Latest News:  

English>>Foreign Affairs

Commentary: Hacking allegations against China both baseless and revealing

(Xinhua)

08:25, February 21, 2013

Key Words: cyberattacks ; hacking; cyber espionage; National Defense

Related Reading:
>> Chinese military never supports cyberattacks: defense ministry
>> China opposes hacking allegations: FM spokesman
>> Chinese experts slam U.S. hacking accusations
>> China tells U.S. to stop groundless accusations

BEIJING, Feb. 20 (Xinhua) -- U.S. cybersecurity firm Mandiant on Monday claimed in a report that hackers related to the Chinese military attacked some U.S. websites, once again stirring up the "Chinese hackers threat."

Mandiant put forward as its main evidence a claim that many of the cyber attacks were launched from IP addresses registered in the Chinese metropolis of Shanghai.

However, one does not need to be a cybersecurity expert to know that professional hackers usually exploit what is called the botnet in other parts of the world as proxies for attacks, not their own computers.

Thus, it is highly unlikely that both the origins of the hackers and the attacks they have launched can be located.

That is why China's foreign ministry and defense ministry both described the firm's report as "amateurish" when they dismissed Mandiant's false accusations.

However, it is beyond belief that a firm specialized in the field of cybersecurity could be so indiscreetly desperate as to jump to a conclusion so full of loopholes, unless it has a good reason.

If one takes a closer look at Mandiant's report, it is not too difficult to find that it reeks of a commercial stunt.

In a statement accompanying the firm's report, Kevin Mandia, founder and CEO of Mandiant, seems to do nothing but market the products and services of his company.

"Given the sheer amount of data this particular group (the hackers) has stolen, we decided it was necessary to arm and prepare as many organizations as possible to prevent additional losses," he said.

Next time, the CEO could simply say: "See the Chinese hackers? Hurry up, come and buy our cybersecurity services."

Moreover, the much-hyped threat can also be attributed to some U.S. politicians and businessmen who always seek to use China to pursue their personal political and commercial interests, especially at a time when the U.S. Congress is about to approve a budget plan for the country's new fiscal year.

Without targeting China as a "presumed enemy," they might run short of excuses to demand more money to build an even stronger cyber military force or buy cybersecurity hardware and services from a company whose CEO used to serve in the U.S. air force.

As the birthplace of the World Wide Web, the United States already has a matchless superiority and ability to stage cyber attacks across the globe.

Currently, the U.S. military has established a significant cyber force, including the 780th Military Intelligence Brigade, which is a regular military unit tasked with carrying out cyber missions.

Earlier media reports said Iran was once attacked by U.S. military intelligence agencies through the Internet, while, according to China's foreign ministry, a majority of the cyber attacks against China come from the United States.

In fact, the credibility of the United States has already been seriously questioned because of its government's habit of accusing other nations based on phoney evidence.

In 1993, the United States accused "Yinhe," a Chinese cargo ship, of carrying banned material for making chemical weapons to Iran. However, no suspected goods were found after a joint Chinese-Saudi inspection.

Similarly, facts will eventually prove that the cyber attacks accusations are groundless and will only tarnish the image and reputation of the company making them, as well as that of the United States.

We Recommend:

Japan should stay away from China's safety range

Will change of Secretary of State make any difference?

Nuke test gives US 'excuse to boost its military'

How can China make more friends?

Japan's UNESCO bid a new provocation

China refutes ivory protection accusations

Email|Print|Comments(Editor:LiXiang、Zhang Qian)

Leave your comment0 comments

  1. Name

  

Selections for you


  1. Special policemen in training

  2. Festive atmosphere on missile speedboat

  3. Pakistanis mourn for victims of deadly blast in Quetta

  4. Impressive moments of Beijing since 1950s

  5. Exploring top private clubs in China

  6. Employees punished to run half-naked

  7. Mo Yan's Our Jing Ke: Downfall by design

  8. Glamor Zhang Xinyi's street style

  9. Facebook targeted by hackers

  10. Online money transfers soared

Most Popular

Opinions

  1. How to build new type ties between big powers?
  2. Diplomacy to help China become global power
  3. Commentary: China sees Africa as true friend
  4. Mind your manners
  5. Football penalties 'too soft'
  6. Juvenile crime rules 'hard to follow'
  7. CCTV's Spring Festival Gala: Glory days gone
  8. Who cares for the village doctors?
  9. The weakening yen's impact on China
  10. Young climbers aim too high in China

What’s happening in China

Employees run half-naked for not meeting sales quotas

  1. Social security top concern ahead of 'two sessions'
  2. 39 punished over N China chemical leak
  3. Dog abuse arouses concern over lab animal
  4. Forbid linking doctors' incomes, medical expenses
  5. China refutes cyber attack allegations