]]></content:encoded>
			<wfw:commentRss>http://beijingcream.com/2013/02/scrutinizing-the-mandiant-report-a-hard-look-at-what-it-proves-and-doesnt/feed/</wfw:commentRss>
		<slash:comments>19</slash:comments>
		</item>
		<item>
		<title>Shanghai Security Chase Off CNN Crew Filming Presumed Hacking Headquarters; BBC Journalist Detained</title>
		<link>http://beijingcream.com/2013/02/security-chase-off-cnn-filming-hacking-hq-bbc-journo-detained/</link>
		<comments>http://beijingcream.com/2013/02/security-chase-off-cnn-filming-hacking-hq-bbc-journo-detained/#comments</comments>
		<pubDate>Wed, 20 Feb 2013 17:26:10 +0000</pubDate>
		<dc:creator><![CDATA[Anthony Tao]]></dc:creator>
				<category><![CDATA[By Anthony Tao]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Video]]></category>

		<guid isPermaLink="false">http://beijingcream.com/?p=10162</guid>
		<description><![CDATA[Mandiant identified "Unit 61398” as a headquarters of sorts for Shanghai-based hacking outfit APT1, and traced it to a 12-story building in Pudong district.

Are they right?]]></description>
				<content:encoded><![CDATA[<a href="http://beijingcream.com/wp-content/uploads/2013/02/Mandiant-China-hacking-headquarters-in-Shanghai.jpeg"><img class="alignnone  wp-image-10164" alt="Mandiant China hacking headquarters in Shanghai" src="http://beijingcream.com/wp-content/uploads/2013/02/Mandiant-China-hacking-headquarters-in-Shanghai.jpeg" width="499" height="320" /></a>
<p>Mandiant identified &#8220;Unit 61398” as a headquarters of sorts for Shanghai-based hacking outfit APT1, and traced it to a 12-story building in Pudong district.</p>
<p>Are they right?</p>
<p>Judging by Chinese security&#8217;s reaction, the answer is probably. In the below video, watch as officers, like T-1000s, chase after a CNN crew trying to make their getaway in a car. &#8220;Keep driving, drive away, drive away,&#8221; one of the voices in the car says. Another adds, very annoyed, &#8220;Drive away.&#8221;<span id="more-10162"></span></p>
<p>&#8220;They said it was a military installation of some kind,&#8221; reporter David McKenzie explains.</p>
<p><iframe src="http://www.youtube.com/embed/3d2gyydHwmY" height="270" width="480" allowfullscreen="" frameborder="0"></iframe></p>
<p>The Brits are having a tough time, too. <a href="http://www.bbc.co.uk/news/world-asia-pacific-21505803" target="_blank">According to BBC</a>, reporter &#8220;John Sudworth went along to investigate but was stopped and briefly detained.&#8221; See above for more info on that.</p>
<p>Imagine: authorities don&#8217;t want foreigners snooping around their military buildings.</p>
<p><iframe src="http://www.youtube.com/embed/pt2jKoqxkjw" height="270" width="480" allowfullscreen="" frameborder="0"></iframe></p>
<p>Meanwhile, China has hit back, claiming the US is the bigger hacker. According to the <a href="http://news.mod.gov.cn/headlines/2013-02/20/content_4433448.htm" target="_blank">Chinese Ministry of Defense</a> (brought to us by <a href="http://www.theatlanticwire.com/national/2013/02/china-says-us-actually-hacker-you-should-be-worried-about/62319/" target="_blank">Atlantic Wire</a>):</p>
<blockquote><p>China is one of the main victims of cyber attacks. According to statistics, the Chinese armed forces access to the Internet user terminal suffered a large number of foreign attacks, [and] according to the IP address of the display, a considerable number of attack sources from the United States, but we did not [use this] a pretext to accuse the U.S. side.</p></blockquote>
<p>It&#8217;s probably true, by the way, that people everywhere are hacking the hell out of one another.</p>
<p>Also, this, translated by <a href="http://money.cnn.com/2013/02/20/technology/china-cyber-hacking-denial/?cnn=yes&amp;hpt=hp_t2" target="_blank">CNN</a>:</p>
<blockquote><p>&#8220;There is still no internationally clear, unified definition of what constitutes a hacking attack,&#8221; Geng said. &#8220;There is no legal evidence behind the report subjectively concluding that the everyday gathering of online information is online spying.&#8221;</p></blockquote>
<p>Which, again, is <em>true</em>. We all agree that in a perfect world, spying on someone, either in the real or virtual world, is bad and no one should ever do it. But in this <em>real world</em>, companies and governments are constantly gathering information on one another all the time. This is the environment we live in, that we&#8217;ve willfully, in many ways, surrendered ourselves to: a closely integrated world with interlacing, overlapping networks, a widened public sphere, and evolving, expanding boundaries of privacy. The best <a href="http://beijingcream.com/2013/02/eric-schmidt-says-chinas-hacking-culture-could-give-it-a-strategic-advantage/">defense is offense</a>. Everyone <a href="http://beijingcream.com/2013/02/apple-and-facebook-report-being-hacked-maybe-or-maybe-not-by-the-chinese/">is being hacked</a>, so maybe, in a way, no one is.</p>
