Home » Cyber » Civilian Apps » Report: Chinese PLA Access 80% of “World’s Communications”

Report: Chinese PLA Access 80% of “World’s Communications”

by Mike Hoffman on July 16, 2012

China has found a backdoor to access 80 percent of the “world’s communications” to include information passed through the internet and sensitive infrastructure databases, writes a former senior security analyst for the Pentagon.

F. Michael Maloof, who now writes for WND, cites Huawei Technologies Co. Ltd and ZTE Corporation as the companies the Chinese government and People Liberation Army can use to gain access to this information via commercial networks installed by each Chinese electronic manufacturer.

“The two companies give the Chinese remote electronic “backdoor” access through the equipment they have installed in telecommunications networks in 140 countries. The Chinese companies service 45 of the world’s 50 largest telecom operators,” Maloof writes.

He goes further to say the Chinese are working to access the remaining 20 percent. Individuals and companies who communicate over their “virtual private networks” or VPNs are especially susceptible. Sources have told Maloof those networks are leaking like a “sieve” to Chinese data collectors, especially those that connect to companies based in places like Mexico.

U.S. government officials are aware of this threat. The U.S. House Intelligence Committee has also chosen to investigate the two companies in question. U.S. Commerce Department leaders banned Huawei from helping build a national wireless network as Maloof also points out.

It’s easy to connect this to the further cyber threat posed by the Chinese. It also brings to mind the 1,800 cases of counterfeit Chinese parts found in U.S. military equipment to include missile defense systems and intelligence sensors. On the drum beats for more cyber awareness inside the Pentagon.

If you want to hear more from Maloof on the subject he did an interview on The Cyber Jungle about the topic. Fast forward to the last segment when Maloof’s interview picks up.

Share |

{ 104 comments… read them below or add one }

kofald July 16, 2012 at 7:46 am

i think it is time to strike back. How long do you want to wait?

Reply

kim July 16, 2012 at 2:34 pm

We most likely do so already; it's called espionage. Reckon Pentagon is not smart enough to do the same thing to sensitive Chinese internet communication?

Reply

Anonymous July 16, 2012 at 7:23 pm

Pentagon wasn't smart enough to prevent 9/11, catch OBL for 10 years, or not engage in 2 decade-long land wars in Asia (one of which was lied about).

Never over-estimate the Pentagon.

Reply

Belesari July 16, 2012 at 7:37 pm

And so we begin!!!

Ok ill bite. What was lied about?

WAIT THE WMD!!

Not really. He had yellow cake uranium (which is used to make nukes) which we got out of the country after the war…and no one reported on…..

Chemical and biological agents? He had those in plenty syria no doubt has some of them atm. He also had built a huge modern chemical weapons factory that was almost ready when we went in.

AQ in iraq? Of course they were there so were many other groups. ME countries use them like 2nd hand armies. Its why they fund them so much. We knew they had been there already. Not to mention they flooded there after the war started drew away insurgents from Astan…and no one used the repreieve to advance there……….

So i agree with onlu one thing. never over estimate the pentegon but also never overestimate how much stupid politicans can screw up the military and its actions. We should have been out of iraq in 2006 or 7 but retard basicly fired the entire Iraqi army and supplied the insurgents and the militias with hundreds of thousands of knowledgable troops who had no money or jobs and also couldnt get any.

Reply

Belesari July 18, 2012 at 1:06 am

Why i seem to have touched the nerve.

gullibleontheceiling July 16, 2012 at 9:16 pm

Yeah well that's 'cause the Pentagon was in on it… do you honestly think a single dude in a cave directed the most sophisticated attack in history, allowing three planes to be piloted for hundreds of miles over heavily defended airspace with pilots that trained for a couple of months, only to hit tiny buildings all while traveling at hundreds of miles an hour? I've got some beachfront property in Oklahoma I'd like to sell you…

Reply

Matt July 17, 2012 at 11:59 am

Flying planes into buildings was not the most sophistaceted attack in history. Epic fail.

Andy July 16, 2012 at 6:12 pm

Did we just layoff CIA and Jame Bond ?

Reply

hellbound1339 July 16, 2012 at 6:58 pm

Apparently, Washington would like to wait until Chinese boots are already in DC.
Wish Reagan were still around…he'd be a man and knock the Chinese off their float.

