Category Archives: China Cyber Timeline

10 Cybersecurity Stocks for the Coming Cyber Wars

Related Quotes

Symbol Price Change
AAPL 393.30 +6.01
Chart for Apple Inc.
CHKP 59.82 +0.64
Chart for Check Point Software Technologi
CSCO 16.46 +0.11
Chart for Cisco Systems, Inc.
FIRE 27.70 +0.68
Chart for Sourcefire, Inc.
FTNT 21.09 +0.39
Chart for Fortinet, Inc.
On Tuesday July 19, 2011, 11:50 am EDT

Lila MacLellan also contributed to this article.

Cyberspace is a scary place. Just ask Sony (SNE), which saw its stock price fall more than 15% after the firm suffered a data breach in April. Or Citibank (C), which announced last month that the personal data of an estimated 360,000 clients had been compromised. Or the US government officials whose Gmail accounts were recently breached by hackers working out of China. Or Monsanto, which this week had its website taken down byAnonymous, also known as the “Internet Hate Machine.”

The recent spike in publicized hacking is expected to trigger even higher demand for information security, especially when it comes to safeguarding customer data. According to a 2010 study by the Ponemon Institute, the average data breach costs a company $7.2 million, mostly in lost customers. The actual bill can be much, much higher — Sony announced in May that its hacking and the subsequent PlayStation Network outage will cost the firm $171 million.

The need to protect against such losses is clear to investors: recently cybersecurity firms Sourcefire (FIRE) and Fortinet Incorporated (FTNT) were trading at 55 and 64 times their expected 2011 earnings, respectively. Stocks such as Symantec (SYMC), Iron Mountain (IRM), and Check Point Software Technologies Ltd. (CHKP) have all outperformed the S&P 500 in 2011.

Corporations are not the only ones scrambling for coverage, of course. Cyberspace is rapidly emerging as a new international battleground in the political sphere, too. In the words of Nick Harvey, the British armed forces minister, “Action in cyberspace will form part of the future battlefield.” Already we’ve seen incidents of real world damage caused by cyberspace attacks. Last year, Iran’s nuclear facility at Natanz was damaged by “Stuxnet”, an extremely complex computer worm. The attack delayed the program and, according to aWikileaks source, caused “a serious… nuclear accident.”

In response, governments are ramping up both their defensive and offensive security services, and defense contractors are expanding their business models to get a piece of the growing market. Lockheed Martin(LMT) received more than $30 million last year from the U.S. government to develop “advances in cybersecurity and cyber warfare capabilities to address a critical global security challenge.” Its cyber-related activities comprised about 22% of 2010 sales, totaling $9.95 billion.

Smaller contractors are getting in on the action as well: Alabama-based Camber Corp. recently purchased a network security subsidiary from EADS North America, and defense IT firm KEYW Corporation (KEYW)acquired JKA technologies, which makes a wide range of security products used by the US intelligence community. Such acquisition targets, which offer “meaningful access” to network solutions, have attracted premium valuations because of the relatively high barriers to entry in the intelligence sector, according to a report published this month by ERG Partners.

More than ever, the Internet is serious business, and so is its safekeeping. But investors without special expertise in this area should be warned: this is a complex market that’s still in transition.

“It’s a weird sector,” says Sean Udall, a Minyanville contributor and author of the TechStrat Report. “A lot of times these stocks go up because of something in the news. You’ll see substantial price swings, even in the companies that have nothing to do with what’s been infiltrated.”

Pure plays are rare, adds Udall. “I think the average person thinks he or she can still buy a Fortinet, or something like it, and gain from this trend. But that’s not quite right for a couple of reasons. For one thing, a lot of these companies have already realized huge price moves, maybe a few years worth in just a few quarters. Secondly, a lot of the business already belongs to the big networking and data storage companies, who have acquired many of the prime plays.”

Almost every big technology company — including Intel, Juniper, and Cisco — has made a security acquisition, he explains. A lot of mergers happened between 2004 and 2007.

For many of the larger companies, the benefits of an M&A that happened years earlier are still forthcoming. “The stocks that look doggy right now are some of the businesses that should benefit the most. Cisco has lagged terribly, for example, but one of the reasons I like it is because they’re very strong in network security.”

