China to Crack Down on Computer Hackers

By

China prosecutors are cracking down on computer hackers by imposing stiffer policies for those caught doing it, according to state media, citing an official statement from the Supreme People’s Court (SPC) and Supreme People’s Procuratorate (SPP).

According to China’s Xinhua news agency, on Monday the two groups “jointly issued a legal interpretation that aims to fight hacking and other Internet crimes more aggressively.”

China is one of the countries most affected by hacking and cyber crimes, according to the joint statement, which said “a crime endangering information network security poses a threat not only to network security but also to national security and public interests.”

As of new rules that will take effect Sept. 1, people who “knowingly purchase, sell or cover-up illegally obtained data or network control will be subject to criminal penalties,” the official cited a statement as saying.

In 2009, more than 42,000 Chinese websites were “distorted” by hackers, Xinhua said.

“Such activities have become increasingly unrestrained, even giving rise to large online transaction platforms. Penalizing these violations helps sever the profit chain of hacking and other related crimes,” according to the statement.

Almost half of the nearly 500,000 cyberattacks aimed at computers in China in 2010 originated overseas, according to government officials who reportedly said the vast majority of the attacks a Chinese monitoring agency reported were in the form of Trojan horse malware that installs on computers, TechZone recently reported.

More than 1 million IP addresses in China were controlled from overseas in 2009, 42,000 websites were distorted by hackers, and 18 million Chinese computers have been infected by the Conficker virus every month, or about 30 percent of computers infected globally, the statement says, citing previous research.

Statistics from the Ministry of Public Security show that the number of viruses circulating on the Internet has surged 80 percent year-on-year in the past five years, Xinhua said.

Want to learn more about the latest in communications and technology? Then be sure to attend ITEXPO West 2011, taking place Sept. 13-15, 2011, in Austin, Texas. ITEXPO offers an educational program to help corporate decision makers select the right IP-based voice, video, fax and unified communications solutions to improve their operations. It's also where service providers learn how to profitably roll out the services their subscribers are clamoring for – and where resellers can learn about new growth opportunities. To register, click here.



Erin Harrison is Executive Editor, Strategic Initiatives, for TMC, where she oversees the company's strategic editorial initiatives, including the launch of several new print and online initiatives. She plays an active role in the print publications and TechZone360, covering IP communications, information technology and other related topics. To read more of Erin's articles, please visit her columnist page.

Edited by Jennifer Russell

Executive Editor, Strategic Initiatives

SHARE THIS ARTICLE
Related Articles

Coding and Invention Made Fun

By: Special Guest    10/12/2018

SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…

Read More

Facebook Marketplace Now Leverages AI

By: Paula Bernier    10/3/2018

Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …

Read More

Oct. 17 Webinar to Address Apache Spark Benefits, Tools

By: Paula Bernier    10/2/2018

In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…

Read More

It's Black and White: Cybercriminals Are Spending 10x More Than Enterprises to Control, Disrupt and Steal

By: Cynthia S. Artin    9/26/2018

In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…

Read More

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More