{"id":201195,"date":"2015-04-13T13:16:07","date_gmt":"2015-04-13T17:16:07","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/great-cannon-of-china-turns-internet-users-into-weapon-of-cyberwar.php"},"modified":"2015-04-13T13:16:07","modified_gmt":"2015-04-13T17:16:07","slug":"great-cannon-of-china-turns-internet-users-into-weapon-of-cyberwar","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/censorship\/great-cannon-of-china-turns-internet-users-into-weapon-of-cyberwar.php","title":{"rendered":"&#39;Great Cannon of China&#39; turns internet users into weapon of cyberwar"},"content":{"rendered":"<p><p>  A receptionist works behind the logo for Baidu.com, the Chinese  search engine whose customers were hijacked by the first firing  of the Great Cannon. Photograph: NG HAN GUAN\/AP<\/p>\n<p>    The Great Cannon has entered the cyberwar lexicon alongside    the Great Firewall of China after a new tool for censorship    in the nation was named and described by researchers from the    University of Toronto.  <\/p>\n<p>    The first use of the Great Cannon came in late March, when the    coding site GitHub was flooded by traffic leaving it    intermittently unresponsive for multiple days. The attack,    using a method called distributed denial of service or DDoS,    appeared to be targeting two specific users of the site: the    New York Times Chinese mirror, and anti-censorship    organisation GreatFire.org.  <\/p>\n<p>    Both users focus their efforts on allowing Chinese residents to    bypass the countrys Great Firewall  the system China uses to restrict access to parts of    the internet.  <\/p>\n<p>    The attack, which continued for almost two weeks, was observed    by researchers led by the University of Torontos Bill Marczak.    They concluded that it provides evidence of a new censorship    tool above and beyond the Great Firewall.  <\/p>\n<p>    While the attack infrastructure is co-located with the Great    Firewall, the attack was carried out by a separate offensive    system, with different capabilities and design, that we term    the Great Cannon, the researchers write.  <\/p>\n<p>    The Great Cannon is not simply an extension of the Great    Firewall, but a distinct attack tool that hijacks traffic to    (or presumably from) individual IP addresses, and can    arbitrarily replace unencrypted content as a    man-in-the-middle.  <\/p>\n<p>    Where the Great Firewall was a tool for largely passive    censorship  preventing access to material and providing the    Chinese state with the ability to spy on its residents  the    Great Cannon provides the ability to effectively rewrite the    internet on the fly.  <\/p>\n<p>    When used offensively, that ability can turn a normal internet    user into a vector of attack. In the case of the GitHub    attacks, the Great Cannon intercepted traffic sent to Baidu    infrastructure servers, web servers run by Chinas largest    search engine that host commonly used analytics, social, or    advertising scripts. Roughly 1.75% of the time it took that    traffic and returned a malicious script, unwittingly enlisting    the web surfer in the hacking campaign against GitHub. The    scripts were not complex, doing little more than sending    requests for content to GitHub; but the sheer quantity of users    affected proved difficult for the site to handle.  <\/p>\n<p>    The researchers conclude that the Great Cannon, like the Great    Firewall before it, is likely to be operated by the Chinese    government. Both systems appear to be hosted on the same    servers, and appear to share source code for intercepting    communications. As such, its operation points to a shift in    Chinese censorship tactics, and has a highly visible impact,    the research says. It is likely that this attack, with its    potential for political backlash, would require the approval of    high-level authorities within the Chinese government.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read more here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/feeds.theguardian.com\/c\/34708\/f\/663828\/s\/4557a082\/sc\/15\/l\/0L0Stheguardian0N0Ctechnology0C20A150Capr0C130Cgreat0Ecannon0Echina0Einternet0Eusers0Eweapon0Ecyberwar\/story01.htm\/RK=0\/RS=Pwz5.U9Ig9G5OAHLxxQnr7iPHvY-\" title=\"&#39;Great Cannon of China&#39; turns internet users into weapon of cyberwar\">&#39;Great Cannon of China&#39; turns internet users into weapon of cyberwar<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A receptionist works behind the logo for Baidu.com, the Chinese search engine whose customers were hijacked by the first firing of the Great Cannon.  <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/censorship\/great-cannon-of-china-turns-internet-users-into-weapon-of-cyberwar.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[388393],"tags":[],"class_list":["post-201195","post","type-post","status-publish","format-standard","hentry","category-censorship"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/201195"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=201195"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/201195\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=201195"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=201195"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=201195"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}