At 8 a.m. on May 4, 2001, anyone trying to access the White House Web site got an error message. By noon, whitehouse.gov was down entirely, the victim of a so-called distributed denial-of-service (DDoS) attack. Somewhere in the world, hackers were pinging White House servers with thousands of page requests per second, clogging the site. Also attacked were sites for the U.S. Navy and various other federal departments.
A series of defacements left little doubt about where the attack originated. "Beat down Imperialism of American [sic]! Attack anti-Chinese arrogance!" read the Interior Department's National Business Center site. "CHINA HACK!" proclaimed the Department of Labor home page. "I AM CHINESE," declared a U.S. Navy page. By then, hackers from Saudi Arabia, Argentina and India had joined in. The military escalated its Infocon threat level from normal to alpha, indicating risk of crippling cyber-attack. Over the next few weeks, the White House site went down twice more. By the time the offensive was over, Chinese hackers had felled 1,000 American sites.
The cyber-conflict grew out of real-world tensions. A month earlier, a U.S. EP-3 reconnaissance aircraft flying off the southern coast of China had collided with a Chinese F-8 fighter jet. The American pilot landed safely, but the Chinese pilot was killed. China's hackers lashed out. It wasn't the first foreign attack on American sites, but it was the biggest -- "the First World Hacker War," as the New York Times dubbed it.
The Chinese attacks were poorly coordinated, and it's tempting to dismiss them as harmless online vandalism. But subsequent attacks have become more serious. In the past two years, Chinese hackers have intercepted critical NASA files, breached the computer system in a sensitive Commerce Department bureau, and launched assaults on the Save Darfur Coalition, pro-Tibet groups and CNN. And those are just the attacks that have been publicly acknowledged. Were these initiated by the Chinese government? Who is doing this?
Peng left two e-mail addresses, his chat information and the screen names of four other hackers. He soon expanded his online profile with a blog, photos, and papers describing his hacking openly. But his boasts went unnoticed until 2005, when a linguist in Kansas typed the right words into Google, found Peng, and pulled back the curtain on a growing danger.
GHOSTS IN THE MACHINE
In its report to Congress last year, the U.S.-China Economic and Security Review Commission called Chinese cyber-espionage a major threat to U.S. technology. "China is aggressively pursuing cyber warfare capabilities that may provide it with an asymmetric advantage against the United States," the commission warned. As everything from health-care services to credit-card records to classified military information moves into a networked age, the risk that our digital systems could be crippled by outside attackers -- or worse, pillaged for sensitive information -- is very real. The commission report cited vulnerable American targets such as the electric grid and the municipal-waste, air-traffic-control, banking and Social Security systems. Before leaving office in January, President Bush authorized the creation of a National Cyber Security Center under the Department of Homeland Security, and in February, President Obama's budget proposal called for giving the department $355 million to secure private- and public-sector cyber-infrastructure.
But there's reason to believe that a damaging attack won't originate in some dedicated Chinese government bureau. In previous testimony before the commission, James C. Mulvenon, director of the defense think tank the Center for Intelligence Research and Analysis, said he was more immediately concerned with independent, civilian-led "patriotic hacking."
James Andrew Lewis, a senior fellow at the Center for Strategic and International Studies (CSIS), which helped develop cybersecurity policy recommendations for the Obama administration, shares that concern. "The U.S. government had a number of serious computer incidents in 2007, most of which were attributed to China," he says. "The focus in Washington is on what appear to be state-sponsored activities. That, of course, is only a part of what's going on in China."
From China, where I've lived for four years, this assessment looks spot-on. Hackers are pervasive, their imprint inescapable. There are hacker magazines, hacker clubs and hacker online serials. A 2005 Shanghai Academy of Social Sciences survey equates hackers and rock stars, with nearly 43 percent of elementary-school students saying they "adore" China's hackers. One third say they want to be one. This culture thrives on a viral, Internet-driven nationalism. The post-Tiananmen generation has known little hardship, so rather than pushing for democracy, many young people define themselves in opposition to the West. China's Internet patriots, who call themselves "red hackers," may not be acting on direct behalf of their government, but the effect is much the same.
