I presume you all have seen the US-China Economic and Security Review Commission's report, "Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation", which was prepared by Northrop Grumman last October? If not, hie thee to http://www.uscc.gov/researchpapers/2009/NorthropGrumman_PRC_Cyber_Paper_FINAL_Approved%20Report_16Oct2009.pdf.
There's also an interesting foreshadowing of these attacks in the article "Anatomy of a Structured Attack" by Michael Shinn, pp 24 - 29 of the IA Newsletter Vol 12 No 3. See http://iac.dtic.mil/iatac/IA_newsletter.jsp. What's particularly interesting is the way specific victims were targetted, based on their reading patterns - a very labour-intensive approach. Best, --- Les Bell [http://www.lesbell.com.au] Tel: +61 2 9451 1144 _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
