Affichage des articles dont le libellé est Guangzhou. Afficher tous les articles
Affichage des articles dont le libellé est Guangzhou. Afficher tous les articles

mardi 7 mai 2019

How Chinese Spies Got the N.S.A.’s Hacking Tools, and Used Them for Attacks

By Nicole Perlroth, David E. Sanger and Scott Shane

The server room at Symantec in Culver City, Calif. The company provided the first evidence that Chinese state-sponsored hackers had acquired some of the National Security Agency’s cybertools before other hackers.

Chinese intelligence agents acquired National Security Agency hacking tools and repurposed them in 2016 to attack American allies and private companies in Europe and Asia, a leading cybersecurity firm has discovered. 
The episode is the latest evidence that the United States has lost control of key parts of its cybersecurity arsenal.
Based on the timing of the attacks and clues in the computer code, researchers with the firm Symantec believe the Chinese did not steal the code but captured it from an N.S.A. attack on their own computers — like a gunslinger who grabs an enemy’s rifle and starts blasting away.
The Chinese action shows how proliferating cyberconflict is creating a digital wild West with few rules or certainties, and how difficult it is for the United States to keep track of the malware it uses to break into foreign networks and attack adversaries’ infrastructure.
The losses have touched off a debate within the intelligence community over whether the United States should continue to develop some of the world’s most high-tech, stealthy cyberweapons if it is unable to keep them under lock and key.
The Chinese hacking group that co-opted the N.S.A.’s tools is considered by the agency’s analysts to be among the most dangerous Chinese contractors it tracks, according to a classified agency memo reviewed by The New York Times. 
The group is responsible for numerous attacks on some of the most sensitive defense targets inside the United States, including space, satellite and nuclear propulsion technology makers.
Now, Symantec’s discovery, unveiled on Monday, suggests that the same Chinese hackers the agency has trailed for more than a decade have turned the tables on the agency.
Some of the same N.S.A. hacking tools acquired by the Chinese were later dumped on the internet by a still-unidentified group that calls itself the Shadow Brokers and used by Russia and North Korea in devastating global attacks, although there appears to be no connection between China’s acquisition of the American cyberweapons and the Shadow Brokers’ later revelations.
But Symantec’s discovery provides the first evidence that Chinese state-sponsored hackers acquired some of the tools months before the Shadow Brokers first appeared on the internet in August 2016.
Repeatedly over the past decade, American intelligence agencies have had their hacking tools and details about highly classified cybersecurity programs resurface in the hands of other nations or criminal groups.
The N.S.A. used sophisticated malware to destroy Iran’s nuclear centrifuges — and then saw the same code proliferate around the world, doing damage to random targets, including American business giants like Chevron. 
Details of secret American cybersecurity programs were disclosed to journalists by Edward J. Snowden, a former N.S.A. contractor now living in exile in Moscow. 
A collection of C.I.A. cyberweapons, leaked by an insider, was posted on WikiLeaks.
We’ve learned that you cannot guarantee your tools will not get leaked and used against you and your allies,” said Eric Chien, a security director at Symantec.
Now that nation-state cyberweapons have been leaked, hacked and repurposed by American adversaries, Mr. Chien added, it is high time that nation states “bake that into” their analysis of the risk of using cyberweapons — and the very real possibility they will be reassembled and shot back at the United States or its allies.
In the latest case, Symantec researchers are not certain exactly how the Chinese obtained the American-developed code. 
But they know that Chinese intelligence contractors used the repurposed American tools to carry out cyberintrusions in at least five countries: Belgium, Luxembourg, Vietnam, the Philippines and Hong Kong. 
The targets included scientific research organizations, educational institutions and the computer networks of at least one American government ally.
One attack on a major telecommunications network may have given Chinese intelligence officers access to hundreds of thousands or millions of private communications, Symantec said.
Symantec did not explicitly name China in its research. 
Instead, it identified the attackers as the Buckeye group, Symantec’s own term for hackers that the Department of Justice and several other cybersecurity firms have identified as a Chinese Ministry of State Security contractor operating out of Guangzhou.
Because cybersecurity companies operate globally, they often concoct their own nicknames for government intelligence agencies to avoid offending any government; Symantec and other firms refer to N.S.A. hackers as the Equation group. 
Buckeye is also referred to as APT3, for Advanced Persistent Threat, and other names.
In 2017, the Justice Department announced the indictment of three Chinese hackers in the group Symantec calls Buckeye. 
While prosecutors did not assert that the three were working on behalf of the Chinese government, independent researchers and the classified N.S.A. memo that was reviewed by The Times made clear the group contracted with the Ministry of State Security and had carried out sophisticated attacks on the United States.
A Pentagon report about Chinese military competition, issued last week, describes Beijing as among the most skilled and persistent players in military, intelligence and commercial cyberoperations, seeking “to degrade core U.S. operational and technological advantages.”
In this case, however, the Chinese simply seem to have spotted an American cyberintrusion and snatched the code, often developed at huge expense to American taxpayers.
Symantec discovered that as early as March 2016, the Chinese hackers were using tweaked versions of two N.S.A. tools, called Eternal Synergy and Double Pulsar, in their attacks. 
Months later, in August 2016, the Shadow Brokers released their first samples of stolen N.S.A. tools, followed by their April 2017 internet dump of its entire collection of N.S.A. exploits.
Symantec researchers noted that there were many previous instances in which malware discovered by cybersecurity researchers was released publicly on the internet and subsequently grabbed by spy agencies or criminals and used for attacks. 
But they did not know of a precedent for the Chinese actions in this case — covertly capturing computer code used in an attack, then co-opting it and turning it against new targets.
“This is the first time we’ve seen a case — that people have long referenced in theory — of a group recovering unknown vulnerabilities and exploits used against them, and then using these exploits to attack others,” Mr. Chien said.
The Chinese appear not to have turned the weapons back against the United States, for two possible reasons, Symantec researchers said. 
They might assume Americans have developed defenses against their own weapons, and they might not want to reveal to the United States that they had stolen American tools.
For American intelligence agencies, Symantec’s discovery presents a kind of worst-case scenario that United States officials have said they try to avoid using a White House program known as the Vulnerabilities Equities Process.
Under that process, started in the Obama administration, a White House cybersecurity coordinator and representatives from various government agencies weigh the trade-offs of keeping the American stockpile of undisclosed vulnerabilities secret. 
Representatives debate the stockpiling of those vulnerabilities for intelligence gathering or military use against the very real risk that they could be discovered by an adversary like the Chinese and used to hack Americans.
The Shadow Brokers’ release of the N.S.A.’s most highly coveted hacking tools in 2016 and 2017 forced the agency to turn over its arsenal of software vulnerabilities to Microsoft for patching and to shut down some of the N.S.A.’s most sensitive counterterrorism operations, two former N.S.A. employees said.
The N.S.A.’s tools were picked up by North Korean and Russian hackers and used for attacks that crippled the British health care system, shut down operations at the shipping corporation Maersk and cut short critical supplies of a vaccine manufactured by Merck. 
In Ukraine, the Russian attacks paralyzed critical Ukrainian services, including the airport, Postal Service, gas stations and A.T.M.s.
“None of the decisions that go into the process are risk free. That’s just not the nature of how these things work,” said Michael Daniel, the president of the Cyber Threat Alliance, who previously was cybersecurity coordinator for the Obama administration. 
“But this clearly reinforces the need to have a thoughtful process that involves lots of different equities and is updated frequently.”
Beyond the nation’s intelligence services, the process involves agencies like the Department of Health and Human Services and the Treasury Department that want to ensure N.S.A. vulnerabilities will not be discovered by adversaries or criminals and turned back on American infrastructure, like hospitals and banks, or interests abroad.
That is exactly what appears to have happened in Symantec’s recent discovery, Mr. Chien said. 
In the future, he said, American officials will need to factor in the real likelihood that their own tools will boomerang back on American targets or allies. 
An N.S.A. spokeswoman said the agency had no immediate comment on the Symantec report.
One other element of Symantec’s discovery troubled Mr. Chien. 
He noted that even though the Buckeye group went dark after the Justice Department indictment of three of its members in 2017, the N.S.A.’s repurposed tools continued to be used in attacks in Europe and Asia through last September.
“Is it still Buckeye?” Mr. Chien asked. 
“Or did they give these tools to another group to use? That is a mystery. People come and go. Clearly the tools live on.”

