Chinese Internet Hacking Base Exposed

Britain’s, The Telegraph, reports that American computer analysts have traced more than 100 attacks on the government departments, companies and journalists to the site of the 12-story building about 40 minutes outside Shanghai’s city center.

A 60-page report by Mandiant, a computer security company said the headquarters of People’s Liberation Army (PLA) Unit 61398 was located in the compound. The Daily Telegraph confirmed that a woman who questioned a reporter’s purpose in visiting the area was a member of Unit 61398.

Men in PLA uniforms guard the entrance of the compound. Large propaganda posters are pinned to walls around the base. Next door, a residential compound for military families greets visitors with a plaque reading: “Be faithful and loyal to the Party. Love the people. Dedicate yourself to the cause.” There is no sign identifying the base by name but clear orders have been placed outside in Chinese and English: “Restricted military area. No photographing or filming.”

http://www.telegraph.co.uk/news/worldnews/asia/china/9879916/Major-Chinese-internet-hacking-base-exposed.html

18 thoughts on “Chinese Internet Hacking Base Exposed

  1. Let’s send a Tomahawk…. just for fun…

    Or maybe the Russians can send two unarmed Bear Tu-95′s to circle compound 61398. That should scare them real good….

  2. Reports of threats circulating in the corporate media just in time for CISPA, etc.?

    Imagine that.

    CISPA is a sweeping, privacy-annihilating Internet law that we killed last year. The Congressmen who introduced it haven’t learned their lesson and they’ve reintroduced it. The price of freedom is eternal vigilance, right? We killed CISPA once before. We will kill CISPA again. Link

  3. “Be faithful and loyal to the Party.”

    Uh huh. No mention of the multinational corporations and the oligarchs and banksters that usually own and direct them.

    The basic outlines of the pattern of the elite* seems to be the same the world over, whether “communist” or “capitalist.” E.g.:

    The CCP implemented policies that set the foundations for an Illuminati super state. They unified the country, attacked traditional Chinese culture, instigated industrialization programs and created a common language.
    Wang Hao, a historian at the China Institute of International Studies, has recorded that Mao’s deputy Zhou Enlai met David Rockefeller in June 1973:
    ‘When meeting David Rockefeller, Zhou said to him that it was necessary to find appropriate methods conducive to the development of the trade between two sides under different political systems.’
    The corporate-communist merger began when Deng Xiaoping came to power in the late 1970s and introduced his market reforms with the slogan “to get rich is glorious.”
    However, after 30 years of Maoism his regime was hopelessly ill equipped to run a market economy. They turned to the wealthiest Chinese tycoons in Hong Kong for guidance.
    THE HONG KONG TYCOONS
    The most powerful HK tycoon is Li Ka-Shing, the richest Asian in the world and an Illuminati insider.
    Other prominent tycoons are ‘HK’s godfather of real estate’ Henry Fok, ‘The king of gambling’ Stanley Ho and the man who would be chosen by Beijing to head Hong Kong after the departure of the British, Tung Chee-Wa.
    It is important to realize that these men rose to power and prestige in a British colony, i.e. they were vetted by the City of London to be colonial leaders. This is illustrated by the rise of Li Ka Shing.
    As HK developed, Li emerged as the most brilliant Chinese entrepreneur. The ‘Brotherhood bankers’ of Hong Kong became aware of his mercantile genius and brought him into the fold. Link

    Conspiracy theory? Maybe. But probably not….

    *With one exception, the American Founders who purposefully designed their system to be resistant to and contain some of their own machinations and the “conspiracies” typical to what John Adams called the natural aristocracy that inevitably arises.

    Perhaps one could look at it this way, where two or more are gathered together discussing how best to create money/debt… there the devil is also.

  4. The irony of it. It’s more likely that CISPA will be used to shut down websites like this* that threaten the corporate elite in America or perhaps to control the internet in the case of another false flag attack pulled off by banksters…. than it will be used to supposedly stop a looming Chinese threat from “over there.”

    But watch out… it’s the Chinese threat!! American lemmings in the mainstream will probably be burning the cars of their neighbors just like the Chinese species of lemming did due to their own “mainstream”/military industrial media before you know it. A satire: “They want our islands or somethin’. Get them, burn the cars of your neighbors!! Burn down your own neighborhood… and then send your kids to war!!!” Etc.

    *

    American Universities and Multi-national Corporations have forgotten that they are Americans. They are bleeding America of its technologic advantage over China for short term profits. The University of Michigan has more than 2,500 Chinese students and scholars mostly studying in technologic fields such as engineering, science and mathematics. Most of these students will eventually return to China with American technology. These Chinese students are taking opportunities away from American students who would like an opportunity for a University of Michigan education. The University of Michigan is making joint research agreements with China that allow Chinese scientist access to our newest technologies. American Multi-national Corporations are making deals to sell goods in China** that require “offsets” (requirements to set up partnerships with Chinese companies) that teach Chinese businesses how to copy our technology and steal our jobs. Link **But then some of the same corporations and the mainstream media that they own will tell you that China is a threat and try to stir up some nationalism if it suits their purposes. Patriotism and nationalism? Isn’t that all outdated and essentially a dangerous threat according to DHS anyway?

