Feeds

China silent on Google, welcomes compliant internet firms

Washington worries about other stuff for now

Top three mobile application threats

China went on a wide-ranging charm offensive today to show the world it is open to the internet and is in fact the biggest victim of hacking attacks.

The heartfelt pleas for understanding began the day after Google threatened to up sticks from the world's most populous country after complaining it had been targeted by organised hackers based in China.

As part of the effort to demonstrate its openness, Beijing deployed a raft of state spokespeople, many of them anonymous, to brief state news agency Xinhua.

According to the agency, foreign industry spokesperson Jiang Yu told reporters that "China's internet is open" and the country had tried "creating a favourable environment for internet".

"China welcomes international Internet companies to conduct business within the country according to law," she said. "China's law prohibits cyber crimes including hacker attacks."

However, officials seemed wary of commenting on Google directly. An anonymous official in the State Council Information Office said the authorities were seeking "more information" on Google's decision.

Another anonymous official told the People's Daily that China itself was a victim of cyber attacks, the majority of which came from abroad.

Reuters quoted Minister Wang Chen of China's State Council Information Office, saying that "properly guiding internet opinion is a major measure for protecting Internet information security."

This would of course be anathema to Google, which simply wants to find out everything about you, so that it can guide you to its advertisers.

Meanwhile, across the Atlantic, there has been little further official comment since Secretary of State Hillary Clinton said Google's decision raised "very serious concerns".

Some sceptical Reg commenters have suggested that the US will be less than vocal on the issue, given its own recent history of trampling over citizens' civil rights in the war against stuff.

Or it may simply be that with a massive humanitarian crisis on its doorstep in the shape of Haiti, a problem that Google created for itself is not exactly top of Washington's agenda right now. ®

3 Big data security analytics techniques

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.