×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Chinese "Cyber-Attack" US Department of Commerce

CmdrTaco posted more than 7 years ago | from the and-you-thought-your-weekend-was-boring dept.

161

Kranfer writes "The register has an article about how the Chinese have recently launched an attack against the US Department of Commerce. From the article: '...attacks originating from computer crackers largely located in China's Guangdong province are aimed at extracting sensitive information from targets such as the Commerce Department's technology export office. Security consultants and US government officials reckon the assaults have at least the tacit support of the Chinese government...' This is not the first time Chinese hackers have attempted to gain access to US Government systems."

cancel ×
This is a preview of your comment

No Comment Title Entered

Anonymous Coward 1 minute ago

No Comment Entered

161 comments

Dupe? (0, Offtopic)

bfree (113420) | more than 7 years ago | (#16363065)

Dupe? [slashdot.org]

Re:Dupe? (0, Offtopic)

Anonymous Coward | more than 7 years ago | (#16363689)

Unfortunately, the Chinese have also hacked the slashdot editors, as well as the dumbass moderators who mark parent as Offtopic, and not Insightful.
And yeah sure you can ignore the truth in this post and mark it as flamebait. No thinking person should trust the moderation system anymore.

Re:Dupe? (0)

Anonymous Coward | more than 7 years ago | (#16365217)

Frucking imbeciles should be banned from moderating altogether.

Not Chinese (5, Insightful)

suv4x4 (956391) | more than 7 years ago | (#16363077)

As mentioned before, the attack are most likely not from China at all.

No decent hacker would leave traces from his own machine when he could easily use a zombie network to carry out the attacks and collect information.

They keep claiming China, China, China.. I'm starting to think it's convenient for them to stick to that version for their own internal affairs.

Re:Not Chinese (1, Insightful)

javilon (99157) | more than 7 years ago | (#16363249)

Al Quaeda is not going to last for ever, you know? they need a solid and real danger to wave in front of the US population in order to take more civil rights away. Apparently, China is second in the list.

Re:Not Chinese (2, Insightful)

TopShelf (92521) | more than 7 years ago | (#16363317)

Instead of "danger", think "rival". This kind of espionage is more commercial, not military, and frankly stuff like this has happened before even between our closest allies.

Re:Not Chinese (1)

einolu (841446) | more than 7 years ago | (#16363409)

you are retarded. you are not going to stop seeing 'made in china' on 90% of the things sold in the us any time soon. and for your information, the age of terror can techincally last forever, so there is no shortage of fear.

Re:Not Chinese (1, Troll)

drinkypoo (153816) | more than 7 years ago | (#16365357)

China is a lot scarier than anything else on this planet right now, especially to the US. China should frighten the world though, there's no women for something like twenty-five percent of their male population and given the attitude of the Chinese culture towards women, they're not likely to find a bunch of willing mail-order brides. I mean people are still leaving their girl babies out to die of exposure in that country, you know what I mean?

But to the US it's scary for a different reason: the trade imbalance, which is going to kick our ass. The US economy is going to get worse before it gets better and China is a big part of that.

Demonizing China is not only logical, but it may actually be a good idea.

Re:Not Chinese (5, Informative)

Shoten (260439) | more than 7 years ago | (#16363341)

Well, yes and no. There are a few problems with this hypothesis; one, and the most important of them, is that attacks have been conclusively back-traced to China. And yes, the guy who did it actually broke the law in the process, but c'est la guerre, non? The event is known as "Titan Rain," [schneier.com] and it began with a series of targeted attacks against the Department of Energy. A computer security worker, in his spare time (and a wink/nod from the FBI) counter-hacked hosts that were the source of the attacks, eventually following the trail back to mainland China. There, he saw that the logins which executed commands were being performed locally, and that the devices were not forwarding pilfered data on to other hosts but were instead the repositories of that data.

Other things involve the fact that when you see attacks from China, you usually get one of two kinds of hosts: you get a wildly unpatched Windows box that's being used as a bot, or you get a decently-secured (usually linux or *BSD) system that is doing some rather specific things to a specific target. And last of all, let's not forget that most of the seminal works on information warfare were written by Chinese military officers, and that it's no secret whatsoever that China actually does have a significant infowar capability. We have no rules of engagement that classify hacking as an act of war, so they can get away with it; what are we going to do, bomb them over it? They have the world's largest standing army, are a (increasingly) crucial economic partner, and we're already overburdened militarily with a two-front war where we've bogged down fighting insurgents. They do it because they know they can get away with it, and they're correct in that thinking.

shhhh... (1)

nihaopaul (782885) | more than 7 years ago | (#16363579)

what are we going to do, bomb them over it?
stop giving people ideas. but if they do, make sure you have them email forigners@in.china.com mailing list to let us know to leave first! Mkay? -- Zie Nazi's are coming

Re:Not Chinese (1)

vtcodger (957785) | more than 7 years ago | (#16363719)

***We have no rules of engagement that classify hacking as an act of war, so they can get away with it; what are we going to do, bomb them over it? They have the world's largest standing army, are a (increasingly) crucial economic partner, and we're already overburdened militarily with a two-front war where we've bogged down fighting insurgents. They do it because they know they can get away with it, and they're correct in that thinking.***

Moreover, I'll be suprised and mildly appalled if the NSA and CIA don't do the same and worse to any government computers that our enemies, friends, and those in between unwisely connect to the Internet. I mean ... that'd be their job would it not?