Finally, says Udall, “there’s also a ton of really good technology being developed with companies that are pre-IPO pipeline. “It’s hard to know how much business those new companies are getting with really good solutions versus what I call mid-tier companies that have not yet been acquired.” (For more on venture capital interest in Silicon Valley’s cybersecurity companies, which are expected to form the next wave of Tech IPOs, see: Analysis: Computer security attracts venture capitalists.)

If you’re still looking to get in on the cybersecurity game, here are some stock names to consider, as selected by Udall. This list is divided into pure plays and software conglomerates.


Check Point Security Systems (CHKP),

This is “one of the better growth companies in the space — one of the cleaner names — therefore the stock has doubled or more in the last year,” say Udall. Indeed, Bloomberg reports that the world’s second largest security company saw its stock price hit a 10-year high this month; shares have gained 97 percent over the past year.

Check Point, the inventor of FireWall-1 and Stateful inspection technology, two landmark innovations, is known for customized security solutions designed to protect consumers from hackers, spyware and identity theft. According to the company’s website, its clients “include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies.”

The Tel Aviv-based firm, which employs just over 2,000 people, recently purchased Nokia’s security appliance business, and two years ago acquired FaceTime Communications’ application database, which added security controls for over 50,000 Web 2.0 widgets and more than 4,500 Internet applications to their company’s portfolio.

Sourcefire (FIRE),

This leading company, known for selling security software into the IT departments of large companies and governments, was recently named to’s Breakout Stocks portfolio. The 10-year-old firm is headquartered in Columbia, M.D. and is best known for its open source Snort program, whichthe company says is “the world’s most widely deployed intrusion detection and prevention technology.” Sourcefire is also behind ClamAV, claimed to be the “most commonly used open source anti-virus and anti-malware gateway product.”

In a recent report, Todd Weller, an analyst at Stifel Nicolaus, said, “We continue to view Sourcefire as an attractive growth play in the security sector, an area that is experiencing increased investor interest… We attribute [this] to the many recent high profile security attacks that have hit various companies.”

According to news stories, Sourcefire was recently an acquisition target for both Barracuda Networks and CheckPoint, described above. Because Sourcefire’s Snort detection software is widely used by the U.S. intelligence community, the potential for a sale to CheckPoint, which is based in Israel, prompted a severe political backlash.

Fortinet (FTNT),

Founded in 2000, this Sunnyvale, California firm is a serious force in the Cybersecurity world. In 2010, its revenue hit $325 million. Udall calls it “a hot name in the space,” and says, “the stock has gone haywire.”

With more than 100,000 customers, Fortinet is considered a market leader in network security appliances and unified threat management (UTM). Customers include major corporations, telecommunication firms and governments around the world.

The stock has been surging over the last year “”as Fortinet delivered four consecutive positive earnings surprises,” says Todd Bunton at Total revenue jumped 34% to $93.3 million in 2011 Q1, beating analyst expectations. Consensus estimates say the earning per share is expected to grow by 21% this year and 17% next year. “Fortinet isn’t exactly a value stock though,” Bunton warns. “Shares trade at 72x forward earnings, a significant premium to the industry average of 20.1x. Its price to book ratio of 13.3 is also well above its peers at 1.9.”

Guidance (GUID),

This company went public in December of 2006, catching the market’s attention with its forensic investigation software. “If something bad happens in your company, they have a solution to help you track down the culprits,” say Udall.

Guidance Software specializes in incident response, computer forensics, litigation support, and “hands-on” digital investigation. They also train corporate, law and government professional in digital forensics. Their flagship product is EnCase, which targets corporate government and law enforcement organizations to conduct computer investigations of various types, including intellectual property theft, incident response and compliance auditing, according to the company’s website. This forensic software is now in demand from so many different types of clients (including financial, retail, manufacturing, defense, and pharmaceutical companies) that a recent update was made to its interface to make it more intuitive. “We’re getting a lot of new people entering this field. The profile of our users is changing. When you use it, it’s going to feel like a web application,” Steve Salinas, Product Marketing Manager, told reporters.