Reply

Joeblow July 17, 2012 at 3:17 am

You mean the Ronald Raygun that sent an emissary with a cake to the Ayatollah, not long after the Marine barracks were blown up in Beirut Lebanon? You mean that Ronald Raygun?

Reply

mpower6428 July 16, 2012 at 7:50 am

SUPRISE….!!!!

the next pearl harbor/ 9-11 will be when "YOUR" electric, wireless, phone lines and cable shut down…. also the delivery schedules to "YOUR" local supermarket, gas station and hardware store…. along with anything and everything digitized you need to make an honest days living…. to include possibly your water, and sewer lines if they can find any chinese coders willing to slum like that….

oh, you can forget about the USPS too, and for at least a month.

Reply

Musson July 16, 2012 at 10:55 am

Even if WalMart could keep their shelves stocked (which they won't) you could not use your debit card to buy anything.

Maybe I should buy that survival food after all.

Reply

mpower6428 July 16, 2012 at 7:52 pm

the scary part is… besides western europe, we're the only country i can think of that would start cannabalizing each other on day 2.

most of the population in asia/eur-asia, indian sub-cont, africa and latin america live without ,what we consider, "the basic neccesities" anyway.

we're the only ones vulnrable enough to attack that way, and it just gets worse every year.

Reply

Kosme July 16, 2012 at 9:53 pm

What do you call the basic neccesities" ??? you know … we hace debit and credit cards down here … we have internet … we even have phone lines !

Reply

Steve July 16, 2012 at 7:59 am

This all started when IBM was allowed to sell their laptop business to the ChiComs. Reverse engineering reveals many secrets.

But go right ahead, buy cheap. And import engineers with no allegiance to the US>

Reply

blight_ July 16, 2012 at 4:39 pm

It's not Lenovo, it's Cisco and the enterprise IT firms whose hardware is the backbone of the intertubewebs.

Reply

IKnowIT July 16, 2012 at 10:36 pm

And, who do you think makes the chips for ALL of these companies? And, where do you think most of the engineering is done?

Reply

blight_ July 17, 2012 at 12:33 am

Certainly not Lenovo. Depending on the parts in the PCB, the Intel chipset may be designed in Israel and fabbed in the US or Malaysia. Samsung and Hynix memory from Korea, Samsung or LG displays from Korea, final assembly in the PRC or Vietnam.

Reply

Vaporhead July 16, 2012 at 7:59 am

I remember people on this board giving me negative ratings when I said they could do the same to the knockoff equipment sold to our military, including gear in our aircraft. Chinese would plant a "backdoor" into our military equipment. This should be a grave concern to th U.S. and our Allies.

Reply

J.E. McKellar July 16, 2012 at 8:11 am

I think its time we singled out the corrupt businessmen that sold out our country to a foreign power and charge them with treason. Then we need to start a program of 100% US-sourced procurement for military equipment and critical infrastructure. Give Americans the chance to rebuilt their own country, and throw the nwo-liberal looters, financial con-artists, and corrupt politicians into those prisons they were so eager to build and fill with the American poor.

Reply

mpower6428 July 16, 2012 at 8:22 am

"nwo liberal looters"…? thats a new one for me but, if you wanna go there… bring it.

Reply

Steve July 16, 2012 at 9:00 am

It's not just the companies. This equipment is supposed to be controlled under ITAR, so the government had to give their blessing at the time.

Reply

Musson July 16, 2012 at 8:35 am

Does this mean in case of War – I won't be able to use my I-phone?

/s

Reply

Vaporhead July 16, 2012 at 10:40 am

Why, yes. If it wasn't the Chinese who took it over, the new ratified Communications Act Barack just signed would allow him and his coherts to take over your phones anyways.

Reply

Joeblow July 19, 2012 at 3:09 am

The Chinese probably have backdoors on your I-Phone already — they're made in China after all.