Re:Not Chinese (1)

Shoten (260439) | more than 7 years ago | (#16365249)

I'd say you're spot on with this. But conversely, I would expect that we'd be doing so anyways; we don't need an excuse to do spook-like things to other countries. So again, there's no disincentive for the Chinese to do the same. After all, the French spy on us, the Israelis spy on us...some of our closest friends with whom we have far less competitive motiviations, in other words, spy on us. So why wouldn't a country like China, with far less to lose and far more to gain not do the same? When you push the details of technology aside, that's all this is...spying. And spying is always going on.

Re:Not Chinese (3, Interesting)

suv4x4 (956391) | more than 7 years ago | (#16363821)

I'd like to defend my viewpoint since I've been called, by some, an idiot and uninformed.

Consider you have to hack into Us givernment servers with confidential data. Even if you're not an incredible hax0r, it's obvious that if they find out about you, you're totally screwed. So the first thing you do, the MOMENT you grab the data, is cut the PC off the network.

Then encrypt and record the data on a mobile media (CD, DVD, Flash, whatever), and securely format the PC or even just destroy the original HDD.

Even before this, you'd turn off all possible logging activity, lock up the security, stop unneeded services, so that you can be relatively secure during the attack.

How is it that so much evidence in logs and what not was found on the "source" machines. This is WAY too much evidence. The contrast between the Windows hacked machines and the linux machines may be just a decoy to get the investigators stop tracing right there.

If the boxes were so secure, how did they get in there?

Why were the Windows boxes having "logs" of where the data was sent and so on. What kind of trojan would log their own activity on the compromised machine?

And the million dollar question is: how the f*ck they tied the Chinese *GOVERNMENT* with a Chinese *HACKER*... In fact, the first thought to occur to a government trying to hack into US's servers would be to hire hackers from another country to do it.

All the "evidence" presented is incredibly shallow and inconvincing if you try and put yourself in place of the people who did the attack.

Add to this the constant FUD that US spread that Lenovo puts spying chips in ThinkPads and similar conspiracy theories. It's apparent US find China a convenient target to blame, just the way they did with Iraq after 9/11.

Re:Not Chinese (1)

drinkypoo (153816) | more than 7 years ago | (#16365407)

Add to this the constant FUD that US spread that Lenovo puts spying chips in ThinkPads and similar conspiracy theories.

You know, the idea that Lenovo would put spying software/firmware in the system is an entirely logical one. It wouldn't even be the first time such a thing happened, although it would probably be the first time it happened on such a large scale.

Ever think that maybe people are paranoid because they know just how plausible it is?

Re:Not Chinese (1)

suv4x4 (956391) | more than 7 years ago | (#16365521)


You know, the idea that Lenovo would put spying software/firmware in the system is an entirely logical one. It wouldn't even be the first time such a thing happened, although it would probably be the first time it happened on such a large scale.

Ever think that maybe people are paranoid because they know just how plausible it is?


The ThinkPC's were produced in China even before Lenovo owned the department. So are most other laptop brands, macs and even mp3 players, including iPod.

If you feel it's plausible, throw away all parts from your PC produced in China. You won't have much left.

Re:Not Chinese (1)

cunina (986893) | more than 7 years ago | (#16365449)

The US has never claimed that Lenovo has put "spying chips" in ThinkPads. You're the one spreading FUD, pal.

Re:Not Chinese (2, Interesting)

lawpoop (604919) | more than 7 years ago | (#16364161)

"attacks have been conclusively back-traced to China."

How could one do this?

...you usually get one of two kinds of hosts: you get a wildly unpatched Windows box that's being used as a bot, or you get a decently-secured (usually linux or *BSD) system that is doing some rather specific things to a specific target.

Isn't the first thing that a hacker does when they get their hands on a decent box is apply all security patches so that *another* hacker cannot get into it? What's the point of co-opting a wide-open Windows box that anyone else on the net can use?

You're telling me that because it's a secured linux or BSD box doing specific things to specific hosts, instead of a promiscious zombie squirting spam everywhere, therefore it *must* be Chinese military, rather than random hacker from anywhere in the world (including China)?

How do you know it isn't a random hacker ssh'ing in (via a series of proxies, anonymous or compromised) to a host that they have secured for their own personal use?

Re:Not Chinese (2, Insightful)

Shoten (260439) | more than 7 years ago | (#16365441)

You're reading too much into individual components of my post, and not taking them as a whole. I'll answer your questions in turn. For one, how does someone backtrack to the original host? By gaining control of the next hop, one at a time, essentially. You know that your box got owned by 10.20.30.1, so you counter-hack it. Once in, you look around, and see who connects to it. More importantly, you see who is connected to it while it connects to your box. (This is detailed in a number of the articles linked in the Schneier article I referenced in my original post as the method used.) Rinse, repeat, until you are on a box where the person connecting to the next hop in the chain isn't on an SSH shell, but is local. This is an oversimplified explanation, but is quite technically accurate; the means employed can range from leveraging the tools placed there already by the hacker to using your own. You could also conceivably enlist the assistance of the organizations that own all the hacked boxes, but this would be a nightmare to accomplish, and since the person investigating Titan Rain has been confirmed to essentially be breaking the law by hacking, I'm sure this wasn't how he did it.