Several Fortune 100 companies use the EnCase platform, including Allstate, Chevron, Ford, General Electric, Honeywell, and Pfizer. Guidance was founded in 1997 in Pasadena, California and has since expanded to locations across the U.S. and in Singapore. On the strength of Guidance Software’s customer base and rising sales, trend-setting investor Primecap Management recently increased its position in the firm.

Symantec (SYMC),

“This company has been around for a long time – it’s a security giant,” says Udall. “The company’s biggest challenger, McAfee, was bought by Intel, and Symantec has remained a wallflower buyout candidate for the better part of decade.”

Based in Mountain View, California, Symantec has been in the cybersecurity field since 1982, and now employs more then 18,000 people around the world. It services companies in the Americas, the Middle East and Africa and the Asia Pacific region, including Japan. The company specializes in securing, storing and managing large amounts of information; its core businesses include consumer and endpoint security, storage management and backup.

In response to the number of malicious software programs developed and deployed amid a recent sea of new apps, Symantec is now, “introducing services that assess the ‘‘reputation’ of software, weighing factors like how old it is and how widely it is used to decide if it is safe,” according to theNew York Times.

Websense (WBSN),

“If I had a buy list, this would be on it,” says Udall. Websense of San Diego, California, focuses on data in transit, in email content and over the web. Its products and services are sold as software that can be installed on standard server hardware, or pre-installed on optimized appliances, or as cloud-based services, or in a hybrid appliance/SaaS configuration, according to the firm’s New York Timesprofile. The stock has been strong this year, though Udall says that the company is considered a takeover target, so 5 to 6 points in its share price can be attributed to a potential merger premium. “I would be surprised if Websense was still operating as a standalone company in one or two years,” he adds.

According to company reports, the firm sells to “tens of thousands of enterprise, mid-market, and small organizations around the world.”


Cisco (CSCO),

This California-based technology behemoth provides hardware, networking, and communications services, among other products. Their many acquisitions have included security companies, including some industry leaders, like Ironport, an internet filter, and Securent, which is known for its management authorization software.

According to Udall, “Not only have they bought strong assets, the gear they make has a security component built into it, which should benefit them over time.” Cisco’s 3Q 2011 earnings topped analysts’ expectations, and revenue increased 4.8% to $10.9 billion. Their recent deal with New Songdo International City Development LLC to invest in U.Life Solutions marks a foray into “smart-city services.”

Blue Coat (BCSI),

Founded in 1996, this company lists 88% of the Fortune Global 500 among its 15,000 customers, as well as the 100 largest companies in the world and 96 of the 100 largest companies in the United States. With headquarters in Sunnyvale, California and development centers in Hong Kong and the UK (with one planned for Bangalore), Blue Coat Systems employs over 1,300 people worldwide. According to the company website, they offer “solutions that provide the visibility, acceleration and security required to optimize and secure the flow of information to any user, on any network, anywhere.”

Blue Coat Systems’ products predominantly focus on WAN (wide area network) optimization. “At every gateway, you can embed certain security protocols,” Udall explains. “Moreover, it’s likely that this name is being underappreciated for it’s security solutions currently.” In May, Blue Coat’s WAN optimization appliance was found by an independent testing lab to have “an extremely large performance advantage” over a competing Riverbed Steelhead appliance.


Ranking #152 in the Fortune 500 with total consolidated revenue of $17 billion in 2010, this company’s stock is traded as a component of the S&P 500, and is near its 52-week high. It employs about 48,500 people and operates in more than 80 countries, according to its corporate website.

Among its $14 billion spent on the acquisitions of 36 technology companies was a 2006 purchase of RSA Security, which specializes in authorization of log-ins. According to Udall, “EMC sells to the world’s largest data centers, so they have layers of security throughout their product line. If this was still a standalone name, I’d likely still own it. ” According to COO Pat Gelsinger, EMC is expected to spend about $3 billion on acquisitions in 2011.

Juniper (JNPR),

Juniper’s company overview proclaims, “Legacy approaches to networking are proving unsustainable. They are too costly, too complex, and simply cannot scale. At Juniper, we are leading the charge to architecting the new network.” (Yes, architect can be used as a verb, and not only computer scientists think so.)

The new network Juniper is building should be a secure one given the company’s interest in making the internet a safer place.