mercredi 6 mars 2019

Megacities: A guide to China's most impressive urban centers

By Maggie Hiufu Wong







With a population of 1.3 billion people and rising, China unsurprisingly boasts the world's highest number of megacities.
So what qualifies as a megacity? 
Most commonly, it's defined as an urban agglomeration of 10 million or more inhabitants.
That's the equivalent of the population of Sweden.
According to the United Nations' data booklet, China has six of the world's 33 megacities
The China Statistic Yearbook, however, indicates that there are at least 10 cities with more than 10 million permanent residents.
It's worth noting that population data is tricky to produce in China
One reason is the sustained wave of migrant workers moving from rural to urban areas. 
Millions make the switch every year, often without securing the proper household registration, or "hukou."
(Populations listed in this article are the most recent figures released by each provincial government.)
These cities are often some of the country's biggest tourist destinations, too.
"Being a megacity means more business and population, which will certainly increase the exposure of the city in international media," Mimi Li, an associate professor in China Tourism at the Hong Kong Polytechnic University, tells CNN Travel.
"Cities with long history such as Beijing, Shanghai and Guangzhou benefit from positive brand image and a wealth of cultural attractions. A newly developed vibrant city may bring in business travelers, with Shenzhen as a good example.
"Now that the tourism industry has been seen as a strategic pillar in the national economy of China, we foresee a closer relationship between city development and tourism development," says Li.
Li highlights Hangzhou and Chengdu as up-and-coming tourism hotspots in China.
"Hangzhou would mainly benefit from, in addition to the cultural resources, its vibrant business environment and innovative atmosphere," says Li.
"Chengdu has been long perceived as a leisure city by Chinese domestic tourists. In addition, Chengdu benefits from its vast tourism resources."
Indeed, there's so much more to these cities than just high populations.
Covering everything from exciting tourism developments and financial prowess to geographical grandness, CNN Travel looks beyond the figures to highlight 14 humongous cities -- including China's big six listed by the UN -- that boggle the mind and spark wanderlust among fans of urban spaces.

1. Chongqing

Dubbed an engineering marvel, the highly anticipated Raffles City Chongqing project is nearly complete.

Population: 30.75 million
Area: 82,300 square kilometers
With a staggering population of over 30 million people, Chongqing -- spanning 82,300 square kilometers in China's mid-western region -- is the country's biggest city by far.
To put that into perspective, Canada has a population of 36 million and Austria comprises an area of 83,879 square kilometers.
A municipality with nine urban districts, Chongqing is referred to by some as the world's most populous city -- depending on whether you count Tokyo as Greater Tokyo Area (around 38 million people) or Tokyo Metropolis only (13 million people).
Bear in mind, others scoff at claims that this city is as big as the government claims given the outer limits of Chongqing are filled with farming and mining communities that feel more like villages than urban centers.
Nonetheless, the city is starting to appeal to travelers, too. 
Chongqing was named the world's fastest-growing tourism city according to the World Travel and Tourism Council in 2017.
Chongqing is known for its tongue-numbing chili pepper hotpot -- there are about 30,000 hotpot restaurants in the city -- and a recently renovated Yangtze River Cableway across the river.
A number of large-scale tourism projects are planned for the next few years in Chongqing including a Six Flags theme park.

2. Shanghai
Shanghai might not be China's biggest city, but it's certainly its richest.

Population: 24.18 million
Area: 6,340 square kilometers
While Shanghai's size and population -- 6,340 square kilometers and more than 24 million people (making it the second most populous city in China) -- are already impressive, nothing trumps its financial prowess.
With a GDP of more than RMB 3 trillion (or US$448 billion), Shanghai is the richest city in China.
Its residents are also the country's biggest spenders, with the city amassing RMB 1.1 trillion (US$164.1 billion) total retail sales on consumer goods in 2017.
The Port of Shanghai has been the busiest container port in the world since 2010 -- handling more than 40 million TEUs (twenty-foot equivalent units) a year.
In comparison, Singapore, ranked second, handled about seven million fewer TEUs in 2017.
Shanghai is as famous for its futuristic skyscrapers -- the movie "Her" was partly shot in Shanghai -- as its glamorous historical architecture in The Bund and Yuyuan Garden.

3. Beijing
Population: 21.71 million
Area: 16,808 square kilometers
Being the political, historical and cultural heart of China, Beijing is unsurprisingly one of the country's biggest cities.
Serving as the ancient capital in various dynasties, Beijing has been an influential epicenter of China for the past 3,000 years.
It's home to seven UNESCO World Heritage sites -- the most in China, including the Forbidden City, which welcomed 17 million visitors in 2018.
The number easily rivals the number of international tourists for entire countries.
About 21 million people call Beijing home, making it the third most populous city in China.

4. Chengdu
Population: 16.33 million
Area: 12,132 square kilometers
The hometown of pandas and spicy hotpots (its biggest hotpot rival Chongqing will probably object), Chengdu is one of the biggest rising stars in China.
Chengdu has a sizable human population of more than 16 million, but its most popular residents have to be its furry black-and-white residents.
Being home to the world's biggest panda nursery, Chengdu successfully bred 42 of the 45 surviving panda babies in 2018.
Chengdu received 210 million visitors and raked in RMB 303.8 billion ($45 billion) in tourism revenue in 2017, contributing to 34% of Sichuan province's entire income.

5. Harbin
Population: 16.33 million
Area: 12,132 square kilometers
Harbin is a unique Chinese megacity thanks to its supersized winter infrastructure and Russia-influenced architecture (it's just a short distance to the border).
In addition to hosting the world's biggest Ice and Snow Festival, Harbin boasts the world's largest indoor ski park, which is inside the Wanda Harbin Mall (including six ski slopes up to 500 meters long).
Dubbed the Ice City, Harbin endures severe long winters, with temperatures as low as -38°C and a snow season that can last up to half a year.
To warm up the residents, the city also has the world's largest water park -- the 300,000-square-meter (twice the size of the Forbidden City) Poseidon Beach Water World -- with a tropical indoor beach temperature of 30C.

6. Guangzhou
Guangzhou has been a major trading port since the 6th century.

Population: 14.49 million
Area: 7,434 square kilometers
Unlike its Canton-rival Shenzhen, Gangzhou's success story dates back hundreds of years.
A major trading port along the historical maritime Silk Roads as early as the sixth century, Guangzhou is one of the richest cities in China for centuries.
In 2017, it contributed to RMB 2 trillion GDP (or US$297 billion) to the country -- just behind Shanghai, Beijing and Shenzhen.
For tourists, major highlights include the Guangdong Science Center -- the world's largest.
Spanning 450,000 square meters with eight themed exhibition areas, Guangdong Science Center is the Disneyland for STEM-addicted parents and kids.

7. Tianjin
Population: 15.57 million
Area: 11,760 square kilometers
One of the only four municipality-level cities in China, the humble historic seaside city of Tianjin has long been overshadowed by its neighboring capital city Beijing, its glamorous southern counterpart Shanghai and even rapidly rising star Chongqing.
But that doesn't make it less attractive to Chinese citizens.
Tianjin has attracted a population of over 15 million people and a GDP of about RMB1.8 trillion per year.
In recent years, Tianjin has been working to build its tourism and high-tech industries by building a Binhai New Area, where a stunning futuristic seaside library is located.
A high-speed railway route has been built to connect Tianjin to Beijing, shortening the commute to only 30 minutes.

8. Shenzhen

A China Mobile survey carried out in 2017 estimated that around 25 million people live in Shenzhen.

Population: 11.9 million
Area: 2,050 square kilometers
Transforming from a rural village to one of the world's biggest metropolises in just three decades, Shenzhen is an urban Cinderella tale -- and its fairy godfather is China's former leader, Deng Xiaoping.
Being appointed the country's first "special economic zone" by Deng in 1980, Shenzhen hasn't stopped thriving ever since.
Among the 143 buildings completed around the globe in 2018, about 10% of them were built in Shenzhen.
It also has the world's fourth tallest building, the Ping An Finance Centre.
While the official figure claims Shenzhen has around 12 million residents, a China Mobile 2017 survey found that around 25 million people treat Shenzhen as home.
Visiting is easy -- it's just over the border from Hong Kong connected by multiple trains and buses -- including a new bullet train. (Though bear in mind you'll likely need a visa.)

9. Wuhan

Thanks to its central location, Wuhan is one of the biggest transportation hubs in China.

Population: 10.89 million
Area: 8,494 square kilometers
Another megacity in China (with a population of just over 10 million people), Wuhan is the biggest city in the country's central region.
Thanks to its location, Wuhan is one of the biggest transportation hubs in China and its busiest connecting railway hub.
It's home to two humongous lakes -- the 47.6-square-kilometer Tangxun Lake (largest lake enclosed by a city in Asia) and the 33-square-kilometer East Lake.
Wuhan is one of the fastest growing/youngest second-tier cities in China.
It's been luring young graduates to stay in the city with a generous housing policy, offering young talent a 20% discount on rent or purchase of a flat.

10. Shijiazhuang
Population: 10.87 million
Area: 15,849 square kilometers
A relatively unfamiliar name on China's megacity list, Shijiazhuang is the provincial capital city of Hebei.
With about 10 million people living in Shijiazhuang now, it's difficult to imagine that in the early 20th century, Shijiazhuang was an unassuming village of a few hundred people.
It grew rapidly in the last 70 years when railroads were constructed in the area, making it an important transportation hub in the province.
It was designated the provincial capital in 1968.
The city is famous for its rich natural resources and neighboring scenery -- Shijiazhuang sits between the towering Taihang Mountains and the North China Plain.

11. Suzhou
Population: 10.68 million
Area: 8,488 square kilometers
In addition to having a population of between 9-10 million people and one of the highest GDP values in China, Suzhou has plenty of unbeatable attractions, too.
Located 100 kilometers west of Shanghai, Suzhou features some of the most exquisite ancient Chinese gardens in the country.
It's also one of the most historical cities in China, with a history that can be traced back to 2,500 years ago.
Suzhou also has the tallest planned skyscraper in China
Towering over the city at 729 meters, once complete it will be second in height, only surpassed by the 828-meter Khalifa Tower in Dubai.
Named Suzhou Zhongnan Center, the tower will be a multi-use project housing tourist attractions, a hotel, luxury residences and offices.
It's expected to be completed in 2021.

12. Hangzhou
Population: 9.8 million
Area: 16,847 square kilometers
According to Hurun Research Institute in 2019, a new unicorn company (a start-up with a company value of over $1 billion) is born about every four days in China, making the country the second largest breeding ground for unicorns in the world (The largest is still the United States).
With 18 unicorn companies, Hangzhou is the third biggest unicorn city by volume -- just after Beijing and Shanghai.
Hangzhou is also home to Alibaba, the e-commerce and tech giant, some of the most beautiful cityscapes, one of the best unknown Chinese cuisines.
West Lake, in the heart of the city, is one of the most romantic lakes in China and also the stage of an impressive Zhang Yimou-directed outdoor show Impression West Lake.
It's also known for producing some of the best silk and tea leaves in China.

13. Dongguan
One fifth of the world's mobile phones are made in Dongguan.

Population: 8.26 million
Area: 2,465 square kilometers
Dubbed the factory of the world, Dongguan has been flourishing thanks to its manufacturing industry.
To cite a few figures, over 70% of the world's computer motherboards, 75% of the world's toys, 20% of the world's smartphones and 10% of the world's shoes are made here.
The world's biggest shopping mall, New South China Mall -- once called a "ghost mall" for its high vacancy rate -- is also in Dongguan. 
The five-million-square feet mall (twice the size of Mall of America, the biggest shopping center in the United States) is now buzzing with activities.
The shopping mall has a giant Egyptian sphinx, a replica of the Arc de Triomphe and an indoor roller coaster.

14. Hulunbuir

Hulunbuir's Matryoshka Hotel claims to have the world's biggest matryoshka doll.

Population: 2.5 million
Area: 263,953 square kilometers
Hulunbuir may not have the population to even come close to being named a megacity, but the prefecture-level city in Inner Mongolia is China's largest city by size.
The total jurisdiction area under Hulunbuir measures 263,954 square kilometers -- just slightly smaller than the US state of Texas.
It constitutes about 20% of Inner Mongolia.
The city is basically one gigantic green carpet -- with about 80,000 square kilometers of grasslands and 120,000 square kilometers of woodland.

mercredi 10 octobre 2018

New evidence of Chinese tampering with Supermicro hardware found in US telecoms company

A security expert has provided evidence that reveals how China’s intelligence services had ordered subcontractors to plant malicious chips in server motherboards
Bloomberg News

A major American telecommunications company discovered manipulated hardware from Super Micro Computer (Supermicro) in its network and removed it in August – fresh evidence of China tampering in critical technology components bound for the US, a security expert working for the company has said.
The expert, Yossi Appleboum, provided documents, analysis and other evidence of the discovery that detailed how China’s intelligence services had ordered subcontractors to plant malicious chips in Supermicro server motherboards over a two-year period ending in 2015.
Appleboum previously worked in the technology unit of the Israeli Army Intelligence Corps and is now co-chief executive officer of Sepio Systems in Gaithersburg, Maryland.
His firm specialises in hardware security and was hired to scan several large data centres belonging to the telecommunications company. 
The company is not being identified because of Appleboum’s nondisclosure agreement with the client.

Unusual communications from a Supermicro server and a subsequent physical inspection revealed an implant built into the server’s Ethernet connector, a component that’s used to attach network cables to the computer, Appleboum said. 
He said he has seen similar manipulations of different vendors’ computer hardware made by contractors in China, not just products from Supermicro.
Appleboum said his concern was that there are countless points in the supply chain in China where manipulations could be introduced, and deducing them can in many cases be impossible. 
“That’s the problem with the Chinese supply chain,” he said.
Headquartered in San Jose, California, Supermicro was founded in 1993 by Taiwanese-American Charles Liang
Bloomberg News first contacted Supermicro for comment on this story on Monday morning Eastern time and gave the company 24 hours to respond.
Supermicro said after a Bloomberg BusinessWeek report last week that it “strongly refutes” reports that servers it sold to customers contained malicious microchips. 
China’s embassy in Washington did not return a request for comment on Monday.
Chinese mole or Trojan horse: Charles Liang opened gates to Chinese intelligence services.

In response to the earlier Bloomberg BusinessWeek investigation, China’s Ministry of Foreign Affairs didn’t directly address questions about the manipulation of Supermicro servers but said supply chain security was “an issue of common concern”.
The more recent manipulation is different from the one described in the report last week, but it shares key characteristics: They’re both designed to give attackers invisible access to data on a computer network in which the server is installed, and the alterations were found to have been made at the factory as the motherboard was being produced by a Supermicro subcontractor in China.
Based on his inspection of the device, Appleboum determined that the telecoms company’s server was modified at the factory where it was manufactured. 
He said that he was told by Western intelligence contacts that the device was made at a Supermicro subcontractor factory in Guangzhou, a port city in southeastern China.
Guangzhou is 90 miles upstream from Shenzhen, called the “Silicon Valley of Hardware”, and home to giants such as Tencent Holdings and Huawei Technologies.
The tampered hardware was found in a facility that had large numbers of Supermicro servers, and the telecommunications company’s technicians couldn’t answer what kind of data was pulsing through the infected one, said Appleboum, who accompanied them for a visual inspection of the machine.

It’s not clear if the telecommunications company contacted the FBI about the discovery. 
An FBI spokeswoman declined to comment on whether it was aware of the finding.
Representatives for AT&T and Verizon had no immediate comment on whether the malicious component was found in one of their servers. 
T-Mobile US and Sprint didn’t immediately respond to requests for comment.
Sepio Systems’ board includes Chairman Tamir Pardo, former director of the Israeli Mossad, the national defence agency of Israel, and its advisory board includes Robert Bigman, former chief information security officer of the US Central Intelligence Agency.
US communications networks are an important target of Chinese intelligence agencies because data from millions of mobile phones, computers, and other devices pass through their systems. 
Hardware implants are key tools used to create covert openings into those networks, perform reconnaissance and hunt for corporate intellectual property or government secrets.
In emails, Appleboum and his team refer to the implant as their “old friend” because he said they had previously seen several variations in investigations of hardware made by other companies manufacturing in China.

In Bloomberg Businessweek’s report, one official said investigators found that the Chinese infiltration through Supermicro reached almost 30 companies, including Amazon and Apple.
People familiar with the federal investigation into the 2014-2015 attacks say that it is being led by the FBI’s cyber and counter-intelligence teams, and that the Homeland Security Department may not have been involved.
Counter-intelligence investigations are among the FBI’s most closely held, and few officials and agencies outside those units are briefed on the existence of those investigations.
Appleboum said that he had consulted intelligence agencies outside the US and that they told him they had been tracking the manipulation of Supermicro hardware, and the hardware of other companies, for some time.

mercredi 4 juillet 2018

U.S. Pulls More Casualties Out of Guangzhou and Beijing as Sonic Attacks Persist

At least three have been sent back to the U.S., believed to be the first affected in Beijing
By Te-Ping Chen

The U.S. embassy in Beijing. The three Americans sent home for medical reasons are thought to be the first in the Chinese capital to have been affected by so-called "health" attacks. 

BEIJING—The U.S. has evacuated at least three Americans from Beijing after they reported unusual health symptoms, in the latest evacuations since unexplained "health" incidents first affected U.S. diplomatic personnel stationed in Cuba in 2016.
In a U.S. Embassy meeting on Tuesday, staff were told that the latest people evacuated, as with previous cases, were sent for further medical evaluation to the University of Pennsylvania, a person familiar with the matter said.
The U.S. Embassy in Beijing didn’t immediately comment. 
At the embassy meeting, the affected individuals weren’t identified by name, and it wasn’t made clear whether they were diplomatic personnel or family members.
The latest cases are believed to be the first from Beijing. 
At least a dozen Americans have now been evacuated from China, the only other country besides Cuba where the unexplained health incidents are known to have struck U.S. government personnel.
Symptoms include headaches, sleep impairment and various cognitive issues; the State Department has said the cause is unclear and has described the incidents as “health attacks.”
To date, the State Department has reported one case of a U.S. government employee previously based in the southern Chinese city of Guangzhou who was confirmed to have suffered symptoms consistent with those of U.S. workers stationed in Havana.
The employee was evacuated earlier this spring, and more than half a dozen other evacuations of Americans connected to the Guangzhou consulate have followed for reasons that include unrelated medical issues discovered in the course of medical screenings, the person familiar with the situation said.
More than 280 U.S. diplomatic staff and family members have now undergone medical screenings in China, the person said.

mardi 3 juillet 2018

The Opium War and the Humiliation of China

By Ian Morris
A satirical cartoon of Lord Macartney kneeling before Emperor Qianlong and presenting his “gifts.”

IMPERIAL TWILIGHT
The Opium War and the End of China’s Last Golden Age

By Stephen R. Platt
Illustrated. 556 pp. Alfred A. Knopf. $35.

A century before its finest hour, the British Empire went through what may have been its darkest. After China declared a war on drugs in 1839, confiscating well over 1,000 tons of opium from dealers — mostly British — in Canton (modern Guangzhou), the cartels pressured their government back in London into demanding that Beijing repay them the full street value of their narcotics. 
When the emperor refused, a squadron of Britain’s most up-to-date warships arrived in 1840 to brush aside the Celestial Empire’s junks and blast its coastal towns into ruins. 
British troops slaughtered civilians up and down China’s coast. 
“Many most barbarous things occurred disgraceful to our men,” one officer confessed. 
Critics compared the opium trade to the recently banned slave trade. 
The London government almost fell. 
In China, the Opium War gradually came to be seen as the beginning of a century of humiliations at Western hands.
As the West’s entanglement with China has deepened since the 1990s, so too has fascination with the Opium War, and every China-watcher will want to read Stephen R. Platt’s fascinating and beautifully constructed new book. 
It is a worthy prequel to “Autumn in the Heavenly Kingdom,” his fine account of the Taiping Rebellion, which claimed an estimated 20 million Chinese lives between 1850 and 1864.
Unlike most accounts of the Opium War, “Imperial Twilight” focuses not on the conflict itself but on its background, going back to the Chinese decision in the 1750s to restrict Western trade to the single port of Canton. 
The usual highlights, like Lord Macartney’s trade embassy of 1793, are all here, but so too is a parade of less well-known but equally important episodes and a procession of gloriously eccentric characters. 
At one end, we have obsessive adventurers like Thomas Manning, who sneaked across the border from India into Tibet in 1811 armed with little more than a waist-length, jet-black beard and a dyspeptic Chinese interpreter — and yet managed to engineer an audience with the 6-year-old Dalai Lama
Manning was overwhelmed: “His beautiful mouth” was “perpetually unbending into a graceful smile... I could have wept through strangeness of sensation... I was absorbed in reflections when I got home.” 
At the other end are the red-in-tooth-and-claw British and American merchants in Canton who, forbidden to bring Western women with them, reverted to childhood, playing leapfrog at all hours of day and night.
Some of Platt’s villains, like the Scottish drug lords William Jardine and James Matheson, are worthy of soap opera. 
Others, Britain’s Prime Minister Lord Melbourne, for example, take the banality of evil to new depths. 
Worlds apart from Rufus Sewell’s urbane, ironic portrayal of Melbourne in the PBS television series “Victoria,” Platt’s Lord M unleashes the Opium War on China apparently with scarcely a second thought. 
There is pathos aplenty as Charles Elliot, the British superintendent of trade in Canton, falls apart under Chinese pressure in 1839, eventually beginning to doubt his own sanity. 
Good men do bad things, roads to hell are paved with good intentions and golden opportunities are missed. 
In short, “Imperial Twilight” is a ripping yarn.

And yet Platt’s story also has a thesis, even if he makes it explicit only in his final few pages. 
“It is important to remember just how arbitrary and unexpected the outcome of this era really was,” he says. 
The war was “not part of some long-term British imperial plan. … Neither did it result from some inevitable clash of civilizations.” 
Rather, “Imperial Twilight” is overflowing with individuals precisely because it is the individuals who drove everything. 
In the age-old debate over the historical roles of Very Important Persons and Vast Impersonal Forces, Platt comes down firmly on the side of the people.
“If Charles Elliot had not let his panic get the best of him when he so dramatically overreacted to Lin Zexu’s threats,” Platt speculates. 
“Or if Lin Zexu himself had been more open to working with, rather than against, Elliot; if they had cooperated on their shared interest in bringing the British opium smugglers under control. Or if just five members of the House of Commons had voted differently in the early hours of April 10, 1840 — we might be looking back on very different lessons from this era.” 
And just in case we misunderstand, Platt closes with a coda on the business relationship between the Chinese merchant Houqua and the American John Murray Forbes, which “had always been informal, based on trust and affection.” 
Everything could have been different — and better.
“Imperial Twilight” is a masterpiece of the “If Only” school of history, which holds out the tantalizing prospect of a world that, with the right choices, could be made perfect. 
Edmund Morgan’s magnificent “American Slavery, American Freedom” is a classic of this kind, insistently hinting that if a few people in 17th-century Virginia had chosen differently, the cancers of slavery and racism would not have entered America’s bloodstream. 
So too, in a different way, is Niall Ferguson’s “The Pity of War,” arguing that Britain could have avoided entering World War I — in which case there would have been a European war but not a global one, the British Empire would have survived, and fascism and Communism would never have taken off.
In the right hands, like Platt’s, this produces superb history, explaining why the actors acted as they did while also showing that they did not have to do so — and could in fact have made a better world. And yet too often one ends up feeling that the authors’ own narratives do not quite bear out their theory, and that the Very Important Persons’ choices are always constrained by Vast Impersonal Forces that they rarely understand, let alone control.
In this case, Britain’s industrial revolution was transforming the balance of global power in the early 19th century. 
It was not inevitable that Britons would use violence to exploit this, but the revolution constantly threw up situations where violence was an option. 
We might think of each crisis as a roll of the dice. 
In 1802, war between Britain and France almost spilled over into China. 
In 1808, British marines seized Macao, but withdrew peacefully. 
Tempers flared again in 1814, and in 1816 the H.M.S. Alceste fired on a Chinese fort, killing a reported 47 soldiers. 
None of these incidents had anything to do with opium, but in 1831 the drug dealers tried to provoke a war when Chinese officials trampled their shrub garden and insulted a portrait of King George IV.
It was not written in stone that Britain and China would get the particular war they did. 
Cooler heads could have prevailed in 1839, although by the same token, hotter heads could have prevailed at any time since 1802. 
And even if 1839 had passed off peacefully, crises would have just kept coming. 
British merchants would have kept pushing to open China (in the late 1850s, they did bring on a second war). 
Compromises would not have satisfied the Jardines and Mathesons, and the likelihood that no British government would ever have decided that violence was its least bad option seems vanishingly small.
Stephen Platt has written an enthralling account of the run-up to war between Britain and China during a century in which wealth and power were shifting inexorably from East to West. 
But if this history holds a lesson today — as wealth and power shift equally inexorably back from West to East — it is surely the same one that Karl Marx identified just a decade after the Opium War, that men make their own history, but they do not make it as they please.

vendredi 8 juin 2018

China's Sonic War

U.S. Consulate under Chinese sonic attacks: More U.S. casualties have been evacuated from Guangzhou
BY C. DANIELLE BIZIER 

More U.S. citizens have been evacuated from a U.S. consulate in Guangzhou, China, after suffering what appears to be the same strange, sound-related illness that afflicted consulate workers in Cuba. The New York Times reported that consulate worker Mark Lenzi and his wife heard strange noises over the course of several months before falling ill with what they described as neurological symptoms
On Wednesday night they were flown to the U.S. with their children, including a three-year-old son who was also affected.
Speaking to The Washington Post that same day, Lenzi described the sound as being like “marbles bouncing and hitting a floor then rolling on an incline with a static sound.” 
The Lenzis reached out to their neighbors to see if the sound was coming from their home but the neighbor denied it. 
Several months after the sounds began, the Lenzis began to develop migraine like headaches and suffer from sleep deprivation. 
Medical professionals at the consulate prescribed sleeping pills to help with the insomnia.
In May, Lenzi found out that the same neighbor had been evacuated after exhibiting the same symptoms. 
He was checked and diagnosed with a “mild traumatic brain injury,” the State Department said in a statement. 
That statement also said the government did not know of any other cases — which according to Lenzi, was a lie. 
He told The Washington Post that he he’d filed several reports with both the consulate and the State Department.
Lenzi also contends that his security clearance was frozen after he attempted to bring attention to the issue, effectively barring him from work at the consulate, and that he is now calling for the resignation of the U.S. ambassador to China, who is based in Beijing.
The New York Times is also reporting that a State Department medical team flew to Guangzhou and is performing tests on other employees and their family members — some 170 workers in total at the site, plus their family members.
If this case sound eerily familiar, it should. 
In 2016, 24 people — all embassy workers and their families there – suffered the same symptoms at the U.S. embassy in Havana, Cuba
Those symptoms included dizziness, headaches, tinnitus, fatigue, cognitive issues, visual problems, ear complaints and hearing loss, and difficulty sleeping, the State Department said at the time. 
Tests concluded that they had suffered injuries consistent with concussion or minor brain injury.
In the wake of the initial illnesses, speculation on the cause included the possibility of targeted sonic attacks that might cause such disruption. 
The U.S., blaming Havana, expelled Cuban dignitaries following the incident. 
Additional theories include bacterial poisoning, neurotoxins, and surveillance devices that emit disabling sounds.
On Tuesday, Secretary of State Mike Pompeo announced the launch of The Health Incidents Response Task Force, which had been created to respond to the unexplained ailments, including testing workers and families at the Guangzhou consulate. 
The task force’s role includes “identification and treatment of affected personnel and family members, investigation and risk mitigation, messaging, and diplomatic outreach.”
On May 24, Chinese foreign ministry spokesman Lu Kang said in a regular press briefing that China had investigated the initial May 16 case, but had not found a reason for the illness. 
The Russians have a history of using toxins against the foreign diplomatic corps, but the Chinese have stayed primarily in the lanes of active and aggressive surveillance. 
Some attachés tell stories of playing along with the status quo by asking aloud in their homes for help finding missing items such as car keys and glasses. 
They would leave the home after the request for a few moments and return to find the items placed conspicuously on their kitchen table. 
The Chinese have never been shy about making sure American diplomats knew they were under constant monitoring — though before now, the most aggressive tales involved State Department officials returning home to find someone had defected in their toilet and left it without flushing.
The potential sonic attacks we are now beginning to see are more reminiscent of Cold War era Soviet tactics — but perhaps par for the course of the ever-growing tensions.

jeudi 7 juin 2018

Chinese sonic attacks: More US diplomats fall ill in China

Consular employees sent home from Guangzhou for medical checks as Mike Pompeo sets up new investigation
By Lily Kuo and agencies

The US employees were working at a consulate in Guangzhou, China, when they reported symptoms previous linked to sonic attacks.

More US citizens have been evacuated from China, reviving concerns that American government personnel and their families may be the target of “sonic attacks” by China.
US state department officials said on Wednesday it had sent “a number of individuals” from its consulate in Guangzhou back to the US for “further evaluation and a comprehensive assessment of their symptoms”. 
Last month, a consulate worker in Guangzhou was found to have suffered a traumatic brain injury after reporting “abnormal sensations of sound and pressure” from late 2017 through to April 2018.
The department sent a team to Guangzhou in late May to examine other US staff and their families, and investigate possible links between their symptoms and those of US diplomats in Cuba last year, an incident that prompted Washington to pull its staff from the country and expel Cuban diplomats from the US.
The US secretary of state, Mike Pompeo, on Tuesday announced the formation of a task force to investigate unexplained health incidents among US government personnel and their families overseas.
The latest evacuation suggests what was previously described as an isolated case may turn into a wider diplomatic crisis, at a time when US-China ties are already at a low.
China’s foreign minister, Wang Yi, described the incident in May involving the US consulate worker as an “individual case”, and one Beijing hoped would not be “magnified, complicated or even politicised”.
When the US issued a health alert in May to US citizens in China to report any “unusual acute auditory or sensory phenomena”, it said it was not aware of other similar cases within or outside of the US diplomatic community in China.
That has been disputed by Mark Lenzi, a security engineering officer at the consulate in Guangzhou, who, according to the New York Times, was among the personnel evacuated on Wednesday.
Lenzi, who lived in the same complex as the consulate worker who suffered brain trauma, said he had been hearing sounds like “marbles bouncing and hitting a floor” since April last year. 
That was followed by excruciating headaches and sleeplessness, symptoms his family also experienced. 
When he brought his concerns to his superiors, he was prescribed painkillers.
Lenzi sent an email to staff of the consulate criticising the fact that the first employee was evacuated in April, but US citizens weren’t alerted until a month later. 
The health alert suggested it was a single case. 
“They knew full well it wasn’t,” he told the paper.
The US embassy in Beijing did not respond to requests for comment on Lenzi’s allegations, but sent the government’s statement from Wednesday.
“The state department has been and will continue to be diligent and transparent in its response to our employees’ concerns,” departmental spokesperson Heather Nauert said.

vendredi 25 mai 2018

China's Dirty Crimes: Sonic Experiments

US embassy worker's brain injury in China appears similar to those sustained by diplomats in Cuba 'sonic attacks'.
AL JAZEERA AND NEWS AGENCIES
Secretary of State Mike Pompeo said the US was moving medical teams to China over the 'sonic attack' 

US Secretary of State Mike Pompeo said a brain injury sustained by an American official in a "sonic attack" in China was similar to those that affected US and Canadian diplomats in Cuba.
Pompeo's remarks on Wednesday came hours after the US embassy in China issued a health warning to Americans living in the country an "unusual" auditory or sensory phenomena.
The embassy said a US government employee in the southern city of Guangzhou reported experiencing a "subtle and vague, but abnormal, sensations of sound and pressure", which led to a mild brain injury.
Pompeo told the House Foreign Affairs Committee the "sonic attack" in China was similar to the incidents in Cuba last year.
"The medical indications are very similar and entirely consistent with the medical indications that have taken place to Americans working in Cuba," he said.
The US was moving medical teams to the area to work on the case, he said.
"We are working to figure out what took place both in Havana and now in China as well," Pompeo said.
In Washington for talks with Pompeo, Chinese Foreign Minister Wang Yi said the US should avoid politicising the case.
"We don't want to see that this individual case would be magnified, complicated or even politicised," Wang told reporters.

'Variety of symptoms'
Heather Nauert, the state department spokeswoman, said the US embassy learned on Friday that the Guangzhou employee showed concussion symptoms after medical testing.
That is the same clinical finding doctors treating the Cuba patients at the University of Philadelphia found.
The Guangzhou worker started experiencing "a variety of symptoms" starting in late 2017 that lasted through April this year, Nauert said.
The worker was sent to the US for further evaluation, she added.
In Cuba last year, 24 diplomats and their family members were left with mysterious injuries resembling brain trauma, which were suspected of being caused by a "sonic attack".
Ten Canadian diplomats and their relatives also suffered similar illnesses.
The still-unexplained incidents sparked a rift in US-Cuban relations, while investigators have chased theories including a sonic attack, an electromagnetic weapon, or a flawed spying device.
Symptoms, sounds and sensations reportedly varied dramatically from person to person, according to The Associated Press.
Some have permanent hearing loss or concussions, while others suffered nausea, headaches and ear-ringing. 
Some struggle with concentration or common word recall.

mercredi 23 mai 2018

Chinese Aggressions

US warns staff in China: Beware of unusual sounds
BBC News
The affected staff member reportedly worked at the US consulate in Guangzhou

The US state department has urged its staff in China to alert them to any abnormal hearing or vision issues after one employee reported mystery symptoms.
The person experienced "subtle and vague, but abnormal, sensations of sound and pressure", a statement said.
Secretary of State Mike Pompeo said the incident was "medically similar" to suspected sonic attacks on diplomatic staff in Cuba.
China-US relations have been strained recently, amid fears of a trade war.
The state department said it was taking the incident "very seriously", but the US has not accused China of being behind it.

What happened in China?
Embassy spokeswoman Jinnie Lee said the employee had suffered a "variety of physical symptoms" between late 2017 and April 2018 while working at the US consulate in the city of Guangzhou.
The employee was sent back to the US, and on 18 May the embassy learnt that they had been diagnosed with mild traumatic brain injury (MTBI), Ms Lee added.
"We do not currently know what caused the reported symptoms and we are not aware of any similar situations in China, either inside or outside of the diplomatic community," the US diplomatic statement said.
"The US government is taking these reports seriously and has informed its official staff in China of this event," it said.
The statement continues with a warning: "While in China, if you experience any unusual acute auditory or sensory phenomena accompanied by unusual sounds or piercing noises, do not attempt to locate their source. Instead, move to a location where the sounds are not present."
Ms Lee said the Chinese government had given assurances that it was also investigating and taking appropriate measures.

Was this a sonic attack?
Parallels have been drawn with the suspected sonic attacks in Havana.
Mr Pompeo told the House of Representatives Foreign Affairs Committee: "The medical indications are very similar and entirely consistent with the medical indications that have taken place to Americans working in Cuba."
He added that medical teams were on their way to Guangzhou to investigate.
"We are working to figure out what took place, both in Havana and in now in China as well," Mr Pompeo said.
"We've asked the Chinese for their assistance in doing that and they have committed to honouring their commitments under the Vienna convention to keep American foreign service officers safe."
He added there was nothing so far to link the China incident directly to Cuba.
"We cannot at this time connect it with what happened in Havana but we are investigating all possibilities," a US embassy official in Beijing told AFP news agency on condition of anonymity.


Types of sonic weapon

Infrasound - below 20Hz

  • at frequencies too low for humans to hear
  • if very loud can cause vertigo, vomiting or uncontrollable defecation
  • would need huge racks of speakers to be effective

Ultrasound - above 20,000Hz
  • easier to target
  • possible to direct sound through walls
  • risk of affecting people other than those targeted, including person carrying out attack
What happened in Cuba?
In November 2016, US diplomats based in Cuba started to complain of odd ailments, including dizziness, nausea and hearing problems.
More than 20 members of staff in Havana were harmed in the "health attacks", according to the state department. 
At least two Canadians were also affected.
The US has held Cuba responsible, either for allowing the suspected attacks to happen or for carrying them out itself.