And no, I'm not saying that just because it's not a Windows box spouting spam or whatnot, but is instead a unix-flavored system doing very specific things, it's the Chinese. I'm saying that because it's a unix-flavored box at the end of a long train of hacked proxies (keep in mind that without the backtracking, the assumed culprit would have been South Korea in most cases, everyone) where the only person logged in doing naughty things to us is there locally, in a country whose military was the very first to espouse information warfare as a legitimate method in current times...well, that's a much clearer picture. I think you get the idea. To counter, let me point out that the argument has been, up to this point, "It can't be China, because lots of Chinese boxes get owned, and it could just be a bot owned by someone else." That's an argument for skepticism and closer investigation, not a logically sound way to say that the entire population of the world's largest country is impossible of being capable of hacking. And when you look at WHAT is being hacked, and what information is being stolen, then you can see the shopping list [sans.org] that is being used, which is typical of an organized intelligence-gathering organization.

Re:Not Chinese (1)

djupedal (584558) | more than 7 years ago | (#16364379)

'They do it because they know they can get away with it, and they're correct in that thinking.'

"I Fart in Your General Direction..."

Since I live in that province, and work in the telecom sector, I think I'll ask the boys in R & D tomorrow if anyone knows of anyone knock, knock, knocking on USDCs' digital door...

Re:Not Chinese (0)

Anonymous Coward | more than 7 years ago | (#16363351)

As mentioned before, the attack are most likely not from China at all. No decent hacker would leave traces from his own machine when he could easily use a zombie network to carry out the attacks and collect information.
The people making these claims are, in fact, not idiots. They have thought of that.

lets not talk about the OS that was hacked .. (1)

rs232 (849320) | more than 7 years ago | (#16363403)

"As mentioned before, the attack are most likely not from China at all. No decent hacker would leave traces from his own machine", suv4x4

It's not as if they had access to the hackers computers. They would use evidence of portscans being run against their own computers.

"A few minutes ago, we received a complaint from the U.S. Department of Commerce [google.co.uk] about them being portscanned"

"Attacks on UK government systems using a then unpatched ,Microsoft Windows [theregister.co.uk] Meta File (WMF) exploit last Christmas were traced back to China."

"Last June the UK's .. (NISCC) warned that approximately 300 UK Government departments .. have been the subject of such attacks, many reportedly originating in the Far East [theregister.co.uk] .

How the heck does this get modded up Insightful?

was Re:Not Chinese, Insightful)

Re:lets not talk about the OS that was hacked .. (1)

Mister Whirly (964219) | more than 7 years ago | (#16365255)

It was an unpatched Windows system most likely because 90% of the copies of Windows in China are bootlegs and won't allow them to update...

Re:lets not talk about the OS that was hacked .. (1)

rs232 (849320) | more than 7 years ago | (#16365573)

Why are you posting total nonsence. The attacks were on machines in the UK and no patch was available at the time.

UK.gov repels zero day WMF attack

"The attacks - initiated before [theregister.co.uk] Microsoft's patch against the vulnerability was released on January 5"

Re:Not Chinese (0)

Anonymous Coward | more than 7 years ago | (#16363469)

This passes as Insightful these days? Read up before you make idiotic statements like that. A lot of cracking activity has most certainly been traced back to China, including these incidents. Don't post if you're so uninformed.

Re:Not Chinese (0)

Anonymous Coward | more than 7 years ago | (#16363495)

"No decent hacker would leave traces from his own machine when he could easily use a zombie network to carry out the attacks and collect information."

If we have a government that was wiretapping domestically, what makes you think they couldn't make a few calls to see where the most likely origin of the attack was? With the current situation in Asia it would be more convenient to say the attacks were from North Korea (China shares similar views on North Korea as the U.S.).

Re:Not Chinese (2, Insightful)

Anonymous Coward | more than 7 years ago | (#16363603)

Does everyone have to take every story about someone attacking the US and claim it is a lie? I'm guessing since it' safer to believe nothing is wrong than face reality then this is the reason. "They keep claiming China...." Yes, god forbid someone should point out the person who is doing something. If the guy accross the street keeps attacking you, stealing from you, and destroying your property it's bad to keep blaming him.

This is why the United States will fall apart. We have two groups, one that sees no threat in anything and one group who wants to be the Nazi2000 party. What will happen is we will get a big smack in the face because we didn't defend ourselves and the Bush-like people will gain even more control because of it.

"I'm starting to think it's convenient..."

I'm starting to think that slashdot is full of know-nothing big mouths who don't really have any common sense. "No decent hacker would leave traces...". So that MUST mean that it's not China because they wouldn't leave traces. Kevin Mitnick must not be a very good hacker then because he got caught. We all know it's IMPOSSIBLE to catch good hackers.