<p>Although we readily admit this: it completely and totally sucks to lose information, especially to a competitor. People have every reason to be upset, as long as they don&#8217;t get hypocritical about it.</p>
<p><em>(H/T <a href="http://www.twitter.com/alicialui1" target="_blank">Alicia</a>)</em></p>
]]></content:encoded>
			<wfw:commentRss>http://beijingcream.com/2013/02/security-chase-off-cnn-filming-hacking-hq-bbc-journo-detained/feed/</wfw:commentRss>
		<slash:comments>12</slash:comments>
		</item>
		<item>
		<title>Apple And Facebook Report Being Hacked, Maybe (Or Maybe Not) By The Chinese</title>
		<link>http://beijingcream.com/2013/02/apple-and-facebook-report-being-hacked-maybe-or-maybe-not-by-the-chinese/</link>
		<comments>http://beijingcream.com/2013/02/apple-and-facebook-report-being-hacked-maybe-or-maybe-not-by-the-chinese/#comments</comments>
		<pubDate>Wed, 20 Feb 2013 02:44:32 +0000</pubDate>
		<dc:creator><![CDATA[Anthony Tao]]></dc:creator>
				<category><![CDATA[By Anthony Tao]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Hacking]]></category>

		<guid isPermaLink="false">http://beijingcream.com/?p=10147</guid>
		<description><![CDATA[On the heels of Mandiant&#8217;s eye-opening report on alleged Chinese hacking under the auspices of the People&#8217;s Liberation Army, Facebook and Apple have said they too &#8212; like literally everyone else &#8212; have been &#8220;hacked.&#8221; Some Apple employees reportedly dipped their fingers into cyber traps designed to infect their computers with malicious software. &#8220;The same software,...  <a href="http://beijingcream.com/2013/02/apple-and-facebook-report-being-hacked-maybe-or-maybe-not-by-the-chinese/" title="Read Apple And Facebook Report Being Hacked, Maybe (Or Maybe Not) By The Chinese" class="read-more">Read more &#187;</a>]]></description>
				<content:encoded><![CDATA[<a href="http://beijingcream.com/wp-content/uploads/2013/02/Chinese-hackers.jpg"><img class="alignnone  wp-image-10148" alt="Chinese hackers" src="http://beijingcream.com/wp-content/uploads/2013/02/Chinese-hackers.jpg" width="400" height="305" /></a>
<p>On the heels of Mandiant&#8217;s <a href="http://www.nytimes.com/2013/02/19/technology/chinas-army-is-seen-as-tied-to-hacking-against-us.html?pagewanted=all&amp;_r=0" target="_blank">eye-opening report</a> on alleged Chinese hacking under the auspices of the People&#8217;s Liberation Army, Facebook and Apple have said they too &#8212; like <em>literally everyone else</em> &#8212; have been &#8220;hacked.&#8221;</p>
<p>Some Apple employees reportedly dipped their fingers into cyber traps designed to infect their computers with malicious software. &#8220;The same software, which infected Macs by exploiting a flaw in a version of Oracle Corp&#8217;s Java software used as a plug-in on Web browsers, was used to launch attacks against Facebook, which the social network disclosed on Friday,&#8221; according to <a href="http://www.reuters.com/article/2013/02/19/us-apple-hackers-idUSBRE91I10920130219" target="_blank">Reuters</a>.<span id="more-10147"></span></p>
<p>No one is safe, apparently:</p>
<blockquote><p>Charlie Miller, a prominent expert on Apple security who is co-author of the Mac Hacker&#8217;s Handbook, said the attacks show that criminal hackers are investing more time studying the Mac OS X operating system so they can attack Apple computers.</p>
<p>For example, he noted, hackers recently figured out a fairly sophisticated way to attack Macs by exploiting a flaw in Adobe Systems Inc&#8217;s Flash software.</p>
<p>&#8220;The only thing that was making it safe before is that nobody bothered to attack it. That goes away if somebody bothers to attack it,&#8221; Miller said.</p></blockquote>
<p>Like Ra&#8217;s al Ghul seeking to deliver a microwave bomb into Gotham&#8217;s water main, hackers apparently wanted to deliver their treachery to a wellspring so that <em>all</em> of our digital lives become shrouded in paranoia.</p>
<blockquote><p>Security firm F-Secure wrote that the attackers might have been trying to get access to the code for apps on smartphones, seeking a way to infect millions of end-users. It urged developers to check their source code for unintended changes.</p></blockquote>
<p>Facebook said a few things too. Gee, who will protect our private information &#8212; sarcasm alert &#8212; if not Facebook?</p>