  5. Huh…

    Groups opposed to the Cyber Intelligence Sharing and Protection Act (CISPA), introduced Wednesday, have “unfounded fears” about the privacy implications of the bill, said Representative Mike Rogers, a CISPA sponsor, Michigan Republican and chairman of the House of Representatives Intelligence Committee. ….
    The bill is needed, Rogers said, because companies fear lawsuits if they share cyberthreat information with each other or the government.

    But:

    Two professors from the University of Michigan come forth as whistleblowers to reveal that one of our country’s premier unversity’s President Mary Sue Coleman and Regents have for this past decade been participating in the greatest “sell out” of our country’s greatest economic treasures in history…..to China. It’s not only our manufacturing jobs but our our technology that is going overseas. What they don’t steal from us through theft and espionage, these education leaders are outright giving away through corporate-style “joint ventures” and a massive rush-to-greed. Powercorruptsagain.com

    I bet this fits together somehow. Too bad we can’t rely on investigative journalists to do their jobs these days, though.

    Interesting that Mike Rogers doesn’t seem to be interested in establishing more of a police state at the University of Michigan in order to keep everyone there safe, regardless.

  6. This is the front line, and where we should be reallocating a lot of our resources instead of pouring them into fighter jets with no mission set and major design flaws.

    The best SWAG I would take for our defense posture is that the line units need to be refitted and reset equipment wise and we need to divert funding from a lot of the Air Force’s painfully irrelevant capabilities towards intelligence gathering.

  7. This is the front line, and where we should be reallocating a lot of our resources…

    Here’s an idea… let’s hire a Chinese corporation to stop the Chinese terrists or put some more Chinese students in American universities to work on researching the problem. After all… as long as everyone gets their allocation of resources and some federal reserve notes created by global bankers, who cares about national security in reality?

    Meanwhile, it might be helpful to buy back some of the power grids and so on that have already begun to be sold to the Chinese. And perhaps some of the shale oil in America that they’ve been buying too… so that Americans actually own sources of energy for themselves at a local or decentralized level, etc.

  8. “The best SWAG I would take for our defense posture ”
    @Falcor – only Air Force people use the term “SWAG” Everyone else just WAGs it.

  9. The Chinese will only be deterred by better internet security by the U.S. Government and the large corporations the Chinese are targeting. It is a cyberwar but it is only the beginning.

  10. The Chinese will only be deterred by better internet security by the U.S. Government and the large corporations the Chinese are targeting.

    Actually it’s more likely that they’ll be deterred by Anonymous and people exposing corruption within the U.S. Government itself. Meanwhile… we already have thousands, if not millions, of Chinese nationals studying in our universities and so on and so forth. But the biggest threat to security is the fact that Facebook will not be able to share information on American citizens with NSA quickly enough if they have to get a warrant?

    You’re still caught up in projections of nationalism enough to believe the way this is being marketed? The globalist powers that be and multinational corporations are only invoking nationalism around the world when it suits them, including what Rupert Murdoch called the “patriot market” in America.

    Still waiting on the “threat matrix” that’s already been established to be streamlined into Facebook directly.

    Something along the lines of: “There’s a social network forming that’s a threat to our power and they hit the like button on that? Detain them without trail!”

    Or: “They hit a like button on terrism. Compute the threat matrix to ourselves and send in the predator drone to target the GPS in that cell phone.” Etc.

    And guess what terrism will evolve into… essentially anything that the central banksters and their utterly corrupt ruling class says it is. Because they’re all linked into a closed source, central network of paper ponzi. All of them… pretty much the entire Congress, etc.

  11. Britain’s, The Telegraph, reports that American computer analysts have traced more than 100 attacks on the government departments, companies and journalists to the site of the 12-story building about 40 minutes outside Shanghai’s city center.

    A 60-page report by Mandiant, a computer security company said the headquarters of People’s Liberation Army (PLA) Unit 61398 was located in the compound. The Daily Telegraph confirmed that a woman who questioned a reporter’s purpose in visiting the area was a member of Unit 61398

    Whose government departments?

    …we need to divert funding from a lot of the Air Force’s painfully irrelevant capabilities…

    Such as?

    If you don’t think that the ability to carpet-bomb is important, since the use of ICBM’s is unlikely, then you are ‘painfully’ naive.

  12. “Such as?”

    The F-22. A 420 Million dollar per jet program that in 10 years of Combat has yet to fly a single combat mission. What an investment.

    And yes, carpet bombing has its uses, but no that capability is not even close to the importance of denying other countries the ability to shut down our power grid.

    And also, what on Earth does carpet bombing have to do with an ICBM? They are completely unrelated topics.

  13. Marine Corps uses the “S”? No _hit!?

    WAG usually gets associated with wag bag which is…. Well we won’t go there.

Comments are closed.