Login
Sign Up
Become an affiliate
  • Home
  • Cybercrime Video Gallery
  • Course Comparison
  • About IFCI
    • About IFCI
    • Board Of Directors
    • Testimonials
    • Frequently Asked Questions
    • Our Heritage - The IFCI Name
  • Courses & Certifications
  • Contact Us

Chinese Hacker Profiles

 

Rating :

 

Comments

 
  • nick
    nick at February 03,2016
    The point that strikes me about this video is how out of date the main stream media is in regard to cyber security. Even though this video is at least four years old, it was incredibly out of date at the time of publishing. Wan Tao and the China Eagle Union had been documented in Scott Henderson's "The Dark Visitor" as early as 2007 and furthermore in Xu Wu's book, "Chinese Cyber Nationalism: Evolution, Characteristics, and Implications." The main stream medias ability to stay relevant on cyber security must come into question. Secondly, Wan has been described as one of the early leaders of Chinese cyber nationalism and much of his alleged activity occurred in the 90s and early 2000s. Some of this activity, according to Wu, included early cyber wars with the United States, attacks against Indonesia and propaganda campaigns against Japan. It stretches credulity to think that this activity would not have come to the attention of the Chinese government and how it may affect Chinese government foreign policy. Although Wan claims his China Eagle Union received no support from the government in these activities, the Chinese governments lack of action would seem to imply tacit approval. It is difficult to believe that the Chinese government would allow such activity to transpire if it had the possibility of damaging the central governments's objectives, despite Wan's objectives that he could not have been stopped.
  • stadkal
    stadkal at February 03,2016
    Hackers are spread across the world. But there is a belief that the china has been encouraging many hackers to target the world, so as to increase the Cyber power of their nation as World now is completely living in the cyber world. There are numerous hacking groups out there which are based from china and comprising of Chinese individuals from all over the world. Learning the style of strategy they use might help us from preventing from an attack and if any attack has happened we can know who is behind it.
  • nbaker3
    nbaker3 at February 04,2016
    Very interesting video. The public view of hacking looks to be the complete opposite in China as it is in the United States. I believe this gives the Chinese a huge advantage to the Chinese because these hackers are publicly supported. There are not organizations trying to take down these hackers and the positive public view could motivate them to become better at what they do. In the United States this negative view of hackers really takes away from the want, for most people, to be a hacker and really takes away any motivation towards it, which may have set us back in the war on hacking.
  • fpazdzin
    fpazdzin at February 16,2016
    It was interesting to me that he said he didn’t feel sorry for hacking and planting viruses because it made him feel free. That he could do anything and change the world. We have rules in place to keep an order in our society but there’s always that little voice in the back of your head asking why you should follow those rules. A lot of times when you tell someone that they can’t do something or that something is impossible, that just drives them more to figure out how to do it. I guess it’s always been human nature to seek out and do the things that other people can’t do to get a sense of accomplishment and betterment.
  • danielm8
    danielm8 at March 04,2016
    I am not sure that China would actually let someone be interviewed about attacks on the United States or even let his face be shown. If China is letting him get interviewed, it will already be very old news.
    • «
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • »
Home
Course Comparison
About Us
FAQ
Testimonials
Courses & Professional Certifications
Contact Us
instagram
twitter
facebook
Copyright © 2014 cybercrimeinvestigators.com. All rights Reserved