This Sunnydale, California firm was once known mainly for its high-performance Internet Protocol network products, but over time its identity has come to include network security. Its $4 billion acquisition of NetScreen Technologies, a network security layer company, in 2004, was just one of the company’s moves toward the e-commerce security market.

Udall believes Juniper is just the type of company to benefit most from increased demand for online security. “Think about the amount of internet commerce done today vs. 10 years ago. Credit card numbers and social security numbers are flying through the internet all the time. And most of them are safe because of these security networks”.

“What I would almost argue is that when you look at the pure play vs. the hardware companies, it’s the hardware companies that are in many cases going to come out ahead,” he says. “Juniper is doing way more to help the overall security of data companies and the global internet than these small companies — an interesting value proposition.”

With over 9,000 employees and offices in 47 countries, Juniper’s market cap topped $22 billion in April 2011. Now the company’s networks infrastructure will be deployed by (YOKU), marking a coup for the U.S. firm, which has had other success in China. Earlier this year, Juniper’s architecture was purchased by China Mobile Limited (CHL), the largest mobile network operator in China.

via 10 Cybersecurity Stocks for the Coming Cyber Wars – Yahoo! Finance.


Chinese Hacker Timeline 1988 -2011

Chinese Hacker Timeline 1988 -2011

Cyber Capabilities of China |USCyberLabs

From a speech I gave @JIU –Veteran4life

Cyber Capabilities of China

Good Day, my name is GaTo MaLo and I have worked in the IT world of corporate America for fortune 100 companies for over 35 years. In this presentation I hope to explain the state of China as an Internet Cyber Security leader. In today’s economy every government in the world is dealing with the Internet and Cyber Space. The Internet is were commerce happens, we go to our social networks, we find that ice cream shop that everyone is talking about, go out and get ice cream for the family. Cyber space is were the hackers that are stealing your credit card that you just used to buy ice cream for the family. Hackers are also stealing top-secret technology from our government and our corporation. As I compiled the China Cyber Timeline Project (Chinese Hacker-Cyber Timeline🙂 it was easy to connect the dots and see when China started its cyber push as a way to gain intellectual property, technology secrets, political and military secrets. The reason they are making headlines is because they are not very good and are getting caught.

Hacker Moto: -be hidden, be silent, listen and don’t get DOX (documented-revealed).

  1. Let’s take a look at their Offensive Capabilities.

From January-2010 to June-2011 China had the fastest Super Computer in the world on June 23, 2011 Japan became the new holder of the fastest super computer in the world, the US is in the top 5 but this alone shows what China can do in cyber space, the New York Times reported. China has now Nationalized Hacker groups to go out and hack making them patriot of the new Chinese (Digital Dragon-Warriors). China now has cyber spy schools popping up all over the place. China has also recently announced to have a cyber team called “PLA Online Blue Team” which is in charge of cyber espionage and intelligence for national security purpose and attacks on the 5th Battlefield (land, sea, air, space, cyber space), the Associated Press reported 2011. One of the key espionage and intelligence hacks come from the Chinese city of Jinan. It has over 6 million people, 12 Universities and a High Tech technology Zones for companies. It’s also the center for China’s PLA (Peoples Liberation Army) cyber warfare college and home to the “PLA-Online Blue Team”.

The city of Jinan, China – was traced back as the center of the Google e-mail attacks. And this is just one modern new City, as China grows every day new centers of technology will give China the technology to do almost anything they want in Cyber Space.

The only thing that is keeping China from going full out is “communism paranoia” they distrust everything not created internally. And they do not have the manpower today to fix it. China has fears that software & hardware that is created outside of China may have back doors.  In July 15, 2011 –The US State department released information that hardware computer components manufactured abroad have embedded back door to the Internet that’s design to defeats security anti-virus software. China may be right. China been hard at work manufacturing our electronics and shipping them to the rest of the world. Made in China = “Zombie Computer”

  1. What are China’s Defensive Cyber Capabilities?

China has a big problem they lack the manpower to do everything they want to do in cyber space. They have people but they lack the education that is needed in high-tech areas.

China’s fear of all software and hardware not created in China is another big problem. For example the SCADA (supervisory control and data acquisition) computer systems that monitor Power Stations. The US DHS (Department of Homeland Security) announce that China’s SCADA software has major flaws. The US told the world of the problems now everyone in Cyber Space knows. Hacker groups like Anonymous and LutzSec may attack them now.