<p>All told &#8212; as was the case with media organizations who reported they were hacked &#8212; no information was reported missing. What gives? What are they setting up? There was a time &#8212; those long lost days of yore &#8212; when being hacked was a horrible, infuriating thing, because it meant lost passcodes and credit card numbers, or slower processer speeds and more pop-up ads, i.e. living the rest of your cyber life with the computer equivalent of syphilis. In our newer digital age, perhaps there should be a more subtle word for the type aggressive phishing that&#8217;s happening? If Inuits can have more than a couple of words for &#8220;snow,&#8221; we ought to have at least a few for &#8220;hacking,&#8221; right? Something to think about.</p>
<p><em><a href="http://www.reuters.com/article/2013/02/19/us-apple-hackers-idUSBRE91I10920130219" target="_blank">Exclusive: Apple, Macs hit by hackers who targeted Facebook</a> </em>(Reuters) <em>(Image <a href="http://news.xinhuanet.com/internet/2009-03/01/content_10922602.htm" target="_blank">Xinhua</a>)</em></p>
]]></content:encoded>
			<wfw:commentRss>http://beijingcream.com/2013/02/apple-and-facebook-report-being-hacked-maybe-or-maybe-not-by-the-chinese/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>US Security Firm Claims Shadowy Chinese Hacking Organization Has &#8220;Compromised&#8221; 141 Companies Since 2006</title>
		<link>http://beijingcream.com/2013/02/us-security-firm-report-on-shadowy-chinese-hacking-organization/</link>
		<comments>http://beijingcream.com/2013/02/us-security-firm-report-on-shadowy-chinese-hacking-organization/#comments</comments>
		<pubDate>Tue, 19 Feb 2013 20:18:17 +0000</pubDate>
		<dc:creator><![CDATA[Wendy Hale]]></dc:creator>
				<category><![CDATA[By Wendy Hale]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Hacking]]></category>

		<guid isPermaLink="false">http://beijingcream.com/?p=10128</guid>
		<description><![CDATA[The People’s Liberation Army may have been funding a massive group of Chinese hackers since 2006, according to a 74-page report by the US-based security firm Mandiant. Reading like the backpage of a Michael Crichton novel, the report details how a large hacking group, APT1, based in the Pudong district of Shanghai has been responsible for hundreds of...  <a href="http://beijingcream.com/2013/02/us-security-firm-report-on-shadowy-chinese-hacking-organization/" title="Read US Security Firm Claims Shadowy Chinese Hacking Organization Has &#8220;Compromised&#8221; 141 Companies Since 2006" class="read-more">Read more &#187;</a>]]></description>
				<content:encoded><![CDATA[<a href="http://beijingcream.com/wp-content/uploads/2013/02/Mandiant-report-on-Chinese-hacking.png"><img alt="Mandiant report on Chinese hacking" src="http://beijingcream.com/wp-content/uploads/2013/02/Mandiant-report-on-Chinese-hacking.png" width="522" height="164" /></a>
<p>The People’s Liberation Army may have been funding a massive group of Chinese hackers since 2006, according to a 74-page <a href="http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf" target="_blank">report</a> by the US-based security firm Mandiant. Reading like the backpage of a Michael Crichton novel, the report details how a large hacking group, APT1, based in the Pudong district of Shanghai has been responsible for hundreds of cyber attacks in the last seven years.<span id="more-10128"></span></p>
<p>87 percent of APT1’s hacking victims were based in English-speaking countries, according to the report, and include “development agencies, foreign governments in which English is one of multiple official languages, and multinational conglomerates that primarily conduct their business in English.”</p>
<blockquote><p>We believe that organizations in all industries related to China’s strategic priorities are potential targets of APT1’s comprehensive cyber espionage campaign. While we have certainly seen the group target some industries more heavily than others (see Figure 13), our  observations confirm that APT1 has targeted at least four of the seven strategic emerging industries that China identified in its 12th Five  Year Plan.</p></blockquote>
<a href="http://beijingcream.com/wp-content/uploads/2013/02/Chinese-hacking-industries-compromised-by-APT1.png"><img class="alignnone  wp-image-10139" alt="Chinese hacking industries compromised by APT1" src="http://beijingcream.com/wp-content/uploads/2013/02/Chinese-hacking-industries-compromised-by-APT1.png" width="494" height="410" /></a>
<p>APT1 also has many suspicious structural similarities to a PLA unit. Mandiant believes APT1’s offices are located in a 12-story building fitted out by China Telecom and employs hundreds to thousands of employees, while &#8220;PLA Unit 61398 is also located in precisely the same area from which APT1 activity appears to originate.”</p>