And finally, there's the fact that maybe China DOESN'T CARE if we know.

However, once again we have people who tell us we are wrong to worry about security and that what is happening is not really happening. This plays right into the hands of people like Bush who will use the "told you so" argument to make this country a dictatorship.

Re:Not Chinese (1)

buswolley (591500) | more than 7 years ago | (#16365613)

You know... While its true that Hackers try to obscure where they came from, its also true that some of the best in the field are tracing them back to China.

When the beer runs out... (-1, Flamebait)

Ice Wewe (936718) | more than 7 years ago | (#16363081)

This is not the first time Chinese hackers have attempted to gain access to US Government systems.

Well it's not like they're the only ones that have ever tried. When you run out of beer, life can get pretty boring, and you're so drunk, you don't know if you're attacking the US goverment servers, or Carmen Electra's server.

WindowsUpdate (2, Funny)

crazyjeremy (857410) | more than 7 years ago | (#16363093)

They hacked WindowsUpdate.com [mtrx.net] as well... It must be them. The screen capture of the hacked website says "hacked by chinese".

Re:WindowsUpdate (1)

megaditto (982598) | more than 7 years ago | (#16363999)

1) Chinese hacked US Govt computers
2) Most of US Govt computers run MS Windows
3) Bill Gates is in charge of MS

Therefore, Bill Gates is a Chinese Spy!!1!!!!11

Re:WindowsUpdate (1)

swb (14022) | more than 7 years ago | (#16364645)

I know you're making a joke, but what about a capitalist/communist China wouldn't any US corporation like?

A few select business leaders are allowed to run massive monopolies, labor disputes are settled with an AK-47, and there's no noisy press to berate your crappy products or your business leadership.

Sounds like Bill Gates might actually like the Chinese afterall.

Obviously (1, Funny)

amliebsch (724858) | more than 7 years ago | (#16363095)

These are Chinese hacker infantry, who steal money from the internet to fund the war against the GLA.

Re:Obviously (-1, Offtopic)

Anonymous Coward | more than 7 years ago | (#16363255)

"Black Lotus has trained us well."

Re:Obviously (-1, Troll)

Anonymous Coward | more than 7 years ago | (#16363343)

Parent post is a reference to Command and Conquer, not a troll. If you don't understand something, think twice about moderating it.

US Department of Commerce? (1)

dattaway (3088) | more than 7 years ago | (#16363123)

What could possibly be of importance on US Department of Commerce computers? Are they trying to download warez? Logs off steamy chat rooms? Minutes of another boring meeting a typical government official attended?

Re:US Department of Commerce? (0)

Anonymous Coward | more than 7 years ago | (#16363219)

China already slaughtered the US on commerce. ;)
They already set up base camps called Walmart.

Re:US Department of Commerce? (4, Informative)

acvh (120205) | more than 7 years ago | (#16363465)

Actually, the Department of Commerce has become as important to foreign relations as the Department of State. Maybe even more so. State is concerned with PR, diplomacy and such. Commerce cuts deals worth billions of dollars; the prospect of being able or not to do business with the US is a much bigger stick than threatening to refer someone to the UN.

If a foreign power could gain access to internal Commerce discussions it would give them some leverage in negotiations; and in the realm of international business a little inside info can go a long way.

This is getting ridiculous (0, Troll)

BVis (267028) | more than 7 years ago | (#16363131)

Does anyone on the Slashdot editorial staff even read the main page anymore?

It's so bad, they disabled the "dupe" tag (0)

Anonymous Coward | more than 7 years ago | (#16363191)

Seriously. So now they can say "See, no dupes!" Fortunately, clever members of the Slashdot audience have discovered they can use "dup" and "duplicate" instead. I imagine "tripe" still works, too.

This is not the first time indeed (-1, Offtopic)

Anonymous Coward | more than 7 years ago | (#16363209)

It just happened Saturday! [slashdot.org]

Block China From the Firewall (4, Interesting)

organgtool (966989) | more than 7 years ago | (#16363213)

I was going to suggest blocking all traffic coming from the IP range of addresses from China, but they could easily circumvent that by using a proxy outside of China. Maybe the U.S. Department of Commerce could create a welcome message that promotes democrary and condemns the inhumane treatment of the Chinese government and have that message appear before prompting for the username. That traffic would probably get blocked by the Great Firewall of China. When your weapons fail to work, turn your enemy's weapons against them.

They'd just hit from South Korea then (1)

Travoltus (110240) | more than 7 years ago | (#16363381)

Need I say more?

Re:They'd just hit from South Korea then (1)

jamar0303 (896820) | more than 7 years ago | (#16364149)

Why South Korea? The only relationship I see is the large number of Korean immigrants in Shanghai (and now I see shop signs in Korean a lot more in the "Korean-dominant" areas) and maybe the commercial relations (Pantech, Samsung, and LG are 3 companies that I can think of that are pretty big in China)

Re:Block China From the Firewall (5, Interesting)

smilindog2000 (907665) | more than 7 years ago | (#16363635)

That would really PO the Chinese. They hate it when we point at their miserable human-rights record in public. A better way IMO to deal with the Chinese is to work behind the scenes to get them to improve while publicly praising their efforts. IMO, Chinese culture cares much about 'face', a concept of honor that requires the appearance of respect, even if we bicker shamelessly behind closed doors. Bush routinely shows his ignorance of the Chinese by publicly lashing them, and then he gets bent out of shape when the Chinese retaliate with substance rather than words.

