Share This

Showing posts with label Computer hackers. Show all posts
Showing posts with label Computer hackers. Show all posts

Friday, 5 May 2017

Chinese scientists make quantum leap in computing; jumbo passenger jet C919 liftoff !

Chinese leading quantum physicist Pan Jianwei, an academician of the Chinese Academy of Sciences, and his colleagues announced they have built world's first quantum computing machine at a press conference in the Shanghai Institute for Advanced Studies of University of Science and Technology of China on Wednesday. -- People's Daily

CHINESE scientists have built the world's first quantum computing machine that goes far beyond the early classical -- or conventional -- computers, paving the way to the ultimate realization of quantum computing.

Scientists announced their achievement at a press conference in the Shanghai Institute for Advanced Studies of University of Science and Technology of China on Wednesday.

Scientists believe quantum computing could in some ways dwarf the processing power of today's supercomputers. One analogy to explain the concept of quantum computing is that it is like being able to read all the books in a library at the same time, whereas conventional computing is like having to read them one after another.

Pan Jianwei, an academician of the Chinese Academy of Sciences and a leading quantum physicist, said quantum computing exploits the fundamental quantum superposition principle to enable ultra-fast parallel calculation and simulation capabilities.

In normal silicon computer chips, data is rendered in one of two states: 0 or 1. However, in quantum computers, data could exist in both states simultaneously, holding exponentially more information.

The computing power of a quantum computer grows exponentially with the number of quantum bits that can be manipulated. This could effectively solve large-scale computation problems that are beyond the ability of current classical computers, Pan said.

For example, a quantum computer with 50 quantum bits would be more powerful in solving quantum sampling problems than today's fastest supercomputer, Sunway TaihuLight, installed in the National Supercomputing Center of China.

Due to the enormous potential of quantum computing, Europe and the United States are actively collaborating in their research. High-tech companies, such as Google, Microsoft and IBM, also have massive interests in quantum computing research.

The research team led by Pan is exploring three technical routes: systems based on single photons, ultra-cold atoms and superconducting circuits.

Recently, Pan Jianwei and his colleagues -- Lu Chaoyang and Zhu Xiaobo, of the University of Science and Technology of China, and Wang Haohua, of Zhejiang University -- set two international records in quantum control of the maximal numbers of entangled photonic quantum bits and entangled superconducting quantum bits.

Pan explained that manipulation of multi-particle entanglement is the core of quantum computing technology and has been the focus of international competition in quantum computing research.

In the photonic system, his team has achieved the first 5, 6, 8 and 10 entangled photons in the world and is at the forefront of global developments.

Pan said quantum computers could, in principle, solve certain problems faster than classical computers. Despite substantial progress in the past two decades, building quantum machines that can actually outperform classical computers in some specific tasks -- an important milestone termed "quantum supremacy" -- remains challenging.

In the quest for quantum supremacy, Boson sampling, an intermediate (that is, non-universal) quantum computer model, has received considerable attention, as it requires fewer physical resources than building universal optical quantum computers, Pan said.

Last year, Pan and Lu Chaoyang developed the world's best single photon source based on semiconductor quantum dots. Now, they are using the high-performance single photon source and electronically programmable photonic circuit to build a multi-photon quantum computing prototype to run the Boson sampling task.

The test results show the sampling rate of this prototype is at least 24,000 times faster than international counterparts, according to Pan's team.

At the same time, the prototype quantum computing machine is 10 to 100 times faster than the first electronic computer, ENIAC, and the first transistor computer, TRADIC, in running the classical algorithm, Pan said.

It is the first quantum computing machine based on single photons that goes beyond the early classical computer, and ultimately paves the way to a quantum computer that can beat classical computers. This achievement was published online in the latest issue of Nature Photonics this week.

In the superconducting quantum circuit system, a research team from Google, NASA and the University of California at Santa Barbara announced a high-precision manipulation of 9 superconducting quantum bits in 2015.

Now the Chinese team led by Pan, Zhu Xiaobo and Wang Haohua have broken that record. They independently developed a superconducting quantum circuit containing 10 superconducting quantum bits and successfully entangled the 10 quantum bits through a global quantum operation.

