China’s national defense agencies who have been outside the large-scale espionage network attack (Figure)
Air Force network warfare command of the brochure. Xinhua News Agency reporter Zhang Yanshe
International Herald Tribune reporter intern reporter Leiwen Jia Hui Liang from Beijing not Night clothes, but active in the network of dark world; without Feiyanzoubi, was able to win over opponents ‘foregone conclusion’ ; without a robust physique, and superb martial arts, able to run-off on thousands of miles away.
a high-configuration PC, is their deadly weapons, the mouse is like AK-47, CPU like a bomber. As long as tapping the keyboard, you can set off a storm across the Atlantic … …
recently set off a wave of Western media played up “China threat theory network,” the climax, fabricated the so-called “China’s spy network.” A recent message on April 3, Australian media reports claimed that “China’s network of spies Prime Minister Kevin Rudd has tried to capture e-mail, and attack the Australian Government, commercial computer networks, and foreign embassies,” and so on.
4 7 April, the National Defense University military expert Professor Meng Xiangqing to the “International Herald Tribune,” sharply pointed out: This is the West cast a smokescreen to cover them on the Internet in China “lose ground”, in fact, China in the West by highly skilled network of spies victims. China Internet Illegal Information Reporting Centre head 7, also told reporters that the use of the Internet’s hidden, anti-China hostile forces and elements on the Internet in China has been engaged in anti-China activities, theft of Chinese intelligence.
China’s Internet has experienced “Waterloo”
University of Toronto, Canada Moncton International Research Center recently released a study on the network, as the Western media This round of “China’s Internet Threat” fuse.
According to reports, the center after 10 months of research, declared that “discovered” a base in “the territory of China, massive” Internet spy network, which has penetrated 103 countries, 1295 computer. The report came out, then rise to a “butterfly effect”, the Western media have an excuse for the old tune, played up “China’s Internet threat.”
While the report mentioned in the so-called “victim” (ie Israel) come out to prove “not subject to cyber attacks from China,” but the Western media was unanimous. The research center that had to come forward to explain, “This does not necessarily mean that the Chinese government involvement in the spy network, it could be the United States Central Intelligence Agency, or the Russians doing.”
Internet is such a “dark world”, no borders, geography, time and space constraints, agile “network agent” behind may be far from a residential building in Hawaii, the lanky, it could be your desk opposite mm tiny new colleagues. China Institute of Contemporary International Relations, Social Development Research Information and Don Lan, deputy director told the “International Herald Tribune,” Western media hype and no basis to launch attacks if the computer’s IP address from within China, we can not explain is the computer in China is because the spy can be transplanted outside the network, “Trojan horse”, “zombie” programs on computers in China to implement remote control, and computer in China as a springboard to any other computer on the Internet attack, “from Technically, it is difficult to determine the network attacks come from any country or organization. “
in Professor Meng Xiangqing view, the West overestimated China’s spy network warfare capabilities,” China’s Internet technology has not threatened his country’s ability to threaten the strongest of the few United States a natural. “
In fact, U.S. intelligence agencies spy network has long been an open secret strength. In 2000, the British media to expose a network of U.S. Central Intelligence Agency spy program, which shows that the CIA sought to enter the world’s major corporations, banks and government agencies the ability of computer systems to gather information. To cover for them, the CIA has set up a high-tech companies, under the guise of civil status and the Silicon Valley high-tech companies to develop on the Internet can get anything from spyware.
the Western media portrayed as “The Matrix” in Chinese, Western natural network of spies was listed as the best opponents. Two years ago, according to media reports, some of the important sectors of China’s computer to suffer a “Waterloo”, a number of government departments, defense agencies, military units and other important business, was outside the large-scale theft of network attacks. It is said that there are tens of thousands outside the control side staring Trojan thousands of computers in China.
Obviously, as a relatively weak technical capacity of China is the biggest victims of war spy network. IT industry analysis, said technical experts to the newspaper, select the configuration outside of the general high, with small, weak protection of the computer to start and use it as a springboard to launch network operations; most cases, the Chinese medium-sized city government agencies to start the computer is often easy to become goals. Tang Lan researcher also told the “International Herald Tribune,” China’s personal computers and corporate computer protection is weak, often target foreign spy agencies. Tang Lan, Symantec Corp. researcher to the United States released a report monitoring example, the report shows, “is the number of foreign computer remote control, the number of computers in China affected always ranked first or second place.”
collusion between domestic and foreign anti-China forces
Professor Meng Xiangqing pointed out that in recent years, Western countries and Taiwan and some foreign spy agency, the mainland’s espionage network increasingly active, the approach means are becoming increasingly diverse, the purpose is taking the mainland’s political, military, economic and business intelligence information.
