CHINESE MILITARY, HACKERS AND CYBERNATIONALISTS

CHINESE MILITARY AND HACKERS

Chinese military planners have determined the greatest weakness the United States military has is its reliance on computer and satellite systems. It has developed strategies to take advantage of these systems. Hackers in the PLA have worked out plan aimed disabling an aircraft carrier battle group. A “virtual guidebook for electronic warfare and jamming" was developed by the PLA after carefully studying American and NATO military manuals.

There are two primary kinds of cyber attacks: 1) “fishing trips” for sensitive information; and 2) outright attacks that are aimed at destroying data or disrupting computer systems. Even a relatively unsophisticated hacker can download ready-to-use software from a Chinese site and use it to enter a victim’s computer and use the webcam to spy on the victim. The red light can deactivated, with the attacker often waiting until the victim gets up to go to the bathroom and get something to eat to steal information or attack the system. Cyber warfare expert Mike McConnell said, “Every nation with advanced technology is exploring options... to use this new capability to wage war. Everyone. All the time.”

The aim of military hackers is to attain “electronic dominance over each if its global rivals by 2050.” There are plans to cripple satellite communications system and bring financial markets to their knees. A massive cyberattack could leave the United States without electrical power for six months and cause a shut down of many of it military operations systems.

Chinese hackers began launching cyber attacks on U.S. government and military targets in 2003, including a coordinates serioes of attacks code-named Titan rain. . In 2007 the Chinese military successfully hacked into the Pentagon’s computer network, raising alarms that China could disrupt American military operations. The attack took place in June 2007 after several months of planning and shut down the computer system serving 1,500 Pentagon computers including the one used by of the Secretary of Defense,

After the Pentagon attack hundreds of computers had to be taken offline for months. Hackers also disrupted the U.S. Naval War College network. Chinese military hackers have also penetrated computers in the British military, the German government, including the offices of German Chancellor Angela Merkel, and top U.S. military contractors.

Most of the attacks appear to have been aimed at collected information and probing defenses, possible to prepare for a real cyber-war in the future. In 2010, the PLA announced that it was setting up a special command to handle cyberwar threats , but added that the department was for defensive purposes. The US created a similar centre in 2009. The US and Israel are also widely believed to have been responsible for the Stuxnet virus, which reportedly disrupted Iran's nuclear program.

Good Websites and Sources: Sources on the Chinese Military http://newton.uor.edu ; Chinese Military Guide globalsecurity.org ; Chinese Military Power www.comw.org ; Defence Talk Pictures of Chinese Military defencetalk.com ; Sino Defence sinodefence.com ; Chinese Government Site on the Chinese Military chinatoday.com Chinese Spies: Wikipedia List of Chinese Spies Wikipedia ; 60 Minutes Video of Pentagon Employee Selling Secrets to Chinese Spy cbsnews.com ; Chinese Spy Caught on a Security Camera washingtontimes.com ; Book: China Builds the Bomb by Sieny D. Drell (Stanford University, 1988) ; Links in this Website: CHINESE MILITARY Factsanddetails.com/China ; UNITED STATES, CHINA AND SPIES Factsanddetails.com/China TERRORISM AND BOMBINGS IN CHINA Factsanddetails.com/China ; GOVERNMENT IN CHINA Factsanddetails.com/China ; GOVERNMENT CONTROL OF THE INTERNET Factsanddetails.com/China ;

Hacker Attacks from China

Hackers from China have attacked dozens of websites in Japan, Taiwan and the United States, often seeking out military, government or conservative political sites. A series of attack on Japan’said to have been prompted by Japanese nationalism and Japan’s position on some disputed islands temporally shut down the sites of the Japanese Foreign Ministry Defense Agency and National Police Agency.

In the United States, hackers from China have successfully beached hundreds of unclassified networks in the U.S. Defense Department and other U.S. agencies. It is not clear whether the breaches were the work of a concerted attack supported by the government or the work of individual hackers acting on their own.

Hackers from China and Taiwan often invade and alter websites in each other’s countries. The Taiwanese national anthem, complete with music, for example, was placed on a web page for the Chinese Ministry of Railways. Chinese hackers responded by placing a mainland flag in the site for the Taiwan National Assembly.

