Skip to main content

Top Chinese officials led Google hacking: WikiLeaks


The hacking of Google Inc that led the internet company to briefly pull out of China was orchestrated by two members of China's top ruling body, according to US diplomatic cables released by WikiLeaks and cited by The New York Times on Saturday.

Citing the cables, the Times said China made repeated and often successful hacking attacks on the US government, private enterprises and Western allies as far back as 2002.

Google, the world's top internet search engine, closed its China-based search service in March, two months after it had said it would stop censoring search results in response to what it said was a sophisticated cyber attack that it traced to China and increasing limits on freedom of expression.
The dispute was resolved in July after Google tweaked the way it directs users to an unfiltered search engine.
The Times quoted one cable dated earlier this year as saying: "A well-placed contact claims that the Chinese government coordinated the recent intrusions of Google systems. According to our contact, the closely held operations were directed at the Politburo Standing Committee level."
The paper added that the cable quoted the contact as saying the hacking of Google "had been coordinated out of the State Council Information Office with the oversight" of two members of the Communist Party's Politburo: Li Changchun and Zhou Yongkang. It said Zhou is China's top security official.
But the Times said that in an interview with the paper, the contact cited in the cable, "a Chinese person with family connections to the elite," denied knowing who directed the attack.
The person said it was one of Li's subordinates who orchestrated a campaign to force Google to abide by censorship regulations, and Li and Zhou signed off on the plan at several points, the Times said, "But the person did not know whether senior leaders directed the attack."
The Times did not explain the discrepancy between what the person said in the interview and what was attributed to the person in the cable.
The cables did not make clear how the cyber attacks blamed on China were coordinated, the Times said, and "the cables also appear to contain some suppositions by Chinese and Americans passed along by diplomats."
According to the cables, at least one previously unreported 2008 attack, which US investigators code-named Byzantine Candor, yielded more than 50 megabytes of e-mail messages along with a complete list of user names and passwords from a US government agency.
WikiLeaks started publishing last weekend what it said were more than 250,000 US diplomatic cables, giving advance access to the Times and several other publications. Some of the revelations provide embarrassing insights into US foreign policy, while others lend support to the US diplomatic position.

Comments

Popular posts from this blog

Top 10 Open Source PBX Software.

PBX (Private Branch Exchange) is a small telephone switch that is used to establish connections among the internal telephones of a private organization. PBX reduces the overall cost of telephony in a company by reducing the total number of telephone lines they need to lease from the telephone company. Without a PBX a company needs to lease one telephone line for every employee with a telephone. The company only needs to lease as many lines from the telephone company as the telephone company as maximum number of employees that will be making outside calls at one time. It is nearly 10% of the number of extensions. In a PBX system, every telephone is wired to the PBX. When an employee takes the receiver off hook and dials the outside access code, the PBX connects the employee to an outside line. The enterprise-class PBX including directory-based voicemail, conference calling, integrated messaging, interactive voice response (IVR), three-way calling, caller ID, and call queues.  T

The evolution of hard drives and Storage

The punch card A punch card was once the basis for digital information used for computer programs and data storage. They were widely used throughout the first half of the 20 th   century in processing machines to input data and to store it. Punch cards could be fed into the first commercial computer, IBM 305 system, which then stored the data on hard disks. IBM 350 disk storage unit The 350 Disk Storage System was a major component of the IBM 305 RAMAC (Random Access Method of Accounting and Control) system, which was introduced in September 1956. It consisted of 40 platters and a dual read/write head on a single arm that moved up and down the stack of magnetic disk platters. Those 40 platters stored a whopping (for the time) 5MB of data.

Microsoft Windows - Evolutions

Microsoft Started Operating System with DOS (Disk Operating System) and earlier versions of Windows were started with command line interface, we were needed to change the date, time and then EDIT program was used to make files in 1985 Microsoft Introduced Windows 1.0, to start windows from DOS win command was used, Microsoft Windows Logo also changed since 1985. Here is a family tree of windows