Reply

Jon July 16, 2012 at 10:32 am

Doesnt the US have the ability to access something like 100% of the worlds communications? I'm sure the NSA is doing the same damn thing to the Chinese and everyone else. Before we start crying strike back at china maybe we should think about what kind of world we would have if we made acts of espionage cause for war. The US would be fighting everybody and everybody would be fighting each other. Not that I really care. I own stock in Lockheed :)

Reply

Anonymous July 16, 2012 at 11:17 am

But but but it's only bad when China does it! We're the good guys, so it's OK for us to to do it!

Reply

Pilgrimman July 16, 2012 at 11:57 am

Back to Reddit.

Reply

blight_ July 16, 2012 at 4:39 pm

You seem to be running low on !

Here, take this.

!!!!!!!!!

Reply

Brad July 16, 2012 at 10:51 am

China and a lot of other countries learned from the US, they watched us and took notes. China is dumping all kids of money into africa, just like america does with other countries, but China does not tell them how to run their country, they just want to do busisness. In the past American tossed all kinds of money at othe countries, and we still do. And not a one of them can we trust, or really depend on. As fare as war goes, there will only be wars in countries, where it doesn't hurt the bottom line, or in the case where it threatens certain interest of another country. Things are going to get heated as othe countries grow and depend a bigger share of the resources.

Reply

Belesari July 16, 2012 at 7:49 pm

"but China does not tell them how to run their country"

Really? Hey maybe we should give money to north korea we can use their slave labour to make stuff!

When has Japan or South Korea betrayed us?

Reply

ruger July 17, 2012 at 10:36 am

The US people cannot trust their own government sadly because they have moved away from and usurped the Constitution at every chance. …a big problem. This is not a religious comment: There exists no higher calling or greater power than man, in these scumbags minds because politicians are not afraid of voters.

Reply

RCDC July 16, 2012 at 11:30 am

They (China) have the parts, they manufacture and produce, they have the manpower, money and ingenuity. They are dangerous.

Reply

HazardUs July 16, 2012 at 6:30 pm

they lack ingenuity….

Reply

ltfunk2 July 16, 2012 at 11:34 am

This sounds liek another joke article by Kevin Coleman. Anybody who could see 80% of the worlds communications wouldnt have to work as hard as the Chinese do. LOL

Reply

kski July 16, 2012 at 12:37 pm

In the words of one of Tom Clancy's characters "THIS REPRESENTS A CLEAR AND PRESENT DANGER!!!!!!!!!!!!!!!!!!!" Where is Reagan when you need him. Either we take a stand now or we lose the next war!

Reply

ghostwhowalksnz July 16, 2012 at 6:52 pm

Reagan was selling spare parts to the Iranian mullahs

Reply

Belesari July 16, 2012 at 7:47 pm

Yes in a attempt to free 7 americans. And there have always been questions about the whole affair.

And the clintons gave the chinese missile tech in exchange for money……your point.

Reply

blight_ July 17, 2012 at 12:34 am

Loralgate was all Loral. I heard Obama gave the Pakistanis F-16s…!

Reply

Joeblow July 17, 2012 at 3:23 am

Ronald Raygun was forced to pay tribute to the Ayatollahs. He even sent Robert McFarlane to Tehran bearing a cake for Khomeini. Raygun was all bark and no bite.

And there is no evidence that Clinton gave missile tech to anyone. Greedy capitalists whom neocon TEA baggers worship are the ones who sold us out to China. They continue to do so to this very day.

Reply

ruger July 17, 2012 at 10:30 am

No-dbad, it is the ones who blindly worship the gods of government that allow corporate donors to do such things. Your ignorance of tea baggers is astounding. It is supposed to be the government oversight that protects the taxpayer. Instead the government allows this to happen and then suggests that by giving it more power, it will solve the problem they created.
Keep your ignorance to yourself, don't continue to punish people like you.

oldmtnbkr July 16, 2012 at 12:39 pm

Uhhhm, if WND is going to become a regular source for Defensetech's posts, I may need to revise my bookmarks….

Reply

Musson July 16, 2012 at 4:15 pm

Or DEBKA.COM?

Reply

blight_ July 16, 2012 at 1:24 pm

Wasn't this the guy who alleged Israel also had stealth Blackhawks?