Chinese scientists aim to realize manipulation of 20 entangled photons by the end of this year, and will try to design and manipulate 20 superconducting quantum bits. They also plan to launch a quantum cloud computing platform by the end of this year.

Source: Xinhua

 Related post:

China successfully launched world's first quantum communication satellite 'very exciting' !


Related

It's liftoff! C919 takes to the sky on debut flight

The long-awaited China's homegrown passenger plane C919 lifts off on its maiden flight at Shanghai Pudong International Airport on Friday.

1st large Chinese-made passenger jet C919 takes flight


https://youtu.be/EEB8vKVV3HQ

Tuesday, 16 August 2016

China successfully launches world's first quantum communication satellite 'very exciting' !

https://youtu.be/XjHosmTOyUE

China launches world's first quantum communication satellite

China launched the world's first quantum-enabled satellite in the early morning hours of Tuesday, marking the first step in building a space-based quantum communications network that is virtually un-crackable.


Combined photo shows China launching the world's first quantum satellite on top of a Long March-2D rocket from the Jiuquan Satellite Launch Center in Jiuquan, northwest China's Gansu Province, Aug. 16, 2016. The world's first quantum communication satellite, which China has launched, has been given the moniker "Micius," after a fifth century B.C. Chinese scientist, the Chinese Academy of Sciences (CAS) announced Monday. (Xinhua/Jin Liwang)

WASHINGTON, Aug. 15 -- China's successful launch of the world's first quantum satellite was "very exciting" and can help conduct experiments that may lead to "much more secure" quantum communications, a U.S. quantum expert said.

"The event is indeed very exciting and does carry global importance because this would be the first such experiment," said Alexander Sergienko, a professor of electrical and computer engineering at the Boston University.

The satellite, Quantum Experiments at Space Scale (QUESS), lifted off from China's Jiuquan Satellite Launch Center at 1:40 a.m. Tuesday, local time.

Sergienko said the quantum communication race has been going on for the last 20 years since the initial demonstration of quantum key distribution link under Lake Geneva in 1995.

After that, metropolitan secure communication networks have been developed and demonstrated in Boston, Vienna, Beijing, and Tokyo, and many more examples of quantum metropolitan networks have been demonstrated in the last five years covering Canada, Italy, U.K. and Australia, he said.

"The race is now moving in the near space in order to cover longer distances between different metropolitan areas," he said.

"I know there were plans to develop multiple point-by-point multi-city quantum communication segments to cover the distance between Shanghai and Beijing. A successful implementation of the satellite project would allow covering it in one step."

Sergienko also predicted that quantum communication and cryptography will be first used to ensure the most important communication lines such as used by the government and by major business in their communication.

China said the 600-plus-kilogram QUESS, nicknamed "Micius," is expected to circle the Earth once every 90 minutes after it enters a sun-synchronous orbit at an altitude of 500 kilometers.

In its two-year mission, QUESS is designed to establish "hack-proof" quantum communications by transmitting uncrackable keys from space to the ground, and provide insights into the strangest phenomenon in quantum physics -- quantum entanglement.

China launches first-ever quantum communication satellite


China launches the world's first quantum satellite on top of a Long March-2D rocket from the Jiuquan Satellite Launch Center in Jiuquan, northwest China's Gansu Province, Aug. 16, 2016. The world's first quantum communication satellite, which China is preparing to launch, has been given the moniker "Micius," after a fifth century B.C. Chinese scientist, the Chinese Academy of Sciences (CAS) announced Monday. (Xinhua/Jin Liwang)

China successfully launched the world's first quantum satellite from the Jiuquan Satellite Launch Center in northwestern Gobi Desert at 1:40 am on Tuesday.

In a cloud of thick smoke, the satellite, Quantum Experiments at Space Scale (QUESS), roared into the dark sky on top of a Long March-2D rocket.

The 600-plus-kilogram satellite will circle the Earth once every 90 minutes after it enters a sun-synchronous orbit at an altitude of 500 kilometers.