STUMBLING ONTO THE DANGER
In 2004, Scott Henderson, a trim 46-year-old with sandy brown hair, had just retired from decades as a language expert for the U.S. Army to work for a private intelligence contractor in Fort Leavenworth, Kansas. With a command of Mandarin, not to mention a Taiwanese wife, Henderson's knowledge of China makes him valuable in the intelligence community. His mandate at the new job was open-source intelligence, which meant using only information from publicly available sources, mimicking the capabilities of the average civilian. Although he had little experience in the subject, he was assigned a report on Chinese hackers.
Sitting down at a desk overlooking the Fort Leavenworth military base, Henderson started, like any novice, with Google. Using Mandarin characters, he typed heike -- literally, "black guest" -- pulling up the characters for "hacker." Probably, he thought, he'd find articles rehashing weak Western reports. But when he hit "return," his browser displayed a slew of unfamiliar sites: hackbase.com, hacker123.com, hack8.cn. There were hundreds, maybe thousands. He quickly realized that each was the online headquarters of a Chinese hacker organization, with detailed logs of hacks, contact information for hackers, and forums where users discussed targets. Chinese hackers, it turns out, take credit on their own sites for attacks, leaving a long trail of documentation. They are so attention-driven that when they post images of their successes to online trophy rooms, they tag them with e-mail addresses, URLs, even cellphone numbers. Within three minutes, Henderson had more information than he knew what to do with.
He spent the next few months trying to make sense of the data. To map connections among hacker sites, he laid a large sheet of paper out on the floor of his office and started sketching the network by hand. The diagram quickly extended off the page. Then it extended off several taped-together pages. After a co-worker suggested the computer program i2 Analyst's Notebook, an investigative tool that allowed him to craft a more sophisticated model, Henderson, following links from site to site, connected 250 hacker pages. Monitoring a cross-section of sites over several days to estimate the number of people logged in at any given time, he came up with 380,000 hackers.
There were localized clubs, whose members saw one another regularly. There were fleeting groups, whose sites appeared and disappeared in a matter of weeks. There were kid hackers, femme-fatale hackers and hacker wannabes (although most hackers are simply computer-savvy 20-somethings -- what Henderson calls "normal guys"). One group penned a theme song. Henderson recognized early on that such publicity ploys were not the work of the state. "If this was some secret government-run organization," he says, "it was the most horribly run secret government organization in the universe."
Instead, Chinese hackers work in small, competing crews, he found. During moments of crisis, like the 2001 EP-3 collision, the groups band together into coalitions called "Chinese emergency conference centers." The Red Hacker Alliance, often described in the Western press as a monolithic group, is in fact a loose association allowing disparate cells to coordinate their efforts.
But the largest unifying characteristic is nationalism. In a 2005 Hong Kong Sunday Morning Post article, a man identified as "the Godfather of hackers" explains, "Unlike our Western [hacker] counterparts, most of whom are individualists or anarchists, Chinese hackers tend to get more involved with politics because most of them are young, passionate, and patriotic." Nationalism is hip, and hackers -- who spearhead nationalist campaigns with just a laptop and an Internet connection -- are figures to revere.
Henderson says he's found nothing to show a direct connection between the central government and civilian hacker groups. But he emphasizes that the relationship between citizen and state is fluid in China, and that the Chinese government tends not to prosecute hackers unless they attack within China. To Henderson, that lack of supervision is tacit approval, and it constitutes a de facto partnership between civilian hackers and the Chinese government.
Jack Linchuan Qiu, a communications professor at the Chinese University of Hong Kong who spent the 2001 hacker war logged into mainland forums, agrees. "Chinese hackerism is not the American 'hacktivism' that wants social change," he says. "It's actually very close to the state. The Chinese distinction between the private and public domains is very small." Chinese entrepreneurs returning from working in Silicon Valley, Qiu says, sometimes comply with government requests to provide filtering technology to China's Internet police. Homegrown hackers might just as easily be recruited to write viruses or software for the People's Liberation Army.