<p>For its part, China/PLA has denied the allegations, the <a href="http://www.washingtonpost.com/world/report-ties-100-plus-cyber-attacks-on-us-computers-to-chinese-military/2013/02/19/2700228e-7a6a-11e2-9a75-dab0201670da_story.html" target="_blank">Washington Post</a> reports.</p>
<p>The Mandiant report goes into the nitty-gritty of the hacking process, but the takeaway is really this: never, ever open a strange attachment. Ever.</p>
]]></content:encoded>
			<wfw:commentRss>http://beijingcream.com/2013/02/us-security-firm-report-on-shadowy-chinese-hacking-organization/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>In New Book, Google Chairman Eric Schmidt Says China&#8217;s Hacking Culture Could Give It A Strategic Advantage</title>
		<link>http://beijingcream.com/2013/02/eric-schmidt-says-chinas-hacking-culture-could-give-it-a-strategic-advantage/</link>
		<comments>http://beijingcream.com/2013/02/eric-schmidt-says-chinas-hacking-culture-could-give-it-a-strategic-advantage/#comments</comments>
		<pubDate>Mon, 04 Feb 2013 18:40:58 +0000</pubDate>
		<dc:creator><![CDATA[Anthony Tao]]></dc:creator>
				<category><![CDATA[By Anthony Tao]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Book]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Tech]]></category>

		<guid isPermaLink="false">http://beijingcream.com/?p=9764</guid>
		<description><![CDATA[Google chairman Eric Schmidt has a new book ready to debut in April, The Digital Age, co-written by Jared Cohen, formerly of the State Department. As the Wall Street Journal puts it succinctly, the book is clear about one thing: &#8220;China is the most dangerous superpower on Earth.&#8221; Specifically, Schmidt writes that China&#8217;s hacking culture &#8212;...  <a href="http://beijingcream.com/2013/02/eric-schmidt-says-chinas-hacking-culture-could-give-it-a-strategic-advantage/" title="Read In New Book, Google Chairman Eric Schmidt Says China&#8217;s Hacking Culture Could Give It A Strategic Advantage" class="read-more">Read more &#187;</a>]]></description>
				<content:encoded><![CDATA[<a href="http://beijingcream.com/wp-content/uploads/2013/02/Eric-Schmidt.jpeg"><img class="alignnone size-medium wp-image-9765" alt="Eric Schmidt" src="http://beijingcream.com/wp-content/uploads/2013/02/Eric-Schmidt-300x199.jpeg" width="300" height="199" /></a>
<p>Google chairman Eric Schmidt has a new book ready to debut in April, <em>The Digital Age</em>, co-written by Jared Cohen, formerly of the State Department. As the Wall Street Journal <a href="http://blogs.wsj.com/corporate-intelligence/2013/02/01/exclusive-eric-schmidt-unloads-on-china-in-new-book/" target="_blank">puts it</a> succinctly, the book is clear about one thing: &#8220;China is the most dangerous superpower on Earth.&#8221;</p>
<p>Specifically, Schmidt writes that China&#8217;s hacking culture &#8212; New York Times, Wall Street Journal, Bloomberg, and Washington Post have all recently fallen victim &#8212; will give it a strategic advantage:</p>
<blockquote><p>“The disparity between American and Chinese firms and their tactics will put both the government and the companies of the United States as a distinct disadvantage,” because “the United States will not take the same path of digital corporate espionage, as its laws are much stricter (and better enforced) and because illicit competition violates the American sense of fair play,” they claim.</p>
<p>“This is a difference in values as much as a legal one.”</p></blockquote>
<p>The book says the US&#8217;s hands aren&#8217;t exactly clean:</p>
<blockquote><p>The U.S. is far from an angel, the book acknowledges. From high-profile cases of cyber-espionage such as the Stuxnet virus that targeted Iranian nuclear facilities, to exports of surveillance software and technology to states with bad human rights records, there is plenty at home to criticize.</p></blockquote>
<p>But they&#8217;re not engaged in the same scale of corporate (and media) espionage. Should they be? Here&#8217;s the controversial part:</p>
<blockquote><p>In this roundabout way the pair come close, on occasion, to suggesting western governments follow China’s lead and form closer relationships between state policy and corporate activity.</p>
<p>Take the equipment and software that comprises the Internet. Most of the world’s IT systems were once based almost entirely on Western infrastructure, but as Chinese firms get more competitive, that is changing, and not necessarily for the better, they say.</p></blockquote>
<p>The authors probably won&#8217;t find a more vociferous critic than WSJ itself: one editor, in a rather breathlessly written <a href="http://online.wsj.com/article/SB10001424127887323701904578275920521747756.html?mod=googlenews_wsj" target="_blank">editorial</a>, recently stated, &#8220;The Middle Kingdom might once have been the center of human civilization. But in the digital world, the Chinese are the barbarians at the gate.&#8221;</p>
