This post is based on an email that was sent and in no way reflects the views and opinions of ''Met'' or To send in a story send your email to [email protected]



China’s universities linked to cyber-spying
Dan Vergano, USA TODAY5:41p.m. EST February 28, 2013
China’s academic computer and information schools have ties to its cyber-espionage-linked military units, a magazine reports.

(Photo: NASA)
An extensive research university base supports China’s cyber-espionage abilities
A Science magazine report ties hiring by China’s military to these schools
China denies recent reports tying military units to cyber-espionage against U.S. organizations
A burgeoning Chinese effort to build academic and civilian expertise in computer espionage has ties to the nation’s military, a science journal reports Thursday.

In the past five years, China has opened 10 university computer security academies that specialize in cyber-research, says the Science magazine report by international editor Richard Stone. Chinese universities publish computer espionage research in the open scientific literature — including one 2009 report “outlining how to mount an effective attack on the U.S. power grid.” Such schools have hosted hiring fairs for People’s Liberation Army units, which have been linked to hundreds of hacking successes against U.S. industries and government agencies recently by outside analysts.

Stone, formerly based in Beijing, concludes, “The wellspring of China’s strength is hundreds of computer and information departments across the country.” Chinese academic researchers have published studies of “malware” and “Rootkit” programs that allow hackers to invade computer networks for several years. The cyber-academies “were established more to strengthen internal state security than as cyber-espionage (or) warfare training grounds,” Stone says by e-mail. “Maybe the only way to determine their real purpose would be to trace where graduates are ending up, and we weren’t able to do that.”

The report comes as computer security analysts paint a dire picture of China’s cyber-espionage efforts. An October report by the Project 2049 Institute based in Arlington, Va., said Unit 61398 of the PLA’s General Staff Department, a job fair recruiter, was the “premier entity targeting the United States and Canada.” A report Monday by computer security firm Mandiant suggests that since 2006, the cyber-warfare unit has repeatedly stolen documents from 115 U.S. organizations. An online recruitment notice is posted for recent grads to join the Shanghai PLA team at the center of the recent report.

The recruitment efforts at universities publishing analyses of hacking software, such as Shanghai Jiao Tong University, “lend credence to the assertion that some Chinese military units are involved and at the very least are cognizant of some of these known intrusions of U.S-based entities,” says research fellow Russell Hsiao of the Project 2049 Institute.

A PLA spokesman and Xi’an Jiaotong University computer programming graduate told Science magazine that the work the army’s computer teams conduct is “purely defensive.” Wednesday, Geng Yansheng, a spokesman with the Ministry of National Defense denied the charges made in the Mandiant report, saying Chinese law forbade such attacks. China’s Defense Ministry claimed Thursday that two of its websites faced 144,000 hacking attacks a month last year, most of them originating from the USA.

Contributing: Calum MacLeod


Leave a Reply

Your email address will not be published.

[+] kaskus emoticons nartzco

Current day month [email protected] *

DISCLAIMER The views or opinions appearing on this blog are solely those of their respective authors. In no way do such posts represent the views, opinions or beliefs of “Met,” or “Met” and will not assume liability for the opinions or statements, nor the accuracy of such statements, posted by users utilizing this blog to express themselves. Users are advised that false statements which are defamatory in nature may be subject to legal action, for which the user posting such statements will be personally liable for any damages or other liability, of any nature, arising out of the posting of such statements. Comments submitted to this blog may be edited to meet our format and space requirements. We also reserve the right to edit vulgar language and/or comments involving topics we may deem inappropriate for this web site.

****RULES**** 1. Debates and rebuttals are allowed but disrespectful curse-outs will prompt immediate BAN 2. Children are never to be discussed in a negative way 3. Personal information  eg. workplace, status, home address are never to be posted in comments. 4. All are welcome but please exercise discretion when posting your comments , do not say anything about someone you wouldnt like to be said about  you. 5. Do not deliberately LIE on someone here or send in any information based on your own personal vendetta. 6. If your picture was taken from a prio site eg. fimiyaad etc and posted on JMG, you cannot request its removal. 7. If you dont like this forum, please do not whine and wear us out, do yourself the favor of closing the screen- Thanks! . To send in a story send your email to :- [email protected]