Ultimately, hackers with loose government connections may be more frightening than state-sponsored cyberwarfare. According to Lewis, "The government at a minimum tolerates them. Sometimes it encourages them. And sometimes it tasks them and controls them." In the end, he says, "it's easy for the government to turn on and hard to turn off."
"These rogue groups are missing oversight," Henderson says. "When a situation is approaching critical mass" -- if, for instance, these hackers decide to abandon simple vandalism and start gunning for Social Security numbers or classified information -- "who's the guy who pulls back and says, 'No, we don't go any further'?"
A HACKER IS BORN
Shanghai Jiaotong University, one of the best in China, sits on the southern edge of Shanghai, surrounded by the R&D labs of multinational corporations. On the day I visit, students are sprawled on a verdant lawn, chatting and studying. Just behind them is the Information Security Engineering School, a futuristic mélange of maroon and gray.
Peng Yinan formed Javaphile here in September 2000. Peng originally saw the group as a way to explore physics and programming. But the following spring, patriotic fury at the EP-3 collision turned the group to hacking. A scholarship student, Peng was dark and intense, with long bangs hanging over his eyes and a fondness for horror films, Buddhist texts, and blogging about food. A former roommate of Peng's tells me his anti-American sentiments were common. "Everybody was very nationalistic," he says. "It's not like he was exceptional."
In 2002, Peng and two other hackers broke into the Web site of Lite-On and replaced the Taiwanese firm's home page with an image of a white face with hollowed-out eyes, along with the message "[F-ck] Taiwan's pro-independence!!!" In December 2003, the ghost face reemerged on the U.S. Navy Chartroom site, an internal Navy page. "[F-ck] usa.gov," read the defacement, which was signed by coolswallow and four others.
Soon after, Javaphile disintegrated. But Peng continued to take online casualties, defining his role as electronic patriot more and more broadly. After the U.S. invasion of Iraq in 2003, Peng, objecting to American imperialism, plastered the Washington, D.C. -- area Fox News site with "Allah Bless Iraq!!! Don't throw bombs, throw Bush."
In 2006 Henderson published a book about his search for Chinese hackers, The Dark Visitor, and in November 2007 he posted a profile of Javaphile to his blog, thedarkvisitor.com. He didn't yet know coolswallow's real name, so he used the hacker's screen handle, which was easy to deduce from Javaphile forum posts. Hackers regularly read Henderson's blog; once, one e-mailed to complain that government censors had blocked the site. So when traffic spiked a few weeks after the Javaphile post, Henderson checked to see where it was coming from.
Clicking through the discussion schedule on Pneuma's Web site, pneuma.cn (devoted to "cherishing the motherland when gazing at the world"), Henderson learned that a "senior hacker" named Peng Yinan had delivered Pneuma's second-anniversary lecture, "Hacker in a Nutshell." The poster for the event was appended with a quote from Hamlet: "I could be bounded in a nutshell and count myself a king of infinite space."
One PowerPoint slide from the lecture underlines the importance of simple, openly available techniques, noting that in 2006 the Chicago Tribune obtained contact information for 2,600 CIA agents using a commercial online service and suggesting that hackers "use illegal methods in weak sites to obtain information on personnel from safe sites." Chinese coverage of the event showed Peng lecturing easily from behind an open laptop. Henderson now had definitive evidence connecting coolswallow and ericool to Peng's name, allowing him to reconstruct the hacker's biography. What most intrigued him, however, was a phrase in small type at the bottom of the Pneuma flyer describing Peng as a consultant for the Shanghai Municipal Bureau of Public Security.
Henderson promptly posted his findings on his blog, with a copy of the presentation, an introduction to Pneuma, and Peng Yinan's photo. It was impossible to deduce the exact nature of Peng's new job. Based on the flyer, he was working for the Shanghai government, not for the national intelligence service. But such an arrangement supported Henderson's assessment of China's informal government-hacker relationship, providing evidence that after hackers cut their teeth on nationalist campaigns, the government might hire them to take on freelance work.
