Powered by TypePad

« Victory In Iraq | Main | The Times On Judy Miller (Again) »

August 28, 2005

Comments

Dave Schuler

If somebody offered a six-pack of beer as a prize for breaching or bringing down Chinese government sites, I suspect that within 24 hours there would be no intact Chinese government sites. My point in mentioning this is not to suggest that such a thing be done but two-fold: first, (at least right now) despite China's considerably larger population there's probably a significant hacker gap in our advantage; and, second, the United States isn't the only country with something to lose due to security breaches.

Bill Arnold

Reading the skeptic's position, at least as likely as chinese spammers is that the attackers are ordinary but *non-chinese* free-enterprisers, using compromized chinese machines to build/assemble networks of other compromised machines.

Sure, the chinese government could be at work; the principle of least malice is only tenuously applicable to the chinese government.

kim

So who is potentially most malicious, Chinese or American hackers?

It was envisioned years ago that computer warriors may fight the battles of the future. Well here we are. Be sure to check your seats to make sure you haven't left anything behind.
=============================================

H.M. Stryx

We have experienced direct action in these attacks and blocked them after extensive investigation. Unfortunately I can report that based on analysis of the attacks, these are not private organizations or mafia. IPs belonging to the Chinese Public Relations Ministry, as well as 3 ISPs on the same street in physical proximity (near enough to walk between) are the source, with slave machines in South Korea, Italy, and France (Speedera Networks). The attacks are human-directed, focusing agent time against targets that resist traditional automated attack methods or respond aggressively to questionable traffic. We have detected active attempts to provide traffic interception against SBC Networks users and predict this operation will yield significant data to the consumer nation on unencrypted Internet traffic. All our users are strongly urged to engage in the most aggressive encryption solutions both inside and on WAN access, as well as blocking target nations IP ranges for inbound and outbound traffic with full logging. Use of security devices and traps are strongly recommended but we do not anticipate police cooperation in international search and seizure of the responsible machines and parties.

Buy Entropia Universe Gold

Buy Entropia Universe Gold is a good way.

LOTRO Gold

When you have LOTRO Gold, you can get more!

The comments to this entry are closed.

Wilson/Plame