`
qjoycn
  • 浏览: 1215627 次
文章分类
社区版块
存档分类
最新评论

A new approach to china

 
阅读更多
1/12/2010 03:00:00 PM

Like many other well-known organizations, we face cyber attacks of varying degrees on a regular basis. In mid-December, we detected a highly sophisticated and targeted attack on our corporate infrastructure originating from China that resulted in the theft of intellectual property from Google. However, it soon became clear that what at first appeared to be solely a security incident--albeit a significant one--was something quite different.

First, this attack was not just on Google. As part of our investigation we have discovered that at least twenty other large companies from a wide range of businesses--including the Internet, finance, technology, media and chemical sectors--have been similarly targeted. We are currently in the process of notifying those companies, and we are also working with the relevant U.S. authorities.

Second, we have evidence to suggest that a primary goal of the attackers was accessing the Gmail accounts of Chinese human rights activists. Based on our investigation to date we believe their attack did not achieve that objective. Only two Gmail accounts appear to have been accessed, and that activity was limited to account information (such as the date the account was created) and subject line, rather than the content of emails themselves.

Third, as part of this investigation but independent of the attack on Google, we have discovered that the accounts of dozens of U.S.-, China- and Europe-based Gmail users who are advocates of human rights in China appear to have been routinely accessed by third parties. These accounts have not been accessed through any security breach at Google, but most likely via phishing scams or malware placed on the users' computers.

We have already used information gained from this attack to make infrastructure and architectural improvements that enhance security for Google and for our users. In terms of individual users, we would advise people to deploy reputable anti-virus and anti-spyware programs on their computers, to install patches for their operating systems and to update their web browsers. Always be cautious when clicking on links appearing in instant messages and emails, or when asked to share personal information like passwords online. You can read more here about our cyber-security recommendations. People wanting to learn more about these kinds of attacks can read this U.S. government report (PDF), Nart Villeneuve's blog and this presentation on the GhostNet spying incident.

We have taken the unusual step of sharing information about these attacks with a broad audience not just because of the security and human rights implications of what we have unearthed, but also because this information goes to the heart of a much bigger global debate about freedom of speech. In the last two decades, China's economic reform programs and its citizens' entrepreneurial flair have lifted hundreds of millions of Chinese people out of poverty. Indeed, this great nation is at the heart of much economic progress and development in the world today.

We launched Google.cn in January 2006 in the belief that the benefits of increased access to information for people in China and a more open Internet outweighed our discomfort in agreeing to censor some results. At the time we made clear that "we will carefully monitor conditions in China, including new laws and other restrictions on our services. If we determine that we are unable to achieve the objectives outlined we will not hesitate to reconsider our approach to China."

These attacks and the surveillance they have uncovered--combined with the attempts over the past year to further limit free speech on the web--have led us to conclude that we should review the feasibility of our business operations in China. We have decided we are no longer willing to continue censoring our results on Google.cn, and so over the next few weeks we will be discussing with the Chinese government the basis on which we could operate an unfiltered search engine within the law, if at all. We recognize that this may well mean having to shut down Google.cn, and potentially our offices in China.

The decision to review our business operations in China has been incredibly hard, and we know that it will have potentially far-reaching consequences. We want to make clear that this move was driven by our executives in the United States, without the knowledge or involvement of our employees in China who have worked incredibly hard to make Google.cn the success it is today. We are committed to working responsibly to resolve the very difficult issues raised.

象许多其他著名组织,我们面对不同的定期度网络攻击。 12月中旬,我们发现在我们的公司从中国,在由谷歌侵犯了知识产权,导致原基础设施非常复杂和具有针对性的攻击。 然而,很快就清楚地知道在第一次出现是单纯的安全事件 - 尽管是重要的一项 - 是完全是另外一回事。

首先,这次袭击不只是谷歌。 作为我们调查的一部分,我们发现,至少有20等大公司从业务范围广泛 - 包括互联网,金融,技术,媒体和化工等领域 - 也遭受了同样的目标。 我们目前还在通知这些公司的过程中,我们也与美国有关当局的工作。

第二,我们有证据表明,一个攻击者的主要目的是访问的中国人权活动的Gmail帐户。 根据我们调查,迄今为止,我们相信他们的进攻并没有实现这一目标。 只有两个Gmail帐户似乎已被访问,而这一活动仅限于帐户信息(如日期的帐户已创建)和主题行,而不是自己的电子邮件内容。

第三,这项调查的,但对谷歌攻击独立的一部分,我们发现,美几十个帐户,中国和欧洲的Gmail用户谁是在中国人权倡导者看来是例行访问的 第三方。 这些帐户还没有被访问的谷歌通过任何安全漏洞,但大多数通过网路钓鱼或恶意软件在用户的电脑上的可能。