Reply

RCDC July 16, 2012 at 2:00 pm

Apple have braches and factories in China. PC phones, Laptop, desktop, telephoney electronics and parts were also produce in China, aside from Reebok, Nike and etc. USA export jobs and technology to China to produce what is now sold in US and the rest of the world as consumer products to profit from low produce and export tax. This is no suprise. Probably the next hollywood movie after I see dead people is I see Chinese people.

Reply

A. Nonymous July 16, 2012 at 2:31 pm

The Sixth Shens?

Reply

jamesb101 July 16, 2012 at 2:14 pm

Is ANYBODY Surprised at this?

make your cost's cheap….
get the market….
keep your back door open…

Simple…

Reply

Lance July 16, 2012 at 2:47 pm

This is the BIGGEST ''DUH'' ever. Of course they have accesses they make 90% of the worlds computer parts and assemblies.

Reply

Mark July 16, 2012 at 3:00 pm

Can somebody please WAKE UP and smell the EGG ROLLS?

Connect the dots folks … the next war will be with the Communist Chinese.

I don't trust them … further than I can spit them.

Reply

DWAIN July 20, 2012 at 6:14 pm

WE WILL GO TO WAR WITH CHINA… YOU CAN BET ON THAT

Reply

Tad July 16, 2012 at 4:11 pm

Hey! PLA! Stop reading this post immediately!

Reply

Urallparanoid July 16, 2012 at 4:59 pm

I think you should all calm down and pity the poor Chinese intel officers who (if this is true) have to sift through 80% of the world's communications, 79.9999999999% of which are boring nonsense (79.9999999999999999999% in the case of America).

Reply

HazardUs July 16, 2012 at 6:34 pm

another big chunk is just porn.

Reply

Belesari July 16, 2012 at 7:44 pm

Actucally 70% of the internet is entirely porn.

Now i understand the PLA just want free porn.

Reply

C.L.Loh July 24, 2012 at 2:46 am

On most of the Chinese web browsers, porn sites are not accessible.

Reply

Sam July 16, 2012 at 6:10 pm

And all U.S. phone call records and billing are done by the Israelis.. They have access to just about every landline in America. 60 minutes did a report of this over a decade ago. How the U.S. gov't could allow this is beyond me and most Americans given the Israeli's history and continued spying on America.

Reply

Belesari July 16, 2012 at 7:42 pm

Dude ya'll killed 6,000,000 men women and children over 60 years ago! Wasnt that enough.

Jesus christ when i figure out why insane people are obsessed with jews ill be rich. Or depressed. Or both.

Lets see Israel last terrorist attack in the US or invasion of someone outside of the palestinians territories etc (from which they have been shot at daily by rockets and gunfire)….

Damn i cant remember one. Oh and dont mention assasinations of terrorist leaders and such i dont care.

Reply

RMS July 19, 2012 at 10:07 am


Lets see Israel last terrorist attack in the US or invasion of someone outside of the palestinians territories etc (from which they have been shot at daily by rockets and gunfire)….”

Lebanon 1982 & 2006.

Just enter “Liberty Attack” or “Lavon Affair” into the search engine of your choice.

Reply

Marcellus Hambrick July 16, 2012 at 6:43 pm

The Chinese are getting every advantage over the US. All we are concerned about is social programs. We are a country in decline. You can see it coming. The Chinese, with no dissention from their populace, will “bury us” like Khrushchev said. The Chinese are stealing military and economic secrets left and right and we are only concerned about people paying their “fair share”. Give me a break.

Reply

Joeblow July 17, 2012 at 3:29 am

Huh? Who the hell do you think sent the jobs and technology over there? Poor Americans below the poverty line? It's the greedy capitalists and free-marketeers that sold us out. They did this to reap enormous profits for themselves and they stash their money in offshore bank accounts to avoid paying taxes. You're damn right we should make these pigs pay their fair share.

Reply

blight_ July 18, 2012 at 9:48 am

Makes you wonder if worker-owned companies would be better, or worse. Then again, the evildoers would move from the executive's chair and an MBA to some union board and run the company into the ground for self-gain. That has been the historical precedent set by greedy people interested in themselves ahead of others, in all timeframes and commercial/government contexts.

Reply

Some Other Steve July 16, 2012 at 7:13 pm

Before blowing a gasket, consider the source: WND: Wing Nut Daily.

Sheesh.

