Taiwan Accuses China Of Launching Cyberattack
Taiwan’s Ministry of National Defense deems this systematic information attack launched by China as military warfare. North Korea is also operating a highly skilled military hacking unit focused on breaching South Korean computer systems.
This is military warfare.
In China’s Master Plan to Destroy America, Unrestricted Warfare, we find the intrusions of hackers as one means of attack. Taiwan’s response in labeling the hacker attack as military warfare may be an acknowledgement that they consider Unrestricted Warfare is being waged.
Whether it be the intrusions of hackers, a major explosion at the World Trade Center, or a bombing attack by bin Laden, all of these greatly exceed the frequency band widths understood by the American military.
http://ftp.die.net/mirror/cryptome/cuw02.htm
-Am
Taiwan Accuses China Of Launching Cyberattack June 16, 2004
According to the Taipei Times, a cabinet minister says government officials believe Chinese hackers have tapped into databases belonging to the Democratic Progressive Party and stolen classified information.
By George V. Hulme
Taiwanese government officials believe Chinese hackers have broken into databases belonging to the Democratic Progressive Party, the Taipei Times reported Wednesday, citing an unidentified Cabinet official as its source.
"The incident has sent jitters through the Ministry of National Defense, which deems a systematic information attack launched by China as military warfare," the paper quoted the Cabinet official as saying. The official said that the hackers stole classified information pertaining to upcoming visits to the United States by high-ranking Taiwanese government officials, the paper reported. The official also said the personal itineraries of President Chen Shui-bian and other party officials were stolen.
This isn't the only recent allegation of potentially state-sponsored cyberattacks. On May 27, Agence France-Presse cited South Korea's highest ranking military intelligence official, Song Young-Keun, commanding general of the Defense Security Command, as saying that North Korea is operating a highly skilled military hacking unit focused on breaching South Korean computer systems.
The AFP report quoted Young-Keun claiming that the North Korean hackers were stealing classified information from research institutes and government agencies.
"It should be no surprise to anyone that this is going on," says John Watters, president and CEO at security intelligence services provider iDefense Inc. "The surprise is that this is making the press and countries are acknowledging that they've been hacked."
Watters says it appears that some governments often work with rogue hacking groups to attack other nations, rather than use their own military hackers. "They don't want it proven that they were directly involved in the attack, which would be seen as an act of cyberwar," he adds.
Watters says there's no direct proof that such attacks are conducted in conjunction with nation states. "But there certainly appears to be some connectedness between the actions of hacker groups and the interests of certain countries," he says. "They appear to be often working in parallel."
Watters says most countries have military hacking groups which collect their own arsenal of digital weapons, including software vulnerabilities and exploit code that haven't been made public.
http://www.informationweek.com/story/showArticle.jhtml?articleID=22100221
Reference:
China’s Master Plan to Destroy America
Unrestricted Warfare
Qiao Liang and Wang Xiangsui
(Beijing: PLA Literature and Arts Publishing House, February 1999)
Is China Behind the 9/11 Attack on the United States?
While it is obvious that Unrestricted Warfare, China’s Master Plan to Destroy America, is being used for American propaganda purposes is there legitimacy in this ‘deadly cognition’?
The unrestricted warfare advocated in the original Chinese version is primarily a defensive measure as a strategic black mail. However in view of the events taking place not only on 9/11 but at other times it is clear that the defensive nature of the document may have become aggressive. Current and political events reveal that Unrestricted Warfare is being implemented by it seems not only China but other countries as well.
Following are a few excerpts I have gathered from Unrestricted Warfare with some rather curious surrounding circumstances.
Excerpt: Unrestricted Warfare
Whether it be the intrusions of hackers, a major explosion at the World Trade Center, or a bombing attack by bin Laden, all of these greatly exceed the frequency band widths understood by the American military.
http://ftp.die.net/mirror/cryptome/cuw02.htm
Thus, from China, a long time supporter of al Qaeda, comes the concept for the second more deadly 9/11 attack against the United States, a major explosion at the World Trade Center, or a bombing attack by bin Laden.