Secret copying of data from an unattended laptop computer belonging to U.S. Commerce Secretary Carlos Gutierrez occurred during his visit to Beijing in December 2007 and the data was use to hack into Commerce Department computers.

Cyber attacks originating in China have become very common in recent years, said Bruce Schneier, chief security technology officer at telecommunications company BT. "It's not just the Chinese government. It's independent actors within China who are working with the tacit approval of the government," he said.

Chinese Military Suspected in Hacker Attacks on the U.S.

According to a 2009 U.S. Congressional report “individuals participating in ongoing penetrations of U.S. networks have Chinese language skills and have well established ties with the Chinese underground hacker community, although it acknowledges that “these relationships do not prove any government affiliation.”

According to a 2011 U.S. Congressional report China “conducted and supported a range of malicious cyber activities.” It said that evidence has emerged that tied the Chinese military to a decade-old cyber attack on a U.S.-based website of the Falun Gong spiritual group.

Chinese officials long have denied any role in computer attacks. The commission has “been collecting unproved stories to serve its purpose of vilifying China’s international image over the years,” said Wang Baodong, a spokesman for the Chinese Embassy in Washington, in a statement. China “never does anything that endangers other countries’ security interests.”

Defense Department reports of malicious cyber activity, including incidents in which the Chinese weren’t the main suspect, rose to a high of 71,661 in 2009 from 3,651 in 2001, according to the draft. This year, attacks are expected to reach 55,110, compared with 55,812 in 2010. Relying on the Internet

The Chinese military also has been focused on its U.S. counterpart, which it considers too reliant on computers. In a conflict, the Chinese would try to “compromise, disrupt, deny, degrade, deceive or destroy” U.S. space and computer systems, the draft says. “This could critically disrupt the U.S. military’s ability to deploy and operate during a military contingency,” according to the draft.

Other cyber intrusions with possible Chinese involvement included the so-called Night Dragon attacks on energy and petrochemical companies and an effort to compromise the Gmail accounts of U.S. government officials, journalists and Chinese political activists, according to the draft.

Often the attacks are found to have come from Chinese Internet-protocol, or IP, addresses. Businesses based in other countries and operating in China think that computer network intrusions are among the “most serious threats to their intellectual property,” the draft says.The threat extends to companies not located in China. On March 22, U.S. Internet traffic was “improperly” redirected through a network controlled by Beijing-based China Telecom Corp. Ltd., the state-owned largest provider of broadband Internet connections in the country, the draft said. In its draft of last year’s report, the commission highlighted China’s ability to direct Internet traffic and exploit “hijacked” data.

Chinese Military Suspected in Hacker Attacks on U.S. Satellites

Computer hackers, possibly from the Chinese military, interfered with two U.S. government satellites four times in 2007 and 2008 through a ground station in Norway, according to a congressional commission, Bloomberg reported in October 2011. The intrusions on the satellites, used for earth climate and terrain observation, underscore the potential danger posed by hackers, according to excerpts from the final draft of the annual report by the U.S.-China Economic and Security Review Commission. The report is scheduled to be released next month. [Source: Tony Capaccio and Jeff Bliss, Bloomberg, October 26, 2011]

“Such interference poses numerous potential threats, particularly if achieved against satellites with more sensitive functions,” according to the draft. “Access to a satellite’s controls could allow an attacker to damage or destroy the satellite. An attacker could also deny or degrade as well as forge or otherwise manipulate the satellite’s transmission.”

A Landsat-7 earth observation satellite system experienced 12 or more minutes of interference in October 2007 and July 2008, according to the report. Hackers interfered with a Terra AM-1 earth observation satellite twice, for two minutes in June 2008 and nine minutes in October that year, the draft says, citing a closed-door U.S. Air Force briefing. The draft report doesn’t elaborate on the nature of the hackers’ interference with the satellites.

U.S. military and intelligence agencies use satellites to communicate, collect intelligence and conduct reconnaissance. The draft doesn’t accuse the Chinese government of conducting or sponsoring the four attacks. It says the breaches are consistent with Chinese military writings that advocate disabling an enemy’s space systems, and particularly “ground-based infrastructure, such as satellite control facilities.”