When the Chinese accidentally rammed one of our surveillance planes was a great example. Bush immediately publicly blamed the Chinese overly-hostile pilots (who were, of course, at fault), and demanded back our plane and it's crew. The correct course would have been to call the Chinese first, and negotiate terms for getting our plane and crew back secretly. IMO, the Chinese can be far more reasonable if we agree to put on a face showing friendship, cooperation, and respect for each other. We could have agreed to publicly call it a freak accident, with no one to blame. That probably would have gotten our guys and maybe even the plane back far quicker.

So, I think changing the web site to shame the Chinese government would be a bad idea. Instead, we should work with the Chinese behind close doors to solve the problem. Of course, that wont end Chinese spying on the US, nor will it end our spying on them. In general, I feel that it is good for world stability when we know the truth about each other. Fear of the unknown can cause major problems (like WMD in Iraq).

Re:Block China From the Firewall (1)

javilon (99157) | more than 7 years ago | (#16364137)

Fear of the unknown can cause major problems (like WMD in Iraq).

I hate to break it to you, but the iraq invasion was not caused by lack of knowledge. It was actually the fact that Bush new that Iraq didn't have any meaningful WMD that allowed the invasion.

Countries with real WMD like North Korea dont get invaded. If you disregard the US rethoric, invading Iraq has sent the message that you need WMD in order to keep the americans at bay. That is why Iran and NK pursue them as fast as they can.

I'm sure this is intended to provide an excuse... (4, Insightful)

BlabberMouth (672282) | more than 7 years ago | (#16363271)

for all the cracking attempts our own guys have launched against China. I'd be schocked if we (the United States) haven't been doing this type of thing against China, North Korea, Iran, or just about anybody all long.

China is about to get nuked anyway (-1, Offtopic)

Fruity McGayGay (1005769) | more than 7 years ago | (#16363275)


ENOUGH OF THIS GAY BANTER, ON WITH THE TROLLING!!!

8====D~~



During my years as a councilor at a Boy Scout camp, I have had the chance of many experiences. The chance to see naked boys in the community showers and the sight of sexy bodies going for a dip in the lake but one memory comes back clearer than ever.

First let me introduce myself. My name is Joshua, but friends call me Josh for short, I am 17 years old and about 5 foot 11 with a really toned body. I run 2 mile each morning right after I wake up to keep myself in shape. I had always loved the outdoors and I have plans to be a teacher when I got older so I thought teaching kids is going to be a great experience for me and that's how I became involved in the scouting program.

It was my second year at scout camp being a councilor and that comes with some major seniority, and that was the ability to have the over 21 staff buy me alcohol. One night after a stressful day of working with a bunch of crying whiny little kids I decided its time to crack open my 1/5 of jack. I sit back in my tent relaxed just slowly drinking the night away when Caleb popped his head into my tent. He was 16 years old with a body to die for, he was center for his High School football team and had a six
pack any guy would give his left nut for.

"Hey josh," Caleb muttered, I could tell he had been drinking, " come over to my tent, I cant find my flash light." So I stand to the best of my ability and stumble following him over to his tent, and fall in, shining my light around till he finds his. Then I take the last drink of my jack and lay the bottle down why I lay there looking up into the dark tent ceiling. All of a sudden my dick began to get rock hard as a thought of a plan. I pulled my 8 inch dick out and started jacking off and said "Caleb I am going to masturbate in your tent." "Na you wouldn't dare do anything like that" he replied as he shined his flashlight on my hand as I slowly pumped my cock. He looked at my cock with wide eyes as I began to pump a little faster. I saw him reach over and take off his boxers and began to play with his 5-1/2 inch cock. I laughed at him and said "Wow you really do have a small cock why don't you jack me off and see how it is to hold a real cock on this boy hands."

He looked at me and shook his head no, I reach over and forced his hand away from his cock and began to jack him off he followed suit and began to do the same with me. It feel good because he was going at a fairly fast pace and I began to moan softly. Then he did something I didn't expect he move his mouth over my dick and began to softly suck it. His bobbed his head up and down making sure to please my dick equally with his tongue. He moved his dick over my mouth and I began to suck it, taking it in inch by inch till I hit his pubes then I began to take it in and out slowly. I took my mouth off his dick and used my tongue to pleasure the left ball then the right, then taking them both into my mouth being careful. As we continued to 69 it up, I thought I heard a noise outside so I moved slightly and apparently he took this as a sigh to stop and got off, I was pissed so I grabbed his hand and placed it back on my cock as he began to jerk me off again he got up took off his boxers and said to me Fuck me josh, Fuck me hard"

I couldn't resist this little hot stud so I placed him on the floor and put my cock to his virgin hole and began to softly push inward. I heard him grunt softly as in pain and I stopped; keeping my cock still it was about half way in. Keep going I heard him mutter and I began to put more pressure till my pubes touched his ass. I said here we go as I began to slowly fuck this tight virgin man hole enjoying each pleasure able in and out I took. I began to pump faster and faster letting my balls made contact with his ass.

i am Cumming I muttered as I released 5 huge squirts of my man juice inside his virgin hole. I quickly drew out and turned him over and began to give him a blow job leaving nothing in question and within 30 seconds my mouth was filled full of this studs seed as I drank each gulp that he so graciously gave me. I gave him a firm kiss on the lips and said Good night my Caleb as I walked back to my tent and fell asleep at 2:09.

