Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
US 'concerned' over reported Chinese global censorship tool
by Staff Writers
Washington (AFP) May 8, 2015


The United States expressed concern Friday over reports China has used a powerful censorship tool dubbed "Great Cannon" to attack websites around the world.

Researchers reported in April that the "Great Cannon" is an online attack system used to hijack web traffic and enforce the country's broad censorship of information online.

The system was used to shut down websites aimed at helping Chinese bypass the country's extensive online restrictions known as the "Great Firewall," experts said.

"We are concerned by reports that China has used a new cyber capability to interfere with the ability of worldwide internet users to access content hosted outside of China," State Department spokesman Jeff Rathke said following a question about the program.

Rathke said the cyber attack manipulated Chinese web traffic and "and turned it into malicious traffic directed at US sites."

"We have asked Chinese authorities to investigate this activity and provide us with the results of their investigation," he said.

Experts at the University of Toronto reported on the Great Cannon last month, noting denial of service attacks carried out by the system.

The report supported claims by an activist organization which said China was seeking to shut down its online service that offer ways to access content from blocked websites.

Great Cannon gives China cyberattack capabilities similar to the US National Security Agency's Quantum program, revealed in documents leaked by former NSA contractor Edward Snowden, experts said.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
US behind curve in online war with IS: experts
Washington (AFP) May 8, 2015
The US government is struggling to counter the Islamic State group's fast-paced online propaganda, which played a role in inspiring a failed attack in Texas this week on an exhibit of caricatures of the Prophet Mohammed. One of the two gunmen had been in frequent contact via Twitter with an American militant from the IS group who was well known to federal authorities, according to groups tha ... read more


CYBER WARS
Russia Invites China to Join in Creating Lunar Station

Japan to land first unmanned spacecraft on moon in 2018

Dating the moon-forming impact event with meteorites

Japan to land probe on the moon in 2018

CYBER WARS
Traffic Around Mars Gets Busy

Rock Spire in 'Spirit of St. Louis Crater' on Mars

Rover on the Lookout for Dust Devils

UAE opens space center to oversee mission to Mars

CYBER WARS
The language of invention: Most innovations are rephrasings of the past

NASA Confirms Electromagnetic Drive Produces Thrust in Vacuum

NASA pushes back against proposal to slash climate budget

Hawaii Says 'Aloha' to NASA's Low-Density Supersonic Decelerator

CYBER WARS
Xinhua Insight: How China joins space club?

Chinese scientists mull power station in space

China completes second test on new carrier rocket's power system

China's Yutu rover reveals Moon's "complex" geological history

CYBER WARS
Progress Incident Not Threatening Orbital Station, Work of Crew

Russia loses control of unmanned spacecraft

Japanese astronaut to arrive in ISS in May

Liquid crystal bubbles experiment arrives at International Space Station

CYBER WARS
ILS And Dauria announce Proton/Angara dual launch services agreement

SpaceX to test 'eject-button' for astronauts

India to launch 6 more satellites in 2015-16

Arianespace to launch HellaSat-4/SGS-1 for Arabsat and KACST

CYBER WARS
New exoplanet too big for its star

Robotically discovering Earth's nearest neighbors

Astronomers join forces to speed discovery of habitable worlds

Titan's Atmosphere Useful In Study Of Hazy Exoplanets

CYBER WARS
Real stereotypes continue to exist in virtual worlds

Researchers match physical and virtual atomic friction experiments

See flower cells in 3-D - no electron microscopy required

Northwestern scientists develop first liquid nanolaser




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement All images and articles appearing on Space Media Network have been edited or digitally altered in some way. Any requests to remove copyright material will be acted upon in a timely and appropriate manner. Any attempt to extort money from Space Media Network will be ignored and reported to Australian Law Enforcement Agencies as a potential case of financial fraud involving the use of a telephonic carriage device or postal service.