I'm sorry but this whole story seems a little doubtful to me. Why, if you are 
Chinese Intelligence, use such blunt-instrument methods to obtain IP from 
american companies? Why not develop a Kim Philby (yes, Google is your friend) 
for the purpose? Failing that, there must surely be hundreds of 
chinese-american techies in those companies who can be leaned on for whatever 
reason to provide info. 

 Great narrative this, what with words/phrases like "hacking" and "dissidents" 
and "IE flaw". Fails to pass basic logic tests though. 

P.
 
On Jan 15, 2010, at 14:17, Thomas Bbosa , CISSP wrote:

> The Advanced persistent threats (APT) technology said to have been used by 
> these guys in the attack has been a real worry among security practioners. 
> Because this simply means that the attacker has muscle!! There has been talk 
> that the bad guys invest a lot in this technology that mostly involves 
> stealthy tactics with zero day attacks.  Again holes in IE continue to worry 
> many.
>  
> But the real question though is, can Google afford to loose the China?
>  
> Regards;
> Thomas.
>  
> Thomas Bbosa , CISSP
>  
> BitWork Technologies (U) Ltd 
> Plot 135, UMA show Grounds –Lugogo
> P.O.BOX 851, Kampala, Uganda
> Tel:     +256-414-579099
> Mob:   +256-782480878
> Fax:     +256-414-289218
> Website: http://www.bitworktech.com
> From: Daniel Bwente [mailto:[email protected]] 
> Sent: 15 January 2010 12:25
> To: Linux Users Group Uganda
> Subject: Re: [LUG] OT- Google and China
>  
> Insight on the attack Vectors used to hit Google and others,
> 
> http://siblog.mcafee.com/cto/operation-%E2%80%9Caurora%E2%80%9D-hit-google-others/
> 
> Operation “Aurora”
> I am sure you are wondering about the name “Aurora.”  Based on our analysis, 
> “Aurora” was part of the filepath on the attacker’s machine that was included 
> in two of the malware binaries that we have confirmed are associated with the 
> attack.
> 
> 
> Cheers
> 
> On Thu, Jan 14, 2010 at 2:25 PM, Niles Collins <[email protected]> 
> wrote:
> As much as the US needs China for that credit line, China needs the US 
> because we buy all their products. If the US stopped buying Chinese made 
> products and China called in the debt owed by the US I think that China would 
> blink first. This might turn into the beginning of that struggle.
> 
> _______________________________________________
> LUG mailing list
> [email protected]
> http://kym.net/mailman/listinfo/lug
> %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
> 
> The above comments and data are owned by whoever posted them (including 
> attachments if any). The List's Host is not responsible for them in any way.
> ---------------------------------------
> 
> 
> 
> 
> 
> -- 
>  Dan
>  +256-071-2-552035
> 
> "You won't have eyes tonight. You won't have ears or a tongue. you will 
> wander the underworld blind, deaf and dumb and all the dead will know; This 
> is Hector: the fool who thought he killed Achilles."
> _______________________________________________
> LUG mailing list
> [email protected]
> http://kym.net/mailman/listinfo/lug
> %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
> 
> The above comments and data are owned by whoever posted them (including 
> attachments if any). The List's Host is not responsible for them in any way.
> ---------------------------------------
> 

_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------

Reply via email to