Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,205,003 members, 7,990,769 topics. Date: Friday, 01 November 2024 at 12:20 AM

Lets Copy China In online Hacking & Spying To Develop Our Technology. (Picture) - Programming - Nairaland

Nairaland Forum / Science/Technology / Programming / Lets Copy China In online Hacking & Spying To Develop Our Technology. (Picture) (1600 Views)

Larry Tesler Dies! Man Who Invented Copy And Paste Is Dead. / Mobile Technology: Lets Build A Mobile App With Javascript / Python Programmers Lets Meet Here!!! (2) (3) (4)

(1) (Reply) (Go Down)

Lets Copy China In online Hacking & Spying To Develop Our Technology. (Picture) by mamapidgin: 1:49pm On Apr 03, 2020
There is a school of thought that says that, If you can not buy or build a technology, You had better steal the Knowledge of how the technology was made from those that have successfully built theirs so that you replicate it for yourself, no developed country is willing to release info on how it built some of its mega technological infrastructures and military hard and softwares, and is a well known fact that no country in the world can really develop without technology. be it engineering, agriculture, medicine industrial development, communication, military etc all requires technology.

Countries like the United states and China have been embroiled in a long term faceoff about how China has stole and still stealing from USA via cyber hacking, cyber attack and cyber espionage of many US assets such as, trade secretes, intellectual properties, technological innovations etc. and are remodeling it to suit china's purpose.

There have been many reports about how China is alleged to have begun a widespread effort to acquire U.S. military technology and classified information about the trade secrets of U.S companies. The Chinese government has been accused of stealing trade secrets and technology, often from companies in the United States, to help support its long-term military and commercial development. China has been accused of using a number of methods to obtain U.S. technology (using U.S. law to avoid prosecution), including espionage , exploitation of commercial entities and a network of scientific, academic and business contacts.

In addition to traditional espionage, China partners civilian Chinese companies with American businesses to acquire technology and economic data and uses cyber spying to penetrate the computer networks of U.S. businesses and government agencies; an example is the December 2009 Operation Aurora where U.S. law enforcement officials identified China as the most active foreign power involved in the illegal acquisition of American technology that China wants.

On May 19, 2014, the United States Department of Justice announced that a Federal grand jury had indicted five People's Liberation Army officers for stealing confidential business information and intellectual property from U.S. commercial firms and planting malware on their computers.

Some scholars believe that what china is doing via cyber espionage although very illegal, is what has kept china economy going, it has made Chinese economy to be the second largest economy in the world and has allowed china to take 70% of its 1.4billion population out of poverty within a short period and China also have a future plan of defeating poverty completely by the year 2025.

It is believed that the Chinese government is in full support of this cyber hacking and spying and the country demonstrate this by recruiting and allowing young and exceptionally brilliant university graduates from its various institutions to work as internet spies and online hackers for China.

Nigeria with is economic problems and massive youth unemployment can learn one or two things from what china is doing....

Some of the technologies reported to have been stolen by china includes.

1. Automobile designs and Manufacturing

1.a) Porsche Cayman and SozhouEagle Carrie

1.b) Cadillac Escalade and Victory S10

1.c.) Royce Royce and Geely GE

1.d) Lamborghini and Diablo VT


CC... moderators

1 Like

Re: Lets Copy China In online Hacking & Spying To Develop Our Technology. (Picture) by mamapidgin: 1:50pm On Apr 03, 2020
2. Fighter Aircraft Chengdu J-20 and U.S. F-22 Raptor.
The J-20, China’s first fifth generation fighter, was purpose built not only to serve as a competitor for America’s F-22 Raptor, but in many ways, as a direct copy. Plans for the Lockheed Martin design were stolen by a Chinese national named Su Bin, who was sentenced to 46 months in federal prison for his crime

Re: Lets Copy China In online Hacking & Spying To Develop Our Technology. (Picture) by mamapidgin: 1:55pm On Apr 03, 2020
3.Shenyang J-31 and the U.S. F-35

like the F-22, Lockheed Martin’s F-35 Joint Strike Fighter was also compromised by Su Bin, leading to China’s J-31 program. This jet, still under development, possesses a greater operational range and larger payload capacity than the F-35 it was based on. There is an expectation that the J-31 will become China’s primary carrier-based fighter once it reaches full production, replacing the PLA-N’s troubled J-15 once it enters service. Like the J-20 program, the J-31 is limited by China’s inexperience with stealth aircraft.

