Sihai network

U.S. record of global monitoring operation: Chinese military hackers list top 10 hackers in the worl

After the Snowden incident, the United States has been discrediting China. It is humiliating that the United States sued five Chinese officers for stealing secrets. However, the global monitoring record of the United States is undoubtedly a slap in the face. It is not known that the United States is the world's largest hacker empire, and the top 10 hackers are basically in the United States.

Review of the US prosecution of Chinese officers as hackers

The FBI announced on Monday that five PLA officers, Wang Dong, aka uglygorilla, Jack Wang, sun Kailiang, aka Jack sun, Wen Xinyu, aka winxyhappy and win, are wanted by the FBI on Monday_ XY and Lao Wen, Huang Zhenyu, aka hay_ Lhx) and Gu Chunhui, aka kandygoo, were charged with 31 counts of assaulting six U.S. companies, including American steel, Alcoa, Allegheny technologies and Westinghouse, and stealing trade secrets.

The indictment lists a large number of cyber attacks by five people, but does not elaborate on how U.S. law enforcement agencies obtained the details of these Chinese hacking attacks and their identities. The indictment argues that the stolen trade secrets are intended to help Chinese state-owned enterprises gain a competitive advantage. For example, around 2007, Westinghouse and China's state-owned nuclear power company reached an agreement to build the fourth generation nuclear power plant, AP1000, in China. Westinghouse set many restrictions on technology transfer. Since then, the network of Westinghouse has been under a lot of attacks. Around May 6, 2010, sun Kailiang visited a computer of Westinghouse through a host name of L & times; & times; & times; & times; & times; 0, and transmitted the files ccapp.exe 。 From 2010 to 2012, Chinese military hackers stole at least 1.4GB of data, including the technical and design specifications of a large number of nuclear power plants, which can help nuclear power companies become competitors of Westinghouse in the future.

According to the information provided in the indictment, Chinese military hackers use a traditional method of sending phishing emails to their targets. In 2008, hackers sent a phishing email to 19 senior employees of Alcoa. The sender disguised as a board member of the company. The content of the email was disguised as the agenda of a board meeting. The information stolen by the attacker included high-level internal discussions on a Chinese acquisition.

US global surveillance record

--Nearly 5 billion mobile phone records are collected every day around the world.

--For more than a decade, German Chancellor Angela Merkel has been spying on her mobile phone.

--They secretly intruded into the main communication networks between the data centers of Yahoo and Google, stealing hundreds of millions of user information.

--For many years, it has been monitoring mobile applications and grabbing personal data.

--Conduct large-scale network attacks against China and target Chinese leaders and Huawei.

First of all, it is not true that Chinese military hackers are addicted to the privacy of the United States. Secondly, the record of us global monitoring operations is irrefutable. Finally, if we want to compare the two, the Chinese side is absolutely useless.

Why are American hackers so powerful

According to the Foreign Policy magazine of the United States, the U.S. National Security Agency has a secret organization called the office of specific intelligence operations, which has more than 1000 troops working 24 hours a day, and nearly 600 of them are dedicated to decoding passwords. Once they decipher the relevant password, they will be taken over by others immediately and implanted with computer virus, so as to decipher each other's computer system.

The key targets of this hacker force include China, Russia and other countries, as well as terrorist organizations all over the world. The computer systems of the Chinese military, government systems and Chinese scientific research institutions, whether they are connected to the Internet or not, have been taken care of and attacked maliciously by them, and this behavior has lasted for nearly 15 years. This hacker force mainly carries out electronic reconnaissance, electronic wiretapping, electronic communication, and also includes electronic network mail stealing and other operations.

In addition, the U.S. military also has a huge hacking force. The current president, Barack Obama, is known as the "Internet president". Under its promotion, the U.S. military hacker force has developed rapidly. According to US Defense Department officials, the U.S. cyber command is stepping up the establishment of three types of forces: the first is the national mission force, which is responsible for protecting power grids, power plants and other vital infrastructure for national security and economic security; the second is the combat task force, which helps commanders formulate overseas action plans, launch attacks and take other offensive actions; and; The third is the network protection force, which is used to strengthen and protect the network security of the Ministry of defense.

However, these are only the organizations and units directly under the headquarters. If the cyber warfare forces of various services and arms are included, the total number of us cyber warfare forces has now exceeded 100000. With such a large network warfare force, the United States has become the most powerful 'hacker empire' in the world. Even big military powers like Russia and China are out of reach.

One of the top ten old hackers: Linus

The epic Linux originated in Helsinki. It seems that hackers all over the world are creating source programs for their own lives, and Linus is no exception. His home is on kalevagatan (close to kalevara) Street, not far from the city center. This is a place where 19th-century architecture and modern bungalows echo each other. Linus lives here with his wife. His home is very much like a dormitory for college students. There are always rows of bicycles under the stairs.

