You have commented 339 times on Rantburg.

Your Name
Your e-mail (optional)
Website (optional)
My Original Nic        Pic-a-Nic        Sorry. Comments have been closed on this article.
Bold Italic Underline Strike Bullet Blockquote Small Big Link Squish Foto Photo
China-Japan-Koreas
China Google Attack and the Terrorist Surveillance Program
2010-01-16
Posted by:3dc

#6  I'm in the process of updating. Thank you, 3dc. It's always helpful to get advice from an expert in the field.
Posted by: trailing wife   2010-01-16 22:44  

#5  thanks for the heads-up, 3dc - just updated my Acrobat to 9.3.0
Posted by: Frank G   2010-01-16 17:38  

#4  this comment is interesting:


It also means that the (most likely spoofed) origin addresses and destination addresses used in the communication of the messages that contained the hacking code passed through the telephone switches that NSA has a line splitter on.

As news has come out, it is not limited to Google. And it focuses on human rights activists.

What I find interesting is that the companies mentioned are likely to have as employees in the US a number of Chinese nationals, some of whom who might be seen by the Chinese government as supporters of human rights movements in China. No data, just a hunch about those on H1-B visas and others who might have gained US citizenship. And who have friends and relatives in China.

But then again, it might be one of those situations with a motive of “because we can”.
Posted by: 3dc   2010-01-16 15:10  

#3  you need to apply the Adobe patch described here
article
Posted by: 3dc   2010-01-16 15:00  

#2  and this comment:

The other tell-tale came not from Google but from Adobe, and I think that it’s been ignored and understated. Adobe was hit as well, and may also have been key to the intrusion process. Again, they aren’t saying much — but their newer products have potential back doors in them, and the PDF file format has become so ubiquitous in business that virtually everybody in the business world has multiple PDF files on their computers at any time.

Let’s speculate and imagine for a second that the search warrant system which allows all governments to request user information requires submission of a warrant in the form of a PDF file…

Posted by: 3dc   2010-01-16 14:49  

#1  The question not being asked is whether any U.S. gov’t contractor working on TSP-like project might not have had a security breach, perhaps in the form of a worker who sold info about Google’s systems.

Or perhaps whether Google has had foreign nationals in its employ who sold them out.
Posted by: 3dc   2010-01-16 14:43  

00:00