#msg-2380195
Taiwan’s Ministry of National Defense deems this systematic information attack launched by China as military warfare. North Korea is also operating a highly skilled military hacking unit focused on breaching South Korean computer systems.
This is military warfare.
In China’s Master Plan to Destroy America, Unrestricted Warfare, we find the intrusions of hackers as one means of attack. Taiwan’s response in labeling the hacker attack as military warfare may be an acknowledgement that they consider Unrestricted Warfare is being waged.
Whether it be the intrusions of hackers, a major explosion at the World Trade Center, or a bombing attack by bin Laden, all of these greatly exceed the frequency band widths understood by the American military.
http://ftp.die.net/mirror/cryptome/cuw02.htm
-Am
Taiwan Accuses China Of Launching Cyberattack June 16, 2004
According to the Taipei Times, a cabinet minister says government officials believe Chinese hackers have tapped into databases belonging to the Democratic Progressive Party and stolen classified information.
By George V. Hulme
Taiwanese government officials believe Chinese hackers have broken into databases belonging to the Democratic Progressive Party, the Taipei Times reported Wednesday, citing an unidentified Cabinet official as its source.
"The incident has sent jitters through the Ministry of National Defense, which deems a systematic information attack launched by China as military warfare," the paper quoted the Cabinet official as saying. The official said that the hackers stole classified information pertaining to upcoming visits to the United States by high-ranking Taiwanese government officials, the paper reported. The official also said the personal itineraries of President Chen Shui-bian and other party officials were stolen.
This isn't the only recent allegation of potentially state-sponsored cyberattacks. On May 27, Agence France-Presse cited South Korea's highest ranking military intelligence official, Song Young-Keun, commanding general of the Defense Security Command, as saying that North Korea is operating a highly skilled military hacking unit focused on breaching South Korean computer systems.
The AFP report quoted Young-Keun claiming that the North Korean hackers were stealing classified information from research institutes and government agencies.
"It should be no surprise to anyone that this is going on," says John Watters, president and CEO at security intelligence services provider iDefense Inc. "The surprise is that this is making the press and countries are acknowledging that they've been hacked."
Watters says it appears that some governments often work with rogue hacking groups to attack other nations, rather than use their own military hackers. "They don't want it proven that they were directly involved in the attack, which would be seen as an act of cyberwar," he adds.
Watters says there's no direct proof that such attacks are conducted in conjunction with nation states. "But there certainly appears to be some connectedness between the actions of hacker groups and the interests of certain countries," he says. "They appear to be often working in parallel."
Watters says most countries have military hacking groups which collect their own arsenal of digital weapons, including software vulnerabilities and exploit code that haven't been made public.
http://www.informationweek.com/story/showArticle.jhtml?articleID=22100221
Reference:
China’s Master Plan to Destroy America
Unrestricted Warfare
Qiao Liang and Wang Xiangsui
(Beijing: PLA Literature and Arts Publishing House, February 1999)
Is China Behind the 9/11 Attack on the United States?
While it is obvious that Unrestricted Warfare, China’s Master Plan to Destroy America, is being used for American propaganda purposes is there legitimacy in this ‘deadly cognition’?
The unrestricted warfare advocated in the original Chinese version is primarily a defensive measure as a strategic black mail. However in view of the events taking place not only on 9/11 but at other times it is clear that the defensive nature of the document may have become aggressive. Current and political events reveal that Unrestricted Warfare is being implemented by it seems not only China but other countries as well.
Following are a few excerpts I have gathered from Unrestricted Warfare with some rather curious surrounding circumstances.
Excerpt: Unrestricted Warfare
Whether it be the intrusions of hackers, a major explosion at the World Trade Center, or a bombing attack by bin Laden, all of these greatly exceed the frequency band widths understood by the American military.
http://ftp.die.net/mirror/cryptome/cuw02.htm
Thus, from China, a long time supporter of al Qaeda, comes the concept for the second more deadly 9/11 attack against the United States, a major explosion at the World Trade Center, or a bombing attack by bin Laden.
#msg-2380195
Discover What Traders Are Watching
Explore small cap ideas before they hit the headlines.
