Contact us

Company Name:
Lishui Huanqiu Bearing Trading Co., Ltd.

Company Address:
No.11 Shiting Road, Shuige Industrial Zone,Lishui, Zhejiang,China
Contact Person: William

Email: admin@tradebearings.com
Homepage: www.asiabearings.com
Bearing B2B: www.tradebearings.com

email

 

Home > News >

US ready to strike back against China cyberattacks

Because of China's military is responsible for stealing a lot of the United States government data and enterprise business secret evidence mounts, Obama government will look to fines and other trade measures may need to Beijing or any other country's network spy made.
According to the official familiar with the plan, the White House will develop a new report on Wednesday showed that initial, more active measures, the United States will take the highest authorities say something cyberstealing and the Chinese government has been unremitting movement. Unidentified officials to speak, because they were not authorized to speak publicly about threatened action.
Headquartered in Virginia network security issued by the company on Monday flow details, and put in Shanghai of China to the United States secret force for many years the company's network attacks, the White House plan to. Illegal behavior damage more than 140 companies to carry on the analysis, Mandiant conclusion is, they can link to the people's liberation army unit 61398.
Military experts believe that unit is the PLA's network command, which is directly under the leadership of the headquarters of the general staff, the Chinese version of the joint chiefs of staff. Therefore, its activity may be authorized in the highest level of China's military.
The United States authorities say, less open for many years, Mandiant release report, there are three accused hackers and a military unit building in Shanghai photos, let the public. But at the same time also added to the pressure from the United States, experts said China take more forceful action has many years of system spy.
"If the Chinese government immediately into our airspace aircraft, our plane will escort them out of, if there was a two, three or four, President bush will be on the phone, there will be the threat of retaliation, said:" the federal bureau of investigation executive assistant director Sean Henry. "It happened thousands of times. What is the red line, the effect will be needed to have some definition."
Henry, and now the President of the CrowdStrike security companies, and said, tell the company, not increase their network security, the government needs to focus more on how to stop hackers and support their country.
The center for strategic and international studies network security expert James lewis said, in the past year, the White House has been response China seriously, have a look, and added: "it will be this year they will put more pressure, even in aware of this, it is difficult to change in China. Is there a on-off switch".
At the same time, the Chinese government has been denied to take part in the Mandiant network attack. On the contrary, the foreign ministry said, China is also a hacker attack victims, some of its back to the United States foreign ministry spokesman said HongLei information technology and the ministry of information industry subordinates report lists by an organization in 2012 alone, foreign hackers use of viruses and other malicious software 1400 computers in China and 38000 website seize control.
"In the above attacks, the Numbers from the United States the most," Hong Kong in the daily news briefing said, accommodation of the most specific charges, the Chinese government for foreign hackers.
Network security experts say, U.S. authorities have no similar attack or steal data, from China's enterprise, but also admitted that intelligence agencies to other countries often spy.
China is obviously a interested target, lewis said, and pointed out that the United States will have interested in Beijing's military policy, if any action against Taiwan or Japan's plan.
The Mandiant in its report said, to trace the hacker to a neighborhood in Shanghai suburbs, there is a white 12 layer office, implement the liberation army unit 61398.
Mandiant said, China's army of participating in the network attack only two feasible conclusion: whether unit 61398 responsible persistent attack or they are through the direct access to Shanghai telecom infrastructure is a secret organization, Chinese speaker is engaged in a years of espionage running the correct military units out of the gate.
"In the strict monitoring the state of Internet use, it is highly unlikely to attack group, from the pudong new area of Shanghai, the Chinese government is not know," the report said Mandiant, concluded that the group is the only way to the operation of the Beijing government "comprehensive knowledge and cooperation".
The Mandiant wrote, "unit" of the system's stolen hundreds of TB data, at least 141 organization. One million bytes for 1 trillion bytes. For example, the new iPhone 5 of the most popular version, there are 16 GB of space, and more expensive iPad has up to 64 GB of space. The United States congress 2006 - around $2010 in 17 billion, push Twitter archives library amount is 133.2 trillion bytes.
"At some time, we must call China, here, said:" homeland security secretary Michael chertoff, according to President George w. bush and chertoff group chairman of the board, a global security. "Simply roll to avoid our eyes, I don't think this is a long-term strategy.
Richard Bejtlich, Mandiant chief security officials said, the company decided to publish the part of the report, in order to help the news sent to China and the United States government.
He said: "in the government level, I see this as a tool, they can use it to discuss with China, and Allies, and others pay attention to this problem, have an open dialogue, and don't have to worry about leak confidential information sensitive," Bejtlich said. "The question is overclassified."
He said that the release of the non confidential report, provide detailed evidence, make the authorities have an open discussion of what to do.
The Mandiant report is full of high-tech details and juicy nuggets conclusion, including code name some hackers, like ugly gorillas, DOTA and hard, and the emergence of the DOTA to be harry potter fans, for reference to books and the characters in the film, his computer security the answer to the question.
The White House report on Wednesday, is not expected to review.
"About cybertheft, including the military and senior Chinese officials of the highest level, we have put forward many times our attention, we will continue to do so," national security council spokesman caitlin Hayden said. "The United States and China is the world's largest
 



Other News:
US ready to strike back against China cyberattacks
BBC journalists go on strike over job cuts
German investor optimism up, easing recession fear
Japan PM to nominate BOJ chief soon, Muto seen lead candidate
Egypt in political clinch as economic cliff looms
Clinton is one of the richest alive President of US. Obama is only 1/8 of his as
General steps of maintaining insert bearing with housing
Security group suspects Chinese military is behind hacking attacks