In the October 2008 incident with the Terra AM-1, which is managed by the National Aeronautics and Space Administration, “the responsible party achieved all steps required to command the satellite,” although the hackers never exercised that control, according to the draft. The U.S. discovered the 2007 cyber attack on the Landsat-7, which is jointly managed by NASA and the U.S. Geological Survey, only after tracking the 2008 breach.

The Landsat-7 and Terra AM-1 satellites utilize the commercially operated Svalbard Satellite Station in Spitsbergen, Norway that “routinely relies on the Internet for data access and file transfers,” says the commission, quoting a NASA report. The hackers may have used that Internet connection to get into the ground station’s information systems, according to the draft.

While the perpetrators of the satellite breaches aren’t known for sure, other evidence uncovered this year showed the Chinese government’s involvement in another cyber attack, according to the draft. TV Report A brief July segment on China Central Television 7, the government’s military and agricultural channel, indicated that China’s People’s Liberation Army engineered an attack on the Falun Gong website, the draft said.

The website, which was hosted on a University of Alabama at Birmingham computer network, was attacked in 2001 or earlier, the draft says. The CCTV-7 segment said the People’s Liberation Army’s Electrical Engineering University wrote the software to carry out the attack against the Falun Gong website, according to the draft. The Falun Gong movement is banned by the Chinese government, which considers it a cult.

After initially posting the segment on its website, CCTV-7 removed the footage after media from other countries began to report the story, the congressional draft says.

U.S. Congress Report: "Foreign Spies Stealing US Economic Secrets in Cyberspace

A November 2011 report by the U.S. Congress titled "Foreign Spies Stealing US Economic Secrets in Cyberspace" said China and Russia are using cyber espionage to steal U.S. trade and technology secrets to bolster their own economic development, which poses a threat to U.S. prosperity and security. So much sensitive information and research is on computer networks that foreign intruders can collect massive amounts of data quickly and with little risk because they are difficult to detect, the report said.[Source: Tabassum Zakaria, Reuters, November 3, 2011]

Foreign intelligence services, corporations and individuals increased their efforts to steal U.S. technologies which cost millions of dollars to develop, according to the report by the Office of the National Counterintelligence Executive, a U.S. government agency, which covers 2009-2011. "The nations of China and Russia, through their intelligence services and through their corporations, are attacking our research and development," National Counterintelligence Executive Robert Bryant said. "That's a serious issue because if we fuel their economies on our information, I don't think that's right," he said at a news conference.

Intelligence services, private companies, academic institutions and citizens of dozens of countries target the United States, the report said. But it only named China and Russia."Chinese actors are the world's most active and persistent perpetrators of economic espionage," the report said.Russia was also singled out. "Russia's intelligence services are conducting a range of activities to collect economic information and technology from US targets," the report said. It acknowledged the difficulty of determining who exactly is behind a cyber attack.

Information and communications technology, military technologies such as unmanned aerial vehicles, and civilian technologies such as clean energy, and healthcare and pharmaceuticals are areas that may be of interest as foreign cyber espionage targets, the report said. Intelligence officials say it is part of the national policy of China and Russia to try to acquire sensitive technology which they need for their own economic development, while the United States does not do economic espionage as part of its national policy.

The National Science Foundation said research and development spending by U.S. government, industry and universities was $398 billion in 2008. But there are no reliable gauges for how much is stolen through cyber spying. "This is a quiet menace to our economy with notably big results," Bryant said. "Trade secrets developed over thousands of working hours by our brightest minds are stolen in a split second and transferred to our competitors."

The pace of foreign economic and industrial espionage against the United States is accelerating, the report said."We judge that the governments of China and Russia will remain aggressive and capable collectors of sensitive US economic information and technologies, particularly in cyberspace." China and Russia are "motivated by the desire to achieve economic, strategic, and military parity with the United States," the report said.

Top American Electronic Espionage Expert on China

One of the most knowledgeable people about China’s cyber warfare capabilities is Mike McConnell, who was director of the National Intelligence, the supreme authority over U.S. intelligence, from 2007 to 2009, and head National Intelligence Agency (NSA), from 1992 to 1996. He told Nathan Gardels in the Global Viewpoint column, the Chinese “are determined to be the best. Probably the best in the cyber realm are the United States, then the Russians, the British, the Israelis and the French. The next tier is the Chinese.”