Reply

Belesari July 16, 2012 at 7:39 pm

Actucally i've known this for over a year already it was reported awhile back by quite a few internet science/tech sites.

Reply

fungU July 16, 2012 at 10:37 pm

Ping wow. Ming chow.

Reply

dubweiser101 July 16, 2012 at 10:57 pm

There's nothing deadlier than a Chinaman behind a keyboard.

Reply

blight_ July 17, 2012 at 12:31 am

Wrong. There's nothing deadlier than no longer making your own weapons free of outside parts.

Reply

MGC July 17, 2012 at 12:57 am

American: Nice Duds General, bet the Talibs can see you for miles.

Red General: Camo is for Pu**ies

Reply

Ronnie July 17, 2012 at 3:16 am

LISTEN UP USA a mate here in Australia just told me how much his brother makes (electronic eng) in China. His china Co is making boards etc for the US NAVY. It's godda be in the script …..surely the greedy US CEO's have not sold u all down the river.

Reply

Black Owl July 17, 2012 at 6:05 am

We are pathetic…

Reply

Qianlong July 17, 2012 at 8:50 am

But when the US use Echelon to snoop on 90% of all world comms it's OK?

Reply

blight_ July 18, 2012 at 9:46 am

Touche.

That said, they are replicating NSA capability. Presumably, the NSA has similar backdoor routines in electronic systems, or has "defense" hackers working out ways to circumvent a variety of model secured computer systems.

Reply

RCDC July 18, 2012 at 2:38 pm

I bet they are already on military.com snooping. Hey are you a commedong?!!

Reply

nightlife6 July 22, 2012 at 8:23 am

Echelon was old tech – we now cover 100%

Reply

longshadow July 17, 2012 at 9:56 am

Having the capability to access 80% of the world’s commercial networks and actually tapping them are two very different things. Large scale eavesdropping efforts like the one suggested in this article would have been detected a long time ago simply because of the traffic volume flowing back to China.

This article would have been a little more relevant if the journalist had tied China’s selective monitoring agenda to the referenced hardware taps.

In the same respect, we and our partners have our own large scale foreign communications monitoring programs so we shouldn’t act surprised when we hear about another country doing the same thing.

Reply

Jonathan July 17, 2012 at 12:53 pm

Are we this incompetent?

I thought the USA was supposed to be smart. Wouldn't important layers in our internet and communications networks be made with American made electronics for this very reason?

Or is this propaganda?

What is stopping American made computers? Besides the lack of cheap labor compared to Asia. I would probably pay a few hundred dollars more for a computer if it was made in the USA and had it's design improved by the NSA/CIA.

I trust them more then I trust foreigners because ultimately they have the USA's interest in heart (I hope).

Reply

Dawn July 17, 2012 at 5:18 pm

And we're waiting for??? Get with the program folks. You're supposed to be our first line of defense.

Reply

Terry July 17, 2012 at 9:38 pm

Yea, a Chinese spy does not looky like Chinese.

Reply

blight_ July 18, 2012 at 9:45 am

Depends on what "A Chinese spy" is. The case officer is almost certainly Chinese, but his assets will come in genders, races and creeds.

Reply

hax0r July 18, 2012 at 3:43 am

microsoft left a huge backdoor open in windows 7 google metasploit 2 exploit and you will see that everyone is leaving backdoors open so that the governments can control your pc. This is no news since most backdoors that are discovered by hackers are left open and are never patched. How come MS has done nothing to close the metasploit back door and it has been evident that it exists for 2 years. the most dangerouse thing about metasploit is that the hacker has full control of your pc and can also see your desktop, copy password hashes for brute force attacks, and worst of all you can format or delete partitions. like i said full control. metasploit can also attack unix and linux machines its success rate on unix based machines im unsure about. Macs are next for that exploit team. For those of you who think macs are safe think again. there were "no virus's for mac since there was no way to scan for them" most macs are infected.

Reply

blight_ July 18, 2012 at 9:44 am

Time to make my root password longer, then drop admin priviledges on my main Windows account. It'll make life inconvenient, but…

Reply

Jonathan July 19, 2012 at 12:10 pm

Computers are built to be insecure on purpose in my opinion.

