Report: China hackers stole key Google program

Apr 20, 2010
Among the losses Google sustained when intruders stole computer information in December was a company treasure: a password system, The New York Times reported Tuesday.

(AP) -- Computer hackers stole a program that controlled access to most of Google Inc.'s services when they attacked the Internet company late last year, according to a report published late Monday.

The story in The New York Times provided more details about an intrusion that provoked a politically charged showdown between and China's government over Internet censorship and computer security.

The Times said it obtained the information from an unnamed person with direct knowledge of the investigation into the break-in that Google has traced to China.

Google declined to comment specifically on the Times' story. A spokeswoman reiterated Google's previous assertions that the attacks on the company didn't obtain any personal information from its users' accounts.

The stolen password system was called Gaia, a reference to the Greek goddess of earth, according to the Times. Besides e-mail, Gaia also governed access to the online services that Google sells to businesses, government agencies and schools.

Without providing specifics, Google acknowledged some of its intellectual property had been stolen when it announced the hacking attacks in January. The heist prompted Google to tighten its .

At least 20 other companies were targeted in similar attacks, according to Google.

The breach incensed Google so much that the company decided to protest the country's laws dictating the censorship of results deemed to be subversive or pornographic by the government. Google started censoring in China four years ago when it set up a search engine inside of the country to gain better access to the world's largest Web audience.

After unsuccessfully trying to negotiate a compromise with China's ruling party, Google last month began to shift search requests from mainland China to Hong Kong, where online censorship isn't required.

Explore further: Just whose Internet is it? New federal rules may answer that

4.9 /5 (16 votes)
add to favorites email to friend print save as pdf

Related Stories

Chinese minister insists Google obey the law

Mar 12, 2010

(AP) -- China's top Internet regulator insisted Friday that Google must obey its laws or "pay the consequences," giving no sign of a possible compromise in their dispute over censorship and hacking.

Recommended for you

When Facebook goes down it takes big chunks of the internet with it

Jan 30, 2015

Checking social networks is a morning ritual for many, and when that routine is disrupted – as it was recently when Facebook's servers went down – its absence can come as a surprise. But what also becomes apparent is that when the world's most popular social network is inaccessible, so t ...

Facebook adds 'tips' in potential Yelp challenge

Jan 29, 2015

Facebook on Thursday launched a new feature that automatically provides tips about places where members of the social network might be, potentially challenging review websites like Yelp.

User comments : 7

Adjust slider to filter visible comments by rank

Display comments: newest first

mosahlah
2.2 / 5 (9) Apr 20, 2010
China has declared war on America.
MTd2
4.4 / 5 (7) Apr 20, 2010
So, now, stealing passwords = war agression? LOL
Birthmark
not rated yet Apr 20, 2010
Censorship...great way of deluding your people's minds and controlling them.
El_Nose
3 / 5 (2) Apr 20, 2010
no it doesn't but china has in the past year stated that they were upping their cyber warfare units - and to be honest the best target is the USA -- it you want to steal something then you are going to go looking for something of value and thats is the US and Eurounion
Skepticus
1 / 5 (1) Apr 20, 2010
So, now, stealing passwords = war agression? LOL

I guess stealing keys to someone else daughter's condo is no big deal, and the parents concerned will just laughing out loud and that's that.
Caliban
2.3 / 5 (3) Apr 20, 2010
Besides- who knows what groups were the beneficiaries of the info theft?

Just because the attack apparently originated in China does not mean that the people responsible were necessarily solely representing Chinese interests, or even necessarily "criminal" ones.

Makes one wonder.

Always nice to have backdoor-entry capability,
when one desires to circumvent the Law.
ormondotvos
not rated yet Apr 20, 2010
There are trivial things, and important things. A ton of sand, and the key to your car.

Size isn't the metric.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.