• Complain

Hall - CRACK99 : the takedown of a $100 million Chinese software pirate

Here you can read online Hall - CRACK99 : the takedown of a $100 million Chinese software pirate full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: China., United States, year: 2015, publisher: W. W. Norton & Company, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Hall CRACK99 : the takedown of a $100 million Chinese software pirate
  • Book:
    CRACK99 : the takedown of a $100 million Chinese software pirate
  • Author:
  • Publisher:
    W. W. Norton & Company
  • Genre:
  • Year:
    2015
  • City:
    China., United States
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

CRACK99 : the takedown of a $100 million Chinese software pirate: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "CRACK99 : the takedown of a $100 million Chinese software pirate" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

The utterly gripping story of the most outrageous case of cyber piracy prosecuted by the U.S. Department of Justice.

A former U.S. Navy intelligence officer, David Locke Hall was a federal prosecutor when a bizarre-sounding website, CRACK99, came to his attention. It looked like Craigslist on acid, but what it sold was anything but amateurish: thousands of high-tech software products used largely by the military, and for mere pennies on the dollar. Want to purchase satellite tracking software? No problem. Aerospace and aviation simulations? No problem. Communications systems designs? No problem. Software for Marine One, the presidential helicopter? No problem. With delivery times and customer service to rival the worlds most successful e-tailers, anybody, anywhereincluding rogue regimes, terrorists, and countries forbidden from doing business with the United Stateshad access to these goods for any purpose whatsoever.

But who was behind CRACK99, and where were they? The Justice Department discouraged potentially costly, risky cases like this, preferring the low-hanging fruit that scored points from politicians and the public. But Hall and his colleagues were determined to find the culprit. They bought CRACK99s products for delivery in the United States, buying more and more to appeal to the budding entrepreneur in the man they identified as Xiang Li. After winning his confidence, they lured him to Saipana U.S. commonwealth territory where Halls own father had stormed the beaches with the marines during World War II. There they set up an audacious sting that culminated in Xiang Lis capture and imprisonment. The value of the goods offered by CRACK99? A cool $100 million.

An eye-opening look at cybercrime and its chilling consequences for national security, CRACK99 reads like a caper that resonates with every amazing detail.

CRACK99 : the takedown of a $100 million Chinese software pirate — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "CRACK99 : the takedown of a $100 million Chinese software pirate" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Copyright 2015 by David Locke Hall All rights reserved First Edition For - photo 1

Copyright 2015 by David Locke Hall

All rights reserved

First Edition

For information about permission to reproduce selections from this book,

write to Permissions, W. W. Norton & Company, Inc.,

500 Fifth Avenue, New York, NY 10110

For information about special discounts for bulk purchases,
please contact W. W. Norton Special Sales
at specialsales@wwnorton.com or 800-233-4830

Book design by Dana Sloan

Production manager: Devon Zahn

The Library of Congress has cataloged the printed edition as follows:

Hall, David Locke, author.

CRACK99 : the takedown of a $100 million Chinese software pirate /

David Locke Hall. First edition.

pages cm

Includes bibliographical references.

ISBN 978-0-393-24954-5 (hardcover)

1. Computer crimesUnited StatesCase studies. 2. Hacking
ChinaCase studies. 3. Software piracyChinaCase studies.

4. Criminal investigationUnited StatesCase studies. 5. National

securityUnited StatesCase studies. I. Title.

HV6773.2.H355 2015

364.16'8dc23

2015022463

ISBN 978-0-393-24955-2 (e-book)

W. W. Norton & Company, Inc.

500 Fifth Avenue, New York, N.Y. 10110

www.wwnorton.com

W. W. Norton & Company Ltd.

Castle House, 75/76 Wells Street, London W1T 3QT

For my family

There is a tide in the affairs of men,

Which taken at the flood, leads on to fortune.

Omitted, all the voyage of their life is bound in shallows and in miseries.

On such a full sea are we now afloat.

And we must take the current when it serves, or lose our ventures.

WILLIAM SHAKESPEARE,

Julius Caesar, Act 4, Scene 3

No maze all is surprised True deal

XIANG LI

www.crack99.com

Contents

THE DAY AFTER TOMORROW.

The Chinese BZK-005 drone executes a slow leftward turn during its routine patrol of the airspace above a string of uninhabited islands in the East China Sea, northeast of Taiwan. The Chinese call them the Diaoyu Islands. The Japanese do not; they call them the Senkaku Islands, illustrating an important point: when it comes to this territory, the Chinese and the Japanese dont agree on anything. Each country claims ownership, and asserts exclusive sovereignty, no doubt because of the islands rumored oil and gas reserves, which have yet to be exploited.

