Hmmm...
Pot. Kettle. Black. Make a well-known phrase with those words.
The Chinese government claims it came under almost 500,000 cyberattacks last year, most of which it said originated outside the country. Most of the attacks involved Trojan horse malware, according to a report by the National Computer Network Emergency Response Coordination Center of China. A report by the cyber-monitoring …
They found out that their original plan, domination through hard-cornered plastic that you step on in the middle of the night, to be limited; they're allegedly smart enough to do this; and Dane was once a synonym for Viking. Plus, they have the perfect cover. Someone get Sandi Toksvig in for questioning.
A year or two ago, we drove around most of the central and south of the country.
They appear to have covered the majority of it in giant propellers.
I suspect they are attempting lift off, maybe with a view to moving to more southerly climes.
Although when combined with your new information, maybe its part of the grand master plan of Danish domination?
"Although China routinely gets blamed for cyber-espionage attacks, it's a safe bet to assume that just about every capable intelligence agency is playing this game. Seen in that context, the Chinese report represents a counter offensive in an ongoing propaganda war.
An added consideration in the field of cybercrime is the problem of attribution. When a country is physically attacked by another country it's generally quite straightforward to point the finger of blame towards the offending party. However cyberattacks can easily be launched from compromised machines in third-party countries, making it very difficult to know with any certainty who is behind an attack. "
Welcome to New Worlds of Order for CHAOS in Great Intelligence Games .... with Novel GIGs that overwrite earlier parables and leading tales in old and ancient tomes plagiarised from scriptures and dead see scrolls for abuse and entertainment and amusement of the living?
That is why there is such a mad scramble for control of the cyberspace place.
for a reasoned article on the world of cyber attacks ! His two main points - 1) that we must assume that all state (and, indeed, a plethora of corporate) intelligence services are doing it and 2) that «cyberattacks can easily be launched from compromised machines in third-party countries» - are well taken. With regard to the second point, note that, according to Stat Counter Global Stats (http://gs.statcounter.com/#browser_version-CN-daily-20080701-20110812) the proportion of machines using a web browser so easily hacked as IE6 has only fallen under 40 % of the total in China during the last few weeks.Gefundenes Fressen for any foreign state or corporate intelligence service who want to ensure their actions are blamed on the Chinese, who we all love to believe are responsible for all the evil in this world....
Henri