“The Chinese,” McConnell said, “are exploiting our systems for information advantage---looking for characteristics of a weapon system by a defense contractor or academic research on plasma physics, for example---not in order to destroy the data and do damage. But, for now, I believe they are deterred from destroying data both by the need to export to the U.S. and by the need to maintain a stable currency and stable global markets.”

Chinese “intelligence collection is coordinated,” McConnell presumes. “But just as in the U.S., there are competing bureaucracies carrying out the cyber-exploitation mission. In China today, there are thousands of people in a sustained efforts to collect intelligence, many of them on an entrepreneurial basis, as it were, within competing bureaucratic structures.”

McConnell said one of the primary motivating forces behind China’s aggressive cyber activities was the shock that Chinese leaders experienced when they saw U.S. smart bombs in action in Iraq in the first Persian Gulf War. By “linking computer technology with weaponry to attain precision...we owned the ability to locate and see targets...We could take a valuable target out with one bomb at the time of our choosing...I believe the Chinese concluded...that their counter approach had to be to challenge America’s control of the battle space by building capabilities to knock out our satellites and invading it’s cyber networks.”

McDonnell said, China’s “cyber war capability is part and parcel of their growing military might. The Chinese have developed the capacity to shoot-down satellites. They have developed over-the-horizon radar capabilities. They have missiles that can be retargeted in flight. In short, they are seeking ways to keep us at bay in the event of a conflict, to not let us approach China. In time, as their power, influence and wealth grows, China likely will develop “power projection” weapons systems...They see the Middle Kingdom as the center of the world. They have gone from what they describe as the “the century of shame” to “our century” going forward, and they want to protect that from the U.S. or anybody else. The Chinese want to dominate this information space. So, they want to develop the capability of attacking our “information advantage” while denying us this capability.”

How the Hacking Attacks from China Are Coordinated

James Glanz and John Markoff wrote in the New York Times, “Precisely how these hacking attacks are coordinated is not clear. Many appear to rely on Chinese freelancers and an irregular army of “patriotic hackers” who operate with the support of civilian or military authorities, but not directly under their day-to-day control, the cables and interviews suggest. [Source: James Glanz and John Markoff, New York Times, December 4, 2010]

Diplomatic cables involving China leaked by Wikileaks in December 2010 revealed “some suppositions by Chinese and Americans passed along by diplomats. For example, the cable dated earlier this year referring to the hacking attack on Google said: “A well-placed contact claims that the Chinese government coordinated the recent intrusions of Google systems. According to our contact, the closely held operations were directed at the Politburo Standing Committee level.”

The cable goes on to quote this person as saying that the hacking of Google “had been coordinated out of the State Council Information Office with the oversight” of Mr. Li and another Politburo member, Zhou Yongkang.” Mr. Zhou is China’s top security official.

But the person cited in the cable gave a divergent account. He detailed a campaign to press Google coordinated by the Propaganda Department’s director, Liu Yunshan. Mr. Li and Mr. Zhou issued approvals in several instances, he said, but he had no direct knowledge linking them to the hacking attack aimed at securing commercial secrets or dissidents’ e-mail accounts---considered the purview of security officials. Still, the cables provide a patchwork of detail about cyberattacks that American officials believe originated in China with either the assistance or knowledge of the Chinese military.

For example, in 2008 Chinese intruders based in Shanghai and linked to the People’s Liberation Army used a computer document labeled “salary increase---survey and forecast” as bait as part of the sophisticated intrusion scheme that yielded more than 50 megabytes of e-mails and a complete list of user names and passwords from a United States government agency that was not identified.

The cables indicate that the American government has been fighting a pitched battle with intruders who have been clearly identified as using Chinese-language keyboards and physically located in China. In most cases the intruders took great pains to conceal their identities, but occasionally they let their guard down. In one case described in the documents, investigators tracked one of the intruders who was surfing the Web in Taiwan “for personal use.”

