China Cyber Attack -AGAIN

gAtO tHiNk- about 2½ years ago I was reading about the Glass Dragon and Dillion Beresford ( one of my heroes) was just snooping in China, peeking and poking with a translate button. gAtO tried it and you know what – was born. China may of been working in cyberspace for the last few years but here was proof that their infrastructure is just as shitty as ours is. china-computer-hac_1963116c

Like a gAtO I walked on by in the cyber China firewall and beyond, translated by google most of the time and the number of basic open SCADA and other sites WIDE open. What got me really hfffffiisssss gAtO mAD was that our side was doing squat. Here we where doing security like I did before I retired. Come on 6-8 years and you guys still have that same PIX firewall full of holes, outdated patches and some nameless Chinese Telecom that has installed it’s routers into the US infrastructure, come on dude, that’s not right, who approved that purchase order.

Huawei has been dropping great deal all over the world while we been in 2 major wars, China has been making friends in the Tell-com business and at one point directing 15% of all Internet traffic thru China for almost 1 hour. THAT IS BIG boys and girls.

Today China cyber warfare is no longer just talk, we have accepted it as part of life, because it is. In cyberspace there are no geo-political barriers to figure out. “They have no rules and we do”, so who do you think is going to win..ummmm let me think.// I been preaching cyber offensives solutions for a while now and yes I know the legality of it all. check out China Jinan -PLA – 12 Universities – high Tech Zone – one of the high tech China center 4 warfare – open sites…

From and old cyber hippy if you give it away to the protocol then anyone can collect it. Google, Yahoo, hell most department stores take every click, you make and store it, and dice it, and slice it, data farming -BIG DATA- to see how they can make YOU SPEND MORE MONEY on the WEB—Now if we apply the same rules that business is doing and apply it to the bad guy’s then hay we may have a good security solution. We can even apply the same practices that the bad actors use and use it ourselves. By the time you see me in your logs it’s too damm late, I’m-gAtO oUt



Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: