{"id":4894,"date":"2010-10-16T21:21:44","date_gmt":"2010-10-17T05:21:44","guid":{"rendered":"http:\/\/www.horace.org\/blog\/?p=4894"},"modified":"2010-10-16T21:21:44","modified_gmt":"2010-10-17T05:21:44","slug":"the-stuxnet-outbreak","status":"publish","type":"post","link":"https:\/\/www.horace.org\/blog\/2010\/10\/16\/the-stuxnet-outbreak\/","title":{"rendered":"The Stuxnet outbreak"},"content":{"rendered":"<blockquote><p>\nTechnology is neither good or bad, it all depends on how people use it.  Sooner or later, someone will develop Stuxnet.   Being the first cyber war virus, Stuxnet is doing a good deed by sabotage a nuclear weapon plant at Iran and at the same time warn us how vulnerable our infrastructure is under similar attack from terrorists.\n<\/p><\/blockquote>\n<p><!--more--><\/p>\n<p>Sep 30th 2010, The Economist<br \/>\nAn unusually sophisticated cyber-weapon is mysterious but important<\/p>\n<p>IT SOUNDS like the plot of an airport thriller or a James Bond film. A crack team of experts, assembled by a shadowy government agency, develops a cyber-weapon designed to shut down a rogue country\u2019s nuclear programme. The software uses previously unknown tricks to worm its way into industrial control systems undetected, searching for a particular configuration that matches its target\u2014at which point it wreaks havoc by reprogramming the system, closing valves and shutting down pipelines.<\/p>\n<p>This is not fiction, but fact. A new software \u201cworm\u201d called Stuxnet (its name is derived from keywords buried in the code) seems to have been developed to attack a specific nuclear facility in Iran. Its sophistication suggests that it is the work of a well-financed team working for a government, rather than a group of rogue hackers trying to steal secrets or cause trouble. America and Israel are the obvious suspects. But Stuxnet\u2019s origins and effects are unknown.<\/p>\n<p>Stuxnet first came to light in June, when it was identified by VirusBlokAda, a security firm in Belarus. The next month Siemens, a German industrial giant, warned customers that their \u201csupervisory control and data acquisition\u201d (SCADA) management systems, which control valves, pipelines and industrial equipment, were vulnerable to the worm. It targets a piece of Siemens software, called WinCC, which runs on Microsoft Windows.<\/p>\n<p>For security reasons SCADA systems are not usually connected to the internet. But Stuxnet can spread via infected memory sticks plugged into a computer\u2019s USB port. Stuxnet checks to see if WinCC is running. If it is, it tries to log in, to install a clandestine \u201cback door\u201d to the internet, and then to contact a server in Denmark or Malaysia for instructions. (Analysis of traffic to these servers is continuing, and may offer the best chance of casting light on Stuxnet\u2019s purpose and origins.) If it cannot find WinCC, it tries to copy itself on to other USB devices. It can also spread across local networks via shared folders and print spoolers.<\/p>\n<p>Initially, Stuxnet seemed to be designed for industrial espionage or to allow hackers to blackmail companies by threatening to shut down vital systems. But its unusual characteristics suggest another explanation. WinCC is a rather obscure SCADA system. Hackers hoping to target as many companies as possible would have focused on more popular systems. And Stuxnet searches for a particular configuration of industrial equipment as it spreads. It launches an attack only when it finds a match. \u201cThe bad news is that the virus is targeting a specific process or plant,\u201d says Wieland Simon of Siemens. \u201cThe good news is that most industrial processes are not the target of the virus.\u201d (Siemens says it knows of 15 plants around the world that were infected by Stuxnet, but their operations were unaffected as they were not the intended target.)<\/p>\n<p>Another odd feature is that Stuxnet uses two compromised security certificates (stolen from firms in Taiwan) and a previously unknown security hole in Windows to launch itself automatically from a memory stick. The use of such \u201czero-day vulnerabilities\u201d by viruses is not unusual. But Stuxnet can exploit four entirely different ones in order to worm its way into a system. These holes are so valuable that hackers would not normally use four of them in a single attack. Whoever created Stuxnet did just that to boost its chances. They also had detailed knowledge of Siemens\u2019s industrial-production processes and control systems, and access to the target plant\u2019s blueprints. In short, Stuxnet was the work neither of amateur hackers nor of cybercriminals, but of a well- financed team. \u201cBehind this virus there are experts,\u201d says Mr Simon. \u201cThey need money and know-how.