Confused.... (1)

glowingsnowball (973747) | more than 7 years ago | (#16363349)

What kind of credible article uses the word reckon?
"Security experts reckon attacks originating from computer crackers largely located in China's Guangdong province are aimed at extracting sensitive information from targets such as the Commerce Department's technology export office."
I reckon that people believe that we're hicks for a reason....

Those Chinese (0, Troll)

Anonymous Coward | more than 7 years ago | (#16363383)

After we make a glass parking lot out of Iran and North Korea, we'll come for those darned Chicoms, and make their country glow in the dark! Now let us bow our heads to Jesus for his blessing....

[/Neocon]
[/Sarcasm]

Re:Those Chinese (0)

Anonymous Coward | more than 7 years ago | (#16364655)

You're an idiot

Re:Those Chinese (0)

Anonymous Coward | more than 7 years ago | (#16365663)

Seconded

Oh yeah, targeted indeed. (1, Funny)

bo0ork (698470) | more than 7 years ago | (#16363397)

"BIS discovered a targeted effort to gain access to BIS user accounts," Commerce Department spokesperson Richard Mills said. "They took a series of immediate action steps to ensure that no BIS data is compromised. We have no evidence that any BIS data has been lost or compromised," Mills said.

Oh yeah, I too must be specifically targeted then, because I've seen these sequences in my log:

May 31 13:06:27 gator sshd[18127]: Invalid user tony from 210.196.254.66
May 31 13:06:30 gator sshd[18129]: Invalid user core from 210.196.254.66
May 31 13:06:34 gator sshd[18131]: Invalid user newsletter from 210.196.254.66
May 31 13:06:37 gator sshd[18133]: Invalid user named from 210.196.254.66
May 31 13:06:40 gator sshd[18135]: Invalid user visitor from 210.196.254.66
May 31 13:06:43 gator sshd[18137]: Invalid user ftpuser from 210.196.254.66
OMGZ! L33T JAPANESE HAKKERS ARE ABOUT TO PWN ME!

Re:Oh yeah, targeted indeed. (1)

autophile (640621) | more than 7 years ago | (#16363877)

You know, I can understand all those attempted logins -- core, visitor, ftpuser, and so on -- except for the first one. "tony"?! Is this some kind of default login name?

--Rob

Cyber-attack (1)

nichrome (556185) | more than 7 years ago | (#16363499)

Sorry for the OT, but I just can't get past the term "Cyber-Attack". Are the Chinese using concentrated electronic sex talk to assault the US Dept of Commerce?

Export Control, and the Information Age. (5, Insightful)

lwap0 (866326) | more than 7 years ago | (#16363513)

I frequently work with the U.S. government to prevent export control violations in the defense contracting world. While I can't name specific countries, I can tell you that East Asia accounts for 34% of all attacks both cyber and conventional targeting U.S. Industry and government agencies (as of 2005). My peers and I agree that this is likely directly or indirectly sponsored by the Chinese government. And contrary to popular belief, about 90% of what they want is export controlled information, not classified information.

Why export controlled information? Think about how much money it takes to protect classified information - guards, safes, alarm systems etc., it's a lot of cash, and it's damn secure. Export controlled information doesn't enjoy those same protections, just export compliance waivers to sell or ship said products overseas. As an example: Say we have a dual use technology, both military and civilian use - like jet engines. We won't sell it to certain countries we compete with both economically, and militarily, but they will do their very damndest to steal it, either by forging state department waivers, lying, stealing, black-mailing, hacking - whatever it takes. Why do they want it? To equip their jets to compete with ours on the battlefield, or to sell, or maybe even find it's weaknesses to compromise if we ever went to war with them.

I'm willing to bet here that the network used to launch the attack was a University school network, which to most people seems pretty innocent - except that in China, all schools are state run and owned. Is it an academic institution, or an extension of the Chinese government? Likely both. In this instance, the Chinese government gets plausible deniability - they had no control over, or knowledge of any cyber attack. I'll don my tin-foil hat, and disagree with that assertion only because I'm jaded and cynical enough to know better.

Re:Export Control, and the Information Age. (1)

smilindog2000 (907665) | more than 7 years ago | (#16364001)

In your field, you've probably run across the Israel-to-Chinese tech-transfer problem. I hate linking to this obviously BS site, but I'd like to know if this article it carries has any truth to it:

        http://www.americanintifada.com/2005/5/05-06.htm [americanintifada.com]

I've seen similar stories elsewhere. Have we in fact indirectly sold F-16 technology to the Chinese through Israel? Thanks.