Meng Xiangqing it has been China Internet Illegal Information Reporting Centre confirmed. Internet Society of China is the center of industry self-regulatory body, to accept the public network for illegal and bad behavior to report. In an interview with The Center for “International Herald Tribune” interview, for political purposes, collusion between domestic and foreign anti-China forces in China, wantonly spread rumors on the Internet, people’s minds, and steal valuable information. The Center for the newspaper exemplified: In March, the national authorities with the United States government agencies exposed the “Tibetan separatist” organization, the Joint Action Plan for China’s network – “Zhewa Online”, the program began in the United States International Broadcasting Bureau and the Canadian “Samzhub Consulting Company” in May 2006 signed a secret contract.
According to the person in charge, as a subsidiary body of the U.S. government, the U.S. International Broadcasting Bureau responsible for the management of overseas broadcasting entity, “Voice of America” ??is the management of its subsidiary bodies; and “Samzhub consulting company” legal representative of the soil Dengsang beads, is the most important confidant of the Dalai Lama is one of the so-called “Tibetan government in exile” in the former North American representative. “Zhewa Online” task is clear: using the Internet for incitement to confuse Internet users in China, penetration instigation, rumors lead to unrest and Chinese intelligence gathering.
one was in the “Zhewa Online” Tibetan youth awakened work reveals that the organization is a network of orders from the U.S. spy agency, to take American money, by the American supervision, and American service.
spread rumors to stir up trouble
“spy network” functions are not limited to theft of information, rumors, demagogic, sedition but also their important objectives.
Hong Kong “Ta Kung Pao,” once said that “public opinion against the US-Japan network interference rape China” as the headline says, is headquartered in North America, a Chinese web forum has conducted a survey and found that those who published regularly on the Internet. ” sensitive article “is not a simple background of the person who employed the United States, Japan and other countries of the spy agency, specializing in online posted an article attacking the Chinese government and false news, covering China’s political attack, values, ethics and even community .
Tang Lan, according to researcher observations, he summed up a rule: whenever the United States, Japan, when conflicts occur, the phenomenon will increase the foreign spy network, the Internet forum state relations provocative remarks rumors and more will quietly emerge.
“Germany hotline” is an online foreign exchange platform for Chinese, Liu Li told the official “International Herald Tribune,” Some users point of view is very extreme, targeted attacks on the Chinese government. He understood that those who post more than the so-called “pro-democracy activists,” “they will attack our site, that our website is run by the Chinese government to gather intelligence for the purpose of selling the Chinese government.”
China Internet Illegal Information Reporting Centre, told this reporter that on the Internet in China, the negation of reform and opening up and socialist values ??statements have frequently appeared in some non-mainstream community forum, bringing together Qinglian, Guo Quan, and so a group of self-proclaimed so-called “netizens opinion leaders”, “does not exclude some of them outside the context.”
rebellion Hong Kong media that the U.S. intelligence agencies spend millions of dollars every year to fund a number of “network traitor” ideological penetration of Internet users in China, instigation, these so-called “network traitor” more is the losers, and no fixed working person; they come and go in various Chinese forums, portals, Americans regularly receive salaries paid.
innocent users into a “scapegoat”
American money, “Tibetan separatist” and other anti-China forces to contribute, but ultimately it is the innocent victim Internet users.
“Dragon Jane” (screen name) is such an innocent victim. Living in the Aba region of Sichuan, she is pure and simple, because more free time, “Dragon Jane” to become the Internet habits. Two years ago, she met a through QQ chat up the strike of active users, the “opinion”, “depth of knowledge,” “friendly” and “Dragon Jane” impression of the users.
In fact, the users is not a simple backing, his true identity is the “Tibetan government in exile” work overseas Tibetans, the task is the development in China, “Tibetan separatist” forces. Not long, the lack of vigilance on the outside of the “Dragon Jane” to be pulled into the water, the man “friendly” under the instigation of friends, “Dragon Jane” utilization of it, the local military authorities to collect a lot of information, and through the network spread abroad, to bring some national security loss.
“Dragon Jane” was one of many innocent victims of Internet users in the ordinary one, and some Internet users outside the network of spies under the instigation go further, to make a move even more serious harm to national security, and ultimately jail.
KongZhong military version of the official Xu Junjie have quite touched. He told the “International Herald Tribune,” in some Internet chat rooms, some with high levels of speech, unusual sources of information users, they often become prey to foreign spy agencies, “In the past similar case occurred, because there are veterans in the chat much room that was locked in foreign intelligence, by inducement, gradually developed into a foreign spy agency services. “
According to informed sources, the foreign spy organization on the Internet looking for more military and political background Internet users, once the selected target, the instigation through various means, its development into their own spies. These fall into the trap of Internet users outside the network spy, natural escape the fate of legal sanctions. By this time, their “on peak” has disappeared without a trace.
recommended “International Herald Tribune” blog: http://blog.sina.com.cn/xqdb