\u201d<\/p>\n<p>So what was the target? Microsoft said in August that Stuxnet had infected more than 45,000 computers. Symantec, a computer-security firm, found that 60% of the infected machines were in Iran, 18% in Indonesia and 8% in India. That could be a coincidence. But if Stuxnet was aimed at Iran, one possible target is the Bushehr nuclear reactor. This week Iranian officials confirmed that Stuxnet had infected computers at Bushehr, but said that no damage to major systems had been done. Bushehr has been dogged by problems for years and its opening was recently delayed once again. Given that history, the latest hitch may not have been Stuxnet\u2019s work.<\/p>\n<p>A more plausible target is Iran\u2019s uranium-enrichment plant at Natanz. Inspections by the International Atomic Energy Agency, the UN\u2019s watchdog, have found that about half Iran\u2019s centrifuges are idle and those that work are yielding little. Some say a fall in the number of working centrifuges at Natanz in early 2009 is evidence of a successful Stuxnet attack.<\/p>\n<p>Last year Scott Borg of the United States Cyber-Consequences Unit, a think-tank, said that Israel might prefer to mount a cyber-attack rather than a military strike on Iran\u2019s nuclear facilities. That could involve disrupting sensitive equipment such as centrifuges, he said, using malware introduced via infected memory sticks.<\/p>\n<p>His observation now looks astonishingly prescient. \u201cSince the autumn of 2002, I have regularly predicted that this sort of cyber-attack tool would eventually be developed,\u201d he says. Israel certainly has the ability to create Stuxnet, he adds, and there is little downside to such an attack, because it would be virtually impossible to prove who did it. So a tool like Stuxnet is \u201cIsrael\u2019s obvious weapon of choice\u201d. Some have even noted keywords in Stuxnet\u2019s code drawn from the Bible\u2019s Book of Esther\u2014in which the Jews fight back to foil a plot to exterminate them.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Technology is neither good or bad, it all depends on how people use it. Sooner or later, someone will develop Stuxnet. Being the first cyber war virus, Stuxnet is doing a good deed by sabotage a nuclear weapon plant at Iran and at the same time warn us how vulnerable our infrastructure is under similar &hellip; <a href=\"https:\/\/www.horace.org\/blog\/2010\/10\/16\/the-stuxnet-outbreak\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">The Stuxnet outbreak<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"lc_iscn_info":[],"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[15],"tags":[41,702],"class_list":["post-4894","post","type-post","status-publish","format-standard","hentry","category-_newsclips","tag-economist","tag-cyberwar"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Stuxnet outbreak - \u54f2\u5b50\u6232 Philosophist\u2019s Camp<\/title>\n<meta name=\"description\" content=\"Technology is neither good or bad, it all depends on how people use it. Sooner or later, someone will develop Stuxnet. Being the first cyber war virus,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.horace.org\/blog\/2010\/10\/16\/the-stuxnet-outbreak\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Stuxnet outbreak - \u54f2\u5b50\u6232 Philosophist\u2019s Camp\" \/>\n<meta property=\"og:description\" content=\"Technology is neither good or bad, it all depends on how people use it. Sooner or later, someone will develop Stuxnet. Being the first cyber war virus,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.horace.org\/blog\/2010\/10\/16\/the-stuxnet-outbreak\/\" \/>\n<meta property=\"og:site_name\" content=\"\u54f2\u5b50\u6232 Philosophist\u2019s Camp\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/horace.org\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/horace.org\" \/>\n<meta property=\"article:published_time\" content=\"2010-10-17T05:21:44+00:00\" \/>\n<meta name=\"author\" content=\"hevangel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@horaceorg\" \/>\n<meta