Re:Export Control, and the Information Age. (1)

lwap0 (866326) | more than 7 years ago | (#16364317)

To my knowledge, no, we've never sold something to Israel, and then watched them turn and sell it to China. Now, we have provided them (Israel) with F-16's, but these are really stripped down versions of the plane. We don't provide them our avionics package, radar, or targeting software. They have a likewise system they might install, but that's on them, not us as the seller. The U.S. government will not sell military technology to another country, without holding a trump card of more superior technology if said buying country thinks they can take us one day. I know for a fact when we do sell our technology to allied countries, we make them sign numerous agreements to not sell or give the technology to countries on our shit list. And while we wouldn't go to war with them if they did do it, they can be garunteed to never see another U.S. product ever again, which for most any country, is enough to keep them on the straight and narrow. You have to remember, we spend 400+ billion dollars a year on our military, more than any country in the world by a large margin. Everyone knows we've got the best toys, and if they want any of the action, they'd best stay in our good graces.

Your article suggests some political tensions between us and Israel, and I know we've got some beef with them providing weapons to China, but to my knowledge, nothing heavy has occured (other than the UAV's the article has mentioned, and a missle system or two that I know of personaly). Then again, I don't sit in the White House :)

MS BOB (0)

Anonymous Coward | more than 7 years ago | (#16363521)

Who told the US department of commerce to use Windows?

Yawn, Chinese hackers attacked EVERYTHING (0)

Anonymous Coward | more than 7 years ago | (#16363601)

Yawn, I've seen the same thing on every server I've ever maintained, the Department of Commerce isn't special, they should get over it.

"Cyber-Attack" (0)

Anonymous Coward | more than 7 years ago | (#16363655)

Next we'll hear some complaints about "Cyber-Date Rape"...

Wont this be related to the NK atomic bomb news? (1)

LiquidCoooled (634315) | more than 7 years ago | (#16363727)

Like Chinese folks just looking around for info and news.
What has the Commerce department released recently?
whats the news about in China at the moment?

This is just one big Chinese style slashdotting?

To everyone who says it can't be China (-1, Troll)

pjbgravely (751384) | more than 7 years ago | (#16363753)

China is our enemy

We have forgotten that fact,
but it is still true none the less.

Re:To everyone who says it can't be China (1)

Aquila Deus (798176) | more than 7 years ago | (#16364213)

China is our enemy We have forgotten that fact, but it is still true none the less.

What fact? that US helped us many decades ago??

All the enemies americans have today are made-up ones, like Iran and Iraq. Yankees are getting more and more crazy everyday.

*sigh*

Re:To everyone who says it can't be China (1)

jamar0303 (896820) | more than 7 years ago | (#16364223)

Keep repeating that, and quite possibly they will do something to make those words more true, affecting all the ex-pats and tourists in China. Be careful.

Re:To everyone who says it can't be China (5, Insightful)

ObsessiveMathsFreak (773371) | more than 7 years ago | (#16364431)

China is our enemy
Depends on who you are.

If you're a democracy and liberty loving citizen, then yes, the Chinese regieme represents oppression and injustice and stands against you and your way of life.

However, if you're a corporate shareholder, or one of their shills in public office, then the Chinese regieme represents untold potential to shaft billions and make billions in the process. Ergo, you'll want to keep them sweet.

Re:To everyone who says it can't be China (1)

Mister Whirly (964219) | more than 7 years ago | (#16365501)

And if you are Wal-Mart, China is a suplier for 80% of their clothing. If China is our enemy, then what does that make Wal-Mart?? "A friend of my enemy is also my enemy." Sure there are sweatshops in other impoverished areas of the world, but man, China's sweatshops are the cheapest!!

Why is this info internet-accessable anyways? (3, Informative)

knorthern knight (513660) | more than 7 years ago | (#16363759)

According to the Register article...
> Information housed on the department's systems includes sensitive commercial and
> economic data on US exporters as well as data involving law enforcement records.

    How many times does this have to be drilled into people? If you put something on an internet-accessable server, it *WILL* be accessed from the internet, and not only by "authorized personnel". For additional giggles, put the following key into a Google search...

inurl:.gov confidential "do not distribute"

    The f***ing idiots who put sensitive government data on publicly accessable servers should be shot by a firing squad for treason.

what is china's full IP range? (-1, Troll)

Anonymous Coward | more than 7 years ago | (#16363797)

honestly, i have been wondering how to block china specifically. i understand how to block network ranges, but what i am in need of is the range for china. there are so many automated attacks coming from there i see no reason not to block them all. i say fuck em if they can't play nice.

Re:what is china's full IP range? (0)

Anonymous Coward | more than 7 years ago | (#16364343)

0.0.0.0/0 should block most attacks. Just create an exception for each of your gay porn sites and you're good to go.

Sensitivity of information? (1)

Slime-dogg (120473) | more than 7 years ago | (#16363851)

Is government stupid enough to expose information that is incredibly sensitive to the internet? (Please, don't answer this).