Five hours after the post went up, a user calling himself Pneuma Collegium posted a comment: "Your use of the logo and the photo of Pneuma Collegium is . . . an infringement of Pneuma Collegium's copyright." When Henderson saw that the poster's IP address belonged to pneuma.cn, his blood boiled. Henderson removed the logo and the PowerPoint presentation but kept the photo up, citing U.S. law on fair use of images. His aim, he told me later, was to keep the image of Peng publicly available. "When the FBI gets their hands on you," he said, as if still in conversation with the hacker, "I want them to match this picture to your face -- and take you to jail."
WHEN WILL WE CATCH ON?
The problem, of course, is that it's practically impossible for the FBI to catch or prosecute hackers operating abroad. "The international legal framework doesn't exist," says the CSIS's Lewis. And extraditing a hacker to the U.S. simply doesn't happen, given our current relationship with China. Learning to defend ourselves seems to be the only option.
In the meantime, Chinese hackers are becoming harder to monitor. Increasingly, they coordinate through private text-messaging rather than on blogs or Web sites, leaving no public record of their activities. In late 2007, after finding the Javaphile profile on Henderson's blog, Peng logged into the Jiaotong University forum and typed, "Looks like I should quit the historical stage." A few weeks later, he stopped posting on public forums altogether. He graduated the next month.
Last summer, I e-mailed Peng at nine e-mail addresses collected from his blog, academic papers, hacks and the Pneuma site. Eventually I received a reply from a Pneuma member called janeadios. "Peng Yinan is no longer involved with Internet security," it read. But traces of him remained. Earlier that year, in March, he was one of three graduates invited back by the Information Security Engineering School to deliver a career talk to students.
Rather than quit hacking, Henderson speculates, Peng retreated from view. In the months leading up to the Beijing Olympics, the Chinese government tightened its control on information. Peng may have been contracted to monitor the Web. In any case, his disappearance from the virtual realm means the loss of valuable indicators of future attacks.
In February, President Obama launched a 60-day investigation into cybersecurity, pledging to improve U.S. Internet defense. Acting on the review commission's findings, however, will require a coordinated, interdepartmental effort. First on the list should be reading Henderson's painstakingly detailed reports. And Peng's disappearance suggests that time is running out. If we can't handle the information Chinese hackers are leaving now, scarier still is what could happen when it disappears.
Mara Hvistendahl also writes for the New Republic, Harper's and Science. She lives in Shanghai.
I'll bet you the Defense Dept. didn't fore-see this when they developed the Internet.
By the way, Scott Henderson's blog is titled: The Dark Visitor, and a link to it is as follows:
As an avid computer hobbyist I've considered this, and even worried about this possibility for years. The indications are there, and have been for a long time now that this was and will happen, but cyber-security was never a hot issue for Washington (i.e. It didn't bring in votes for those in power,) now we find ourselves much in the same predicament as we did in the late 30's, with America facing a long hard climb up the technology ladder to become equal to the rest of the world in those resources with a war looming on the horizon. Can we respond in time, can we come up with some sort of Cyber-Manhattan project to save the day? Only time will truly tell. In many ways the infrastructure of the defense of our nation may well be in place. We have hackers here in the US as they do In china, or whatever nation you wish to name. The question is will our hackers lie down and let the rest of the world run them over when attacks from outside our nation destroy the very infrastructure they use to "do their thing?" or will they respond back with a digital-age version of the golden rule. "Do unto them what they would do onto us, only do it first." I can only hope when the crisis begins these Americans find patriotism to step up and pight back, and defend their home.
lnwolf41 as is usally the case, the US is bogged down in the 90's as far as new technology is concer. We are arrogant in our complancey of being ahead of everyone eles.