<p>And then you remember that all non-Romans, to Rome, were &#8220;barbarians.&#8221; We know how <a href="http://en.wikipedia.org/wiki/Sack_of_Rome_(410)" target="_blank">that story turned out</a>.</p>
<p><a href="http://blogs.wsj.com/corporate-intelligence/2013/02/01/exclusive-eric-schmidt-unloads-on-china-in-new-book/" target="_blank"><em>Exclusive: Eric Schmidt Unloads on China in New Book</em></a> (WSJ, <em>image <a href="http://www.wired.co.uk/news/archive/2013-02/04/schmidt-china-hacking" target="_blank">Wired</a></em>)</p>
]]></content:encoded>
			<wfw:commentRss>http://beijingcream.com/2013/02/eric-schmidt-says-chinas-hacking-culture-could-give-it-a-strategic-advantage/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>The Wall Street Journal is reporting it got hacked by the Chinese, too</title>
		<link>http://beijingcream.com/2013/02/the-wall-street-journal-is-reporting-it-got-hacked-by-the-chinese-too/</link>
		<comments>http://beijingcream.com/2013/02/the-wall-street-journal-is-reporting-it-got-hacked-by-the-chinese-too/#comments</comments>
		<pubDate>Thu, 31 Jan 2013 21:08:11 +0000</pubDate>
		<dc:creator><![CDATA[Anthony Tao]]></dc:creator>
				<category><![CDATA[By Anthony Tao]]></category>
		<category><![CDATA[The East is Read]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Politics]]></category>

		<guid isPermaLink="false">http://beijingcream.com/?p=9689</guid>
		<description><![CDATA[Anything the New York Times can do, the Wall Street Journal can do better. Reporting: The Wall Street Journal said Thursday that its computer systems had been infiltrated by Chinese hackers for the apparent purpose of monitoring the newspaper&#8217;s China coverage. If you&#8217;re not being hacked and monitored by the Chinese, you&#8217;re just not important...  <a href="http://beijingcream.com/2013/02/the-wall-street-journal-is-reporting-it-got-hacked-by-the-chinese-too/" title="Read The Wall Street Journal is reporting it got hacked by the Chinese, too" class="read-more">Read more &#187;</a>]]></description>
				<content:encoded><![CDATA[<p>Anything the New York Times can do, the Wall Street Journal can do better. <a href="http://online.wsj.com/article/SB10001424127887323926104578276202952260718.html" target="_blank">Reporting</a>:</p>
<blockquote><p>The Wall Street Journal said Thursday that its computer systems had been infiltrated by Chinese hackers for the apparent purpose of monitoring the newspaper&#8217;s China coverage.</p></blockquote>
<p>If you&#8217;re not being hacked and monitored by the Chinese, you&#8217;re just not important enough. Somewhere, NBC News sheds a tear.</p>
<blockquote><p>Paula Keve, chief spokeswoman for the Journal&#8217;s parent company, Dow Jones &amp; Co., said in a written statement: &#8220;Evidence shows that infiltration efforts target the monitoring of the Journal&#8217;s coverage of China, and are not an attempt to gain commercial advantage or to misappropriate customer information.&#8221;</p>
<p>&#8230;Ms. Keve called the infiltration of networks related to coverage of China an &#8220;ongoing issue,&#8221; adding, &#8220;we continue to work closely with the authorities and outside security specialists, taking extensive measures to protect our customers, employees, journalists and sources.&#8221;</p></blockquote>
<p>If you have a WSJ login and password, now might be a good time to change in.</p>
<p><em><a href="http://online.wsj.com/article/SB10001424127887323926104578276202952260718.html" target="_blank">Chinese Hackers Targeted Wall Street Journal Computers</a></em> (WSJ)</p>
]]></content:encoded>
			<wfw:commentRss>http://beijingcream.com/2013/02/the-wall-street-journal-is-reporting-it-got-hacked-by-the-chinese-too/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Snitches Get Stitches: Chinese Hackers Break Into The New York Times&#8217;s Network To Fish Out Their Sources</title>
		<link>http://beijingcream.com/2013/01/snitches-get-stitches-chinese-hackers-break-into-nyt-network-to-fish-out-their-sources/</link>
		<comments>http://beijingcream.com/2013/01/snitches-get-stitches-chinese-hackers-break-into-nyt-network-to-fish-out-their-sources/#comments</comments>
		<pubDate>Thu, 31 Jan 2013 06:12:34 +0000</pubDate>
		<dc:creator><![CDATA[Anthony Tao]]></dc:creator>
				<category><![CDATA[By Anthony Tao]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Featured]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[New York Times]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Wen Jiabao]]></category>

		<guid isPermaLink="false">http://beijingcream.com/?p=9669</guid>