It is nicknamed "Micius," after a fifth century B.C. Chinese philosopher and scientist who has been credited as the first one in human history conducting optical experiments.

In its two-year mission, QUESS is designed to establish "hack-proof" quantum communications by transmitting uncrackable keys from space to the ground, and provide insights into the strangest phenomenon in quantum physics -- quantum entanglement.

Quantum communication boasts ultra-high security as a quantum photon can neither be separated nor duplicated. It is hence impossible to wiretap, intercept or crack the information transmitted through it.

With the help of the new satellite, scientists will be able to test quantum key distribution between the satellite and ground stations, and conduct secure quantum communications between Beijing and Xinjiang's Urumqi. QUESS, as planned, will also beam entangled photons to two earth stations, 1,200 kilometers apart, in a move to test quantum entanglement over a greater distance, as well as test quantum teleportation between a ground station in Ali, Tibet, and itself.

"The newly-launched satellite marks a transition in China's role -- from a follower in classic information technology (IT) development to one of the leaders guiding future IT achievements," said Pan Jianwei, chief scientist of QUESS project with the Chinese Academy of Sciences (CAS).

The scientists now are expecting quantum communications to fundamentally change human development in the next two or three decades, as there are enormous prospects for applying the new generation of communication in fields like defense, military and finance. SPOOKY & ENTANGLED

Quantum physics is the study of the basic building blocks of the world at a scale smaller than atoms. These tiny particles behave in a way that could overturn assumptions of how the world works.

One of the strange properties of quantum physics is that a tiny particle acts as if it's simultaneously in two locations -- a phenomenon known as "superposition." The noted interpretation is the thought experiment of Schrodinger's cat -- a scenario that presents a cat that may be simultaneously both alive and dead.

If that doesn't sound strange enough, quantum physics has another phenomenon which is so confounded that Albert Einstein described as "spooky action at a distance" in 1948.

Scientists found that when two entangled particles are separated, one particle can somehow affect the action of the far-off twin at a speed faster than light.

Scientists liken it to two pieces of paper that are distant from each other: if you write on one, the other immediately shows your writing.

In the quantum entanglement theory, this bizarre connection can happen even when the two particles are separated by the galaxy.

By harnessing quantum entanglement, the quantum key technology is used in quantum communications, ruling out the possibility of wiretapping and perfectly securing the communication.

A quantum key is formed by a string of random numbers generated between two communicating users to encode information. Once intercepted or measured, the quantum state of the key will change, and the information being intercepted will self-destruct.

According to Pan, scientists also plan to test quantum key distribution between QUESS and ground stations in Austria. Italy, Germany and Canada, as they have expressed willingness to cooperate with China in future development of quantum satellite constellations, said Pan. LIFE CHANGING

With the development of quantum technology, quantum mechanics will change our lives in many ways. In addition to quantum communications, there are quantum computers that have also drawn attentions from scientists and governments worldwide.

Quantum computing could dwarf the processing power of today's supercomputers.

In normal silicon computer chips, data is rendered in one of two states: 0 or 1. However, in quantum computers, data could exist in both states simultaneously, holding exponentially more information.

One analogy to explain the concept of quantum computing is that it is like being able to read all the books in a library at the same time, whereas conventional computing is like having to read them one after another.

Scientists say that a quantum computer will take just 0.01 second to deal with a problem that costs Tianhe-2, one of the most powerful supercomputers in the world, 100 years to solve.

Many, however, is viewing this superpower as a threat: if large-scale quantum computers are ever built, they will be able to crack all existing information encryption systems, creating an enormous security headache one day.

Therefore, quantum communications will be needed to act like a "shield," protecting information from the "spear" of quantum computers, offering the new generation of cryptography that can be neither wiretapped nor decoded. GOING GLOBAL?

With the launch of QUESS, Chinese scientists now are having their eyes on a ground-to-satellite quantum communication system, which will enable global scale quantum communications.

In past experiments, quantum communications could only be achieved in a short range, as quantum information, in principle, could travel no more than 500 kilometers through optical fibers on the land due to the loss of photons in transmission, Pan explained.