When in fact we are sadly behind the world in changing to newer, safer, better tech. One prime example is the "new"
3G phones being sold in the U.S.,they have been widely used in japan and other asian countries for years. The Apple store which everyone thinks is great,agan Japan has had this type of store for all of its electronics and computers long before Apple.
This is a good article, but why did we tell all those hackers in china that, "I SEE YOU". now they know were looking for them they have gone underground,and tthough maybe our military might be better protected I doubt that our public utilities will be improved. It's still 40 years out of date and I don't see it changing within the next 10 years and if it does it will still be behind the times.
This may be basic training for us. If we can cope with it in a civil situation, we may be able to defend ourselves in a serious hostile situation.
Speaking as an amateur, maybe websites could be set to accept only 1 entry request per minute, or to identify the source before entering. (Your computer sends a number providing its ID, so that might be denied 2 entries in an hour.) And then there are those fuzzy numbers you have to copy to verify you're not a machine.
If it's important enough, and if it's possible, we have the talent to create the defenses we need.
Is it possible that in addition to alllowing this cyber-terrorism, that the Chinese government is actually teaching people that they should hack America?
This type of attacking was inevitable. In a technological age, this hacking is bound to become more and more frequent, especially with all the conflict between the U.S. and the Middle-East. The chinks need to grow some testicles and quit hiding behind their screens. They just might push this too far and end up getting a nuclear warhead shoved up their communistic asses.
"People think of quantum cryptography as a distant possibility," said Chip Elliott, a principal scientist at BBN Technologies and leader of its quantum engineering team, in a statement.
"But the Darpa Quantum Network is up and running today underneath Cambridge [Massachusetts]. BBN has built a set of high-speed, full-featured quantum cryptography systems and has woven them together into an extremely secure network."
Quantum computing provides near-invulnerable encryption that cannot be eavesdropped upon. Encryption keys are sent via a pattern of single polarised photons and can be changed 100 times per second.
The method is also spy proof, since any third-party observation of the photons changes their properties.
BBN Technologies helped develop the initial backbone of the internet, Arpanet, and developed the first network email. The company is currently involved with developing quantum communications systems for satellites.
@AMP13: Way to play the stereotypical American bigot, that's the kind of attitude that breeds the current pandemic-level Anti-Americanist opinions of a not trivial population of the world. Yea a few dodgy characters may be doing some less than playnice things, but by slinging racist slurs you alienate not only the innocent Chinese population that peacefully goes about their day to day life, but also the Chinese American Nationals that make up a fair chunk of the American population.
(Liberty) cries with silent lips "Give me your tired, your poor, Your huddled masses yearning to breathe free, The wretched refuse of your teeming shore. Send these, the homeless, tempest-tost to me, I lift my lamp beside the golden door!". From what your saying, it seems that what Liberty actually said was "Give me your tired, your poor, and when any of their brothers cause me grief, I'll slander their entire nationality and treat them with spite and malice".
Before anyone slam me, I'm aware the bigotry isn't a national constant, and I'm also aware the hate isn't exclusive to America, I'm just trying to make a point.
So drop the tough guy act AMP13, the only viable (And sane) way America can defend itself against cyber-threats is with cyber-defences...remember China is Nuclear Capable as well.
I'd say that, moving forward, private and government systems that (reasonably) do not need to be accessed remotely should be as isolated as possible. It's not likely that any amount of money will be able to to tool up the cyber-warefare capabilities of the US to match the Chinese outfits in any relatively short time frame, so at least try to limit the potential damage while they play catch-up.
"The present is theirs; the future, for which I really worked, is mine." -- Nikola Tesla
I detest Nationalism. Chinese, Russians everyone alike. Nationalism in my opinion is why these countries have so many problems. Europe is terrible.. everyone you meet doesn't say their European but Spanish, French, etc. Everyone gets hung up on their culture, identity, and competition with other countries. China has so many problems i can even start to count. I personally believe in 'globalisation' and a united world government, idealism lol.