		<description><![CDATA[Chinese hackers, possibly using phishing software, reportedly broke into the New York Times's computer network four months ago and installed malware that enabled them to access the personal computers of 53 employees. All indications are that the attack is a response to the paper's investigation, led by Shanghai bureau chief David Barboza, into premier Wen Jiabao's family fortunes. The NY Times says its computers were compromised as far back as September 13, just as they were wrapping up reporting for the Wen piece, which was published on October 25.]]></description>
				<content:encoded><![CDATA[<a href="http://beijingcream.com/wp-content/uploads/2013/01/New-York-Times-NYT-vs-China1.png"><img class="alignnone size-full wp-image-9671" alt="The New York Times vs China" src="http://beijingcream.com/wp-content/uploads/2013/01/New-York-Times-NYT-vs-China1.png" width="414" height="168" /></a>
<p>Chinese hackers, possibly using phishing software, <a href="http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?smid=tw-share&amp;_r=0" target="_blank">reportedly broke into the New York Times&#8217;s computer network</a> four months ago and installed malware that enabled them to access the personal computers of 53 employees. All indications are that the attack is a response to the paper&#8217;s investigation, led by Shanghai bureau chief David Barboza, into premier <a href="http://www.nytimes.com/2012/10/26/business/global/family-of-wen-jiabao-holds-a-hidden-fortune-in-china.html?pagewanted=all" target="_blank">Wen Jiabao&#8217;s family fortunes</a>. The NY Times says its computers were compromised as far back as September 13, just as they were wrapping up reporting for the Wen piece, which was published on October 25.<span id="more-9669"></span></p>
<p>The concern here should not be for the New York Times, which had nothing stolen and no one harmed (and whose employees, frankly, should know better than to get phished). Near the middle of the NY Times&#8217;s four-page article, this:</p>
<blockquote><p>What they appeared to be looking for were the names of people who might have provided information to Mr. Barboza.</p></blockquote>
<p>Like a vindictive gangster, they were after informants. Chinese agents were after <em>Chinese</em> sources who could then be punished, since &#8212; like cops &#8212; the NY Times&#8217;s reporters are off limits. What we have is a high-level government equivalent of the street code &#8220;snitches get stitches.&#8221; Does anyone still wonder why journalists here are so rarely privy to leaked information from inside Zhongnanhai, China&#8217;s central government compound?</p>
<p>Thankfully, it appears that the New York Times used no anonymous sources for their Wen story:</p>
<blockquote>
<p style="text-align: left;">Mr. Barboza’s research on the stories, as reported previously in The Times, was based on public records, including thousands of corporate documents through China’s State Administration for Industry and Commerce. Those documents — which are available to lawyers and consulting firms for a nominal fee — were used to trace the business interests of relatives of Mr. Wen.</p>
</blockquote>
<p>But this case vividly illustrates the difficulty of doing investigative reporting here. Journalists, like beat-level cops in American urban areas, seem woefully ill-equipped to protect their sources, who bear too much risk.</p>
<p>Also, this bit can&#8217;t be very comforting:</p>
<blockquote>
<p itemprop="articleBody">“They could have wreaked havoc on our systems,” said Marc Frons, the Times’s chief information officer. “But that was not what they were after.”</p>
</blockquote>
<p>The attack came after the government issued ominous warnings:</p>
<blockquote><p>After The Times learned of warnings from Chinese government officials that its investigation of the wealth of Mr. Wen’s relatives would “have consequences&#8221;&#8230;</p></blockquote>
<p><em>Consequences</em>. Think Bobby Baccalieri of <em>The Sopranos</em> walking into a bar, taking two shots of Wild Turkey, and pointing to his head to indicate where a bullet goes.</p>
<p>You can&#8217;t accuse the Chinese of not knowing gamesmanship, a bit of tit for tat &#8212; you investigate our leader, we&#8217;ll spy on yours. You hurt his family, we&#8217;ll hurt yours.</p>
<p>The glaring difference, of course, is Wen Jiabao is one of the most powerful people in a country of 1.4 billion. Someone should probably hold him accountable, right? You disagree, Central Politburo?</p>
<p>For the record, China denies it hacked the New York Times.</p>