Wikileaks Revelations About Chinese Hacker Attack on U.S. Government Sites

James Glanz and John Markoff wrote in the New York Times that U.S. diplomatic cables involving China leaked by Wikileaks in December 2010 revealed “at least one previously unreported attack in 2008, code-named Byzantine Candor by American investigators, yielded more than 50 megabytes of e-mails and a complete list of user names and passwords from an American government agency, a Nov. 3, 2008, cable revealed for the first time. [Source:James Glanz and John Markoff, New York Times, December 4, 2010]

In June 2009 during climate change talks between the United States and China, the secretary of state’s office sent a secret cable warning about e-mail “spear phishing” attacks directed at five State Department employees in the Division of Ocean Affairs of the Office of the Special Envoy for Climate Change.

The messages, which purport to come from a National Journal columnist, had the subject line “China and Climate Change.” The e-mail contained a PDF file that was intended to install a malicious software program known as Poison Ivy, which was meant to give an intruder complete control of the victim’s computer. That attack failed.

The cables also reveal that a surveillance system dubbed Ghostnet that stole information from the computers used by the exiled Tibetan spiritual leader, the Dalai Lama, and South Asian governments and was uncovered in 2009 was linked to a second broad series of break-ins into American government computers code-named Byzantine Hades. Government investigators were able to make a “tenuous connection” between those break-ins and the People’s Liberation Army.

The documents also reveal that in 2008 German intelligence briefed American officials on similar attacks beginning in 2006 against the German government, including military, economic, science and technology, commercial, diplomatic, and research and development targets. The Germans described the attacks as preceding events like the German government’s meetings with the Chinese government.

Lockheed Martin Corp, the U.S. government's top information technology provider, said last week it had thwarted "a significant and tenacious attack" on its information systems network, though no signs pointed to a Chinese origin.

McAfee Reports on Chinese Hackers Attacks

In February 2011, the Internet security company McAfee released a report that hackers operating from China stole sensitive information from Western oil companies through a “coordinated, covert and targeted” attack that began in February 2011. McAfee did not identify the companies but said hackers stole information in operations, bidding for oil fields and financing. The hackers worked through servers in the United States and the Netherlands and exploited vulnerabilities in the Windows operation system.

In August 2011, McAfee claimed it had uncovered the biggest series of cyber-attacks to date and believed a state actor was responsible. The security company said it had discovered a five-year long campaign of cyber attacks on the networks of governments, organisations and businesses. It did not name the "state actor" it believed was behind the attacks but several experts pointed the finger at China. McAfee said the 72 victims in the hacking campaign included the governments of the United States, Taiwan, India, South Korea, Vietnam and Canada. Other targets were the United Nations, the Association of Southeast Asian Nations, the International Olympic Committee; and an array of companies from defence contractors to hi-tech enterprises. [Source: Reuters, The Guardian August 5, 2011]

China's leading state newspaper dismissed as "irresponsible" suggestions that Beijing was the "state actor" behind massive internet hacking of governments and companies. The People's Daily disputed the suggestions. "Linking China to internet hacking attacks is irresponsible," it said. "The McAfee report claims that a “state actor' engaged in hacking for a large-scale internet espionage operation, but its analysis clearly does not stand up to scrutiny."

TV Program Shows Clip of Chinese Cyber Attack

Tania Branigan wrote in The Guardian, “China's state broadcaster has screened footage that apparently shows army-labelled software for attacking US-based websites, security experts have said. ..The analysts warned that the six-second clip could be a mock-up by the broadcaster, CCTV, and that, if genuine, it was probably around 10 years old. The footage emerged as the Pentagon's annual report to Congress on the Chinese military said the People's Liberation Army (PLA) had closed some key technological gaps and was on track for modernisation, including thorough investment in cyber capabilities, by 2020. The Chinese state news agency, Xinhua, denounced the document as a scaremongering "cock and bull story". [Source: Tania Branigan The Guardian August 25, 2011]

The footage shown by CCTV was part of a cybersecurity documentary screened on its military channel last month and removed from its website after US security analysts wrote about it. The programme includes a detailed discussion of cybersecurity by Senior Colonel Du Wenlong, of the PLA's academy of military sciences. A narrator then talks about methods of attack as the screen shows software being operated by an unseen user. The Chinese characters indicate an option for a distributed denial of service attack---a crude form of attack that disrupts access to a site by bombarding it with requests for data.