These hackers are college kids that may and may not be supported by the Chinese government. They can't be prosecuted or extradited. I personally think Americans should hold the Chinese government accountable and pressure them economically. Tell them we will aggressively target Chinese national hackers and hold the Chinese government themselves responsible for acts done by their citizens. I can't imagine a hacker that will deface U.S. property with the threat that Walmart will move their business to India. The Chinese have everything to lose by angering the U.S.
is a shame hackers exist today or maybe in the future you see the problem of the many the US government has and maybe others is the lack of a more advance software and of course the use of a operating system like Microsoft which is easily hacked
lets believe the government has another OS but the many companies and other institutions that use OS windows are in danger because of the complete control Microsoft created
the problem with almost one OS is like a human who is only protected by medicine and has never get a virus
one day because of the over confidence and since your system is not prepare gets sick
the same happens with the OS Microsoft that is many US companies and maybe I don't think so but inside the government which is REALLY STUPID but lets not think that
the codes of this OS well are always hacked because of being like the one and for hackers this makes their jobs easy
I hope the US government change tactics use a better or change their OS with a different computer code
AND PLS DON'T PUBLISHED like you do with the way of creating better money SOMETHINGS MUST KEEP SECRET FOR THE GOOD OF THE NATION and above all the people
And do like Europe take action with Microsoft to reduce his overpower in order to have more OS system around like a variety to make harder the job for hackers
and well this sounds rude but they are chinese people in US that don't like the communist goverment of China so use them as spies as another way to investigate this
and last catch up china they always first in everything they do technologically
athou id love to see cina get a neclare warhead upo the ass i am concernd that they might take controle of our missale networks and encriptions can only take us so far still if its on the internet it can be hacked
i call for an internet revolution
all american hackers unite and wage war on the chinese
i think the first step to this war is to gain access to the chineese the way they have gained accese to us
so before we shuve a warhead up thire ass we have to stop them from doing the same
ps before we do that lets see if we cant get some designs for their tolets
There's a nice interview with the author, Mara Hvistendahl, regarding this story and reporting it, you can find here:
It adds some nice details that aren't in the original story.
These hackers need to grow up. All countries spy on each other, INCLUDING CHINA. Your fighter pilot died and that's a sad thing. However, we're your biggest customer and you should leave the politics to your leaders.
The downside to this? Someday you're going to want to sell me software. And, knowing how you all feel about me, I'm going to avoid Chinese software like the Swine Flu. While I'm at it, can I really be sure that a couple of ultra nationalists haven't inserted sleeper code into the firmware of the laptop they made?
Let me know how that works out for you...
Lulz I'm sure the NSA has the goods on china and everyone else for that matter. We don't deface there websites but just quietly gather up all we want and remain unnoticed in a controlled and organized way.
what i dont understand is how them chinese can have nationalism for such a shitty country.
Many Western communications companies are buying cheap gear from Huawei. their CEO is a former high ranking officer of the Chinese Intelligence service. Here is what the Times of London had to say recently.
"INTELLIGENCE chiefs have warned that China may have gained the capability to shut down Britain by crippling its telecoms and utilities.
They have told ministers of their fears that equipment installed by Huawei, the Chinese telecoms giant, in BT’s new communications network could be used to halt critical services such as power, food and water supplies.
The warnings coincide with growing cyber warfare attacks on Britain by foreign governments, particularly Russia and China."
If you would like to see first hand what that article is referring to, follow these simple instructions anyone can follow.
go to ---> www.google.com/translate
Make sure that the tabs on the bottom read Chinese to English, for those of you who can't read Chinese characters.
in the box provided type ---> 05112.com
[Make sure it has a www. in front of it. for those of you who know html and understand site linking, I don't want to link these two sites. For many reasons.]
Google translate will then work some voodoo and poof, you will be able to view one of their news and instructional sites. Most of these hackers are young and seem quite focused in their efforts. Explore till your hearts content, all thanks to google.
The commission report cited vulnerable American targets such as the electric grid...