我们已经使用的信息,从这次袭击,使获得基础设施和建筑改进,提高安全性和谷歌为我们的用户。 在个人用户方面,我们会建议人们在电脑上部署知名反病毒和反间谍软件程序,为他们安装操作系统补丁,并更新其网络浏览器。 一直很小心,在即时消息和电子邮件,或要求分享的个人信息如密码的网络版上点击链接。 你可以在这里阅读更多关于我们的网络安全的建议。 人们想要了解这些类型的攻击更可以阅读这个美国政府的报告(PDF格式),纳尔特维伦纽夫的博客,这对GhostNet介绍间谍事件。

我们已采取了交流有关的不只是因为安全和人权,我们有什么影响,广大观众发现这些攻击的信息不寻常的步骤,而且还因为这些信息转到了一个更大的关于全球自由辩论的核心 讲话。 在过去二十年里,中国的经济改革计划和公民'的企业精神已经脱离了贫困亿万中华儿女。 事实上,这个伟大的国家,是今天在许多经济进步和世界发展的核心。

我们相信推出Google.cn认为提高了对中国人民在一个更加开放的互联网信息的好处抵销同意审查结果,我们的一些不适,在2006年1月。 当时,我们明确指出,“我们将密切注视中国的条件,包括新的法律和对我们服务的其他限制。如果我们决定,我们无法达到目标所确定的,我们将毫不犹豫地重新考虑对中国的态度。”

这些袭击,他们已经发现监视 - 与在过去一年企图进一步限制网上言论自由的结合 - 已经导致我们得出结论,我们应该检讨我们在中国业务的可行性。 我们已经决定,我们不再愿意继续在Google.cn封杀我们的业绩,所以在未来,我们将与我国政府的基础上,我们可以在法律范围内运作,未经过滤的搜索引擎,讨论如果在几个星期 全部。 我们认识到,这很可能意味着必须关闭Google.cn,并有可能我们在中国的办事处。

审查的决定,在中国的业务一直非常努力,我们知道这将有可能影响深远的后果。 我们要明确,这一举措,主要是因为在美国我们的管理人员不知情或在中国的员工参与,谁工作非常努力,使Google.cn成就的今天。 我们正致力于负责任地解决提出的问题非常困难。

发布者大卫德鲁蒙德,高级副总裁,企业发展和首席法律官

分享到:
评论

相关推荐

    Analysis of root fractal characters in the hinterland of Taklimakan desert, China

    Analysis of root fractal characters in the hinterland of Taklimakan desert, China,杨小林,张希明,Fractal geometry is a potential new approach to the analysis of root architecture which may offer ...

    Winning_Jack_Welch

    there is a substructure of principles to my approach to business, and so I lay them out in this first part. In brief, the four principles are about the importance of a strong mission and concrete ...

    计算机网络第六版答案

    This document contains the solutions to review questions and problems for the 5th edition of Computer Networking: A Top-Down Approach by Jim Kurose and Keith Ross. These solutions are being made ...

    Intelligent Data Mining - D. Ruan, et al., (Springer, 2005)

    A User Centred Approach to Management Decision Making L.P. Maguire lp.maguire@ulster.ac.uk, T.A. McCloskey, P.K. Humphreys, R. McIvor Techniques to Improve Multi-Agent Systems for Searching and Mining...

    sigmod2011全部论文(1)

    A New Approach for Processing Ranked Subsequence Matching Based on Ranked Union (Page 457) Wook-Shin Han (Kyungpook National University) Jinsoo Lee (Kyungpook National University) Yang-Sae Moon ...

    Optical and hygroscopic properties of Asian dust particles based on a horizontal Mie lidar: case study at Hefei, China

    As an extension of the Mie lidar technique to measure the extinction coefficient of the surface particles, a horizontally pointing Mie lidar is used for determining the optical properties of Asian ...

    sigmod2011全部论文(2)

    A Hadoop Based Distributed Loading Approach to Parallel Data Warehouses (Page 1091) Yu Xu (Teradata) Pekka Kostamaa (Teradata) Yan Qi (Teradata) Jian Wen (University of California, Riverside) Kevin ...

    大维随机矩阵的谱分析理论

    the needs of statistics and signal processing, we have added a new chapter on the limiting behavior of eigenvectors of large dimensional sample covariance matrices. To illustrate the application of ...

    ICDE2013(全部论文之二)

    379. Top-K Oracle: A New Way to Present Top-K Tuples for Uncertain Data Chunyao Song (University of Massachusetts, Lowell) Zheng Li (University of Massachusetts, Lowell) Tingjian Ge (University of ...

    大学文献检索资料 DOC

    CH ( 化工) A 、B 、C 、D 、E 、F G 、H 、J 、K 、L 、M 德温特专利文献检索工具的符号体系及名词解释:专利权人代码后的“-”号,表示小公司。“/”号,表示个人。 “=”号,表示俄罗斯(或前苏联)的机构。...

    Handbook of Research on Wireless Security.pdf

    Peer-to-Peer (P2P) Network Security: Firewall Issues .........................................................................95 Lu Yan, University College London, UK Chapter VIII Identity Management...

Global site tag (gtag.js) - Google Analytics