  1. What are the International Laws preventing Cyber Warfare or Espionage?

Cyber Space is getting more and more complicated. In one group of maybe 10 people [LulzSec] from all over the world. They never met face to face. Then hacked into all kind of government and private companies and nobody can find them. And so the LulzSec legend begins.

Since there are no International laws and hackers are even hacking international police like MI5, FBI and Interpol each country must do what it can to protect it self.

  1. 4.    What can the USA do to protect itself from Cyber Warfare?


President Obama has signed executive orders outlining how far the United States military can go when launching cyber-attacks and other cyber-operations against enemies and as part of routine espionage activities, the Associated Press reported June 22. Since we have no International Cyber Laws every country has to protect itself. We as a Nation can reach individual treaties with different countries to make sure everyone knows the rules and in time we will see laws catching up to Cyber Space not until them, we must apply good cyber security to every aspect of our lives.

  1. 5.    Conclusions:

As you can see even in a country like China a communist country today with a little education and lot’s of money they can gain access to the Internet and hack information about a country a corporation or an individual and cause great harm. If a foreign government can hack your financial system your country could go into a recession. Today Chinese nationalized hacker group can hack our Smart Grip (Electricity). Shutting everything down all the power in the eastern or western states.

Anyone of these scenarios could happen and some have happened already. America has to find and implement cyber International policies to prevent this. If cyber attacks happened we must react quickly and have a solid disaster recovery plan, repair the problems and implement retaliation against the perpetrator even if it’s China.


Thanks you for your time I hope I shared something interesting


Reference: HAND – OUT’S

Chinese Hacker-Cyber Timeline:

Rogue State Stole 24,000 Pentagon Files with Sensitive Data in March – International Business Times

China Cyber TIMELINE   Chronology IF you look under the March 2011 you will see what was going on in cyberspace as to China -2011 timeline Only.

In one of the most blatant cyber attacks carried out against the United States by a foreign government, as many as 24,000 Pentagon files were stolen in March, US Deputy Secretary of Defense revealed on Thursday

via Rogue State Stole 24,000 Pentagon Files with Sensitive Data in March – International Business Times.

Chinese Hacker-CYber Timeline: June 23, 2011

Created by: veteran4life:-

This timeline covers almost all of 2010 – to get a full up to date time-line email me : This time-line opened my eye’s and helped connect the dots like 2003 Microsoft opens up source code to China (Titan Rain-starts part of Moonlight Maze operations-) to get MS-Office sold. The Chinese do not like any code that they did not create, all code has back-doors and the west will use it to destroy China, or so goes the Chinese paranoia. – Cyber Chronology


Chinese Hacker-Cyber Timeline 1994 -2010


Major Incident
1994 -1996 Formation, Expansion and Exploration –
  • The Green Army (China’s first hacker group) is formed
  • China Eagle Union’s preliminary web design registered as Chinawill and title “Voice of the Dragon”.
  • Anti-Chinese riots in Indonesia ignites retaliation from Chinese hackers and provide the catalyst for the creation of the “Red Hacker Alliance
  • Moonlight Maze – The name Moonlight Maze refers to an incident in which U.S. officials accidentally discovered a pattern of probing of computer systems at The PentagonNASA,United States Department of Energy, private universities, and research labs that had begun in March 1998 and had been going on for nearly two years. Sources report that the invaders were systematically marauding through tens of thousands of files — including maps of military installations, troop configurations and military hardware designs. The United States Department of Defense traced the trail back to a mainframe computer in the former Soviet Union but the sponsor of the attacks is unknown and Russia denies any involvement. Moonlight Maze is still being actively investigated by U.S. intelligence (as of 2003).[1]
  • Cyber conflict between People’s Republic of China’s and Taiwan over “Two State Theory”
  • Commercialism is introduced into the Green Army
  • August- Taiwanese and Chinese Hacker War- ERUPTS
  • Denial of Nanjing Massacre leads to attack on Japanese web Sites
  • Taiwanese elections spark conflict with mainland hackers
  • November – Chinese Hacktivist threaten DDOS on Taiwan National Day
  • Hacker activity marking the anniversary of the firstSino-US Hacker war squashed by the Chinese government. Chinese hacktivist appear to goUnder Ground.
  • Beginning of “reckless desire” within the alliance the Green Army falls apart from financial disputes
  • Honker Union of China founded by Lion
  • China Eagle Union founded by Won Tao
  • Javaphile founded by CoolSwallow and Blhuang