They are the perfect "spy" tool. Place one in every home and now you know what people's beliefs are, what they are buying, what they are saying, what they are writing, and even what they are seeing.

Hardware that attempts to secure a computer has to go through government approval, and if it works won't be allowed for national security reasons (ITAR, etc).

But if you don't believe me, try to design and sell a device that will allow you to control the signals to and from your computer. It's illegal as far as the government is concerned, even if it's not "officially" illegal. Highly dissuaded to the point of impossible would be a better explanation.

Reply

nraddin July 18, 2012 at 9:22 am

You know that having the network traffic is not the same thing as having the data in that network traffic. If I do end to end encryption, theoretically I can broadcast it to the world and it wouldn't matter. You don't have the key to open the data so you just have a stream of junk.

This is not to say allowing your network gear to push data streams places that you didn't intend is ok, just that if you have planned for that eventuality it's shouldn't be a huge issue.

Reply

blight_ July 18, 2012 at 9:42 am

Indeed. What does their "backdoor access" give them? Raw data streams? Read-only priviledges? The ability to co-opt an enemy system for their own ends? Perhaps the ability to shut down enemy systems? Hard to say from the outside.

Makes you wonder if anyone at CISCO is thinking about it. You know, the human network…

Reply

blight_ July 18, 2012 at 9:46 am

Impostor?

Reply

TonyStark July 18, 2012 at 11:21 am

I guess America has to wake up its bloody idea n start dealing with tis sinister panda. rethink how US can deal with china's asymmetrical warfare using a more down to earth approach rather than political fighting over the 2 parties and overspend on too precious to destroy war toys that stand too vulnerable to china's cheap missiles n weapn

Reply

Andr July 18, 2012 at 6:26 pm

LOL !! I wish I could say who has "backdoor" instead of his head, but I afraid to be banned. The real risk is only that Cisco etc are loosing huge money competing with Chinese companies. The rest – sniffing and transferring 80% of conversation via WAN to China, reading encrypted conversations first of all is technically impossible and second – has no sense at all. US gave China technologies. Moved plants and development to China. Why to steal something US already gave for free? Large US companies (including Cisco) outsourced IT support to India, China, Philippines, gave them access rights to networks and nobody has concerns that sensitive data could be compromised. US public dept to China is in my opinion something we should worry about. Lack of jobs is something we should worry about. More than 100.000 people killed during US presence in Irak – this is something we should worry about. Stop looking for enemy to switch our attention from really important things.

Reply

acid_rain July 19, 2012 at 2:37 pm

look, we hack them all the time. they hack us all the time. tis just how the game works. you think for a second that the dod or dhs hasnt breaches their infra then youre wrong. use google and just search it out. the evidence is there. its been leaked for the last few years now. we hack them. them hack us. its a game. if the US guys thought there was any real danger dont you think we’d have patched our own country then taken china offline? c’mon, with barely any effort a few folks tooks down brazil, you know the country, down for days. not just the net either. google foos. debate all your guys want. leave the grown up stuff to the pros. good day.

I SAID GOOD DAY.

Reply

acid_rain July 19, 2012 at 2:37 pm

look, we hack them all the time. they hack us all the time. tis just how the game works. you think for a second that the dod or dhs hasnt breaches their infra then youre wrong. use google and just search it out. the evidence is there. its been leaked for the last few years now. we hack them. them hack us. its a game. if the US guys thought there was any real danger dont you think we’d have patched our own country then taken china offline? c’mon, with barely any effort a few folks tooks down brazil, you know the country, down for days. not just the net either. google foos. debate all your guys want. leave the grown up stuff to the pros. good day.

I SAID GOOD DAY.

Reply

Pete Cortese July 19, 2012 at 4:04 pm

Pencil,paper,and courier worked well for a long time.Go back to it .

Reply

Smokey July 21, 2012 at 1:48 am

I wonder how much of the world's communications the US and UK are able to monitor via installations such as RAF Menwith Hill? I would expect it's at least in the area of 80% as well.

Reply

Craig July 21, 2012 at 9:38 am

Besides supplying weapons to North Vietnam and North Korea which is on their border, it seems the Chinese keep to themselves and always have. Genghis rode shotgun for a while however.

