Deep inside a Chinese military engineering institute in September 2008, a researcher took a break from his duties and decided — against official policy — to check his private e-mail messages.
Among the new arrivals was an electronic holiday greeting card that purported to be from a state defense office.
The researcher clicked on the card to open it. Within minutes, secretly implanted computer code enabled an unnamed foreign intelligence agency to tap into the databases of the institute in the city of Luoyang in central China and spirit away top-secret information on Chinese submarines.
Read more
Search This Blog
Subscribe to:
Post Comments (Atom)
Fair Use Notice
This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner.
The material is being made available in an effort to advance understanding arms trade activities, for non-profit research and educational purposes only.
I believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law.
If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner.
This is a completely non-commercial site for private personal use. No fee is charged, and no money is made off of the operation of this site.
The material is being made available in an effort to advance understanding arms trade activities, for non-profit research and educational purposes only.
I believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law.
If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner.
This is a completely non-commercial site for private personal use. No fee is charged, and no money is made off of the operation of this site.
No comments:
Post a Comment
Note: only a member of this blog may post a comment.