An anonymous reader writes "When in early 2010 Google shared with the public that they had been breached in what became known as the Aurora attacks, they said that the attackers got their hands on some source code and were looking to access Gmail accounts of Tibetan activists. What they didn't make public is that the hackers have also accessed a database containing information about court-issued surveillance orders that enabled law enforcement agencies to monitor email accounts belonging to diplomats, suspected spies and terrorists. Whether this was the primary goal of the attacks as well as how much information was exfiltrated is unknown. current and former U.S. government officials interviewed by the Washington Post say that the database in question was possibly accessed in order to discover which Chinese intelligence operatives located in the U.S. were under surveillance."
Become a fan of Slashdot on Facebook
An anonymous reader writes "ARM licensee Allwinner sold more application processors for tablet computers in 2012 than Intel and Qualcomm put together, according to this EE Times article that references market researcher Strategy Analytics. Overall one in five tablet processors was provided by a Chinese vendor in 2012, according to the article, partly because they sell chips at half the price of similarly specified chips from better known vendors."
wiredmikey writes "A new report from the Pentagon marked the most explicit statement yet from the United States that it believes China's cyber espionage is focused on the U.S. government, as well as American corporations. China kept up a steady campaign of hacking in 2012 that included attempts to target U.S. government computer networks, which could provide Beijing a better insight into America's policy deliberations and military capabilities, according to the Pentagon's annual assessment of China's military. 'China is using its computer network exploitation capability to support intelligence collection against the U.S. diplomatic, economic, and defense industrial base sectors that support U.S. national defense programs,' said the report to Congress (PDF). The digital espionage was part of a broader industrial espionage effort that seeks to secure military-related U.S. and Western technology, allowing Beijing to scale back its reliance on foreign arms manufacturers, the report said. One day later, Beijing dismissed the Pentagon's report that accused it of widespread cyberspying on the U.S. government, rejecting it as an 'irresponsible' attempt to drum up fear of China as a military threat."
sciencehabit writes "The Boston marathon bombers Tamerlan and Dzhokhar Tsarnaev reportedly purchased several pounds of black powder explosive before the bombing. Used in fireworks and bullets, the explosive substance is both deadly and widely available. It's also very hard to detect. Now, researchers have modified one bomb-sniffing device to accurately spot very small amounts of black powder, an advance that could make us safer from future attacks. What has prevented detection of black powder by IMS in the past, however, is that sulfur and oxygen -- which composes 20% of air—hit the detector at almost the same time. A strong oxygen signal can thus mask a small amount of sulfur, like what a bombmaker's dirty fingers might leave on a luggage strap. A group led by chemist Haiyang Li at the Dalian Institute of Chemical Physics in China modified an IMS to eliminate the oxygen signal. 'We have tested the sensitivity of TR-IMS, and its limit of detection of black powder can reach as low as 0.05 nanograms,' Li says."
coolnumbr12 writes "Chinese hackers have infiltrated a sensitive U.S. Army database that contains information about the vulnerabilities of thousands of dams located throughout the United States. The U.S. Army Corps of Engineers' National Inventory of Dams (NID) has raised concerns that information gathered in the hack could help China carry out a cyber-attack on the national electrical power grid."
hackingbear writes "The Beijing No. 2 Intermediate People's Court ruled in favor of a group of Chinese authors, and Apple will have to pay them in excess of 730,000 yuan (US$118,000) for infringement. Apple had not gotten permission before selling their books on the Apple App Store, it noted. These cases were the second batch of lawsuits filed against Apple by the Writers' Right Protection Union, which includes prominent members like prolific blogger and novelist Han Han who have become a pop culture star through his creative and cynical writings criticizing the (Chinese) government."
ananyo writes "With Taiwan announcing the first case of H7N9 avian flu outside mainland China, researchers have revealed how the virus may spread in China — and beyond. The projections use risk maps developed for human infection by another, well-established avian flu — H5N1. Indeed, when human cases of H7N9 are overlaid on a risk map, they appear to fall within the highest risk areas for H5N1. The map suggests that high-risk areas for H7N9 might include Shandong province (where the first case was reported 23 April) and a belt extending around the Bohai sea to Liaoning province in the north. Though there has been no evidence of sustained human-to-human spread of H7N9 so far, researchers have analyzed airline passenger data for China. Eastern China — the epicenter of the current the H7N9 outbreak — is one of the world's busiest hubs for airline traffic. From the Nature story: 'A quarter of the global population outside of China lives within two hours of an airport with a direct flight from the outbreak regions, and 70% if a single connecting flight is included.'"
An anonymous reader writes "Hui Zhang and Shangui Zhao describe China's decision to move ahead with nuclear power. Following the Fukushima Daiichi accident, China slowed its rapid expansion of nuclear power and undertook a major reevaluation of safety practices. The government has now resumed approval of new nuclear power projects, and is cautiously moving forward. Good description of safety issues that remain." They are suspending in-land construction, and are aiming at 58GWe instead of 80GWe of generation capacity by 2020. It's still more than the 40GWe they planned to build under their 2007 plans.
colinneagle writes "Verizon's 2013 Data Breach Investigation Report is out and includes data gathered by its own forensics team and data breach info from 19 partner organizations worldwide. China was involved in 96% of all espionage data-breach incidents, most often targeting manufacturing, professional and transportation industries, the report claims. The assets China targeted within those industries included laptop/desktop, file server, mail server and directory server, in order to steal credentials, internal organization data, trade secrets and system info. A whopping 95% of the attacks started with phishing to get a toehold into their victim's systems. The report states, 'Phishing techniques have become much more sophisticated, often targeting specific individuals (spear phishing) and using tactics that are harder for IT to control. For example, now that people are suspicious of email, phishers are using phone calls and social networking.' It is unknown who the nation-state actors were in the other 4% of breaches, which the report says 'may mean that other threat groups perform their activities with greater stealth and subterfuge. But it could also mean that China is, in fact, the most active source of national and industrial espionage in the world today.'" The report also notes that financially-motivated incidents primarily came from the U.S. and various Eastern European countries.
kkleiner writes "Recently developed noodle-making robots have now been put into operation in over 3,000 restaurants in China. Invented by a noodle restaurant owner, each unibrow-sporting robot currently costs 10,000 yuan ($1,600), which is only three months wages for an equivalent human noodle cook. As the cost of the robot continues to drop, more noodle shops are bound to displace human workers for the tirelessly working cheaper robots."
derekmead writes "According to a new study (PDF) from Pew Charitable Trusts, China was the world leader in clean energy investment in 2012. The U.S., meanwhile, saw its grip loosen on many of the clean energy technologies it developed. According to the research, total clean energy investment totaled $269 billion worldwide last year, a decline from 2011's record high of $302 billion. However, clean energy investment in the Asia and Oceania markets grew by 16 percent to $101 billion. In terms of investment — which is an indicator that a country or region has offered compelling projects, struck a good regulatory balance, and has a strong economy — that makes Asia the epicenter of the global clean energy market. The Pew researchers thus labeled the U.S. clean energy sector as 'underperforming,' largely for a trio of reasons. First, China's boom and manufacturing prowess has taken investment away from the U.S.. Second, the U.S. regulatory environment for clean energy is horrifically unstable (as is the regulatory environment as a whole) as politicians battle over budget rhetoric. Finally, the U.S. has failed to capitalize on its innovation prowess and develop its clean energy manufacturing sector to its full potential." They do not count nuclear as clean, but including nuclear would only widen China's lead over everyone else (they almost have their first new AP1000 ready and are building lots more).
FrankPoole writes "According to CRN, IBM is in serious negotiations to sell its low-end x86 server business to Lenovo, which is looking to grow its server revenue. If the deal goes though, it will be the second time in eight years that Big Blue has exited a major hardware business and sold the operation to Lenovo. IBM sold its PC business to Chinese computer maker in 2005."
