China Communist paper rejects hacking allegations

Feb 04, 2013 by Carol Huang

The official mouthpiece of China's ruling Communist Party on Monday roundly rejected claims of hacking attacks from China by American media outlets, hinting instead at ulterior motives by the US.

The People's Daily article echoed vehement government rejections last week after The New York Times and linked Beijing to cyberattacks and the accused Chinese hackers of targeting it.

The reports added to rising concerns about Chinese hacking—a US congressional report last year said increasingly skilled Chinese state-backed entities were seeking to breach US systems, calling the country "the most threatening actor in cyberspace".

The front page Chinese-language commentary in the People's Daily, which could not be found on its English website, said: "Even those with little understanding of the Internet know that hacking are transnational and concealable.

"IP addresses simply do not constitute sufficient evidence to confirm the origins of hackers," it added.

The paper accused the US of fanning "fear of " out of self interest, saying that it has invoked national security as a justification for trade protectionism and economic sanctions.

"America keeps labelling China as hackers, simply playing up the rhetoric of the 'China threat' in cyberspace, providing new justification for America's strategy of containing China," it added.

The article repeated the Beijing government's position that China is also a victim of hacking, saying that there were more attacks from US-based IP addresses on Chinese websites in December than from any other country.

Despite this, it said, "China did not draw simple inferences or hasty conclusions about the attack source".

There were attacks from 3,000 foreign IP addresses in the month, it added.

The reported last week that hackers stole corporate passwords and accessed the personal computers of 53 employees after the newspaper published a report on the family fortune of China's premier Wen Jiabao.

Some security analysts said the media attacks were probably linked to the Beijing authorities, while others argued it was difficult to ascertain whether the attacks stemmed from China or if hackers acted on government orders.

"The Chinese government clearly has the capability of doing this," wrote the founder of a group, Greatfire.org, that monitors Chinese Internet controls, a system termed the Great Firewall.

"Online censorship in China is both massive in scale and sophisticated, meaning that they have to employ very skilled people," he said, using the pseudonym Martin Johnson for security reasons.

Still, finding hard evidence to tie the attacks to the Chinese government was "nearly impossible," said his co-founder "Percy Alpha".

Hackers from China have previously been linked to attacks on US defence giant Lockheed Martin, Google and Coca-Cola. Other reports say Chinese hackers have tried to infiltrate the Pentagon's computers and those of US lawmakers.

Beijing's defence and foreign ministries last week repeatedly rejected any accusations of hacking.

"Cyber-attacks have a transnational and anonymous nature," the defence ministry said in a statement to AFP. "Under such circumstances accusing the Chinese military of launching attacks through the web without irrefutable proof is unprofessional and baseless."

Explore further: White House updating online privacy policy

add to favorites email to friend print save as pdf

Related Stories

Claims of hacking New York Times 'groundless': China

Jan 31, 2013

China on Thursday dismissed accusations that it had hacked into the system of the New York Times, in a cyberattack the paper linked to its expose of the wealth amassed by the family of Premier Wen Jiabao. ...

NY Times says Chinese hacked paper's computers (Update)

Jan 31, 2013

Chinese hackers repeatedly penetrated The New York Times' computer systems over the past four months, stealing reporters' passwords and hunting for files on an investigation into the wealth amassed by the family of a top ...

China says it's not behind Google email hacking

Jun 02, 2011

(AP) -- China denied it supports hacking activities and said it is part of global efforts to combat computer security threats Thursday, a day after Google disclosed some of its email users suffered hacking ...

Hackers hit Philippines websites amid China dispute

Apr 26, 2012

Philippine government websites are under heavy attack from hackers, apparently from China, amid a tense territorial dispute between the two countries in the South China Sea, officials said Thursday.

China paper: Google could be hurt by hacking claim

Jun 06, 2011

(AP) -- The Chinese Communist Party's main newspaper lashed out at Google on Monday, saying its latest complaints of computer hacking traced to China were politically motivated and warning its business might ...

Recommended for you

White House updating online privacy policy

1 hour ago

A new Obama administration privacy policy out Friday explains how the government will gather the user data of online visitors to WhiteHouse.gov, mobile apps and social media sites. It also clarifies that ...

Net neutrality balancing act

20 hours ago

Researchers in Italy, writing in the International Journal of Technology, Policy and Management have demonstrated that net neutrality benefits content creator and consumers without compromising provider innovation nor pr ...

Twitter rules out Turkey office amid tax row

Apr 16, 2014

Social networking company Twitter on Wednesday rejected demands from the Turkish government to open an office there, following accusations of tax evasion and a two-week ban on the service.

How does false information spread online?

Apr 16, 2014

Last summer the World Economic Forum (WEF) invited its 1,500 council members to identify top trends facing the world, including what should be done about them. The WEF consists of 80 councils covering a wide range of issues including social media. Members come ...

User comments : 3

Adjust slider to filter visible comments by rank

Display comments: newest first

frajo
5 / 5 (1) Feb 04, 2013
Now, who is behind the 3000 attacks per month against Chinese computers?
The US government clearly has the capability of doing this.
TheGhostofOtto1923
1 / 5 (5) Feb 04, 2013
Now, who is behind the 3000 attacks per month against Chinese computers?
The US government clearly has the capability of doing this.
So do umpteen million other parties. But the only way to be sure that your defenses work is to have them be attacked by a genuine foe. And so if hackers didn't exist it would have been necessary to invent them. The Internet could not survive without them.

By the way it has been determined that Obama has the authority to exercise many options to combat cyberterrorism, including preemptive attack. Angriff ist die beste Verteidigung.
http://www.nytime...amp;_r=0
TheGhostofOtto1923
1 / 5 (5) Feb 04, 2013
"New policies will also govern how the intelligence agencies can carry out searches of faraway computer networks for signs of potential attacks on the United States and, if the president approves, attack adversaries by injecting them with destructive code — even if there is no declared war."

-which would only be prudent. Israel has recently declared similar intentions in the real world. Why wait until the enemy actually gasses civilians? Why wait until Syria actually begins producing plutonium? That would be irresponsible.

More news stories

Venture investments jump to $9.5B in 1Q

Funding for U.S. startup companies soared 57 percent in the first quarter to a level not seen since 2001, as venture capitalists piled more money into an increasing number of deals, according to a report due out Friday.

White House updating online privacy policy

A new Obama administration privacy policy out Friday explains how the government will gather the user data of online visitors to WhiteHouse.gov, mobile apps and social media sites. It also clarifies that ...

Hackathon team's GoogolPlex gives Siri extra powers

(Phys.org) —Four freshmen at the University of Pennsylvania have taken Apple's personal assistant Siri to behave as a graduate-level executive assistant which, when asked, is capable of adjusting the temperature ...

Leeches help save woman's ear after pit bull mauling

(HealthDay)—A pit bull attack in July 2013 left a 19-year-old woman with her left ear ripped from her head, leaving an open wound. After preserving the ear, the surgical team started with a reconnection ...

Scientists tether lionfish to Cayman reefs

Research done by U.S. scientists in the Cayman Islands suggests that native predators can be trained to gobble up invasive lionfish that colonize regional reefs and voraciously prey on juvenile marine creatures.