Posts Tagged ‘Cyber Attacks’

Can Comment Crew, Anonymous and Luzsec endarger Capitalism?

February 22, 2013 1 comment

Posted on February 20, 2013 by Akashma Online News

by Marivel Guzman

The New York Times released yesterday a special report on ‘Comment Crew’, a group of hackers from China. The U.S. government knew about them since 2005. But Obama Administration is keeping its mouth shut regarding ‘Comment Crew’. According to The New York Times, Comment Crew was tracked down to a white tall building in Shanghai, China.

On the outskirts of Shanghai, in a run-down neighborhood dominated by a 12-story white office tower, sits a People’s Liberation Army base for China’s growing corps of cyber warriors.

The building off Datong Road is the headquarters of P.L.A. Unit 61398. A growing body of digital forensic evidence -confirmed by U.S. intelligence officials who say they have tapped into the activity of the unit for years – leaves little doubt that an overwhelming percentage of attacks on U.S. corporations, organizations and government agencies originate in and around the white tower. The New York Times

Hackivists around the world as they are widely known, are a group of hackers that serve social interest for the general public. The corporate world, and the governments see them as cyber criminals, crimes that can landed them in jail for 100 years if the governments wanted to, or 5 years or less if they take a plea. There had been all types of arrests on the hacker community, but there are many types of hackers and common criminals as well.

David Thomas known as El Mariachi was a common criminal and not a hackivist. His activities and crimes can not even be considered to be the work of a hacker, this type of crime does not involve hacking into computers. They have a gang working together, people that work in banks, or in places where there is a database to be extracted, but not by means of hacking. See Hakcers Wars

Attorney General Eric Holder promises the Justice Department will play a "pivotal role" in thwarting efforts by WikiLeaks or any other organization to extract data illegally from U.S. companies.(Credit: White House)

Attorney General Eric Holder promises the Justice Department will play a “pivotal role” in thwarting efforts by WikiLeaks or any other organization to extract data illegally from U.S. companies.
(Credit: White House)

Madiant Security Firm reports(SPT&SPT1) speak of serious threat coming from China, “they have the evidence”, Madiant said. Why then the U.S. government insist on looking the other way. In the latest White House public release, Obama Administrations blames Wikileaks, Anonymous, and Luzsec as a threat to the U.S. and its American corporations.

White House warns of dangers posed by WikiLeaks, LulzSec, other ‘hacktivists’

New Obama administration strategy says organizations such as WikiLeaks and hacking group LulzSec may conduct “economic espionage against U.S. companies. Attorney General Eric Holder at press conference, February 20

The recent published 74 pages report of Mandiant security firm amount of information is impressive, they give an scope of  the type of activities ‘Comment Crew’ is interested in: APT1 Exposing One of China’s Cyber Espionage Units. (APT-Advanced Persistent Threat) Mandiant_APT1_Report

On 2004 Mandiant started tracking the groups APT, that according to this security firm amount to 20 or so of these groups. In 2010 Mandiant published the first report on these Chinese groups, APT Report.

“The Chinese government may authorize this activity, but there’s no way to determine the extent of its involvement. Now, three years later, we have the evidence required to change our assessment” .Mandian said

This issues needs to be taken very seriously and not just like another paper published. There are serious consequences and ramifications to this report.
There is no news that all the governments have an army of cyber warriors, but the interesting point on this report is the deep of the insertion of ‘Comment Crew’ into the U.S. government databases. Remember this group is in China, where more of the illegal cyber activity occurs apart from Indonesia where there are more than 65,000 known hackers.

The war on words started last year when U.S. Rep. Mike Rogers accused China of cyber espionage. There are serious consequences when you speaking publicly acting as a representative of the U.S. government. Specially is your adversary is China, known to buy U.S. debt and owning trillions of dollars of it.