  • The Red Hacker Alliance attacks Japan over incident
  • The Japanese Web Site hit over Prime ministers visit to controversial monument.
  • April- First “Sino-US Hacker War” erupts after US EP-3 and PLA F-2 Collided and US crew Detained
2002 Attack on Taiwanese company Lite-On by Javaphile


  • Titan Rain – was the U.S. government‘s designation given to a series of coordinated attacks on American computer systems since 2003. The attacks were labeled as Chinese in origin, although their precise nature (i.e., state-sponsored espionagecorporate espionage, or randomhacker attacks) and their real identities (i.e., masked by proxy, zombie computer, spyware/virus infected) remain unknown. The activity known as ‘Titan Rain’ is believed to be associated with an Advanced Persistent Threat.
  • August- Reports of Chinese hackers against Taiwanese government and commercial sites.
  • The Chinese government grants licenses to open Internet cafe chains to just 10 firms, including three affiliated to the Ministry of Culture, one linked to the politically powerful Central Committee of China Youth League and six state-owned telecoms operators.
  • Microsoft opens up source code to China to get MS-Office –


  • Chinese hackers hit Japan government web site over dispute over Diaoyu Island.
  • July Chinese hacker attacks against Taiwan continues
  • November- Media reports of attacks against several US military installations.


  • Honker Union of China reforms
  • December- In early December 2005 the director of the SANS Institute, a security institute in the U.S., said that the attacks were “most likely the result of Chinese military hackers attempting to gather information on U.S. systems.”[1]
  • March- Several attacks from sites in allegedly in China against multiple sites in Japan.
  • August- Media reporting of Chinese Espionage condemned “Titan Rain
  • September- According to media staff in Taiwan National Security Council is targeted via social engineering e-mails.
  • China purchases over 200 routers from an American company, Cisco Systems that allow the government more sophisticated technological censoring capabilities. In October, the governmentblocks access to Wikipedia.


  • British MPs targeted. (Guardian, Smash and Grab, the High Tech Way)
  • June- Chinese hackers strike at Taiwan MoD.
  • July- Media Report US State Department is recovering from a damaging cyber attack
  • August- Official State hostile cyber force have downloaded up to 20tb (Terra Byte = 1024 Gigabytes = 1 Terabyte -20 terabytes of data)
  • August- Claims of Congressional Computers being hacked are made
  • November- US Naval War College computers infrastructure reportedly attacked.
  • January-  a group of former senior Communist party officials in China criticize the internet censorship, warning that it could “sow the seeds of disaster” for China’s political transition.
  • February-  Google agrees to block websites, which the Chinese Government deems illegal in exchange for a license to operate on Chinese soil. The search engine responds to international criticism by protesting that it has to obey local laws.
  • May-  Chinese Internet users encountered difficulties when connecting to Hotmail, Microsoft’s popular email service. Microsoft says the break in service is caused by technical problems, but there is widespread speculation that the incident is linked to state censorship. In the last week of May, Google and many of its services also became unreachable.
  • July-  researchers at Cambridge University claim to have broken through the Great Firewall of China – the government imposed blocks on large portions of the web.
  • November-  the Chinese language version of Wikipedia is briefly unblocked before being shut down again the same month.