<blockquote><p>Asked about evidence that indicated the hacking originated in China, and possibly with the military, China’s Ministry of National Defense said, “Chinese laws prohibit any action including hacking that damages Internet security.” It added that “to accuse the Chinese military of launching cyberattacks without solid proof is unprofessional and baseless.”</p></blockquote>
<p><a href="http://www.nytimes.com/2013/01/31/technology/chinese-hackers-infiltrate-new-york-times-computers.html?smid=tw-share&amp;_r=0" target="_blank"><em>Hackers in China Attacked The Times for Last 4 Months</em></a> (NY Times)</p>
]]></content:encoded>
			<wfw:commentRss>http://beijingcream.com/2013/01/snitches-get-stitches-chinese-hackers-break-into-nyt-network-to-fish-out-their-sources/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>Everyone&#8217;s Twitter Account Is Being Hacked In China</title>
		<link>http://beijingcream.com/2012/11/everyones-twitter-account-is-being-hacked-in-china/</link>
		<comments>http://beijingcream.com/2012/11/everyones-twitter-account-is-being-hacked-in-china/#comments</comments>
		<pubDate>Thu, 08 Nov 2012 07:29:03 +0000</pubDate>
		<dc:creator><![CDATA[Anthony Tao]]></dc:creator>
				<category><![CDATA[By Anthony Tao]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Twitter]]></category>

		<guid isPermaLink="false">http://beijingcream.com/?p=6473</guid>
		<description><![CDATA[China Digital Times has noticed something very strange happening on Twitter: several high-profile China watchers have reported receiving warnings about attacks on their accounts. Which shadowy cyber prankster would dare try such a thing? Or is this the work of a more sinister agent of the People&#8217;s Republic branch of Anonymous? It seems wrong to...  <a href="http://beijingcream.com/2012/11/everyones-twitter-account-is-being-hacked-in-china/" title="Read Everyone&#8217;s Twitter Account Is Being Hacked In China" class="read-more">Read more &#187;</a>]]></description>
				<content:encoded><![CDATA[<a href="http://beijingcream.com/wp-content/uploads/2012/11/China-Twitter.jpeg"><img class="alignnone  wp-image-6474" title="China Twitter" alt="" src="http://beijingcream.com/wp-content/uploads/2012/11/China-Twitter.jpeg" width="468" height="367" /></a>
<p>China Digital Times has noticed something <a href="http://chinadigitaltimes.net/2012/11/twitter-accounts-attacked-as-18th-congress-begins/" target="_blank">very strange happening on Twitter</a>: several high-profile China watchers have reported receiving warnings about attacks on their accounts. Which shadowy cyber prankster would dare try such a thing? Or is this the work of a more sinister agent of the People&#8217;s Republic branch of Anonymous?</p>
<p>It seems wrong to target such a small community of like-minded people, and all at once, on such a sensitive day. What is our saboteur seeking to accomplish, denying China watchers, already near-comatose after Hu Jintao&#8217;s <a href="http://beijingcream.com/2012/11/clinging-to-life-at-the-18th-national-congress-were-here-to-help/">100-some-minute speech this morning</a>, their little corner in the buried-behind-the-great-firewall comedy club?</p>
<p>Meanwhile, we eagerly await to see what treasure trove of private tweets has been sitting in <a href="https://twitter.com/prchovanec" target="_blank">Patrick Chovanec</a>&#8216;s account, and revelations that <a href="https://twitter.com/cmphku" target="_blank">China Media Project</a> practices cabalistic dark arts, and pictures of dead animals via <a href="https://twitter.com/larsonchristina" target="_blank">Christina Larson</a>, and <a href="https://twitter.com/raykwong" target="_blank">Ray Kwong</a> carry on a conversation with a sunset, and <a href="https://twitter.com/AdamMinter" target="_blank">Adam Minter</a> tweet, over and over with differing numbers of equal signs: ====D</p>
<p>I will say one thing though: BJC&#8217;s account has not been hacked&#8230; and that seems like an oversight.<span id="more-6473"></span></p>
<blockquote class="twitter-tweet" width="500" lang="ja"><p>Test: Shit, Piss, Fuck, Cunt, CockSucker, MotherFucker, Tits.</p>
<p>&mdash; Beijing Creamさん (@beijingcream) <a href="https://twitter.com/beijingcream/status/266433052585123840">2012年11月8日</a></p></blockquote>
<p><script async src="//platform.twitter.com/widgets.js" charset="utf-8"></script></p>
]]></content:encoded>
			<wfw:commentRss>http://beijingcream.com/2012/11/everyones-twitter-account-is-being-hacked-in-china/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Anonymous: #GFW will be dead soon</title>
		<link>http://beijingcream.com/2012/04/anonymous-gfw-will-be-dead-soon/</link>
		<comments>http://beijingcream.com/2012/04/anonymous-gfw-will-be-dead-soon/#comments</comments>
		<pubDate>Mon, 09 Apr 2012 16:46:59 +0000</pubDate>
		<dc:creator><![CDATA[Anthony Tao]]></dc:creator>