An anonymous reader writes with news that Yahoo will be ending their email service in China on August 13th. A support post on the Yahoo China site tells users how to migrate their account to a different email service called Aliyun. If they do so, their data can be migrated and they will continue to receive emails to their Yahoo address until the end of 2014. From the article: "The US Internet giant Yahoo! has come under criticism in the past over its business in China, with executives apologising in 2007 for providing evidence that Chinese authorities used to convict government critics. The company said it was legally obliged to divulge information about its users to the Chinese government but that it was unaware it would be used to convict dissidents. The end of the service will affect millions of users, the paper quoted Alibaba public relations official Zhang Jianhua as saying, though he did not have a total figure." Yahoo also announced the closure of six other products today: Upcoming, Deals, SMS Alerts, Kids, Mail and Messenger feature phone apps, and older versions of Mail.
cylonlover writes "Lockheed Martin has been getting its feet wet in the renewable energy game for some time. In the 1970s it helped build the world's first successful floating Ocean Thermal Energy Conversion (OTEC) system that generated net power, and in 2009 it was awarded a contract to develop an OTEC pilot plant in Hawaii. That project has apparently been canceled but the company has now shifted its OTEC sights westward by teaming up with Hong Kong-based Reignwood Group to co-develop a 10 MW pilot plant that will be built off the coast of southern China."
An anonymous reader links to an article at Ars explaining the dropping inventory of bridges available to users of the Tor project's encrypted messaging system. They're looking for more bridges, but that doesn't necessarily mean buying new hardware per se. From the article: "After campaigning successfully last year to get more volunteers to run obfuscated Tor bridges to support users in Iran trying to evade state monitoring, the network has lost most of those bridges, according to a message to the Tor relays mailing list by Tor volunteer George Kadiankakis. 'Most of those bridges are down, and fresh ones are needed more than ever,' [Tor volunteer George] Kadiankakis wrote in an e-mail, 'since obfuscated bridges are the only way for people to access Tor in some areas of the world (like China, Iran, and Syria).' For those who want to donate bridges to the Tor network, the easiest route is to use Tor Cloud, an Amazon Web Service Elastic Compute Cloud image created by the Tor Project that allows people to leverage Amazon's free usage tier to deploy a bridge."
adeelarshad82 writes "Marvel's Iron Man 3 will debut in select Japanese theaters later this month employing the 4DX system for the first time. Developed by South Korea's largest movie chain operator, the CJ Group, 4DX-equipped theaters deliver smells, seat motions, and additional effects such as strobe lights and fog, all in sync with events as they appear on the screen. Beyond South Korea, this full immersion approach to cinema is already in operation in countries such as Israel, Mexico, Brazil, and China."
hypnosec writes "The majority of $35 Raspberry Pi production was shifted to a factory in Wales from China and the Raspberry Pi Foundation has announced this week that the factory in Wales has produced its half millionth unit in just over six months. The weekly production has shot up to 40,000 units in the UK factory and that number is 'set to climb further.' The Foundation is optimistic about the Welsh factory and said there will be 'more Made in the U.K. Pis in the world than their Made in China cousins.' The Foundation didn't reveal anything else apart from this, but we already know it sold the millionth Pi back in January."
sciencehabit writes "Lufengosaurus, a long-necked, plant-eating dinosaur that lived in China during the Jurassic period, were the biggest animals of their age, measuring 30 feet long. Now, fossilized embryos reveal that they were also the fastest growing animals on record — 'faster than anything we have ever seen,' according to one researcher. What's more, researchers have found traces of organic matter in their bones, which may belong to the oldest fossil proteins ever found."
msm1267 writes "Tibetans inside China or in exile, along with Syrians, Iranians and other groups oppressed by autocratic regimes, rely on technology to communicate and organize protests. Yet state-sponsored attackers have infiltrated the devices and platforms used by the oppressed to put their freedom or lives in danger. Groups such as Tibet in Action or Citizen Lab Munk School of Global Affairs have put together resources to help educate and enhance the security of oppressed people."
coondoggie writes "New federal restrictions now preclude four U.S. agencies from buying information-technology (IT) systems from manufacturers 'owned, directed or subsidized by the People's Republic of China' due to national-security concerns. But is this a smart tactic? It's clear that some in the U.S. government, including the House Intelligence Committee — which issued a scathing report last fall that called Huawei and ZTE a threat to national security — and the Treasury Department's Committee on Foreign Investment in the U.S. are also working in other ways behind the scenes to keep technology made by China-based manufacturers out of U.S. commercial networks as well."