Re: Lets Copy China In online Hacking & Spying To Develop Our Technology. (Picture) by mamapidgin: 1:59pm On Apr 03, 2020
4. Jaguar Land rover Vs Jiangling Motors Landwind X7

In the year 2016, Jaguar Land Rover told Reuters it had begun legal action in Beijing against Jiangling Motors over its Landwind X7 SUV, which the US-company claims infringes the patented external designs of its Range Rover Evoque.

Re: Lets Copy China In online Hacking & Spying To Develop Our Technology. (Picture) by mamapidgin: 2:21pm On Apr 03, 2020
5. Copy cat Architecture

5.a)after stealing the original design from france, fake Effiel Tower

5.b) China - Recreation of Amsterdam Central Station

5.c) The Venice

5.d) ) The white house +Capital Hill copy and built in China

Re: Lets Copy China In online Hacking & Spying To Develop Our Technology. (Picture) by Nobody: 4:33pm On Apr 03, 2020
That's the problem with Africans we copy the bad parts and refuse to learn other parts that will be beneficial to us
Re: Lets Copy China In online Hacking & Spying To Develop Our Technology. (Picture) by Nobody: 5:38pm On Apr 03, 2020
You are right. The proper term is modelling .

They are modelling other systems.

1 Like

Re: Lets Copy China In online Hacking & Spying To Develop Our Technology. (Picture) by SUGARSON(m): 6:27pm On Apr 03, 2020
WOW... NICE COPY.
Re: Lets Copy China In online Hacking & Spying To Develop Our Technology. (Picture) by Anonime1105(m): 6:51pm On Apr 03, 2020
If having an economy like China is what it means is copy, then it very good to copy but the problem we have here is that we copy the Negative stuffs and forget the positive things.


Why can't we copy other world powers and become one, China faked it till they became a force to reckon with so why can't we?
Re: Lets Copy China In online Hacking & Spying To Develop Our Technology. (Picture) by mamapidgin: 10:00pm On Apr 03, 2020
Anonime1105:
If having an economy like China is what it means is copy, then it very good to copy but the problem we have here is that we copy the Negative stuffs and forget the positive things.


Why can't we copy other world powers and become one, China faked it till they became a force to reckon with so why can't we?

If China can steal technological design and technological know how from America through cyber hacking and internet spying we too can also do thesame thing to china too, all this yahoo yahoo boys that are been arrested and prosecuted by EFCC are very smart and technologically savvy youths, the government can rehabilitate them and re-channel their energy and knowneledge into something productive for the nation by turning them to cyber hackers and online spies for the country. If repentant Boko Haram members can be rehabilitated and they thereafter dont contribute anything to the country other than they are no more causing mayhem...Arrested yahoo boys too can be rehabilitated and turned into government hackers to look for and steal technologies online...

for example If we can get hold of the design of an industrial power plant that can generate a very large mega watt of electricity from General Electric USA classified document from their computer, will our engineers here in Nigeria not put it together and make our electricity better?
Re: Lets Copy China In online Hacking & Spying To Develop Our Technology. (Picture) by WATCHOVER(m): 7:18am On Apr 04, 2020
I support the idea.


Chinese copy cat
Re: Lets Copy China In online Hacking & Spying To Develop Our Technology. (Picture) by Nobody: 11:15am On Apr 04, 2020
When Nigeria is willing & ready to progress, I will volunteer for these sort of things freely.
Re: Lets Copy China In online Hacking & Spying To Develop Our Technology. (Picture) by Deicide: 1:46pm On Apr 04, 2020
mamapidgin:

All this yahoo yahoo boys that are been arrested and prosecuted by EFCC are very smart and technologically savvy youths, the government can rehabilitate them and re-channel their energy and knowneledge into something productive for the nation by turning them to cyber hackers and online spies for the country.
Yahoo boys, you must be kidding ryt? Those guys might be smart but they hardly know anything about Hacking. At best they are good in Social Engineering that's all.

