[37296] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: black hat .cn networks

daemon@ATHENA.MIT.EDU (Shawn McMahon)
Tue May 8 17:06:02 2001

Date: Tue, 8 May 2001 15:21:43 -0400
From: Shawn McMahon <smcmahon@eiv.com>
To: nanog@merit.edu
Message-ID: <20010508152143.A26735@eiv.com>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-md5;
	protocol="application/pgp-signature"; boundary="IS0zKkzwUGydFO0o"
Content-Disposition: inline
In-Reply-To: <3AF81E72.C122B65@Globalone.net>; from Franklin.Lian@globalone.net on Tue, May 08, 2001 at 12:27:30PM -0400
Errors-To: owner-nanog-outgoing@merit.edu



--IS0zKkzwUGydFO0o
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Tue, May 08, 2001 at 12:27:30PM -0400, Franklin Lian wrote:
>=20
> that news couple of years ago both in English and Chinese.  The
> hacker actually was executed for stealing millions of dollars from
> a bank he used work for, NOT for HACKING.  According to Chinese law,
> any criminal commited to crime that evolves more than $100,000=20
> (the exact number might be wrong) can be sentenced to death.

I don't want to debate this here, because it's really far from topic,
but understand that the reason why American hackers portray that as
death for hacking is because it's so very easy to make nearly any
hacking fit that criterion.  Kevin Mitnick caused very limited physical
damages, but the courts accept that it was many millions of dollars in
intellectual property damages.  Leaving aside all questions of what
happened and how much the realistic amount is, the fact is that someone
facing a Chinese court for hacking can go in not knowing if they're
facing trial for a non-crime, or for a capital crime, with the final
decision on that being basically up to the informed whim of a judge.

That's scary.  Whether it's wrong or right (and I have a very strong
opinion on that, but it's not on topic here), it is scary.

So from a certain point of view, it's not a myth.


--IS0zKkzwUGydFO0o
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE6+EdHEcl9bQ0RMt0RAl8aAJ4ynIcJm7bdJnZwCiw4yFqBJRf3tgCgtIIJ
LbycboUlw9z2xrNZ7lv3J9I=
=y1cG
-----END PGP SIGNATURE-----

--IS0zKkzwUGydFO0o--


home help back first fref pref prev next nref lref last post