name=\"twitter:site\" content=\"@horaceorg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hevangel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2010\\\/10\\\/16\\\/the-stuxnet-outbreak\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2010\\\/10\\\/16\\\/the-stuxnet-outbreak\\\/\"},\"author\":{\"name\":\"hevangel\",\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#\\\/schema\\\/person\\\/c8d9e8e7a71d343b4b2c4ef4365cdb4c\"},\"headline\":\"The Stuxnet outbreak\",\"datePublished\":\"2010-10-17T05:21:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2010\\\/10\\\/16\\\/the-stuxnet-outbreak\\\/\"},\"wordCount\":1001,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#\\\/schema\\\/person\\\/c8d9e8e7a71d343b4b2c4ef4365cdb4c\"},\"keywords\":[\"Economist\",\"cyberwar\"],\"articleSection\":[\"News Clips\"],\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.horace.org\\\/blog\\\/2010\\\/10\\\/16\\\/the-stuxnet-outbreak\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2010\\\/10\\\/16\\\/the-stuxnet-outbreak\\\/\",\"url\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2010\\\/10\\\/16\\\/the-stuxnet-outbreak\\\/\",\"name\":\"The Stuxnet outbreak - \u54f2\u5b50\u6232 Philosophist\u2019s Camp\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#website\"},\"datePublished\":\"2010-10-17T05:21:44+00:00\",\"description\":\"Technology is neither good or bad, it all depends on how people use it. Sooner or later, someone will develop Stuxnet. Being the first cyber war virus,\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2010\\\/10\\\/16\\\/the-stuxnet-outbreak\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.horace.org\\\/blog\\\/2010\\\/10\\\/16\\\/the-stuxnet-outbreak\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/2010\\\/10\\\/16\\\/the-stuxnet-outbreak\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Stuxnet outbreak\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/\",\"name\":\"\u54f2\u5b50\u6232 Philosophist\u2019s Camp\",\"description\":\"\u860b\u679c\u65e5\u5831\u4f5c\u8005 - \u9673\u99ac\uff1a\u66f8\u8a55\uff0c\u5f71\u8a55\uff0c\u52d5\u6f2b\uff0c\u65c5\u884c\uff0c\u54f2\u5b78\u7b46\u8a18\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#\\\/schema\\\/person\\\/c8d9e8e7a71d343b4b2c4ef4365cdb4c\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/#\\\/schema\\\/person\\\/c8d9e8e7a71d343b4b2c4ef4365cdb4c\",\"name\":\"hevangel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.horace.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/spocky.jpg?fit=1313%2C1259&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.horace.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/spocky.jpg?fit=1313%2C1259&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.horace.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/spocky.jpg?fit=1313%2C1259&ssl=1\",\"width\":1313,\"height\":1259,\"caption\":\"hevangel\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.horace.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/spocky.jpg?fit=1313%2C1259&ssl=1\"},\"sameAs\":[\"http:\\\/\\\/www.horace.org\",\"https:\\\/\\\/www.facebook.com\\\/horace.org\"],\"url\":\"https:\\\/\\\/www.horace.org\\\/blog\\\/author\\\/hevangel-2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Stuxnet outbreak - \u54f2\u5b50\u6232 Philosophist\u2019s Camp","description":"Technology is neither good or bad, it all depends on how people use it. Sooner or later, someone will develop Stuxnet. Being the first cyber war virus,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.horace.org\/blog\/2010\/10\/16\/the-stuxnet-outbreak\/","og_locale":"en_US","og_type":"article","og_title":"The Stuxnet outbreak - \u54f2\u5b50\u6232 Philosophist\u2019s Camp","og_description":"Technology is neither good or bad, it all depends on how people use it. Sooner or later, someone will develop Stuxnet. Being the first cyber war virus,","og_url":"https:\/\/www.horace.org\/blog\/2010\/10\/16\/the-stuxnet-outbreak\/","og_site_name":"\u54f2\u5b50\u6232 Philosophist\u2019s Camp","article_publisher":"https:\/\/www.facebook.com\/horace.org","article_author":"https:\/\/www.facebook.com\/horace.org","article_published_time":"2010-10-17T05:21:44+00:00","author":"hevangel","twitter_card":"summary_large_image","twitter_creator":"@horaceorg","twitter_site":"@horaceorg","twitter_misc":{"Written by":"hevangel","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.horace.org\/blog\/2010\/10\/16\/the-stuxnet-outbreak\/#article","isPartOf":{"@id":"https:\/\/www.horace.org\/blog\/2010\/10\/16\/the-stuxnet-outbreak\/"},"author":{"name":"hevangel","@id":"https:\/\/www.horace.org\/blog\/#\/schema\/person\/c8d9e8e7a71d343b4b2c4ef4365cdb4c"},"headline":"The