(Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)


with one comment

From “Military Power of the People’s Republic of China (PRC)”

In April 2008, the computer networks at India’s Ministry of External Affairs was attacked by Chinese hackers, and in May 2008 Belgium’s government was attacked by Chinese hackers.

Also in May 2008, suspected Chinese agents secretly copied contents of a U.S. Government laptop during a visit to China by the U.S. commerce secretary and used the information to try to penetrate into Commerce computers.

Computer attacks are one element of what Chinese military theorists call integrated network electronic warfare, to include electronic disrupters and kinetic strikes on enemy infrastructures.

China’s military is aggressively seeking U.S. weapons technology both legally and illegally. U.S. intelligence officials say China’s technology acquisition is a growing threat to national security.

“This year’s DoD China military power report should be required reading for those proposing major U.S. military reductions like ending production of the F-22A fifth generation fighter, reducing U.S. carrier battle groups and unilaterally disarming future U.S. space warfare and robust missile defense capabilities”

Just a heads up.. Our Chinese Overlords are REALLY putting some effort into these things. Time we paid attention. Now add to this the fact they they are being encouraged to buy more of our debt.. I see a perfect storm here.. Anyone else?

Written by Krypt3ia

2009/03/27 at 01:19

One Response

Subscribe to comments with RSS.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: