Add Free Search to the Free Tibet Slogan

December 13, 2016

China is notorious for censoring its people’s access to the Internet.  I have heard and made more than one pun about the Great Firewall of China.  There is search engine in China, but it will not be in Chinese, says Quartz: “How Censored Is China;s First Tibetan Language Search Engine? It Omits The Dalai Lama’s Web Site.”

Yongzin is the first Tibetan language search engine.  It is supposed to act as a unified portal for all the major Tibetan language Web sites in China.  There are seven million Tibetan people in China, but the two big Chinese search engines: Baidu and Sogou do not include the Tibetan language.  Google is banned in China.

Yongzin rips off Google in colors and function.  The Chinese government has dealt with tense issues related to the country of Tibet for decades:

The Chinese government wants the service to act as a propaganda tool too. In the future, Yongzin will provide data for the government to guide public opinion across Tibet, and monitor information in Tibetan online for “information security” purposes, Tselo, who’s in charge of Yongzin’s development, told state media (link in Chinese) at Monday’s (Aug. 22) launch event.

When people search Yongzin with Tibet related keywords, such as Dalai Lama and Tibetan tea, China’s censorship shows itself at work.  Nothing related to the Dalai Lama is shown, not even his Web site, and an article about illegal publications.

China wants to position itself as guardian of the Tibetan culture, but instead they proffer a Chinese-washed version of Tibet rather than the true thing.  It is another reason why the Free Tibet campaign is still important.

Whitney Grace, December 13, 2016

Microsoft to Sunset China Search and News Services

August 22, 2016

Recent news has made clear that online content from the U.S. or any country foreign to China faces challenges in China. An article from CNN Money recently published Microsoft is giving up on its Chinese web portal. This piece informs us that Microsoft will sunset it’s MSN website in China on June 7. Through their company statement, Microsoft mentions their commitment to China remains and notes China is home to the largest R&D facility outside the U.S. An antitrust investigation on Microsoft in China has been underway since July 2014. The article shares an overview of the bigger picture,

The company’s search engine, Bing, also flopped in the country amid tough competition with homegrown rivals. It didn’t help that in Chinese, “Bing” sounds similar to the word for “sickness.

In September, Microsoft finally ditched Bing for users of its Edge browser in China, striking a deal with Chinese Internet giant Baidu (BIDU, Tech30) to use its search engine as the default.

Other Western tech firms have come under scrutiny in China before, including Qualcomm(QCOM, Tech30) and Apple (AAPL, Tech30). Social networks like Facebook (FB, Tech30) and Google (GOOG) remain blocked in the country.”

It looks like Bing will bite the dust soon, in China at least. Does this news mean anything for Microsoft as a company? While regulations China are notably stringent, the size of their population makes up a notably sized market. We will be watching to see how search plays out in China.

Megan Feil, August 22, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph     There is a Louisville, Kentucky Hidden /Dark Web meet up on August 23, 2016.                                                                                                                 Information is at this link: https://www.meetup.com/Louisville-Hidden-Dark-Web-Meetup/events/233019199/

 

Baidu Hopes Transparency Cleans up Results

July 28, 2016

One of the worries about using commercial search engines is that search results are polluted with paid links. In the United States, paid results are differentiated from organic results with a little banner or font change.  It is not so within China and Seeking Alpha shares an interesting story about a Chinese search engine, “Baidu Cleans Up Search Site, Eyes Value.”  Baidu recently did a major overhaul of its search engine, which was due a long, long time ago. Baidu was more interested in generating profits than providing its users a decent service.   Baidu neglected to inform its users that paid links appeared alongside organic results, but now they have been separated out like paid links in the US.

Results are cleaner, but it did not come in time to help one user:

“For anyone who has missed this headline-grabbing story, the crisis erupted after 21-year-old cancer patient Wei Zexi used Baidu to find a hospital to treat his disease. He trusted the hospital he chose partly because it appeared high in Baidu’s results. But he was unaware the hospital got that ranking because it paid the most in an online auctioning system that has helped to make Baidu hugely profitable. Wei later died after receiving an ineffective experimental treatment, though not before complaining loudly about how he was misled.”

The resulting PR nightmare forced Baidu to clean up its digital act.  This example outlines one of the many differences between US and Chinese business ethics.  On average the US probably has more educated consumers than China, who will call out companies when they notice ethical violations.  While it is true US companies are willing to compromise ethics for a buck, at least once they are caught they cannot avoid the windfall.  China on the other hand, does what it wants when it wants.

 

Whitney Grace, July 28, 2016
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

China Reportedly Planning Its Own Precrime System

May 25, 2016

Some of us consider the movie Minority Report to be a cautionary tale, but apparently the Chinese government sees it as more of good suggestion. According to eTeknix, that country seems to be planning a crime-prediction unit similar to the one in the movie, except this one will use algorithms  instead of psychics. We learn about the initiative from the brief write-up, “China Creating ‘Precrime’ System.” Writer Gareth Andrews informs us:

“The movie Minority Report posed an interesting question to people: if you knew that someone was going to commit a crime, would you be able to charge them for it before it even happens? If we knew you were going to pirate a video game when it goes online, does that mean we can charge you for stealing the game before you’ve even done it?

