{"id":6581,"date":"2014-02-25T06:46:05","date_gmt":"2014-02-25T11:46:05","guid":{"rendered":"http:\/\/www.opensource.im\/?p=6581"},"modified":"2014-02-25T06:46:05","modified_gmt":"2014-02-25T11:46:05","slug":"chinas-military-hackers-can-thank-edward-snowden","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/edward-snowden\/chinas-military-hackers-can-thank-edward-snowden.php","title":{"rendered":"China\u2019s military hackers can thank Edward Snowden"},"content":{"rendered":"<p><p>    Chinas military hackers are back, more brazen than ever. You    can thank Edward Snowden.  <\/p>\n<p>    A year ago, the Internet security firm Mandiant went public    with what cyber-war watchers had known for some time: Unit    61398, a secret branch of the Chinese military, had been behind    more than 1,000 cyber attacks on Western targets since 2006.    Employing thousands of trained cyber warriors housed in a    12-story building in Shanghai  and backed by an enormous    militia of part-time hackers  Unit 61398 had been waging a    constant war on foreign banks, infrastructure, defense firms    and government agencies, including one spectacular 2007 raid on    the Pentagon that shut down 1,500 different Defense Department    networks.  <\/p>\n<p>    The resulting international sensation forced a reluctant    President Obama to confront the Chinese premier on the issue.    Beijing issued its usual furious denial  but the attacks    stopped and Unit 61398 fell from the headlines.  <\/p>\n<p>    But now we know they didnt stop for long  and the West and    the Obama administration are looking as ill-prepared and    impotent as ever in dealing with the threat. Chinas usual    attacks on banks, weapons manufacturers and other juicy targets    are now back to almost daily.  <\/p>\n<p>    Most striking is how bold the attacks have grown. The Chinese    are apparently so confident we cant (or wont) stop them that    theyve gotten sloppy. Examining hacker codes left behind on US    military and commercial networks, Internet-security engineers    have been finding bits of code identical to Chinese commercial    software sold for export by companies with contracts with the    Peoples Liberation Army.  <\/p>\n<p>    Why so bold and brazen? Snowdens revelations about the    National Security Agency  both his public releases and his    likely private ones.  <\/p>\n<p>    The Snowden defection back in June was a double gift for    Chinas hackers (as well as for Russian ones  the State    Department even issued a warning that any cellphone or laptop    brought to the Sochi Olympics would almost certainly be hacked    there, and its passwords stolen).  <\/p>\n<p>    The data Snowden brought with him to Hong Kong included a    wealth of information about how our intelligence agencies fight    and trace hackers, as well as on the NSAs own hacking efforts    in China.  <\/p>\n<p>    Second, Snowdens public revelations have for more than six    months distracted media and public attention away from Chinas    increasingly bold and lawless cyber-war offensives, and kept it    focused on the NSA.  <\/p>\n<p>    The press and politicians are more obsessed about whether an    NSA clerk might be listening in one of our phone calls than    whether a transcript of that call could end up on the desk of a    PLA intelligence official  or whether the phone companys    software becomes a conduit for Unit 61398 cracking open bank    accounts around the country.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Here is the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/nypost.com\/2014\/02\/24\/chinas-military-hackers-can-thank-edward-snowden\/\" title=\"China\u2019s military hackers can thank Edward Snowden\">China\u2019s military hackers can thank Edward Snowden<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Chinas military hackers are back, more brazen than ever. You can thank Edward Snowden<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-6581","post","type-post","status-publish","format-standard","hentry","category-edward-snowden"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/6581"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=6581"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/6581\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=6581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=6581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=6581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}