China’s economic espionage has reached an intolerable level and I believe that the United States and our allies in Europe and Asia have an obligation to confront Beijing and demand that they put a stop to this piracy. Beijing is waging a massive trade war on us all, and we should band together to pressure them to stop. Combined, the United States and our allies in Europe and Asia have significant diplomatic and economic leverage over China, and we should use this to our advantage to put an end to this scourge. — U.S. Rep. Mike Rogers, October, 2011

Chinese Defense Minister on January, 2013 responded to such charges, saying that it is unprofessional and groundless to accused the Chinese Military of launching cyber attacks without conclusive evidence.

Why will China want to steal American Corporate secrets? Isn’t the U.S. government sent our corporations and its secrets to China a decade ago? The American Corporations become greedy and exchanged security for cheaper operational costs. They moved to China.

Made in China

100 % of Microsoft Hardware – Read the Microsoft Hardware – The China Connection

SMT and DIP PCB Assembly, Mother Boards and circuits.

Modems, speakers, microphones, cameras, video cameras

PCB Assembling Network Board

Networking PCBA

CISCO and Linksys Routers, Modems, Network adapters Where Linksys products are make?

When we think communication, we think Internet. Most of our communication gadgets come from China. How hard will be to install mini dropping devices inside every product that China produce?.

Beijing, China—November 14, 2006: IBM Chairman, President and CEO Samuel J. Palmisano (left) and Dr. Zhou Ji (right), Minister of the Ministry of Education, People’s Republic of China, at the launch of a major initiative to bring IBM’s global information technology services expertise and capabilities to China in support of the country’s increased focus on developing its services industry. Sam Palmisano before a sign “What makes us special? IBM China” magnifying-glass Sunil Mittal being recognised by Samuel J. Palmisano and President APJ Abdul Kalam India President APJ Abdul Kalam, Samuel J. Palmisano and IBMers lighting the lamp magnifying-glass Samuel J. Palmisano shaking hands with IBMers magnifying-glass

2006-2010: Remaking IBM into a globally integrated enterprise

IBM was clear on its strategy; making it a reality took a lot of work. The transformation took place in phases that often overlapped. From 2006 to 2008, IBM expanded its presence in Asia, Latin America and Eastern Europe, and today nearly half of its employees are in emerging markets. The company set up a network of global delivery centers in India, China, Brazil and other countries. By standardizing processes and outputs across its large, diverse client base, IBM could deliver quality services to its IT and business process outsourcing clients consistently, with the right skills, in the right place—wherever that would be. Projects could be staffed more quickly, delivering greater value to clients sooner.

Sharing resources

The model of shared services caught on. Global procurement was centralized in China.
Beijing, China—November 14, 2006: IBM Chairman, President and CEO Samuel J. Palmisano (left) and Dr. Zhou Ji (right), Minister of the Ministry of Education, People’s Republic of China, at the launch of a major initiative to bring IBM’s global information technology services expertise and capabilities to China in support of the country’s increased focus on developing its services industry.

Dell will consider transferring its factories to central and western China if wages in coastal areas continue to rise. However, the company supports higher wages for workers in coastal areas, said Amit Midha, the president of Dell in Greater China and South Asia, on June 21, 2010
Several electronic manufacturers including Foxconn have previously decided to move factories to inland regions. In 2009, Taiwan Hon Hai Group, the parent company of Foxconn, established a joint venture for producing laptop computers with Hewlett-Packard in Chongqing.

Taiwan Quanta Computer, another major laptop contract manufacturer, also established factories in Chongqing in early 2010.

Cyber espionage and cyber warfare has everything to do with China, theoretically speaking. If People Liberation Army controls every aspect of the life in China, including people jobs, habitat, and food. Chances are, that China government is taking advantage of  the greed of American Corporations. Pay back time for the years of abusing the people of China. The government of China allowed for a whole decade to use their people as slaves workers for American companies.

While this phenomenon of jobs transfer was going to China, American Corporate world was enjoying a steady raise in their profits, and China as Imperial power, become stronger, controlling the price of the dollar, monopoly of products made in China, buying American debt, accelerated production of weapons of all calipers and strategically straightening its power in the world.

For China the ‘One Child Policy” paid off.  On the backs of their citizens the Chinese Imperial Power Become a World Power.