“China is looking to do just that by creating a ‘unified information environment’ where every piece of information about you would tell the authorities just what you normally do. Decide you want to something today and it could be an indication that you are about to commit or already have committed a criminal activity.

“With machine learning and artificial intelligence being at the core of the project, predicting your activities and finding something which ‘deviates from the norm’ can be difficult for even a person to figure out. When the new system goes live, being flagged up to the authorities would be as simple as making a few purchases online….”

Indeed. Today’s tech is being used to gradually erode privacy rights around the world, all in the name of security. There is a scene in that Minority Report that has stuck with me: Citizens in an apartment building are shown pausing their activities to passively accept the intrusion of spider-like spy-bots into their homes, upon their very faces even, then resuming where they left off as if such an incursion were perfectly normal. If we do not pay attention, one day it may become so.

 

Cynthia Murrell, May 25, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Developing Nations Eager to Practice Cyber Surveillance

April 28, 2016

Is it any surprise that emerging nations want in on the ability to spy on their citizens? That’s what all the cool governments are doing, after all. Indian Strategic Studies reports, “Even Developing Nations Want Cyber Spying Capabilities.” Writer Emilio Iasiello sets the stage—he contrasts efforts by developed nations to establish restrictions versus developing countries’ increased interest in cyber espionage tools.

On one hand, we could take heart from statements like this letter and this summary from the UN, and the “cyber sanctions” authority the U.S. Department of Treasury can now wield against foreign cyber attackers. At the same time, we may uneasily observe the growing popularity of FinFisher, a site which sells spyware to governments and law enforcement agencies. A data breach against FinFisher’s parent company, Gamma International, revealed the site’s customer list. Notable client governments include Bangladesh, Kenya, Macedonia, and Paraguay. Iasiello writes:

“While these states may not use these capabilities in order to conduct cyber espionage, some of the governments exposed in the data breach are those that Reporters without Borders have identified as ‘Enemies of the Internet’ for their penchant for censorship, information control, surveillance, and enforcing draconian legislation to curb free speech. National security is the reason many of these governments provide in ratcheting up authoritarian practices, particularly against online activities. Indeed, even France, which is typically associated with liberalism, has implemented strict laws fringing on human rights. In December 2013, the Military Programming Law empowered authorities to surveil phone and Internet communications without having to obtain legal permission. After the recent terrorist attacks in Paris, French law enforcement wants to add addendums to a proposed law that blocks the use of the TOR anonymity network, as well as forbids the provision of free Wi-Fi during states of emergency. To put it in context, China, one of the more aggressive state actors monitoring Internet activity, blocks TOR as well for its own security interests.”

The article compares governments’ cyber spying and other bad online behavior to Pandora’s box. Are resolutions against such practices too little too late?

 

Cynthia Murrell, April 28, 2016

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

New and Improved Hacker Methods in China

December 30, 2015

We learn from an article at Yahoo News that, “On China’s Fringes, Cyber Spies Raise Their Game.” Reporters Clare Baldwin, James Pomfret, and Jeremy Wagstaff report that hackers backed by China are using some unique methods, according to Western security experts. Search is but a tiny part of this approach but, perhaps not surprisingly, cloud storage is a factor. The article relates:

“Hackers have expanded their attacks to parking malware on popular file-sharing services including Dropbox and Google Drive to trap victims into downloading infected files and compromising sensitive information. They also use more sophisticated tactics, honing in on specific targets through so-called ‘white lists’ that only infect certain visitors to compromised websites. Security experts say such techniques are only used by sophisticated hackers from China and Russia, usually for surveillance and information extraction. The level of hacking is a sign, they say, of how important China views Hong Kong, where 79 days of protests late last year brought parts of the territory, a major regional financial hub, to a standstill. The scale of the protests raised concerns in Beijing about political unrest on China’s periphery. ‘We’re the most co-ordinated opposition group on Chinese soil, (and) have a reasonable assumption that Beijing is behind the hacking,’ said Lam Cheuk-ting, chief executive of Hong Kong’s Democratic Party, which says it has been a victim of cyber attacks on its website and some members’ email accounts.”

Officially, China’s Defense Ministry denies any connection to the attacks, but that is nothing new. The adaptation of new hacking techniques is part of a continuing cycle; as journalists, scholars, and activists improve their security, hackers adapt. See the article for specifics on some attacks attributed to China-backed hackers, as well as some ways activists are trying to stay ahead.

Cynthia Murrell, December 30, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Google Play Serves as Make Up Letter from Google to China

September 18, 2015

The article titled Google’s Return to China Won’t Be Easy on VentureBeat discusses Google’s ambitions to revisit China with the help of Google Play, its Android mobile operating system app store. If you don’t remember, about five years ago Google refused to self-censor search results and pulled its services from China to boot. But Google can’t help looking longingly over its shoulder at the world’s largest Internet market. The article explains,

“Apple Inc complies with local laws and made $13.2 billion last quarter in Greater China…, making it its second-biggest market. Some in the industry doubt whether Google can use the Play store to help get its other services into China as domestic rivals are now well established and Google would have to comply with Chinese law. That would mean storing all data in China, and meeting information access and censorship requests, a thorny issue, particularly if the U.S. government gets involved.”

