Another budding theory is it was a case of Monkey See, Monkey do, http://www.thisislondon.co.uk/standard/article-23796497-facebook-and-google---a-spys-perfect-weapon.do
*The recent Chinese-originated cyber-attack on Gmail — using, mark you, the “back door” that they put in for US<http://www.thisislondon.co.uk/standard/related-229-united-states.do>law-enforcement agencies — is cause for anxiety. * On Mon, Jan 18, 2010 at 10:04 PM, Douglas Onyango <[email protected]>wrote: > My bad! > But i guess with the exception of the first line, most of the info still > applies. > > > Regards, > Douglas Onyango +256(0712)981329 > Life is the educators practical joke in which you spend the first half > learning, and the second half learning that everything you learned in the > first was wrong. > > --- On *Tue, 1/19/10, Noah Sematimba <[email protected]>* wrote: > > > From: Noah Sematimba <[email protected]> > > Subject: Re: [LUG] OT- Google and China > To: "Douglas Onyango" <[email protected]> > Cc: "Linux Users Group Uganda" <[email protected]> > Date: Tuesday, January 19, 2010, 12:36 AM > > > > I think Paul meant IP as in Intellectual Property... > > > On Jan 19, 2010, at 12:13 AM, Douglas Onyango wrote: > > Paul, > It was not IP addresses that they were after - any case this is public > property and they don't have to steal. The MO suggests they weren't in > search of the conventional big things like military technology either, > because they have been doing this for years *http://tinyurl.com/y8rvukp* > > These guys were after dissidents and have since got some whose emails they > are forwarding - *http://tinyurl.com/yg5nlft* > > And about words failing you logic test, i have seen the port of this code > on the Metasploit and it gives you shell access to a Windows PC - now, any > security practitioner will tell you, you couldn't ask for more than this. > > But in conclusion i must agree with you; the number of conspiracy theories > available make the issue very complex to understand > > Regards, > Douglas Onyango +256(0712)981329 > Life is the educators practical joke in which you spend the first half > learning, and the second half learning that everything you learned in the > first was wrong. > > --- On *Mon, 1/18/10, Paul Bagyenda > <[email protected]<http://mc/[email protected]> > >* wrote: > > > From: Paul Bagyenda > <[email protected]<http://mc/[email protected]> > > > Subject: Re: [LUG] OT- Google and China > To: "Linux Users Group Uganda" > <[email protected]<http://mc/[email protected]> > > > Date: Monday, January 18, 2010, 6:51 PM > > I'm sorry but this whole story seems a little doubtful to me. Why, if you > are Chinese Intelligence, use such blunt-instrument methods to obtain IP > from american companies? Why not develop a Kim Philby (yes, Google is your > friend) for the purpose? Failing that, there must surely be hundreds of > chinese-american techies in those companies who can be leaned on for > whatever reason to provide info. > > Great narrative this, what with words/phrases like "hacking" and > "dissidents" and "IE flaw". Fails to pass basic logic tests though. > > P. > > On Jan 15, 2010, at 14:17, Thomas Bbosa , CISSP wrote: > > The Advanced persistent threats (APT) technology said to have been used by > these guys in the attack has been a real worry among security practioners. > Because this simply means that the attacker has muscle!! There has been talk > that the bad guys invest a lot in this technology that mostly involves > stealthy tactics with zero day attacks. Again holes in IE continue to worry > many. > > > But the real question though is, can Google afford to loose the China ? > > > Regards; > > Thomas. > > > *Thomas Bbosa , **CISSP* > > * * > > BitWork Technologies (U) Ltd > Plot 135, UMA show Grounds –Lugogo > P.O.BOX 851 , Kampala , Uganda > > Tel: +256-414-579099 > > Mob: +256-782480878 > > Fax: +256-414-289218 > > Website: http://www.bitworktech.com > ------------------------------ > > *From:* Daniel Bwente > [mailto:[email protected]<http://mc/[email protected]> > ] > *Sent:* 15 January 2010 12:25 > *To:* Linux Users Group Uganda > *Subject:* Re: [LUG] OT- Google and China > > > Insight on the attack Vectors used to hit Google and others, > > > http://siblog.mcafee.com/cto/operation-%E2%80%9Caurora%E2%80%9D-hit-google-others/ > > *Operation “ Aurora ”* > I am sure you are wondering about the name “ Aurora .” Based on our > analysis, “ Aurora ” was part of the filepath on the attacker’s machine that > was included in two of the malware binaries that we have confirmed are > associated with the attack. > > > Cheers > > On Thu, Jan 14, 2010 at 2:25 PM, Niles Collins <[email protected]> > wrote: > > As much as the US needs China for that credit line, China needs the US > because we buy all their products. If the US stopped buying Chinese made > products and China called in the debt owed by the US I think that China > would blink first. This might turn into the beginning of that struggle. > > _______________________________________________ > LUG mailing list > [email protected] > http://kym.net/mailman/listinfo/lug > %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ > > The above comments and data are owned by whoever posted them (including > attachments if any). The List's Host is not responsible for them in any way. > --------------------------------------- > > > > > -- > Dan > +256-071-2-552035 > > "You won't have eyes tonight. You won't have ears or a tongue. you will > wander the underworld blind, deaf and dumb and all the dead will know; This > is Hector: the fool who thought he killed Achilles." > _______________________________________________ > LUG mailing list > [email protected] > http://kym.net/mailman/listinfo/lug > %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ > > The above comments and data are owned by whoever posted them (including > attachments if any). The List's Host is not responsible for them in any way. > --------------------------------------- > > > > -----Inline Attachment Follows----- > > _______________________________________________ > LUG mailing list > [email protected] > http://kym.net/mailman/listinfo/lug > %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ > > The above comments and data are owned by whoever posted them (including > attachments if any). The List's Host is not responsible for them in any way. > --------------------------------------- > > > _______________________________________________ > LUG mailing list > [email protected] <http://mc/[email protected]> > http://kym.net/mailman/listinfo/lug > %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ > > The above comments and data are owned by whoever posted them (including > attachments if any). The List's Host is not responsible for them in any way. > --------------------------------------- > > > > > _______________________________________________ > LUG mailing list > [email protected] > http://kym.net/mailman/listinfo/lug > %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ > > The above comments and data are owned by whoever posted them (including > attachments if any). The List's Host is not responsible for them in any way. > --------------------------------------- > > > -- Dan +256-071-2-552035 "You won't have eyes tonight. You won't have ears or a tongue. you will wander the underworld blind, deaf and dumb and all the dead will know; This is Hector: the fool who thought he killed Achilles."
_______________________________________________ LUG mailing list [email protected] http://kym.net/mailman/listinfo/lug %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ The above comments and data are owned by whoever posted them (including attachments if any). The List's Host is not responsible for them in any way. ---------------------------------------