Another shot shows the words "attack system" and "PLA Electronic Engineering Institute" on screen. The user chooses a name, minghui.org, from a list of sites belonging to the banned Falun Gong spiritual movement and clicks on a button reading "attack". The security-focused China SignPost site suggested the footage, if genuine, was likely to be more than a decade old because the method was so basic and because there were several such attacks on Falun Gong sites in 1999 and 2000.

Beijing has consistently denied being behind cyber-attacks, insisting it plays no part in hacking and is itself a victim. Dr Andrew Erickson, an associate professor at the US Naval War College's China Maritime Studies Institute, and Gabe Collins, a commodity and security specialist, wrote: "It appeared to show dated computer screenshots of a Chinese military institute conducting a rudimentary type of cyber-attack against a United States-based dissident entity. However modest, ambiguous---and, from China's perspective, defensive---this is possibly the first direct piece of visual evidence from an official Chinese government source to undermine Beijing's official claims never to engage in overseas hacking of any kind for government purposes."

Asked whether the footage had been mocked up, CCTV 7 said it did not respond to queries from foreign media. CCTV has been caught using misleading footage in the past, memorably in January, when shots from the film Top Gun were inserted into a news report about PLA training exercises.

The Washington Post said Wang Baodong, a spokesman for the Chinese embassy in Washington, had declined to comment on the video, but added: "It's no secret that Falun Gong and its subordinate institutions have been intensifying their subversive efforts against China in cyberspace. And China has every legitimate right to take action against such harmful activities to defend its national security interests." Cyber-attacks are becoming an increasing source of concern for governments around the world. In a strategy document earlier this year, the Pentagon said it would be willing to use conventional military action to retaliate.

Attack on Google

In January 2010, Google threatened to pull out of China and said t would stop filtering Internet searches on its site in China after it was revealed that hackers in China attacked it and stole valuable corporate secrets from its computer systems.

There was a systematic attack on Google and 33 other firms including Juniper Networks, Adobe, Yahoo, Symantec, and Northrop Grumman. One of the aims on the attack on Google it seemed was to gain information on human rights activists. Afterwards international journalists with Google accounts complained their e-mail had been hacked.

The Internet security firm McAfee later announced it had isolated the malicious software used in the attack, saying it exploited a previously unknown vulnerability in Microsoft Internet Explorer that allowed attackers to secretly commandeer the victim’s system. McAfee analyst George Kurtz told the Washington Post, “The current bumper crop of malware is very sophisticated, highly targeted and designed to infect, conceal access, siphon data or, even worse, modify data without detection.” The programs “were primarily seen by governments, and the mere mention of them strikes fear in any cyberwarrior.”

The attack on Google and the threat posed to the Internet and the American government was viewed as serious enough it become a diplomatic issue between the United States and China. U.S. Secretary of State Hillary Clinton urged China to investigate the cyber intrusions of Google. Beijing responded by saying that it was not involved in the cyber attacks and that Washington’s demand implied that it was and said China was the biggest victim of cyber attacks, not the main source of them, with many of attacks on China originating in the United States.

Cybernationlists and Hackers

As the attack on Google in January 2010 showed the victims of cyber attacks are just as likely to be private companies as military or government targets with the aims being to steal computer source codes, company secrets and strategies, and intellectual property or to implant spyware or disruptive malware or otherwise disrupt the target company . The hackers often use a “1,000 grains of sand” approach, meaning they collect every bit of information they can and sift through it for intelligence. Many companies that are victims of such attacks regard them as an embarrassment and keep quiet about them.

A report by the congressional U.S.-China commission noted Chinese espionage is sometimes “straining the U.S. capacity to respond.” The report focused on one attack and concluded that it was supported and possibly orchestrated by the Chinese government.

Cybernationalists seize on anything seen as anti-Chinese and attack those who are perceived of instigating it.

There is little hard evidence that the elite hackers have ties with the Beijing government although it is widely believed they are.

Nationalism today is largely driven through exchanges on the Internet and e-mail. Cybernationalists seize on anything seen as anti-Chinese on the Internet and attack those who are perceived of instigating it.

Cybernationalists see Chinese history as a series of conspiracies, schemes and betrayals at the hands of foreigners who are also blamed for almost every bad thing that happens to China today. Declining Chinese stocks are blamed on foreign speculators who “wildly manipulate” Chinese stock markets and lure investors to take their money out of China. These nationalists talk of a global “currency war” to “make Chinese people foot the bill” for America’s financial woes.