Since photons carrying information barely get scattered or absorbed when travelling through space and Earth's atmosphere, said Pan, transmitting photons between the satellite and ground stations will greatly broaden quantum communications'reach.

However, in quantum communications, an accurate transmission of photons between the "server" and the "receiver" is never easy to make, as the optic axis of the satellite must point precisely toward those of the telescopes in ground stations, said Zhu Zhencai, QUESS chief designer.

It requires an alignment system of the quantum satellite that is 10 times as accurate as that of an ordinary one and the detector on the ground can only catch one in every one million entangled photons fired, the scientist added.

What makes it much harder is that, at a speed of eight kilometers per second, the satellite flying over the earth could be continuously tracked by the ground station for merely a few minutes, scientists say.

"It will be like tossing a coin from a plane at 100,000 meters above the sea level exactly into the slot of a rotating piggy bank," said Wang Jianyu, QUESS project's chief commander.

Given the high sensitivity of QUESS, people could observe a match being lit on the moon from the Earth, Wang added.

After years of experimenting, Chinese scientists developed the world' s first-ever quantum satellite without any available reference to previous projects. Now they are waiting to see QUESS's performance in operation.

According to Pan, his team has planned to initiate new projects involving research on quantum control and light transmission in space station, as well as tests on quantum communications between satellites, all-time quantum communications and the application of quantum key network.

"If China is going to send more quantum communication satellites into orbit, we can expect a global network of quantum communications to be set up around 2030," said Pan. - Xinhuanet

Image for the news resultRelated:

Quantum satellite: China successfully launches its first
NEWS.com.au -China takes major step in creating a global network for quantum communication. August 16 2016

Related posts:


May 30, 2016 ... Scientists are making final adjustments to China's first quantum communication satellite. The project chief describes it as a revolution in ...
Quantum Computing Thrives on Chaos
Mar 12, 2010 ... Embracing chaos just might help physicists build a quantum brain. ..... A Long March-7 carrier rocket lifts off from Wenchang Satellite Launch ...
China's new generation carrier rocket blasts off in Hainan ...
Jun 26, 2016 ... A Long March-7 carrier rocket lifts off from Wenchang Satellite Launch Center, south China's Hainan Province, June 25, 2016. [Photo: Xinhua/Li ...

China to launch second space lab Tiangong-2 in SeptemberChina to launch second space lab Tiangong-2 in September  2016
China will send its second orbiting space lab Tiangong-2 into space in mid September, said a senior official with manned space program.

DBS, the Beidou Navigation Satellite System from China
Jun 17, 2016 ... In 2020, the BDS might offer different positioning accuracy choices and could ... China space station will be completed by 2020, the super "eye".
 
Mar 1, 2016 ... China space station will be completed by 2020, the super "eye" to speed up space rendezvous ... The "eye" is China's newly developed third-generation rendezvous and docking CCD optical imaging sensor. It will be used on China's ... China's Space Age Grows Up As U.S. Space Race ..

Wednesday, 20 August 2014

What the hack were they up to, MH370?

Hackers target information on MH370 probe

The computers of high-ranking officials in agencies involved in the MH370 investigation were hacked and classified information was stolen.

The stolen information was allegedly being sent to a computer in China before CyberSecurity Malaysia - a Ministry of Science, Technology and Innovation agency - had the transmissions blocked and the infected machines shut down.

The national cyber security specialist agency revealed that sophisticated malicious software (malware), disguised as a news article reporting that the missing Boeing 777 had been found, was emailed to the officials on March 9, a day after the Malaysia Airlines (MAS) plane vanished during its flight from Kuala Lumpur to Beijing.

Attached to the email was an executable file that was made to look like a PDF document, which released the malware when a user clicked on it.

A source told The Star that officials in the Department of Civil Aviation, the National Security Council and MAS were among those targeted by the hackers.

"We received reports from the administration of the agencies telling us that their network was congested with email going out of their servers," said CyberSecurity Malaysia chief executive Dr Amirudin Abdul Wahab.