If they had clear information and data policies, their data would all be on private networks, without access to the outside. Not doing so is just an invitation for crackers who love challenges.

Re:Sensitivity of information? (1)

Capt James McCarthy (860294) | more than 7 years ago | (#16364099)

Least we forget how people cry about "the Govt should provide the people all the information that we want because we pay taxes and we should know what they are doing!" Well, to provide information to the US population, would be providing information to the entire globe. That is why many things that seem harmless on the surface (budget for one) but could be used as a valuable piece of intel for many other nations/companies.

Now, unless you want the govt to spend more money on a larger priv network to exchange sensitive information, feel free to email your congressperson to give the green light to spend more money and raise taxes.

First Strike? (1)

nurb432 (527695) | more than 7 years ago | (#16363995)

Ok, assuming for just a moment that it is government backed ( which i honestly doubt ), wouldn't this be considered a declaration of war and a 'first strike' ?

And all we are going to do is sit on our hands and let them?

Re:First Strike? (0)

Anonymous Coward | more than 7 years ago | (#16364485)

As opposed to doing... what?

This is neither the time nor place that we can afford WWIII, and both parties know it.

Re:First Strike? (1)

nurb432 (527695) | more than 7 years ago | (#16365289)

I disagree. Its time for wwiii to commence ( in some ways its already started ). Its time to purge the lesser peoples of the world again, and smack into obedience what is left.

Re:First Strike? (1)

tehcyder (746570) | more than 7 years ago | (#16365147)

And all we are going to do is sit on our hands and let them?
You're right! The US should treat this as though it were a declaration of war and go and start a land invasion of China. What could possibly go wrong?

Invasion ? Nah (1)

nurb432 (527695) | more than 7 years ago | (#16365245)

No need to 'invade', just melt the country. It will deter others from making the same mistake.

Re:First Strike? (1)

Mister Whirly (964219) | more than 7 years ago | (#16365367)

Yeah, I mean look how well things are going for us in Iraq! We should get into that situation with at least a few more countries. Especially China - I hear their millitary is really small.

Why connect it? (1)

amigabill (146897) | more than 7 years ago | (#16364053)

aimed at extracting sensitive information from targets such as the Commerce Department's technology export office.

Why is sensitive governmental data even connected to the public internet? Surely the government can afford it's own private network that doesn't even have connections to the general public internet. They couldn't hack into something that's not there... Sure, the government started the internet, that doesn't mean they have to continue using the same one we do, does it?

Block China (1)

nwf (25607) | more than 7 years ago | (#16364183)

One has to wonder, with all the uproar about hacking from China into US Gov't computers, why don't they just block all the IP blocks in China? Download the list from APNIC, use something like Perl's Net::CIDR to merge the blocks and add to your firewall. It's rather easy...

Re:Block China (1)

ErikZ (55491) | more than 7 years ago | (#16365057)

Because then whatever organisations that are doing this in China will simply move elsewhere and attack from there.

Hows this for your next headlines? "Mexico and Canada jointly attack the US commerce department."

How about, Frienemy (1)

AlbionTourgee (918996) | more than 7 years ago | (#16365163)

China is our enemy? China is our friend? It depends on who you're talking about and who you ask. China isn't a monolith, although they're pretty centralized. (Like us -- today, DC politicos review even mid-level hires throughout the country.) There are friends of US even in their government, and enemies and in between, much like our government. I'm sure they try to spy on us and we try to spy on them. Remember early 2001, the tension after the crash of the US spy plane in Chinese airspace? There were reports of administration hawks saying we'll go after the countries later deemed Axis of Evil and then Red China as well. Today, we import something like twice as much from China, sell them the IBM laptop business, and our government occasionally bemoans lack of Chinese civil rights but caters to them to help us with N. Korea and other hotspots. This is reality in a world where we're married economically to them (ok, a pretty disfunctional marriage) and our efforts to project US power haven't worked out quite as expected (by us). (BTW, is the unnamed "security consultant" mentioned in the Register report really reliable as a news source?)

Surprising and a step in the right direction (1)

TLouden (677335) | more than 7 years ago | (#16365225)

I'm a bit surprised by this. Not that the Chinese Government would approve such action, but that somebody is able to perform it. My indirect experience with the culture suggests that finding individuals capable of the type of on-the-fly problem solving necessary to attack a protected network is very difficult. While the application of such skills is a bit maligned, I'd say it's a good sign for them that such people do in fact exist and can be motivated to utilize their abilities. I know of a few groups who'd be interested in hiring the team performing these attacks for more legit activities.

All the chinese need to do is put up a pron site. (1)

Maxo-Texas (864189) | more than 7 years ago | (#16365331)

Based on the other recent post, many government employees browse pron and gambling sites and get infected with bots.

That would probably be a better vector.

Plus they might make a profit while doing it.

Off the wall possibility (0)

Anonymous Coward | more than 7 years ago | (#16365651)

May it is just bored Chinese soldiers watching the same porn on/through the computers that the US government employees were watching the porn on ;-)
Load More Comments
Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Sign up for Slashdot Newsletters
Create a Slashdot Account

Loading...