Log in

View Full Version : Clinton, Google and cyber cold war on China



Communist
3rd February 2010, 11:53
.
Clinton, Google and the cyber cold war on China (http://www.workers.org/2010/world/clinton_google_0204/)

By Gary Wilson
Jan 31, 2010 8:54 PM


Has Secretary of State Hillary Clinton declared a U.S. cyber cold war on China?

On Jan. 21, Clinton gave a speech titled “Internet Freedom.” News accounts generally tie the speech to a recent report by Google that it had been subjected to cyber attacks that originated in China.

What’s left out of most reports, but was not missed by China and its media, was the rest of the speech. After China’s response to the speech, the New York Time’s characterized the talk very differently than it did in its initial report:
“Clinton’s sweeping speech with its cold war undertones — likening the information curtain to the Iron Curtain — criticized several countries by name, including China, for Internet censorship. It was the first speech in which a top administration official offered a vision for making Internet freedom an integral part of foreign policy.” (N.Y. Times, Jan. 22)

The speech is available in its entirety on the State Department’s Web site. It is filled with aggressive cold war references to the Berlin Wall and an “Information Iron Curtain” as well as other cold war rhetoric, like a speech from the U.S. State Department during the Reagan years.

Clinton’s Internet declaration follows the announcement only seven months earlier on June 23 by the Pentagon’s secretary of war, Robert Gates, that a new military cybercommand has been created for the purpose of conducting cyberwarfare.

Clinton’s speech is not explicitly a war statement, but rather a proclamation of U.S. hegemony over the Internet.

The Google confrontation may or may not have been the catalyst to giving the speech at this time. In early January, Google announced that it is reviewing its business operations in China because of cyber attacks it says originated in China. Although Google does not say it directly, the implication is that the Chinese government is behind the alleged attacks.
The fact is that Google doesn’t know the source and is only able to trace the attack to servers in Taiwan, but anything beyond that is only a guess.

Google chief legal officer, David Drummond, said in a Jan. 12 blog posting, “We have evidence to suggest that a primary goal of the attackers was accessing the Gmail accounts of Chinese human rights activists.” This is a revealing statement, because it also uses imperialist cold war terminology.

In the twisted terminology of imperialism, the phrase “human rights activists” is used to describe anti-communist individuals, particularly those actively seeking to overthrow a government not dominated or controlled by the U.S. The phrase human rights activist is never used to describe those fighting for justice and against oppression in a U.S. ally or client state.

An interesting side note to the Google cyber attack is provided by Macworld reporter Robert McMillan, who says that the attackers used the backdoor into Google that is mandated by the U.S. security services to give them access to monitor Internet activity.

Google is unlikely to close its business in China. China has 298 million Internet users according to the China Internet Network Information Center, almost double the number in the U.S. And Google is in the business of collecting Internet clickers. Google does appear to be trying to use this event in order to negotiate a change in its terms for doing business in China. Just as Google’s operations in the U.S. require it to carry out some costly practices in order to be compliant with laws that are said to be meant to prevent illegal practices, so too Google’s operations in China must operate under similar laws.

The Clinton speech, however, raised the stakes and turned what might have been initially a “business dispute” into something more.

The Chinese newspaper Global Times’ editorial on Jan. 22 calls it “information imperialism” and says that the Internet campaign launched by the Clinton speech “is a disguised attempt to impose [U.S.] values on other cultures in the name of democracy.

“The hard fact that Clinton has failed to highlight in her speech is that the bulk of the information flowing from the U.S. and other Western countries is loaded with aggressive rhetoric against those countries that do not follow their lead,” Global Times says.

“In contrast, in the global information order, countries that are disadvantaged could not produce the massive flow of information required, and could never rival the Western countries in terms of information control and dissemination.

“Keeping that in mind, it must be realized that when it comes to information content, quantity, direction and flow, there is absolutely no equality and fairness.
“The online freedom of unrestricted access is, thus, only one-way traffic, contrary to the spirit of democracy and calculated to strengthen a monopoly,” Global Times concludes. (opinion.globaltimes.cn)

The accuracy of that statement is confirmed by the cyber attacks that originated in the U.S. targeting the government of Iran. Clinton did not mention this censorship of Iran, an attack that shut down for a short time all information coming from the Iranian government. This attack last year is well known and was widely publicized. Clinton, by leaving out any mention of this cyber attack, this censorship of Iran, was by implication giving it official sanction, maybe even implying that this is what’s in store for any countries that oppose U.S. dictates.

As for Internet freedom and censorship, no mention was made of the FBI’s arrest of G-20 protesters last September in Pittsburgh for using Twitter to communicate during their demonstration. The absence of any mention by Clinton of this widely reported attempt to intimidate protesters was confirmation that the speech was about U.S. monopoly control of the Internet, not about any alleged freedoms.

China didn’t miss the message. The official English-language China Daily had a front page report headlined: “New shot in the arm for U.S. hegemony.”

