I’m a National Hero – he’s a Terrorist!
China’s economic espionage has reached an intolerable level and I believe that the United States and our allies in Europe and Asia have an obligation to confront Beijing and demand that they put a stop to this piracy.
Or what? Bomb the slitty eyed so an’ so’s? Spying, or revealing another country’s secrets, is a dreadful habit, shouldn’t do it – especially not revealing military secrets…
APT1 is believed to be the 2nd Bureau of the People’s Liberation Army (PLA) General staff Department’s (GsD) 3rd Department, which is most commonly known by its Military unit Cover Designator (MuCD) as unit 61398.The nature of “Unit 61398’s” work is considered by China to be a state secret; however, we believe it engages in harmful “Computer Network Operations.”
Unit 61398 is partially situated on Datong Road in Gaoqiaozhen, which is located in the Pudong New Area of Shanghai. The central building in this compound is a 130,663 square foot facility that is 12 stories high and was built in early 2007.
But it’s perfectly alright when we do it…is it OK if China and its allies have an obligation to confront Mandiant and demand that they put a stop to this piracy of State Secrets?
Unit 61398 requires its personnel to be trained in computer security and computer network operations and also requires its personnel to be proficient in the English language.
I’ll hazard a guess here – Mandiant’s requires its personnel to be trained in computer security and computer network operations and also requires its personnel to be proficient in the universal computer language…
Of the 141 APT1 victims, 87% of them are headquartered in countries where English is the native language.
That’ll be because - it’ll come to me in a moment….
In over 97% of the 1,905 times Mandiant observed APt1 intruders connecting to their attack infrastructure, APt1 used IP addresses registered in shanghai and systems set to use the simplified Chinese language.
I’d be prepared to bet that Mandiant use IP addresses registered in the USA to track APt1′s activities and systems set to use the US keyboard? What think you?
In an effort to underscore that there are actual individuals behind the keyboard, Mandiant is revealing three personas that are associated with aPt1 activity.
Mandiant will be the first to run screaming to the authorities if it discovers that China is publicly identifying three of its personnel. Probably claiming their lives are at risk after being identified by cyber terrorists…
The Times this morning has come out with an article describing how the Spy Mandiant has been successfully spying on the Spy APt1 and as proof of the veracity of their claims, has sent its intrepid reporter into the back streets of Shanghai, where he interviewed informed sources:
A sales assistant working in a snack shop acknowledged that the area was teeming with PLA, and that the shop itself was owned by the wife of an officer. Asked what the soldiers of Unit 61398 did, she received a sharp elbow in the ribs from her boss: “We don’t know and we don’t care,” she said, quickly.
China is no doubt at this very moment dispatching a reporter to interview the counter assistant in the local donut store by Mandiant’s headquarters, who confirms that she doesn’t have a clue what goes on in there…
The testimony of tradesmen in the surrounding streets appeared to confirm Mandiant’s claim that the block was at the centre of a huge complex housing more than 1,000 computer servers and an army of linguists, researchers and other technicians working in support of the hackers.
The second hand car salesman at the end of the block housing Mandiant said he was sure they had all sorts of computer equipment in there and hundreds of technicians - it was very good for business he said…
Several years ago, when its operations were still gearing up, Unit 61398 was known to be recruiting in China’s best universities, enticing students with computer science skills through generous military scholarships.
What a brilliant idea, pick the best, ah, looks like America beat them to it…
Dr Irving Lachow, a cyber-security expert at the Centre for a New American Security, an independent think-tank, said that the report exposed a new trend in Chinese cyber attacks, namely the focus on critical infrastructure. “It’s one thing if they are stealing secrets from Coca-Cola, but it’s much more worrying if they are targeting information that could lead them to understand the vulnerability of our pipelines,” he said.
Dr Chop Suey, a bullshit-expose expert at Anna Raccoon, an independent drink-tank, said that the report exposed a new trend in American paranoia, namely the focus on publishing detailed plans and maps of military installations. “It’s one thing if they are stealing secrets from Soy Sauce, but it’s much more worrying if they are targeting information that could lead them to understand the vulnerability of military installations” he said.
Can you begin to imagine the outcry if a Chinese company published detailed maps and photographs identifying American soldiers?
I’m a security expert, he’s a cyber terrorist…
According to Sky News, Kaspersky believes “…we are close, very close, to cyber terrorism. Perhaps already the criminals have sold their skills to the terrorists – and then… oh, God.”