  • WASHINGTON —  The Chinese government hacked a noncritical Defense Department computer system in June, a Pentagon source told FOX News on Tuesday.
  • Pentagon investigators could not definitively link the cyber attack to the Chinese military, the source said, but the technology was sophisticated enough that it indicated to Pentagon officials — as well as those in charge of computer security — that it came from within the Chinese government.
  • 2007 German Chancellery compromised and China accused of being the perpetrator. (Der Spiegel, Merkel’s China Visit Marred by Hacking Allegations)
  • 2007 US Pentagon email servers compromised for an extended period. Cost to recover $100 million. Paul, Ryan. “Pentagon e-mail taken down by hackers.” Ars Technica. 22 June 2007 )
  • 2007 Oak Ridge National Laboratory targeted by Chinese hackers (Stiennon, Haephratic Technique Used to Crack US Research Lab)
  • June- OSD (Office of the Secretary of Defense) Computers attacked via malicious e-mail.
  • August- Reports emerge of cyber attacks of Germany.
  • September- Reports emerge of cyber attacks of UK.
  • September- Reports emerge of cyber attacks of NZL (New Zealand).
  • October-US Nuclear Labs targeted by malicious e-mail.
  • December- MI5 Issues warring on Chinese Cyber Attacks
  • January- Hu Jintao, the Chinese president, pledges to “purify” the Internet. He makes no specific mention of censorship, saying China needs to “strengthen administration and development of our country’s Internet culture.”
  • March- access to the LiveJournal, Xanga, Blogger and Blogspot blogging services from within China become blocked. Blogger and Blogspot become accessible again later the same month.
  • June-  American military warn that China is gearing up to launch a cyber war on the US -plans to hack US networks for trade and defense secrets.


  • March- Reports emerge on cyber attacks on Australia.
  • May- Reports emerge on cyber attacks on India.
  • May- Reports emerge on cyber attacks on Belgium
  • May- US commerce Secretary laptop investigation for data infiltration.
  • June- US elections campaign hacking reported.
  • November- Hacking of White House Computers alleged.
  • November- Massive intrusion on NASA systems released.
  • December- French Embassy Web site attacked in protest over meeting with Dali Lama
  • April-  MI5 writes to more than 300 senior executives at banks, accountants and legal firms warning them that the Chinese army is using Internet spyware to steal confidential information.
  • June- Hu Jintao, the Chinese president, makes his first tentative steps online by answering questions on a web forum.
  • August- China faces widespread criticism for Internet censorship in the run-up to the Beijing Olympics. The government surprises critics by lifting some of the restrictions, making the websites of human rights organizations such as Amnesty International accessible for the first time.


  • March- GhostNet – China’s large-scale cyber-spying -China’s global cyber-espionage network GhostNet penetrates 103 countries. A vast Chinese cyber-espionage network, codenamed GhostNet, has penetrated 103 countries and infects at least a dozen new computers every week, according to researchers.
  • 2009 Three largest resource companies in Australia, including Rio Tinto compromised.(Rio Tinto hacked at time of Hu arrest)
  • 2009 Google Aurora attacks target user data and source code. (McAfee blog)
  • April- Compromise of systems across 103 countries by Chinese cyber spies while Chinese govvernment denies invollment in GhostNet.
  • April- Daily attacks reported against German government.
  • April- The Chinese government denies reports of hacking the Australian Prime Ministers e-mail
  • April- Reports emerge of Chinese hackers targeting South Korea official with social engineered e-mail.
  • March-, Bill Gates weighs into the Internet censorship row, declaring that “Chinese efforts to censor the Internet have been very limited” and that the Great Firewall of China is “easy to go around”. His comments are met with scorn by commentators on the web.
  • March-, the government blocks the video-sharing website YouTube after footage appearing to show police beating Tibetan monks is posted on the site.
  • June-, China imposes an information black-outin the lead up to the anniversary of the Tiananmen Square massacre, blocking access to networking sites such as Twitter as well as BBC television reports.
  • June-, China faces a storm of criticism over plans to force all computer users to install Green Dam Internet monitoring software. The plan is dropped in August.
  • June-Lord West, the British security minister,warns that Britain faces the threat of a “cyber cold war” with China amid fears that hackers could gain the technology to shut down the computer systems that control Britain’s power stations, water companies, air traffic, government and financial markets.
  • August-, the US Government begins covertly testing technology to allow people in China and Iran to bypass Internet censorship firewalls set up by their own governments.
  • December-, the government offers rewards of up to 10,000 Yuan (£888) to users who report websites featuring pornography. The number of pornographic searches rockets.



via cyber.amoreswebdesign.com_AmoresWebDesign -Cyber BlogAmoresWebDesign -Cyber Blog » Cyber Security & Warfare Blog.

Haephrati technique used to crack US research lab | ZDNet

June-2007 – Timeline
Haephrati technique used to crack US research lab | ZDNet.