The cybernationalists are known for being particularly nasty to anyone who defies their agenda. Among the responses to criticism of their positions have been “someone give me a gun! Don’t show mercy to the enemy!” And “People who fart through the mouth will get shit stuffed down their throats by me!”

See Tibet

Book: Chinese Cyber Nationalism by Xu Wu, a former journalist in China now at Arizona State University.

Activities by Chinese Cybernationalists

Hackers have caused the website for the U.S. Embassy in Beijing to display the slogan “Down with Barbarians” and made the White House website crash under flood of angry e-mail.

In preparation for a wave anti-Japanese protests in the mid 2000s, anti-Japanese messages were broadcast via chat rooms, bulletin boards and text messages. When the protests were at their peak in Shanghai the Shanghai police cut off cell phone service to downtown Shanghai.

One of the most viewed video in the Internet in 2008 was a piece called 2008 China Stand Up, a work made from snatched video and photos---by a Fudan university student named Tang Jie, who called himself CTGZ---that drew a million hits in its first week and half online. It begins with a run down of “farces, schemes and disasters” thrown at the Chinese by foreigners, then cuts to images of Tibetan rioters and a montage of pressing clippings critical of China, with CNN and BBC logos giving way to images of Nazi and accusations the West s stirring up a “new Col War.” From there it moves on to protesters attempting to disrupt the Olympic torch relay and ends with a Chinese flag and the promise: “We will stand up and hold together always as one family in harmony!”

See Tibet, Japan.

After writing a piece about the disruption of the Olympic torch relay in London, one Times reporter received an e-mail that read: “Hope someday someone will spit in your face. Your name will be recorded in Chinese history book forever as one of cold-blooded, Hitler-type, murder’s assistant.” Other foreign reporters who have received much worse as well as death threats have been worried enough to move their offices.

Computer Spies Worldwide

A report by the Munk Center of International Studies at Toronto University revealed that a vast Chinese spying operation had infiltrated computers and stolen documents from at least 1,295 computers in government and private offices in 103 countries. Among the targets have been embassies, foreign ministries and offices associated with the Dalai Lama.

The spying operation invades and monitors computers by not just “phishing” for random, information by “whaling” for particularly important targets with capabilities of turning on cameras and microphones and recording sound and images in the room where the target computers are located. Using these methods spies gained control of the e-mail server for the Dalai Lama’s organization and used information gathered from this source to put pressure on diplomats and Chinese citizens who had contact with the Dalai Lama. Most of the computers behind the operation were China but there was no evidence that the Chinese government was behind it.

The targeted computers were usually infected with an e-mail that once clicked implants software deep in the targeted computer or lead directly to a “poisoned” web site.

Tibet and Hackers

The Dalai Lama has said that hackers have hacked into his computers and those of the Tibetan exile community and accessed e-mail and information, in one case getting information about a request for an Indian visa, with the Chinese government contacting an Indian embassy and telling them not to grant the visa. In other cases hackers have gained access to e-mails between exile offices just a few kilometers apart in Dharamsala.

The Dalai Lama has said he is not sure who the hackers are but is sure the stolen information finds its way to the Chinese government, A Canadian research group called the Information Warfare Monitors which looks into the matter said mainland hackers they have researched tend to be very nationalistic and “place as much importance on sovereignty [over Tibet] as Beijing does.”

Computers of the Tibetan Government in Exile and its support groups around the world have been attacked by a Chinese-made virus that some believe was sent an okay from Beijing.

Image Sources:

Text Sources: New York Times, Washington Post, Los Angeles Times, Times of London, National Geographic, The New Yorker, Time, Newsweek, Reuters, AP, Lonely Planet Guides, Compton’s Encyclopedia and various books and other publications.

Page Top

© 2008 Jeffrey Hays

Last updated October 2011


This site contains copyrighted material the use of which has not always been authorized by the copyright owner. Such material is made available in an effort to advance understanding of country or topic discussed in the article. This constitutes 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit. If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner. If you are the copyright owner and would like this content removed from factsanddetails.com, please contact me.