The following is a continuation from Ms. Moe Fukada's paper.
Collaboration between real and virtual
For packing for companies with high security consciousness, high-level collaboration between real and virtual is required.
The Communist Party of China is thoroughly pursuing cyber-attacks for public opinion operations.
In order to make it difficult for domestic Chinese to obtain information on overseas sites, real and virtual collaboration has been developing into situations from the physical attack of censure of VPN servers to attacking and downing anti-government media websites.
Although it was rarely reported in Japan, on June 18, 2014, Hong Kong and Taiwan popular newspaper Apple Daily reported the demonstration for a private referendum to select Hong Kong's Chief Administrator General Election Act, and then 40 million times per second, 10 gigabytes of national grade hacker attacked.
On the same day, Apple Daily soon restored the website, but on the next 19th the site was downed as a result of a massive attack, and all data was deleted from the server that stored the contents.
It means that this incident is not just a simple hacking incident through the internet network.
Hackers can tamper with hacking up to the hardware layer up to the software layers and virtualization layers is difficult from the outside normally. There are only two possibilities, one is when a person who has access to the server exists as a resident, and the other is a case of a crime by a network server provider company.
If you compare this with an unauthorized remittance of a bank account by hacking, the former is like a criminal who can access the company's bankbook and seal, and the latter is like the security officer of the security company that provides a safe opening the safe and taking out a passbook and a stamp without permission.
A major Japanese publisher also has a data center in Taiwan, but employees complain that "since the data center was transferred to Taiwan, pirated news of comic books began to appear in China in a few days".
It is also likely that agent in the data center in Taiwan earns pocket money and horizontally extends data to China via submarine cable.
This is not only happening in Taiwan.
Although I may enter and leave the data center in Japan through my job, I once saw a famous expert on the National Security Bureau, the information agency in China, in the data center of Otemachi.
I was surprised by him telling the Japanese name, speaking fluent Japanese, giving out business cards of listed companies.
Even if security measures are taken, it is not surprising that it is because if an internal agent has already entered and is collaborating with the outside, the fact that the information leakage case in Japan remains traceable.