The BZK-005 is a long-range unmanned aerial vehicle used in multiple mission sets, including surveillance. When the data link from the BZK-005 to the Peoples Liberation Army base on the Chinese mainland fails, no one gets excited; this has happened before, and it will be corrected shortly. This time, however, things are different. Although a squad of technicians swarms into the control room, no one can identify a problem with the data link. It has simply ceased to exist. There is a reason for this: the BZK-005 has ceased to exist. This is what happens when a Chinese BZK-005 is hit by a Sidewinder from a Japanese F-15 fighter.

Peoples Liberation Army Air Force J-16 fighters launch in response and quickly engage with the Japanese F-15s. If there were a way to watch this from a safe distance, it would look something like an air showonly deadly. The dogfighting is intense, littering the East China Sea with burning aircraft and burning airmen. It lasts as long as the fuel does, ending in a draw.

The USS George Washington, CVN 73, and her battle group are on patrol in the Philippine Sea. The carrier receives a flash message directing her northwest toward the disputed island chain. Two F-18 Hornets launch as aviators fill the ready room. Awaiting the intel brief, they mill about speculating on the situation and spreading the latest scuttlebutt. The room smells of burnt coffee and aviation fuel. The Chinese government issues a stern warning to the United States: stay out of it, or suffer the consequences. The threat is ignored, and the George Washington continues steaming northwest. Chinese J-16 fighters intercept her and are escorted out of the operating area by U.S. Navy F-18s. All is well until a salvo of Chinese antisatellite missiles is launched against the U.S. Navys Fleet Satellite Communications System, isolating the George Washington.

WAR! scream the headlines.

This would be a bad day by any measure. But it would be particularly galling to learn that the technology employed by the Chinese during this bad dayfrom the drones to the antisatellite missiles to the fighter radarwas produced in the United States, that the ability of the Chinese to neutralize the U.S. Navy was enabled by the crown jewels of U.S. enterprise stolen by Chinese cybercriminals.

The United States is the victim of the greatest transfer of wealth in history. Digital thieves overseasparticularly in Chinaare systematically stealing U.S. intellectual property, largely without adverse consequences. The value of the information and technology being stolen each year is staggering: hundreds of billions of dollars.

Xiang Li was part of this Chinese cybercrime collective and the most prolific Chinese cyber pirate ever caught. From his bastion in Chengdu, China, he operated CRACK99, a website that from 2008 until the time of his arrest in 2011 sold powerful advanced industrial-grade software, the access controls to which had been circumventedor cracked. The stolen software was worth more than $100 million and covered a lot of technological ground: aerospace and aviation simulation and design, communications systems design, electromagnetic simulation, explosive simulation, intelligence analysis, precision tooling, oil field management, and manufacturing plant design.

Cyber pirates like Xiang Li complement the Chinese governments national strategy to steal U.S. technology. One of the thousands of software titles for sale on CRACK99 was Satellite Tool Kit (STK) 8.0, designed by Analytical Graphics Incorporated to enable the U.S. military and aerospace industry to simulate missile launches and flight trajectoriesand to track objects in flight, such as missiles, aircraft (manned and unmanned), and satellites. Moreover, Chinese hackers have reportedly stolen radar software for the $1.4 trillion F-35 stealth joint strike fighter, a fifth-generation tactical fighter still in the testing phase, employing the most advanced U.S. stealth technology. These thefts call into question the ability of the F-35 to remain stealthy in a future conflict with China. Chinese hackers have also reportedly stolen software relating to other military platforms, such as the Global Hawk high-resolution surveillance drone, the UH-60 Black Hawk helicopter, and missile defense systems, including Patriot, Aegis, and Terminal High Altitude Area Defense (THAAD). Some of these digital crimes are sponsored directly by the Chinese government; otherslike Xiang Lisare motivated by money. Either way, the Chinese are stealing U.S. technology to their strategic advantage, shifting the balance of power away from the United States.

The potential consequences are epic. So what is the U.S. government doing about it?

CRACK99

SPECIAL AGENT MIKE RONAYNE AND I sat in a blacked-out Chevy Tahoe outside the arrivals terminal. It was four a.m. and dark as ebony, except for the sickly amber exterior lighting. The humidity was stifling, only occasionally relieved by a welcome puff of sea breeze. We would have been nursing cups of strong black coffee, except that we didnt have any. On the Pacific island of Saipan, there arent a lot of options at four a.m., coffee-wise.

If this guy doesnt show up, Ronayne began.

I know, I interrupted. We were all alone on this one.

Ronaynes cell phone rang. It was Brendan Cullen, another special agent from Homeland Security Investigations (HSI). He was posted in the immigration bay, watching passengers deplane the flight from Chengdu, China.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «CRACK99 : the takedown of a $100 million Chinese software pirate»

Look at similar books to CRACK99 : the takedown of a $100 million Chinese software pirate. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «CRACK99 : the takedown of a $100 million Chinese software pirate»

Discussion, reviews of the book CRACK99 : the takedown of a $100 million Chinese software pirate and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.