The report details how the U.S. completely dominates and controls the Internet and how it is U.S. military policy to maintain that domination.
“The U.S. Defense Strategy Review in March 2005 stated that Internet space should have the same priority as continental, marine, aerial and outer space jurisdictions for the U.S. to maintain a decisive superiority.
A statement from Washington on June 30, 2005, made it clear that the U.S. government would maintain its control ... indefinitely,” China Daily reports.

The article has a great deal of information. For example, it quotes a former U.S. intelligence agent who says that the CIA’s primary means for gathering information on China is through the Internet. And the move by China last June to require a filter named Green Dam, which blocks spying activity, is what is in dispute with Google. Google is seeking to take off the Green Dam filter. Read the full report at www.chinadaily.com.cn (http://www.chinadaily.com.cn), including the details on cyber war attacks by Pentagon contractors Northrop Grumman Corp and General Dynamics.

===============================
======================
===============
===========
========
=====
===
=


Articles copyright 1995-2010 Workers World (http://www.workersworld.net/wwp/pmwiki.php/Main/AboutThisSite).
Verbatim copying and distribution of this
entire article is permitted in any medium
without royalty provided this notice is
preserved.

Kassad
3rd February 2010, 15:33
I have no problem with you posting articles from Workers World, but in case you want to post more, why don't you make a thread for all Workers World related links, articles and such in the forum here?

Communist
6th February 2010, 18:59
.
How the U.S. — and Google — censors the Internet
(http://www.workers.org/2010/us/google_0211/)
By Gary Wilson
Feb 6, 2010 8:25 AM

Since mid-January, hardly a day has gone by without some report in the big-business-controlled media about China and censorship of the Internet.

The primary reports were about Google’s declaration in early January that it may stop complying with Chinese laws that are meant to block illegal Internet activity, including spying. This was followed by Secretary of State Hillary Clinton’s blistering cold-war-style speech that directly attacked China.

Such threats, coming from the U.S. government, must be taken seriously.

After all, this kind of speech from the heads of the State Department preceded the U.S. invasions of Yugoslavia, Iraq and Afghanistan. Not that an invasion of China is imminent, but this is war talk from the State Department and must be treated as such.

Outside the U.S., the events are seen quite differently than the carefully-coiffed version presented in the U.S. media. China has done nothing out of the norm for any country with respect to regulating the Internet. Even the U.S. has similar laws and restrictions on criminal activities.

Given the way the U.S. media report this, it is important to make it clear that China does not control the Internet. Control of the Internet lies completely in the hands of the U.S., or more precisely, the U.S. military-industrial complex. And access to the core services is 100 percent controlled in the U.S. In fact, U.S. domination of the Internet was reflected in a bill that was proposed in the U.S. Senate last August that sought to give the president the authority to take full control of the Internet with a national security declaration.

As for censorship of the Internet, no country does more to block global access to the Internet than the U.S. government.

This was illustrated on Jan. 1. That’s the day that a hammer went down and all access to a substantial number of Web sites was blocked to all people from countries on a list created by the State Department. Cuba, Syria, Sudan and Iran are included on the list. A search of the State Department’s Web site and a Google search did not turn up the names of other countries on this list.

SourceForge is a Web site that’s now blocked. SourceForge says it “offers free access to hosting and tools for developers of free/open source software.” As of Jan. 1, all access to SourceForge, including downloads of free software, has been blocked to any user from a country on the State Department’s list. Previously in 2008, SourceForge started blocking access to any free software developer who wished to contribute to any free software project.

This development at SourceForge, because it is a central point for free and open access to software, has produced an international storm of protest. But SourceForge is not alone. Sun Microsystems, Mathworks and Microchip — companies that sell software used by developers — have also made their Web sites unreachable to any user from the State Department’s list. And most prominent in all this turns out to be Google and the Google Code Web site that is also for free software projects.

There is already a protest movement among free software developers to move projects off Google Code and SourceForge and onto Web sites in countries that allow open access to all. One prominent free software project, NautilusSVN, has done this in response to the blockage by Google of access to Google Code. The developers have moved their project onto Ubuntu Linux’s Launchpad and renamed it RabbitVCS, though there is some concern that the London-based Launchpad could become subjected to the U.S. blockade.

In a report on ArabCrunch, Syrian computer engineer Abdulrahman Idlbi says, “It’s worth mentioning that Internet content blockage against some countries is not restricted to getting software or services. It is really disappointing to try to participate in a global humanitarian event such as Earth Hour or the Google Haiti crisis response to make a donation, to find out that parts of those Web sites (powered by Google) are blocked.” Idlbi found that he was not able to make a donation to Haiti relief efforts.

=============================
===================
============
=======
===












Articles copyright 1995-2010 Workers World (http://www.workersworld.net/wwp/pmwiki.php/Main/AboutThisSite).
Verbatim copying and distribution of this entire
article is permitted in any medium without
royalty provided this notice is preserved.