"Those email contained confidential data from the officials' computers including the minutes of meetings and classified documents. Some of these were related to the MH370 investigation."

About 30 computers were infected by the malware, CyberSecurity Malaysia said. It discovered that the malware was sending the information to an IP address in China and asked the Internet service provider in that region to block it.

An IP (Internet Protocol) address is a unique numerical label assigned to each device on a computer network.

"This was well-crafted malware that antivirus programs couldn't detect. It was a very sophisticated attack,'' Amirudin said.

The agency and police are working with Interpol on the incident.

CyberSecurity Malaysia suspects the motivation for the hacking was the MH370 investigations.

"At that time, there were some people accusing the Government of not releasing crucial information,'' Amirudin said. "But everything on the investigation had been disclosed."

Flight MH370 with 239 on board went missing on March 8 about 45 minutes after take-off.

Expert: Spearphishing needs a lot of planning and work


Spearphishing attacks such as the ones that targeted the Civil Aviation Department and the National Security Council require a lot of planning and work, said a cyber security expert.

These point to either a very skilled attacker or group of hackers who have the know-how to spoof an email address to make it appear as if the message is coming from a familiar sender, said Dhillon Kannabhiran.

He is chief executive of Hack In The Box which organises the annual HITBSecConf series of network security conferences.

He said that sensitive and confidential documents should always be encrypted as an added layer of security against hackers.

How sophisticated an attack was, Kannabhiran said, depended on which version of the Microsoft Windows operating system was on the victim's computer and how up to date the system security was.

By Nicholas Cheng, The Star/Asia News Network

Related posts:

Malaysia is poised to escape the middle-income trap, but also ready to fall back into it. Normally the middle-income trap refers to count...
Photo taken on July 17, 2014 shows the debris at the crash site of a passenger plane near the village of Grabovo, Ukraine. A Malaysian...
Malaysia is poised to escape the middle-income trap, but also ready to fall back into it. Normally the middle-income trap refers to count...
Boeing has patent for autopilot tech: When it was first speculated that Flight MH370 could have been hijac...

Saturday, 22 June 2013

No privacy on the Net !

Revelations about PRISM, a US government program that harvests data on the Internet, has sparked concerns about privacy and civil rights violations. But has there ever been real privacy and security on the WWW?

 Demonstrators hold posters during a demonstration against the US Internet surveillance program of the NSA, PRISM, at Checkpoint Charlie in Berlin, Germany, ahead of US President Barack Obama’s visit to the German capital.

IMAGINE a time before email, when all your correspondence was sent through the post. How would you feel if you knew that somebody at the post office was recording the details of all the people you were corresponding with, “just in case” you did something wrong?

I think quite a few of you would be upset about it.

Similarly, some Americans are furious over revelations made about a system called PRISM. In the last few weeks, an allegation has been made that the US government is harvesting data on the Internet by copying what travels through some of its Internet Service Providers.

The US Director of National Intelligence has said that PRISM “is not an undisclosed collection or data mining program”, but its detractors are not convinced that this doesn’t mean no such program exists.

I think there are mainly two kinds of responses to this revelation: “Oh my God!” and “What took them so long?”.

The Internet has never really been secure. Because your data usually has to travel via systems owned by other people, you are at their mercy as to what they do with it. The indications are that this is already being done elsewhere.

Countries such as China, India, Russia, Sweden and the United Kingdom allegedly already run similar tracking projects on telecommunications and the Internet, mostly modelled on the US National Security Agency’s (unconfirmed) call monitoring programme. For discussion, I’ll limit myself for the moment to just emails – something that most people would recognise as being private and personal.

I find many people are surprised when I tell them that sending email over the Internet is a little bit like sending your message on a postcard. Just because you need a password to access it, doesn’t mean it’s secure during transmission.

The analogy would be that your mailbox is locked so only you can open it, but those carrying the postcard can read it before it reaches its final destination. Of course, there are ways to mitigate this. One has to be careful about what one put in emails in the first place. Don’t send anything that would be disastrous if it were forwarded to someone else without your permission.

You could also encrypt your email, so only the receiver with the correct password or key could read it, but this is difficult for most end users to do. (For those interested in encrypting emails, I would recommend looking at a product called PGP.)

The analogy holds up for other Internet traffic. It’s easy to monitor, given enough money and time. And as easy as it is for the Good Guys to try to monitor the Bad Guys, it’s just as easy for the Bad Guys to monitor us hapless members of the public.

But who do we mean by the Bad Guys? Specifically, should the government and law-enforcement agencies be categorised as ‘Bad Guys’ for purposes of privacy? Generally, the line oft quoted is “if you have nothing to hide, then you have nothing to worry about”.

Yet, I think we all accept that there should be a fundamental right to privacy, for everybody from anybody. An interesting corollary to being able to express your thoughts freely is that you should also be able to decide when and how you make them public.

The fault in relying on organisations that say “trust us” isn’t in the spirit of their objectives, but in how the humans in them are flawed in character and action.

An example quoted regularly at the moment is how the FBI collected information about Martin Luther King because they considered him the “most dangerous and effective Negro leader in the country”.

One way of defining the boundaries are by codifying them in laws. For example, the Malaysian Personal Data Protection Act prohibits companies from sharing personal data with third parties without the original owner’s consent.

However, this law explicitly does not apply to the federal and state governments of Malaysia. Another clause indicates that consent is not necessary if it is for the purpose of “administration of justice”, or for the “exercise of any functions conferred on any person by or under any law”.

In relation to the revelations of PRISM, several questions come to mind: Can Internet traffic (or a subset of it) be considered “personal data”? Is it possible for government agencies to collect and store such data without your consent?

And if so, what safeguards are there to ensure that this personal data is accurate, is used correctly and is relevant for storage in the first place?

This should be a sharp point of debate, not just in terms of which of our secrets the government can be privy to, but also of which of the government’s information should be readily accessible by us.

True, there is so much data out there that analysing it is not a trivial task. However, companies such as Google are doing exactly that kind of work on large volumes of unstructured data so that you can search for cute kittens. The technology is already on its way.

Perhaps I am being over-cautious, but it seems a bit fantastical that people can know your deepest and darkest secrets by just monitoring a sequence of 1’s and 0’s. But, to quote science fiction author Phillip K. Dick, “It’s strange how paranoia can link up with reality now and then”.

Contradictheory
By DZOF AZMI

> Logic is the antithesis of emotion but mathematician-turned-scriptwriter Dzof Azmi’s theory is that people need both to make sense of life’s vagaries and contradictions. Speak to him at star2@thestar.com.my.

Related post:

US Spy Snowden Says U.S. Hacking China Since 2009

Sunday, 16 June 2013

Upset over US cyber spying!

There are increasingly strong reactions to revelations that United States agencies are spying on Internet use by Americans and foreigners as well as planning cyber actions on foreign targets.

 
Weekend News Round-up: US cyber spying whistle-blower revealed; is Snapchat worth US$1bn?

THE revelations of data collection on a massive scale by the United States’ security agencies of details of telephone calls and Internet use of its citizens and foreigners are having reverberations around the world.

Much of the responses have been on the potential invasion of privacy of individuals not only in the United States but anywhere in the world who use US-based Internet servers.

Also revealed is a US presidential directive to security agencies to draw up a list of potential overseas targets for US cyber-attacks.

This lays the Unites States open to charges of double standards and hypocrisy: accusing other countries of engaging in Internet snooping or hacking and cyber warfare, when it has itself established the systems to do both on a mega scale.

The revelations, published in the Guardian and Wall Street Journal, and based on a leak by a former US intelligence official, include that US security agencies have access to telephone data of Verizon Communications, AT&T and Sprint Nextel, as well as from credit card transactions.

They also can access data from major Internet companies – Google, Yahoo, Microsoft, Facebook, AOL, Apple, PalTalk, Skype and YouTube—under the Prism surveillance programme.

Millions of Internet users around the world use the servers or web-based services of the companies mentioned.

Two American citizen groups, the American Civil Liberties Union (ACLU) and the New York Civil Liberties Union, have filed a lawsuit against the US administration.

“Those programmes constitute unreasonable intrusions into American’s private lives that’s protected by the Fourth Amendment (on search and seizure),” said Brett Kaufman of the ACLU, as quoted by IPS news agency.

Governments and people outside the United States are equally upset, or more so, that they apparently are also covered by the massive US surveillance programme.

The European Union’s commissioner of justice Viviane Reding has written to the US attorney general asking if European citizens’ personal information had been part of the intelligence gathering, and what avenues are available for Europeans to find out if they had been spied on.

In China, commentators and opinion makers are citing double standards on the part of the United States.

An article in the China Daily commented that the massive US global surveillance programme as revealed is certain to stain Washington’s overseas image and test developing China-US ties.

An editorial in another Chinese paper, Global Daily, stated: “China needs to seek an explanation from Washington.

“We are not bystanders. The issue of whether the United States as an Internet superpower has abused its powers touches on our vital interests directly.”

In their summit last week in California, United States President Barack Obama reportedly pressed Chinese President Xi Jinpeng to curb cyber-spying by Chinese agencies and companies.

The breaking news about the United States snooping on Internet users must have caused some discomfort to Obama when bringing up this issue.

A Chinese Foreign Ministry spokesperson last week reiterated that “China is also a victim to the most sophisticated cyber hacking”.

Though less publicised, a part of the leaks published in the Guardian, was a 18-page directive from President Obama to his security and intelligence officials to draw up a list of potential overseas targets for US cyber-attacks.

The October 2012 directive states that what it calls Offensive Cyber Effects Operations (OCEO) “can offer unique and unconventional capabilities to advance US national objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging”, according to the June 7 Guardian article by Glenn Greenwald and Ewen MacAskill.

The directive says the government will “identify potential targets of national importance where OCEO can offer a favorable balance of effectiveness and risk as compared with other instruments of national power”.

The aim of the document was “to put in place tools and a framework to enable government to make decisions” on cyber actions, a senior administration official told the Guardian.

Obama’s move to establish a potentially aggressive cyber warfare doctrine will heighten fears over the increasing militarisation of the Internet, comments the Guardian article.

It adds that the United States is understood to have already participated in at least one major cyber attack, the use of the Stuxnet computer worm targeted on Iranian uranium enrichment centrifuges, the legality of which has been the subject of controversy.

In the presidential directive, the criteria for offensive cyber operations in the directive is not limited to retaliatory action but vaguely framed as advancing “US national objectives around the world”.

Obama further authorised the use of offensive cyber attacks in foreign nations without their government’s consent whenever “US national interests and equities” require such non-consensual attacks. It expressly reserves the right to use cyber tactics as part of what it calls “anticipatory action taken against imminent threats”.

The Guardian commented: “The revelation that the US is preparing a specific target list for offensive cyber-action is likely to reignite previously raised concerns of security researchers and academics, several of whom have warned that large-scale cyber operations could easily escalate into full-scale military conflict.”

Meanwhile, UN Human Rights Council’s Special Rapporteur Frank La Rue issued a report on June 4 on the increasing use of surveillance, warning that unfettered state access to surveillance technologies could compromise human rights to privacy and freedom of expression, as protected by the Universal Declaration of Human Rights and the International Covenant on Civil and Political Rights (ICCPR).

The report warned too against the use of “an amorphous concept of national security” as a reason to invade people’s rights to privacy and freedom of expression, arguing that such an invasion potentially “threatens the foundations of a democratic society”.

Global Trends
By MARTIN KHOR

Related posts:
US Spy Snowden Says U.S. Hacking China Since 2009 
New China-US relationship can avoid past traps 
Xi-Obama summit aims to boost ties, aspirations between China and USA 

US Spy Snowden Says U.S. Hacking China Since 2009

Support: Protesters shout slogans in support of former US spy Edward Snowden as march to the US consulate in Hong Kong

Video:
Director Robert Mueller says Edward Snowden has caused damage to national security.
http://www.dailymail.co.uk/news/article-2341451/Whistleblower-Edward-Snowden-smuggled-secrets-everyday-thumb-drive-banned-NSA-offices.html

 
The United States has hacked hundreds of Chinese civilians since 2009. But its favored hacking technique isn't to target individual PCs via advanced persistent threat (APT) attacks, in the manner of the Chinese military. Instead, it prefers to compromise foreign network backbones, thus potentially gaining access to hundreds of thousands of systems at once. 

 That revelation was delivered by whistle-blower Edward Snowden, until recently a contractor for the National Security Agency. He emerged from hiding Wednesday to grant an interview to Hong Kong's South China Morning Post.

"We hack network backbones -- like huge Internet routers, basically -- that give us access to the communications of hundreds of thousands of computers without having to hack every single one," he told the Post.

According to NSA documents reviewed by the Post, which haven't been verified, targets of the NSA's Prism program have included computers in both mainland China and Hong Kong. People targeted included systems at Hong Kong's Chinese University, as well as government officials, businesses and students in the region. But the Post reported that the program didn't appear to target Chinese military systems.

 [ Security standoff at recent U.S.-China summit: Read U.S.-Chinese Summit: 4 Information Security Takeaways. ]
 
According to Snowden, he learned of at least 61,000 such NSA hacking operations globally. The Post didn't specify whether those operations all allegedly occurred since 2009.

Why go public with the NSA's alleged hacking campaign? Snowden said he wanted to highlight "the hypocrisy of the U.S. government when it claims that it does not target civilian infrastructure, unlike its adversaries."

"Not only does it do so, but it is so afraid of this being known that it is willing to use any means, such as diplomatic intimidation, to prevent this information from becoming public," he said.

Snowden first arrived in Hong Kong May 20, and said that the choice of venue wasn't accidental. "People who think I made a mistake in picking Hong Kong as a location misunderstand my intentions. I am not here to hide from justice, I am here to reveal criminality," he said, noting that he planned to stay until "asked to leave." Noting that the U.S. government had already been "bullying" Hong Kong authorities into extraditing him, Snowden said that he would legally fight any such attempt.

How will Hong Kong handle Snowden's case? "We can't comment on individual cases," Hong Kong's chief executive, Leung Chun-ying, told Bloomberg Wednesday. "We'll handle the case according to our law."

Hong Kong is a special administrative region of China, and Beijing could influence the government's legal thinking. But when asked in a Thursday press conference if the Chinese government had received any requests from Washington related to Snowden's case, Hua Chunying, a spokeswoman for China's foreign ministry, said only: "We have no information to offer," reported The Hindu in India.

Snowden previously said he would prefer to "seek asylum in a country with shared values," and named Iceland. Asked to respond to a spokesman for Russian president Vladimir Putin recently saying that were Snowden to apply for asylum in his country, authorities would consider his request, Snowden replied: "My only comment is that I am glad there are governments that refuse to be intimidated by great power."

Snowden said he hadn't contacted his family since leaving the country, but feared for both their safety as well as his own. He also appeared disinclined to glorify what he'd done. "I'm neither traitor nor hero. I'm an American," he said. "I believe in freedom of expression. I acted in good faith but it is only right that the public form its own opinion."

How has China reacted to Snowden's revelations that the NSA is spying on the Chinese? Chinese foreign ministry spokewoman Hua said in a regular press conference Thursday that the government has been following the revelations of NSA monitoring detailed by Snowden, and she repeated calls from the Chinese government -- agreed to in principle at last week's U.S.-China summit in California -- to launch a cybersecurity working group to increase "dialogue, coordination and cooperation" between the two countries.

"We also think adoption of double standards," she said, "will bring no benefit to settlement of the relevant issue."

By  Mathew J. Schwartz
IT finally has its security priorities right, our annual survey shows. Also in the new, all-digital Strategic Security issue of InformationWeek: Five counterintuitive insights on innovation from our recent CIO Summit.

Related posts:
New China-US relationship can avoid past traps 
Xi-Obama summit aims to boost ties, aspirations between China and USA