SlideShare une entreprise Scribd logo
1  sur  8
Gmail Hacking In China By: Hessa Al-Mannai 9D
What Is the Chinese Gmail Hacking? The Chinese Google Hacking is a criminal offense that the Chinese caused while trying to hack Google’s email service, Gmail. Hacking is a criminal offense to gain unauthorized access to data in a computer. The Chinese were attempting to gain confidential information from private emails. This could be viewed as an attack on the American government and people through spying.
TG Daily TG Daily is a technology news publication from Los Angeles, CA. Their viewpoint is very neutral and they only report on what the Chinese reactions to the allegations that have been made against them. Since TG Daily is American based you would expect them to be bias but instead they seem very neutral on the topic.
BBC The British Broadcasting Commission (BBC) has reported on the Chinese hacking scandal by including information and reports from both sides. This article highlights that this issue is between the Chinese and Google rather than the Chinese and the Americans.
The Guardian The Guardian, a British newspaper, reported about China’s hacking. They give an insight story on what has been happening these past few days. It highlights that hacking is an international crime that affects the relationships amongst countries. China rejected Google’s accusations and said its critics “ulterior motives” trying to blame the government of Beijing. This article sympathizes with the Chinese government and is stating facts that support China and it describes them as being victims.
Analysis On Sources Most of the websites that have reported on the Google scandal have included facts and opinions from both sides; the articles vary but not in great detail.
Political and Social Issues The Chinese hacking issue is a social and political one because it affects the society and the relationship between China and the US. According to “The Guardian” many of the hackers were traced back Jinan, the capital of Shandong province and not Beijing, who were accused internationally. Evidence suggest that the hackers logged into details of hundreds of senior US and South Korean officials as well as Chinese political activists. This is a political and social issue as it could easily damage the relationship not just between the US and China but China and South Korea.    This is not the first time hacking has been taken place, in the past there has been many issues between the World’s biggest search engine and the World’s censor. What makes it more complicated is the fact that it is hard to say one country is the cause of the problem such as China.
Solution The best solution for hacking would be to use anti-virus software and keep it current. Installing an anti-virus program can keep viruses and other hacking programs out of your computer. Government officials and senior politicians should activate a firewall. Many people use software or hardware firewalls to prevent hackers from gaining access to their private and confidential files through ports or other points of entry.

Contenu connexe

Tendances

Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internetryangregory55
 
Social Media: New Tool for Government Affairs
Social Media:  New Tool for Government AffairsSocial Media:  New Tool for Government Affairs
Social Media: New Tool for Government AffairsCurt Mercadante
 
Federal Government Information Goes Social? Inspiration from Change.gov
Federal Government Information Goes Social?  Inspiration from Change.govFederal Government Information Goes Social?  Inspiration from Change.gov
Federal Government Information Goes Social? Inspiration from Change.govKim Schultz
 
2019 IPR Disinformation Study
2019 IPR Disinformation Study2019 IPR Disinformation Study
2019 IPR Disinformation StudyTaylorThelander
 

Tendances (6)

Digital Citizens
Digital CitizensDigital Citizens
Digital Citizens
 
Pornography on the internet
Pornography on the internetPornography on the internet
Pornography on the internet
 
Social Media: New Tool for Government Affairs
Social Media:  New Tool for Government AffairsSocial Media:  New Tool for Government Affairs
Social Media: New Tool for Government Affairs
 
Bd & privacy issues in social media
Bd & privacy issues in social mediaBd & privacy issues in social media
Bd & privacy issues in social media
 
Federal Government Information Goes Social? Inspiration from Change.gov
Federal Government Information Goes Social?  Inspiration from Change.govFederal Government Information Goes Social?  Inspiration from Change.gov
Federal Government Information Goes Social? Inspiration from Change.gov
 
2019 IPR Disinformation Study
2019 IPR Disinformation Study2019 IPR Disinformation Study
2019 IPR Disinformation Study
 

Similaire à Gmail Hacking in China

AN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spiesAN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spiesYokimura Dimaunahan
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxericbrooks84875
 
Corporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best friCorporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best friAlleneMcclendon878
 
Edward Snowden's NSA surveillance revelations strain China-US relations - Cro...
Edward Snowden's NSA surveillance revelations strain China-US relations - Cro...Edward Snowden's NSA surveillance revelations strain China-US relations - Cro...
Edward Snowden's NSA surveillance revelations strain China-US relations - Cro...Paula Pepe
 
Can cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosuresCan cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosuresJason Fernandes
 
News & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comNews & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comeducatedcommuni79
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)PwC France
 
Top 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowTop 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowAbdullah Khosa
 
Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Kate Neal
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareSecuricon
 
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...VogelDenise
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxsmile790243
 
Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?Jason Fernandes
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 

Similaire à Gmail Hacking in China (20)

AN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spiesAN ARTICLE: Is Tiktok a tool for Chinese spies
AN ARTICLE: Is Tiktok a tool for Chinese spies
 
Prism
PrismPrism
Prism
 
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docxwww.pwc.comgsiss2015Managing cyber risks in an intercon.docx
www.pwc.comgsiss2015Managing cyber risks in an intercon.docx
 
Corporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best friCorporate LawYou, your brother, your sister, and your best fri
Corporate LawYou, your brother, your sister, and your best fri
 
Edward Snowden's NSA surveillance revelations strain China-US relations - Cro...
Edward Snowden's NSA surveillance revelations strain China-US relations - Cro...Edward Snowden's NSA surveillance revelations strain China-US relations - Cro...
Edward Snowden's NSA surveillance revelations strain China-US relations - Cro...
 
Can cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosuresCan cloud computing survive the NSA disclosures
Can cloud computing survive the NSA disclosures
 
News & Videos about Web -- CNN.com
News & Videos about Web -- CNN.comNews & Videos about Web -- CNN.com
News & Videos about Web -- CNN.com
 
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
Etude PwC/CIO/CSO sur la sécurité de l'information (2014)
 
Top 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowTop 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till now
 
Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1Katherine Neal_Written Brief 1
Katherine Neal_Written Brief 1
 
2008 07-20 Google China.turnoy
2008 07-20 Google China.turnoy2008 07-20 Google China.turnoy
2008 07-20 Google China.turnoy
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
 
Cyber Legislation
Cyber LegislationCyber Legislation
Cyber Legislation
 
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
 
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docxLAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
LAST ISSUE -CYBER ESPIONAGEBusinesses and government agencies in.docx
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?Cyber Warfare: Can business trust the government to protect them?
Cyber Warfare: Can business trust the government to protect them?
 
Cyber Warfare
Cyber WarfareCyber Warfare
Cyber Warfare
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 

Gmail Hacking in China

  • 1. Gmail Hacking In China By: Hessa Al-Mannai 9D
  • 2. What Is the Chinese Gmail Hacking? The Chinese Google Hacking is a criminal offense that the Chinese caused while trying to hack Google’s email service, Gmail. Hacking is a criminal offense to gain unauthorized access to data in a computer. The Chinese were attempting to gain confidential information from private emails. This could be viewed as an attack on the American government and people through spying.
  • 3. TG Daily TG Daily is a technology news publication from Los Angeles, CA. Their viewpoint is very neutral and they only report on what the Chinese reactions to the allegations that have been made against them. Since TG Daily is American based you would expect them to be bias but instead they seem very neutral on the topic.
  • 4. BBC The British Broadcasting Commission (BBC) has reported on the Chinese hacking scandal by including information and reports from both sides. This article highlights that this issue is between the Chinese and Google rather than the Chinese and the Americans.
  • 5. The Guardian The Guardian, a British newspaper, reported about China’s hacking. They give an insight story on what has been happening these past few days. It highlights that hacking is an international crime that affects the relationships amongst countries. China rejected Google’s accusations and said its critics “ulterior motives” trying to blame the government of Beijing. This article sympathizes with the Chinese government and is stating facts that support China and it describes them as being victims.
  • 6. Analysis On Sources Most of the websites that have reported on the Google scandal have included facts and opinions from both sides; the articles vary but not in great detail.
  • 7. Political and Social Issues The Chinese hacking issue is a social and political one because it affects the society and the relationship between China and the US. According to “The Guardian” many of the hackers were traced back Jinan, the capital of Shandong province and not Beijing, who were accused internationally. Evidence suggest that the hackers logged into details of hundreds of senior US and South Korean officials as well as Chinese political activists. This is a political and social issue as it could easily damage the relationship not just between the US and China but China and South Korea.   This is not the first time hacking has been taken place, in the past there has been many issues between the World’s biggest search engine and the World’s censor. What makes it more complicated is the fact that it is hard to say one country is the cause of the problem such as China.
  • 8. Solution The best solution for hacking would be to use anti-virus software and keep it current. Installing an anti-virus program can keep viruses and other hacking programs out of your computer. Government officials and senior politicians should activate a firewall. Many people use software or hardware firewalls to prevent hackers from gaining access to their private and confidential files through ports or other points of entry.