Obviously, China did not heed Google’s advice on reforming its approach to business and government oversight. Some argue that the focus on Google Play may make the movement toward China less threatening to Chinese regulators than their other services like search and Gmail. The article suggests the possibility that the lapse in Google’s presence in the market may be fatal to them there. The niche market has been working just fine, thank you very much, many mobile players believe. At any rate, Google’s hopes are a long shot unless they are willing to do it the Chinese way.

Chelsea Kerwin, September 18, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Chinese Opinion Monitoring Software by Knowlesys

August 18, 2015

Ever wonder what tools the Chinese government uses to keep track of those pesky opinions voiced by its citizens? If so, take a look at “IPOMS : Chinese Internet Public Opinion Monitoring System” at Revolution News. The brief write-up tells us about a software company, Knowlesys, reportedly supplying such software to China (among other clients). Reporter and Revolution News founder Jennifer Baker tells us:

“Knowlesys’ system can collect web pages with some certain key words from Internet news, topics on forum and BBS, and then cluster these web pages according to different ‘event’ groups. Furthermore, this system provides the function of automatically tracking the progress of one event. With this system, supervisors can know what is exactly happening and what has happened from different views, which can improve their work efficiency a lot. Most of time, the supervisor is the government, the evil government. sometimes a company uses the system to collect information for its products. IPOMS is composed of web crawler, html parser and topic detection and tracking tool.”

The piece includes a diagram that lays out the software’s process, from extraction to analysis to presentation (though the specifics are pretty standard to anyone familiar with data analysis in general). Data monitoring and mining firm Knowlesys was founded in 2003. The company has offices in Hong Kong and a development center in Schenzhen, China.

Cynthia Murrell, August 18, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Monkeys Cause System Failure

July 28, 2015

Nobody likes to talk about his or her failures.  Admitting to failure proves that you failed at a task in the past and it is a big blow to the ego.  Failure admission is even worse for technology companies, because users want to believe technology is flawless.  On Microsoft’s Azure Blog, Heather Nakama posted “Inside Azure Search: Chaos Engineering” and she explains that software engineers are aware that failure is unavoidable.  Rather than trying to prevent failure, they welcome potential failure.  Why?  It allows them to test software and systems to prevent problems before they develop.

Nakama mentions it is not a sustainable model to account for every potential failure and to test the system every time it is upgraded.  Azure Search borrowed chaos engineering from Netflix to resolve the issue and it is run by a bunch of digital monkeys

“As coined by Netflix in a recent excellent blog post, chaos engineering is the practice of building infrastructure to enable controlled automated fault injection into a distributed system.  To accomplish this, Netflix has created the Netflix Simian Army with a collection of tools (dubbed “monkeys”) that inject failures into customer services.”

Netflix basically unleashes a Search Chaos Monkey into its system to wreck havoc, then Netflix learns about system weaknesses and repairs accordingly.  There are several chaos levels: high, medium, and low, with each resulting in more possible damage.  At each level, Search Chaos Monkey is given more destructive tools to “play” around with.  The high levels are the most valuable to software engineers, because it demonstrates the largest and worst diagnostic failures.

While letting a bull loose in a china shop is bad, because you lose your merchandise, letting a bunch of digital monkeys loose in a computer system is actually beneficial.  It remains true that you can learn from failure.  I just hope that the digital monkeys do not have digital dung.

Whitney Grace, July 28, 2015

Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

 

HP Sales Are Slow, But CEO Says Progress

June 24, 2015

According to Computer Weekly, “HP CEO Hails Business Split Progress Amid Downbeat Q2 Revenue Slumps.”  HP’s Enterprise Service has the worst revenue reports for the quarter along with several more of its business units with a seven percent net loss.  The Enterprise Service saw a sixteen percent loss.

Ironically, the company’s stock rose 1 percent, mostly due to HP expanding into China due to a new partnership with Tsinghua University.  The joint venture will focus on developing HP’s H3C’s technology and its China-based server business, supposedly it will have huge implications on the Chinese technology market.

Another piece of news is that HP will split up:

“[CEO Meg ] Whitman also spoke in favour of the progress the company is making with its plans to separate into two publicly traded business entities: one comprised of its consumer PC and printing operations, and the other focused on enterprise hardware, software and services.

The past six months have reinforced Whitman’s conviction that this is the right path for the company to take, and the split is still on course to occur before the end of the firm’s financial year.”

The company wants to increase its revenue, but it needs to cut gross costs across the board.  HP is confidant that it will work.  Sales will continue to be slow for 2015, but they can still do investment banking things at HP.

Whitney Grace, June 24, 2015
Sponsored by ArnoldIT.com, publisher of the CyberOSINT monograph

Next Page »

  • Archives

  • Recent Posts

  • Meta