The only way to get to the electric grid is from a dedicated IP using a specific port opened in their firewall. The only way that this is possible is for someone to have a "spy" working for a SCADA group for whatever company controls whatever part of the grid that you are accessing. That is not hacking it is espionage. Liberal arts majors really need to stop reporting on technical issues.
asians are going to dominate the internet
I'm not surprised this is going on, kids are always trying to impress people. A computer is a whole lot more powerful weapon than most people would give it credit to be. That's technology for you.
"This letter is not meant for publication, although you can publish it if you wish. It is meant specifically for you, the editor, not the public.
I am a hacker. That is to say, I enjoy playing with computers — working with, learning about, and writing clever computer programs. I am not a cracker; I don't make a practice of breaking computer security.
There's nothing shameful about the hacking I do. But when I tell people I am a hacker, people think I'm admitting something naughty — because newspapers such as yours misuse the word “hacker”, giving the impression that it means “security breaker” and nothing else. You are giving hackers a bad name.
The saddest thing is that this problem is perpetuated deliberately. Your reporters know the difference between “hacker” and “security breaker”. They know how to make the distinction, but you don't let them! You insist on using “hacker” pejoratively. When reporters try to use another word, you change it. When reporters try to explain the other meanings, you cut it.
Of course, you have a reason. You say that readers have become used to your insulting usage of “hacker”, so that you cannot change it now. Well, you can't undo past mistakes today; but that is no excuse to repeat them tomorrow.
If I were what you call a “hacker”, at this point I would threaten to crack your computer and crash it. But I am a hacker, not a cracker. I don't do that kind of thing! I have enough computers to play with at home and at work; I don't need yours. Besides, it's not my way to respond to insults with violence. My response is this letter.
You owe hackers an apology; but more than that, you owe us ordinary respect."
I've never found something that as eloquent as this letter from The Jargon File, which can be found by Googling it (I was going to link, but I don't know how good your anti-spam URL detector is, so I'm not going to tempt it).
Why not "Hack Back"? Give them a little taste of their own medicine?
To "hack" implies cutting into something. If you just enjoy tinkering with code and are truly not malicious, then you are a programer. Do you prefer to call yourself a "hacker" because it makes you feel all bad ass? The average person makes a marked distinction between hacking and programing. Your use of the term "cracker" might mean something to some small slice of the population, but not to the rest of us. Hacking, to us, is exactly the same as vandalism, kick robberies and smash-and-grab robberies except that the hacker is a punk-assed coward who never has to physically face their victims.
This is just wonderful, and another example of the entire world biting the hand that feeds it. Let's ALL get together and join the I hate America club. These ignorant Chineese people have decided just like everyone else in the world that all of their problems are America's fault. Well, give me a break! I am sure that these ignorant Chineese brats don't realize that if it weren't for America they would be speaking Japaneese right now, and if it weren't for America teaching them the business of capitalism they would still be grubbing in the dirt on their collectives, instead of attacking our electronic infrastructure because of their ignorance and stupidity. But, oh I forgot how could these ignorant boobs know any of that because they don't have freedom of speech and their knowledge and thoughts are tightly controlled by Chineese government propaganda, how stupid of me, duh!
The last time I checked it was illegal to initiate cyber attacks against anyone's website in the USA. I think America should issue arrest warrants for these bastards and insist that they be extradited to the United States for prosecution and then we should throw the book at them and give them all maximum sentences and make examples out of them.
Oh, by the way you ignorant, little, snot-nosed, Chineese creep, the internet was invented by the United States Government as a way to share information among people who cherish freedom of speech, so why don't you just stay off of it and you won't have to worry about your government coming to arrest you for something you may say that they disagree with.
We have to say hackers are also parts of the world.
Down with you American bastards for invading and manipulating the great Chinese nation. You are the barbarians of the world with your military snooping in other countries of the world. Your selling of arms to the territory of Taiwan is only making the situation worse for China's sovereign right. You abuse gun powder to support your deranged constitution scares the world over.
We only want peace, not always war with everyone like you idiots in U.S.A.. We won't be intimidated by your silly and illogical, racist thoughts.