				<category><![CDATA[By Anthony Tao]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Anonymous]]></category>
		<category><![CDATA[Censorship]]></category>
		<category><![CDATA[Hacking]]></category>

		<guid isPermaLink="false">http://beijingcream.com/?p=1962</guid>
		<description><![CDATA[Confession time: I&#8217;m petrified of Anonymous. As someone who is hopelessly clumsy when it comes to web hosting and IT, I know how easy it can be for an experienced hacker to ruin my day. But then again, I have nothing to hide. I &#8212; unlike Fang Binxing &#8212; did not engineer a &#8220;Great Firewall&#8221;...  <a href="http://beijingcream.com/2012/04/anonymous-gfw-will-be-dead-soon/" title="Read Anonymous: #GFW will be dead soon" class="read-more">Read more &#187;</a>]]></description>
				<content:encoded><![CDATA[<a href="http://beijingcream.com/wp-content/uploads/2012/04/Anonymous-GFW-warning.png"><img class="alignnone size-full wp-image-1963" title="Is the Great Firewall doomed?" alt="" src="http://beijingcream.com/wp-content/uploads/2012/04/Anonymous-GFW-warning.png" width="457" height="232" /></a>
<p>Confession time: I&#8217;m petrified of Anonymous. As someone who is hopelessly clumsy when it comes to web hosting and IT, I know how easy it can be for an experienced hacker to ruin my day.</p>
<p>But then again, I have nothing to hide. I &#8212; unlike Fang Binxing &#8212; did not engineer a &#8220;Great Firewall&#8221; for the express purpose of making lives difficult (I <a href="http://heartofbeijing.blogspot.com/2010/12/in-defense-of-fang-binxing-father-of.html">remind you</a> here that Fang Binxing is &#8220;not a walking heap of gelatinous shit&#8221;). I &#8212; unlike Fang Binxing &#8212; do not boast about having six VPNs (I only have one, Witopia), and <a href="http://www.china.org.cn/china/2011-02/18/content_21951602.htm">say</a>, &#8220;But I only try them to test which side wins: the GFW or the VPN.&#8221; I &#8212; unlike some &#8212; am happy to speak out against <a href="http://beijingcream.com/tag/censorship/">censorship</a>. And I somewhat fashion myself a man of the people, assuming &#8220;people&#8221; aren&#8217;t offended by the word &#8220;<a href="http://beijingcream.com/2012/04/via-ministry-of-censorships-biggest-bitch-gov-tells-microblogs-to-censor/">shit</a>.&#8221; Therefore, I think &#8212; if Anonymous really is serious about continuing its inroads onto Chinese turf &#8212; that at least I&#8217;m safe. As for some other people on Chinese Internet&#8230;<span id="more-1962"></span></p>
<p>We don&#8217;t know what to make of Anonymous&#8217;s plan to &#8220;take down the Great Firewall,&#8221; or its threats against Chinese government websites, but they certainly have clout &#8212; and more than enough credibility to at least draw Reuters&#8217;s attention, which <a href="http://news.yahoo.com/anonymous-says-plans-more-attacks-against-china-sites-103725591.html">reported</a> yesterday:</p>
<blockquote><p>The activist hacker group Anonymous plans to launch further attacks on Chinese government websites in a bid to uncover corruption and lobby for human rights, a member of the group said on Monday&#8230;.</p>
<p>&#8220;First we want to alert the Chinese government that we aren&#8217;t afraid, and we are going to show the truth and fight for justice,&#8221; Anonymous hacker &#8220;f0ws3r&#8221; told Reuters.</p></blockquote>
<p>I imagine this could be the government&#8217;s worst nightmare. It&#8217;s easy, relatively speaking, to deal with businesses and other governments: you just send a stern memo to the regional chamber of commerce or have one of your diplomats refuse to smile in the direction of one of their diplomats. But this new game has different rules, which I can only guess is a lack of rules. How do you negotiate with someone who operates from the shadows, is uninterested in diplomacy and undeterred by your lawyers?</p>
<p>The answer is to have a better offense, I think. The hacker known as fows3r might not have any fear, but I wonder if he&#8217;s as committed to his attack as his enemies are to their defense &#8212; and counterattack, we can only assume. Because China has an army of hackers, too, and judging by what we hear in the media, they&#8217;re also pretty damn good at what they do.</p>
<p>None of this will play out in the open, so we&#8217;ll just have to wait and see what gets selectively leaked. Storylines abound, that&#8217;s for sure.</p>
<p>Oh, and if you&#8217;re from Anonymous China, please <a href="mailto:tao@beijingcream.com">get in touch</a>. I have questions.</p>
]]></content:encoded>
			<wfw:commentRss>http://beijingcream.com/2012/04/anonymous-gfw-will-be-dead-soon/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