Linus himself looked like a student, not a Taoist. He is of medium build, with light brown hair and blue eyes. His eyes are straight at you through the lens. Only his bushy eyebrows are black and his boyish face is set off. His room is lined with books, full of oil paintings and decorations, cheap curtains, dry crocodile skin hanging between two armchairs, and two supercilious cats and several computers: three PCs, a power Mac, and three alpha based microcomputers borrowed from Dec. They are inconspicuous in the corner of the room. Another interesting thing is hard to detect: a dedicated line connecting the computer to the system's test station, installed and paid for by a local ISP, is a symbolic reward for the Linux Taoist priest.

Main achievements: it seems to be talking about dreams, and it seems to be a plot in the 'X-Files'. A 21-year-old Finnish college student wrote Linux, the kernel of the operating system, in his dormitory, and then published it to the public. It attracted thousands of programmers to supplement, modify and disseminate it. In a few years, it has more than 10 million users, becoming the fastest growing software on the earth. Linus Torvalds is the most famous computer programmer and hacker in the world. The inventor of the Linux kernel and a collaborator of the project. Torvalds used his personal time and equipment to create one of the most popular operating system kernels in the world. Free software has evolved from industrial thought movement to market business movement, which has changed the face of software industry and even it industry.

Woznik: one of the top ten old hackers

In Silicon Valley, it's much harder to win a good reputation than to win a lot of money. Because wealth is the basic condition for fame. In order to win wealth, we must collude with each other and pursue profits. As a result, both Apple's Steve Jobs, Oracle's Ellison and Intel's Grove can only gain a mixed reputation locally. But if there is only one person in Silicon Valley who is universally acknowledged as a good person, then this person must be worth.

The technical genius of that time, indifferent to fame and wealth, simple character, left the lively center early. It is also destined that he and the computer industry along different lines, writing their own history. Now, the former comrade in arms Steve Jobs is scolding the storm, and he is living his own quiet life.

Top 10 Super veteran hackers: Dennis leach and Ken Thompson

It's amazing that the original operating system was not born to bring it to the market, or even to let more people use it, but only for the convenience of the author to use, and the original intention is to play games more conveniently. Even the awkward name of UNIX is a joking term for an early operating system called MULTICS. "Our goal is to create a good computer working environment for ourselves, and we hope everyone will like it," Dennis rich, one of the authors, said in a later award-winning acknowledgement.

However, in this inadvertent, a miracle was born, which once again verified that the innovation of IT industry is often caused by interest rather than a lot of money. After 10 years of internal use, it began in the mid-1970s. The first time UNIX was released to the world, it gradually became a success and shocked the whole computer industry. When they started working in 1969, Ritchie and Thompson didn't even want to stir up enthusiasm in the industry. Before 1974, they didn't even publish any news about the project. And when UNIX came out, they were surprised at how much interest it would generate. They don't actively promote it. Universities and research institutions can use it for free, and they also provide source code.

Main achievements: Bell Labs is the famous computer science working group's propellant for creativity. Rich and Thompson created UNIX in 1969. UNIX is a first-class open operating system on minicomputers. It can help users complete ordinary computing, word processing, networking, and soon become a standard language.

Little known fact: Plan 9, created by Thompson and his colleague rob pike at Bell Labs, is the next-generation operating system derived from UNIX.

Stohmann: one of the top ten old hackers

Main achievements: veteran hackers. In 1971, he found a job in MIT's Artificial Intelligence Lab on the street. He was an undergraduate at Harvard. Later, stohmann founded the free software fund, breaking the concept that software is private property.

First contact with computers: at IBM's New York Science Center in 1969, at the age of 16. His own unique hacking tool: in the 1980s, stohmann didn't get paid at MIT, but continued to work in one of the offices. There he created a new operating system, GNU, which stands for GNU & quo; s not UNIX. Little known fact: he won the $240000 Talent Award from the MacArthur Foundation.

One of the top ten old hackers: John Delap

Major achievements: the discovery of a free (long-distance) phone call using the whistle (blowing to the telephone receiver) as a prize in the cereal box of Captain crunchy. Cap & amp; n crunch introduced the brilliant idea of "stealing telephone lines" to make (long-distance) calls to several generations of hackers.

First contact with computers: as a teenager, trying to convince a payphone to get his coins and get through to his phone.

Their unique tool: the toy whistle in captain crunchy's cereal box can produce a 2600 Hz tone. This is to turn on a blue box for outgoing calls. Users can also make (long-distance) calls for free. (the Oscar Meyer Weiner whistle of Oscar meyerweiner was also favored by telephone flyers for a time)

Mitnick: one of the top ten old hackers

Major achievements: he is the No