3 Likes

Re: Lets Copy China In online Hacking & Spying To Develop Our Technology. (Picture) by mamapidgin: 7:50pm On Apr 04, 2020
Deicide:
Yahoo boys, you must be kidding ryt? Those guys might be smart but they hardly know anything about Hacking. At best they are good in Social Engineering that's all.

Yeah you may be right but they are readily available raw material that can be trained and re-channel their energy into it... Most of them do their internet scamming with great passion they can be rehabilitated and trained in real ethical hacking the passion is already in them
Re: Lets Copy China In online Hacking & Spying To Develop Our Technology. (Picture) by chuckjonesbaba(m): 10:02pm On Apr 30, 2020
mamapidgin:
There is a school of thought that says that, If you can not buy or build a technology, You had better steal the Knowledge of how the technology was made from those that have successfully built theirs so that you replicate it for yourself, no developed country is willing to release info on how it built some of its mega technological infrastructures and military hard and softwares, and is a well known fact that no country in the world can really develop without technology. be it engineering, agriculture, medicine industrial development, communication, military etc all requires technology.

Countries like the United states and China have been embroiled in a long term faceoff about how China has stole and still stealing from USA via cyber hacking, cyber attack and cyber espionage of many US assets such as, trade secretes, intellectual properties, technological innovations etc. and are remodeling it to suit china's purpose.

There have been many reports about how China is alleged to have begun a widespread effort to acquire U.S. military technology and classified information about the trade secrets of U.S companies. The Chinese government has been accused of stealing trade secrets and technology, often from companies in the United States, to help support its long-term military and commercial development. China has been accused of using a number of methods to obtain U.S. technology (using U.S. law to avoid prosecution), including espionage , exploitation of commercial entities and a network of scientific, academic and business contacts.

In addition to traditional espionage, China partners civilian Chinese companies with American businesses to acquire technology and economic data and uses cyber spying to penetrate the computer networks of U.S. businesses and government agencies; an example is the December 2009 Operation Aurora where U.S. law enforcement officials identified China as the most active foreign power involved in the illegal acquisition of American technology that China wants.

On May 19, 2014, the United States Department of Justice announced that a Federal grand jury had indicted five People's Liberation Army officers for stealing confidential business information and intellectual property from U.S. commercial firms and planting malware on their computers.

Some scholars believe that what china is doing via cyber espionage although very illegal, is what has kept china economy going, it has made Chinese economy to be the second largest economy in the world and has allowed china to take 70% of its 1.4billion population out of poverty within a short period and China also have a future plan of defeating poverty completely by the year 2025.

It is believed that the Chinese government is in full support of this cyber hacking and spying and the country demonstrate this by recruiting and allowing young and exceptionally brilliant university graduates from its various institutions to work as internet spies and online hackers for China.

Nigeria with is economic problems and massive youth unemployment can learn one or two things from what china is doing....

Some of the technologies reported to have been stolen by china includes.

1. Automobile designs and Manufacturing

1.a) Porsche Cayman and SozhouEagle Carrie

1.b) Cadillac Escalade and Victory S10

1.c.) Royce Royce and Geely GE

1.d) Lamborghini and Diablo VT


CC... moderators

The EFCC and the Nigerian government instead of rehabilitation of all these youths involved in Yahoo Yahoo will discourage research and interests involving the benefits of the cyber technology.

In Nigeria now youths are scared of walking around with a laptop or owning a computer at home.. how can we catch up to India and China who were our contemporaries just decades ago.. its SAD man SAD for a few ignorant buffoons to determine the fate of the world's most populous black nation.

(1) (Reply)

Please How Do I Make Fake Whatsapp Video Calls. / Oracle Vs Sql Server / Abuja Programmers

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 38
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.