Read on this issue Negligence at home while giving away our power in the name of greed and slavery: The mentality that everything could be made in China grew to a devastating proportions for United States.

We the United States of North America sent our manufacturers to China, even some of the Military gadgets were to be made in China, critical technology for the Defense Department was even ‘Made In China’.

Israel preparing Cyber Iron Dome Shield

Posted on January 06, 2012 by Akashma Online News

Source The HackersNews
And Hack Read Cyber Forever


Anonymous on Israel Tracks

IDF’s Communication Supplier & 21 Other Israeli Sites Hacked by AnonGhost

The government of Israel is now starting its own cyber warfare training program for its youth to get a professional grip over cyber attacks that are being conducted against Israel every day.

Israel’s Prime Minister officially opened a new national program to train teenagers in the art of cyber-warfare. The program named “Magshimim Le’umit”, is to prepare them for their future role in the military and intelligence community.
Israel Prime Minister Binyamin Netanyahu said the country’s computer systems are facing attacks from Iran and other countries, and such attacks are set to increase in the digital age.

The new program will accept outstanding pupils aged between 16 and 18 and train them to intercept malicious attacks through a three-year course. Cyber security has become a national priority in Israel, with significant resources being invested in protecting the military and civilian computing networks.
Benjamin Netanyahu revealed plans to create a “digital Iron Dome” to protect vital infrastructure from hackers and viruses like last November, Israeli was under heavy cyber attacks from hacktivist group Anonymous as the latte protested against the Israeli attacks on Gaza.
We are one of the world’s leaders in the field of cybernetics and we must maintain this position. We will continue to cultivate the generation of the future,” said Israeli prime minister Benyamin Netanyahu. The Prime Minister told prospective students that they will be the “future interceptors for the state.”

The program which has been named as ”Magshimim Le’umit” was under planning for last three years, allows youth between the age of 16 to 18 to participate in this extraordinary training.

At the occasion, the Israeli Prime Minister Binyamin Netanyahu said that:

Israel is under massive cyber attacks everyday; hackers from Iran and other countries are disturbing the country’s online infrastructure, it is now time for Israel to develop a better and secure cyber world for the country and for this purpose the government has finally unveiled the training program through Israel National Cyber Bureau (INCB). 

He added that the trained students are the future and guardian of the country, Israel is world leader in Cyber intelligence and it is our duty to maintain that position and don’t loose it to any other nation. 

The decision of opening a cyber warfare training program at such a high level shows that past hacks from Anonymous hackers for #OpIsrael has affected and damage the country’s cyber space.

However, It will be important to see the content of training at Magshimim Le’umit and results will be seen in future.

The AnonGhost hacker from Anonymous group has hacked the official website of Israel’s one of the leader in military communication accessories supplying company known as Source of Sounds (
anon-ghostSource Of Sound Ltd. (SOS), established in 1971, is the primary supplier of high quality communication headsets and other military communication accessories to the Israeli Defense Forces (IDF). SOS has acquired considerable expertise in military as well as in communication technologies, in extreme environmental conditions.
The hacker also hacked 21 other Israeli websites and left his deface page and a message on all of the hacked website, the message threatens Israel to stop its occupation against the Palestine and get expect the hacker to return soon.

According to the deface message:

To the Government of Israel, We are watching you.. We can see what you are doing, we control you. We are everywhere.. Remember this. The people you are trying to stop on, we are everyone you depend on. We are the people who do your laundry and cook you food and serve you dinner. We make bed. We guard you, while you are sleeping. We drive the ambulances  We direct your calls.. We are cooks and taxi drivers. We are everyone you come into contact with on a daily bases. We know everything about you. We process your insurance claims and credit card charges. We control every part of your life . Together we stand against Israel.

We are anonymous  We are legion.. United as ONE. Divided by Zero.. We do not forgive injustice. We do not forget oppression  We are coming soon to release Gaza.. Expect Us..

We are AnonGhost we are legion. We do not forgive, we do not forget. Expect us.

%d bloggers like this: