Huangpu is a district of pigeon fanciers and the skies over Shanghai have seen birds racing back to their coops for the best part of a century. Words and pictures by Jonathan Browning.
- Sun
- Mar 3, 2013
- Updated: 12:48pm
Trending topics
America's two-faced tirade against Chinese 'cyberwar'
Hey, kettle. It's pot here, calling to denounce you with evidence you are undermining world peace.
The Obama administration is planning to confront the new leadership in Beijing, according to The New York Times, over the cyberwarfare that the Chinese state is allegedly waging against America and its top corporations.
The evidence? A dubious report by commercial internet security firm Mandiant - which was not peer-reviewed by any independent experts - and which has generated so much free publicity for them by accusing China of being the world's worst cyber-rogue state.
According to the company and now the White House, almost every item on a lengthy, confidential list of IP addresses - linked to a hacking group that has stolen terabytes of data from US corporations - could be traced to a neighbourhood in Shanghai that hosts the Chinese military's cybercommand. Even Hong Kong's own University of Science and Technology reportedly had a few addresses on the list.
These attacks were presented as sophisticated and state-sponsored. But how sophisticated?
Strangely, these master hackers from China all forgot to hide their internet traces. In fact, they did the opposite: they left their fingerprints all over the crime scene so it could all be traced back to a single People's Liberation Army source in Shanghai! Just how smart could these guys be?
Or perhaps they weren't the real perpetrators. Presumably, any self-respecting hacker or cybercriminal worth his salt would plant false leads and hide tracks so his crime can't be traced back to him. Who would leave behind a long list of IP addresses to implicate himself and pinpoint his location to a single postal address?
To date, the only confirmed act of state-sponsored cyberwarfare has been by the United States and its closest ally, Israel, against Iran's nuclear weapons programme.
Like nuclear weapons (with the Soviets) and weapons of mass destruction (with Iraq), an enemy is needed before Washington can legitimise the development of new military capability or go to war … or launch drone assassinations - oh, sorry, I meant targeted killings - that have caused thousands of deaths, many of them innocent bystanders, in Yemen, Pakistan and Somalia.
Which is the rogue state?
After reading this article, people also read
12:10am
Marc Vo
CTO for Oinfosys inc. in San Francisco Ca.
I would like to congratulate you on your article.
Although it is an Opinion Piece. You have motivated me to respond.
My organizations Core business is technology research specializing in leap frogging technologies.
Let me first give you my email address Marc@oinfosys.com
My team of technology researchers and myself is available to you.
Please contact me anytime.
Your pieces contains no facts at all. The I.T. industry Norm for peer reviewed is to release the data and Industry leaders and experts from all over the world will Flame you if you are wrong.
As an american I am offended. I assume that you believe your reader to be only from Asia.
Let me clear that up right now.
The South China Morning Post has a global audience.
Your statement " The evidence? A dubious report by commercial internet security firm Mandiant "
I applaude Mandiant for their courage to stand by their work and put their expertise
on the net for all to see and review.
IMO Mandiant's goal is to create a dialog between our two Economies.
To address the elephant in the room and invent a forum for containing
the corporate interllectual property robbery.
I will be posting this to my readers on Google Plus and Linkedin.com
Looking forward to speaking with you.
Cheers, Marc
12:44pm
"A reader asked: “Have you (or Mr. Lo) ever actually read a refereed computer science journal paper?” Thanks for your condescending comment.
Indeed I had in my R&D days before I became a professional manager. As a matter of fact, I am still working unsuccessfully on an algorithm right this very minute after a few passes. And that's just all for fun. So eat your heart out, my friend.
No, I have never taken a single course in computer science but had designed a commercial CPU with pipeline architecture as well as the entire instruction set for the microcode control store in the CPU. Here is the meaning of this gibberish. I wrote the microcode implementing my assembly language instruction set for the computer’s CPU. Comprende? Verstehen Sie? Now are you satisfied?
The trouble with ignorant China baiters is their own tunnel vision, 坐井觀天.
Elsewhere in this column I just responded to another reader related to Ken Thompson's talk on rootkit malware. But I don't suppose you know who Ken Thompson is or what programmable logic controller rootkit means.
Now you can go back and wallow in your hate China diatribes."
6:56pm
9:53pm
9:21am
7:36pm
6:07pm
12:13pm
I usually enjoy Alex Lo's columns; heck I even agree with some of them. But this one is pretty silly.
10:09pm
I am no apologist for China's misdeeds. Mr. Lo can speak for himself. But it's the sanctimoniousness and projectionist mind of some readers in this column which need a sanity check.
China is not far from using drones? Sure. Greg Torode is projecting that China will do in future exactly just as what the West did in the past - trafficking slaves, peddling opium and slaughtering 500,000 Filipinos during Spanish American War. I am glad you find your favorite columnist to commiserate with on the ascension of China.
1:03am
So you're factually wrong and abusive. Good work.
Pages
In Case You Missed It
Login
SCMP.com Account
or
Log in using a partner site
Log in using your Facebook account. What's this?
Don't have an SCMP.com account? Subscribe Now!