Reply

reply October 11, 2012 at 11:06 am

genghis is not chinese, he’s mongolian. that’s like saying the germans invaded the french for 1 run and then using the phrase “the french tried to invade england blah blah blah after the fact without knowing the facts”
it’s bad context

I really think China really does keeps to themselves and are just really god dam competitive. It seems they do everything the usa does, They got invaded by western countries before (it’s not talked about, hong kong, japan, england etc, some 8 western countries trying to divide up the country) and I really don’t think they trust people after that. If you think of it from their point of view, the same people who invaded them before didn’t seem to change, why trust them when they want to get into trouble near “our” borders (vietnam). Why trust a puppet government and foreign backed competitor with weapons near our border, why have any wars near our borders,

No one wants this and if China has a turn of heart for the worst, no one wants any wars with them either. It’s the people that do that you have to watch out for.

Reply

CombatArmsHacks July 22, 2012 at 10:06 am

It is perfect time to make a few plans for the long run and it’s time to be happy. I’ve read this post and if I may just I wish to counsel you few interesting things or tips. Maybe you could write subsequent articles referring to this article. I wish to read more things about it!

Reply

cloud leaf July 26, 2012 at 11:31 am

you do realize that 81% of internet traffic is ****….so sue PLA for piracy, don’t use this as an excuse to pay for cyber war to fattening the 1% of the MIC!

Reply

SFC C+11 August 21, 2012 at 2:48 am

Read the book "CYBER WAR – THE NEXT THREAT TO NATIONAL SECURITY AND WHAT TO DO ABOUT IT" by, Richard A. Clarke and Robert K. Knake.
Look at WHO gave the Chinese Proprietary Rights so they could sell their merchandise in China. You may be amazed!!

Reply

digital agency london list September 8, 2012 at 1:38 pm

I love what you guys are up too. Such clever work and reporting!

Keep up the very good works guys I’ve added you guys to my own blogroll.

Reply

MyNameIs September 17, 2012 at 6:06 am

after reading alot of good and nonsenses it makes me think that some of you smoke tooooo much
Google for Internet usage stats for 2011 ASIA / China uses 44% of all internet
Another plus to that story, at once i know a guy that worked @******** according to his stories 30-40% of all supplied weapons for use @/in military bases was unaccounted for, meaning been stolen and nobody(maybe 1-5 people) knows where they went tooooo or still are.!

Reply

Berniece December 13, 2012 at 2:30 am
essentialrelationships.com January 3, 2013 at 8:22 am
blight_ July 17, 2012 at 12:34 am

Secunia PSI isn't magic. It just tells you when a program out of a list of programs has a new release newer than the version installed on your computer…

Reply

blight_ July 17, 2012 at 9:40 pm

For a group without access to its own weapons, it ranks as most destructive.

Reply

Joeblow July 19, 2012 at 3:20 am

BZZZT!

Why is it that TEA baggers always act shocked, SHOCKED when capitalists act like capitalists? The people whom the baggers worship are the ones who sold us out for a buck. I thought making a profit was a good thing, no? These Masters of the Universe use their wealth to buy our govt and politicians to get out of the way. Isn't that what the baggers want — get govt out of the way?

Reply

nraddin July 19, 2012 at 10:40 pm

There are a few ways to do this, most encryption for communication is private key / public key encryption. This is where the little lock in the corner of your browser comes from when you hit a site running secure socket layer https:// This encryption allows for one end to send a public key that allows for encryption of data that can then only be opened with the private key (That you keep only for yourself). This is common at 2048bit encryption and above.

Obviously there is also the private/private key system where each side has the others private keys allowing for encryption and decryption. This is not common as it would require a pre-existing trust between end users, but it used in military and enterprise setups fairly popularly.

We use a system at my work that encrypts in the ISO layer 6, as well using SSL/TLS for actual network communication. All systems are encrypted at the disk via a hardware before the OS, so you can't just take a disk either.

Hey and next time don't be rude about something you are not 100% sure about (Heck try just not being rude). There was no call for it at all and it makes people want to not help you learn.

Reply

SFC C+11 August 21, 2012 at 2:51 am

The chips may not have caused a malfunction YET, but the Chinese have the back door to cause them!!

Reply

Leave a Comment

Previous post:

Next post: