A facility believed to be an internment camp located north of Kashgar, in the Xinjiang Uyghur Autonomous Region, June 2, 2019. 10-23-19 Nearly half of the residents of a village in a Uyghur-majority of northwest China’s Xinjiang Uyghur Autonomous Region (XUAR) have been sent to internment camps amid a policy of mass incarceration targeting minorities in the area, according to an official source.
Reports suggest that authorities are detaining as many Uyghurs as possible in internment camps and jails regardless of their age, prior service to the ruling Communist Party, or the severity of the accusations against them—as part of a bid to satisfy “quotas” ordered by the regional government....
In October 2017, officials from two villages in Hotan (Hetian) prefecture’s Qaraqash (Moyu) county told RFA that they had been given a target quota for sending residents to internment camps.A police officer in one of the villages said he had been informed during an “online conference” in mid-June of that year that his department was to detain 40 percent of the local population for exhibiting signs of “religious extremism.” https://www.rfa.org/english/news/uyghur/half-10232019144954.html
.............................................
.............................................
5-6-19 Chinese intelligence agents acquired National Security Agency hacking tools and repurposed them in 2016 to attack American allies and private companies in Europe and Asia, a leading cybersecurity firm has discovered. The episode is the latest evidence that the United States has lost control of key parts of its cybersecurity arsenal.
Based on the timing of the attacks and clues in the computer code, researchers with the firm Symantec believe the Chinese did not steal the code but captured it from an N.S.A. attack on their own computers — like a gunslinger who grabs an enemy’s rifle and starts blasting away.
The Chinese action shows how proliferating cyberconflict is creating a digital wild West with few rules or certainties, and how difficult it is for the United States to keep track of the malware it uses to break into foreign networks and attack adversaries’ infrastructure.
The losses have touched off a debate within the intelligence community over whether the United States should continue to develop some of the world’s most high-tech, stealthy cyberweapons if it is unable to keep them under lock and key.
The Chinese hacking group that co-opted the N.S.A.’s tools is considered by the agency’s analysts to be among the most dangerous Chinese contractors it tracks, according to a classified agency memo reviewed by The New York Times. The group is responsible for numerous attacks on some of the most sensitive defense targets inside the United States, including space, satellite and nuclear propulsion technology makers.
Now, Symantec’s discovery, unveiled on Monday, suggests that the same Chinese hackers the agency has trailed for more than a decade have turned the tables on the agency.
Some of the same N.S.A. hacking tools acquired by the Chinese were later dumped on the internet by a still-unidentified group that calls itself the Shadow Brokers
https://www.nytimes.com/2019/05/06/us/politics/china-hacking-cyber.html
No comments:
Post a Comment