Another budding theory is it was a case of Monkey See, Monkey do,

http://www.thisislondon.co.uk/standard/article-23796497-facebook-and-google---a-spys-perfect-weapon.do

*The recent Chinese-originated cyber-attack on Gmail — using, mark you, the
“back door” that they put in for
US<http://www.thisislondon.co.uk/standard/related-229-united-states.do>law-enforcement
agencies — is cause for anxiety.
*



On Mon, Jan 18, 2010 at 10:04 PM, Douglas Onyango <[email protected]>wrote:

> My bad!
> But i guess with the exception of the first line, most of the info still
> applies.
>
>
> Regards,
> Douglas Onyango +256(0712)981329
> Life is the educators practical joke in which you spend the first half
> learning, and the second half learning that everything you learned in the
> first was wrong.
>
> --- On *Tue, 1/19/10, Noah Sematimba <[email protected]>* wrote:
>
>
> From: Noah Sematimba <[email protected]>
>
> Subject: Re: [LUG] OT- Google and China
> To: "Douglas Onyango" <[email protected]>
> Cc: "Linux Users Group Uganda" <[email protected]>
> Date: Tuesday, January 19, 2010, 12:36 AM
>
>
>
> I think Paul meant IP as in Intellectual Property...
>
>
> On Jan 19, 2010, at 12:13 AM, Douglas Onyango wrote:
>
> Paul,
> It was not  IP addresses that they were after - any case this is public
> property and they don't have to steal. The MO suggests they weren't in
> search of the conventional big things like military technology either,
> because they have been doing this for years *http://tinyurl.com/y8rvukp*
>
> These guys were after dissidents and have since got some whose emails they
> are forwarding - *http://tinyurl.com/yg5nlft*
>
> And about words failing you logic test, i have seen the port of this code
> on the Metasploit and it gives you shell access to a Windows PC - now, any
> security practitioner will tell you, you couldn't ask for more than this.
>
> But in conclusion i must agree with you; the number of conspiracy theories
> available make the issue very complex to understand
>
> Regards,
> Douglas Onyango +256(0712)981329
> Life is the educators practical joke in which you spend the first half
> learning, and the second half learning that everything you learned in the
> first was wrong.
>
> --- On *Mon, 1/18/10, Paul Bagyenda 
> <[email protected]<http://mc/[email protected]>
> >* wrote:
>
>
> From: Paul Bagyenda 
> <[email protected]<http://mc/[email protected]>
> >
> Subject: Re: [LUG] OT- Google and China
> To: "Linux Users Group Uganda" 
> <[email protected]<http://mc/[email protected]>
> >
> Date: Monday, January 18, 2010, 6:51 PM
>
> I'm sorry but this whole story seems a little doubtful to me. Why, if you
> are Chinese Intelligence, use such blunt-instrument methods to obtain IP
> from american companies? Why not develop a Kim Philby (yes, Google is your
> friend) for the purpose? Failing that, there must surely be hundreds of
> chinese-american techies in those companies who can be leaned on for
> whatever reason to provide info.
>
>  Great narrative this, what with words/phrases like "hacking" and
> "dissidents" and "IE flaw". Fails to pass basic logic tests though.
>
> P.
>
> On Jan 15, 2010, at 14:17, Thomas Bbosa , CISSP wrote:
>
> The Advanced persistent threats (APT) technology said to have been used by
> these guys in the attack has been a real worry among security practioners.
> Because this simply means that the attacker has muscle!! There has been talk
> that the bad guys invest a lot in this technology that mostly involves
> stealthy tactics with zero day attacks.  Again holes in IE continue to worry
> many.
>
>
> But the real question though is, can Google afford to loose the China ?
>
>
> Regards;
>
> Thomas.
>
>
> *Thomas Bbosa , **CISSP*
>
> * *
>
> BitWork Technologies (U) Ltd
> Plot 135, UMA show Grounds –Lugogo
> P.O.BOX 851 , Kampala , Uganda
>
> Tel:     +256-414-579099
>
> Mob:   +256-782480878
>
> Fax:     +256-414-289218
>
> Website: http://www.bitworktech.com
> ------------------------------
>
> *From:* Daniel Bwente 
> [mailto:[email protected]<http://mc/[email protected]>
> ]
> *Sent:* 15 January 2010 12:25
> *To:* Linux Users Group Uganda
> *Subject:* Re: [LUG] OT- Google and China
>
>
> Insight on the attack Vectors used to hit Google and others,
>
>
> http://siblog.mcafee.com/cto/operation-%E2%80%9Caurora%E2%80%9D-hit-google-others/
>
> *Operation “ Aurora ”*
> I am sure you are wondering about the name “ Aurora .”  Based on our
> analysis, “ Aurora ” was part of the filepath on the attacker’s machine that
> was included in two of the malware binaries that we have confirmed are
> associated with the attack.
>
>
> Cheers
>
> On Thu, Jan 14, 2010 at 2:25 PM, Niles Collins <[email protected]>
> wrote:
>
> As much as the US needs China for that credit line, China needs the US
> because we buy all their products. If the US stopped buying Chinese made
> products and China called in the debt owed by the US I think that China
> would blink first. This might turn into the beginning of that struggle.
>
> _______________________________________________
> LUG mailing list
> [email protected]
> http://kym.net/mailman/listinfo/lug
> %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
>
> The above comments and data are owned by whoever posted them (including
> attachments if any). The List's Host is not responsible for them in any way.
> ---------------------------------------
>
>
>
>
> --
>  Dan
>  +256-071-2-552035
>
> "You won't have eyes tonight. You won't have ears or a tongue. you will
> wander the underworld blind, deaf and dumb and all the dead will know; This
> is Hector: the fool who thought he killed Achilles."
> _______________________________________________
> LUG mailing list
> [email protected]
> http://kym.net/mailman/listinfo/lug
> %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
>
> The above comments and data are owned by whoever posted them (including
> attachments if any). The List's Host is not responsible for them in any way.
> ---------------------------------------
>
>
>
> -----Inline Attachment Follows-----
>
> _______________________________________________
> LUG mailing list
> [email protected]
> http://kym.net/mailman/listinfo/lug
> %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
>
> The above comments and data are owned by whoever posted them (including
> attachments if any). The List's Host is not responsible for them in any way.
> ---------------------------------------
>
>
> _______________________________________________
> LUG mailing list
> [email protected] <http://mc/[email protected]>
> http://kym.net/mailman/listinfo/lug
> %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
>
> The above comments and data are owned by whoever posted them (including
> attachments if any). The List's Host is not responsible for them in any way.
> ---------------------------------------
>
>
>
>
> _______________________________________________
> LUG mailing list
> [email protected]
> http://kym.net/mailman/listinfo/lug
> %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/
>
> The above comments and data are owned by whoever posted them (including
> attachments if any). The List's Host is not responsible for them in any way.
> ---------------------------------------
>
>
>


-- 
 Dan
 +256-071-2-552035

"You won't have eyes tonight. You won't have ears or a tongue. you will
wander the underworld blind, deaf and dumb and all the dead will know; This
is Hector: the fool who thought he killed Achilles."
_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------

Reply via email to