Communist
5th March 2010, 00:42
.
Google Attack Performed by 'Amateur' Botnet (http://www.eweek.com/c/a/Security/Google-Attack-Performed-by-Amateur-Botnet-763973/)

By: Brian Prince
2010-03-02

Security researchers at Damballa analyzed the command and control activity of the botnet associated with the attack on Google. The Damballa report supplies information about the attack's tactics and reach.

Researchers at Damballa have uncovered evidence that the botnet behind the now infamous attack on Google in 2009 was active months before the search engine giant was hit.

In a 31-page analysis of a botnet described as "amateur," the researchers traced the botnet's activity back to July, when its operators first began testing it. By the time the attack was detected by Google in mid-December, systems in at least seven countries had been affected, and by the time Google disclosed the attack that number had risen to 22 and included systems in China, Germany, Taiwan, the United Kingdom and the United States.

Despite its reach, however, the botnet was in many ways unremarkable, noted Gunter Ollmann, vice president of research at Damballa and one of the authors of the report.
Resource Library:

"The threat originally disclosed by Google on Jan. 12, 2010, has frequently been associated with state-endorsed attack and many vendors have explained the operation using a military vernacular," Ollmann said in a statement. "Based on a thorough analysis of deeper data surrounding the attacks and examination of both malware and CnC (command and control) topologies used by the criminals behind the attacks, it appears that Aurora can be best classified as just another increasingly common botnet attack and one that is more amateur than average."

Based on CnC domain registration and management information, the minds behind Aurora appear to have built and managed a number of other botnets for parallel targeted attack campaigns. The earliest of the CnC domains associated with these botnets reliant upon DDNS (Dynamic Domain Name System) service provisioning appears to have been registered July 13, 2009.

After July, that particular CnC domain went dormant, only to become active again within Google's network. The earliest queries for the domain took place in the Hangzhou region of China, with some occurring in Beijing.

The botnets used dozens of domains in diverse DDNS networks for CnC, the authors added, and some of the botnets focused on victims outside of Google. This suggests that each set of domains might have been dedicated to a distinct class or vertical of victims, the researchers said.

"The DNS log analysis reveals numerous MX-lookups (mail-related DNS lookups) … In addition to the type of DNS traffic, the log analysis also reveals where the victims are located," the report stated. "Almost all (99 percent) of these events took place inside Google's U.S. network. No victim in any other country performed MX lookups, suggesting Aurora 's data exfiltration targets were all in the U.S. The pattern of MX lookups appears automated and lacks any diurnal properties."

Though much of the attention has focused on the Hydraq Trojan, Hydraq was actually just one of the pieces of malware used by the attackers. In addition to Hydraq, Damballa found two rogue antivirus program families that were used, specifically Fake AV Alert/Scareware - Login Software 2009 and Fake Microsoft Antispyware Service. These were deployed prior to the launch of Hydraq, though some of the releases overlapped, the researchers said.

"The major malware families associated with the Aurora botnet attacks are distinct and are unlikely to have been developed by the same malware engineer," the report said. "This finding is typical of the botnets that Damballa observes targeting enterprise networks. Relatively few botnet criminal operators develop and maintain their own malware. Instead, they typically rely upon third-party contractors or off-the-shelf malware construction kits. As such, core features and functionality changes can occur overnight, but the CnC transitions slowly as the botnet operator ensures that backup CnC domains remain in operation until the victim malware updates (or migration) is complete."

The full report is available here (http://www.damballa.com/research/aurora/).

Communist
23rd March 2010, 07:31
.
China denounces Google 'US ties' (http://news.bbc.co.uk/go/pr/fr/-/2/hi/asia-pacific/8578968.stm)

BBC NEWS
2010/03/21

China's state media has attacked Google for having what it said were "intricate ties" with the US government.

Google provides US intelligence agencies with a record of its search engine results, the state-run news agency Xinhua said. It also accused Google of trying to change Chinese society by imposing American values on it.

Google denied that it was influenced by the US government, a spokesperson for the company was quoted as saying by AP.

"Google's high-level officials have intricate ties with the US government. It is also an open secret that some security experts in the Pentagon are from Google", reporters from Xinhua wrote in a commentary.

The attack comes as Google prepares to announce whether it will pull out of China because of internet censorship there.

"The decision to review our business in China was entirely Google's and Google's alone, Google spokeswoman Jessica Powell told AP news agency

Google's market share lags behind that of China's most popular search engine, Baidu, but China has more people online than any other country.

Censorship laws

Xinhua said China's internet regulations would remain unchanged whether Google left or not.

"One company's ambition to change China's internet rules will only prove to be ridiculous", Xinhua said.

Google announced in January that it would no longer comply with China's internet censorship laws.

It warned that it may shut down google.cn because of censorship and a hacking attack on the portal.

Google began operations in China in 2006 to widespread criticism. While many argued Google was complicit in the censorship imposed by Chinese government, Google insisted it was nevertheless serving the public interest even though it was furnishing censored results.

Relations between China and Google cooled in January after what Google described as a sophisticated cyber attack in which the webmail accounts of Chinese human rights activists were targeted.

.