Stuxnet outbreak","datePublished":"2010-10-17T05:21:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.horace.org\/blog\/2010\/10\/16\/the-stuxnet-outbreak\/"},"wordCount":1001,"commentCount":0,"publisher":{"@id":"https:\/\/www.horace.org\/blog\/#\/schema\/person\/c8d9e8e7a71d343b4b2c4ef4365cdb4c"},"keywords":["Economist","cyberwar"],"articleSection":["News Clips"],"inLanguage":"en-CA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.horace.org\/blog\/2010\/10\/16\/the-stuxnet-outbreak\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.horace.org\/blog\/2010\/10\/16\/the-stuxnet-outbreak\/","url":"https:\/\/www.horace.org\/blog\/2010\/10\/16\/the-stuxnet-outbreak\/","name":"The Stuxnet outbreak - \u54f2\u5b50\u6232 Philosophist\u2019s Camp","isPartOf":{"@id":"https:\/\/www.horace.org\/blog\/#website"},"datePublished":"2010-10-17T05:21:44+00:00","description":"Technology is neither good or bad, it all depends on how people use it. Sooner or later, someone will develop Stuxnet. Being the first cyber war virus,","breadcrumb":{"@id":"https:\/\/www.horace.org\/blog\/2010\/10\/16\/the-stuxnet-outbreak\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.horace.org\/blog\/2010\/10\/16\/the-stuxnet-outbreak\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.horace.org\/blog\/2010\/10\/16\/the-stuxnet-outbreak\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.horace.org\/blog\/"},{"@type":"ListItem","position":2,"name":"The Stuxnet outbreak"}]},{"@type":"WebSite","@id":"https:\/\/www.horace.org\/blog\/#website","url":"https:\/\/www.horace.org\/blog\/","name":"\u54f2\u5b50\u6232 Philosophist\u2019s Camp","description":"\u860b\u679c\u65e5\u5831\u4f5c\u8005 - \u9673\u99ac\uff1a\u66f8\u8a55\uff0c\u5f71\u8a55\uff0c\u52d5\u6f2b\uff0c\u65c5\u884c\uff0c\u54f2\u5b78\u7b46\u8a18","publisher":{"@id":"https:\/\/www.horace.org\/blog\/#\/schema\/person\/c8d9e8e7a71d343b4b2c4ef4365cdb4c"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.horace.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":["Person","Organization"],"@id":"https:\/\/www.horace.org\/blog\/#\/schema\/person\/c8d9e8e7a71d343b4b2c4ef4365cdb4c","name":"hevangel","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/i0.wp.com\/www.horace.org\/blog\/wp-content\/uploads\/2021\/11\/spocky.jpg?fit=1313%2C1259&ssl=1","url":"https:\/\/i0.wp.com\/www.horace.org\/blog\/wp-content\/uploads\/2021\/11\/spocky.jpg?fit=1313%2C1259&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.horace.org\/blog\/wp-content\/uploads\/2021\/11\/spocky.jpg?fit=1313%2C1259&ssl=1","width":1313,"height":1259,"caption":"hevangel"},"logo":{"@id":"https:\/\/i0.wp.com\/www.horace.org\/blog\/wp-content\/uploads\/2021\/11\/spocky.jpg?fit=1313%2C1259&ssl=1"},"sameAs":["http:\/\/www.horace.org","https:\/\/www.facebook.com\/horace.org"],"url":"https:\/\/www.horace.org\/blog\/author\/hevangel-2\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pwn21-1gW","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":3339,"url":"https:\/\/www.horace.org\/blog\/2009\/08\/14\/the-horribly-slow-murderer-with-the-extremely-inefficient-weapon\/","url_meta":{"origin":4894,"position":0},"title":"The Horribly Slow Murderer with the Extremely Inefficient Weapon","author":"hevangel","date":"August 14, 2009","format":false,"excerpt":"The most frightening weapon of all time, a spoon.","rel":"","context":"In &quot;Daily Scribble&quot;","block_context":{"text":"Daily Scribble","link":"https:\/\/www.horace.org\/blog\/category\/_scribble\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":228,"url":"https:\/\/www.horace.org\/blog\/2005\/10\/28\/no-ipcom\/","url_meta":{"origin":4894,"position":1},"title":"no-ip.com","author":"hevangel","date":"October 28, 2005","format":false,"excerpt":"I have been using no-ip.com for my DNS redirection for many years. It basically maps the my domains (www.horace.org and trishama.no-ip.com) to the IP address of my webserver at home. It is a free service and very reliable. I don't expect my free account will actually expired. This unexpected link\u2026","rel":"","context":"In &quot;Daily Scribble&quot;","block_context":{"text":"Daily Scribble","link":"https:\/\/www.horace.org\/blog\/category\/_scribble\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3961,"url":"https:\/\/www.horace.org\/blog\/2010\/01\/13\/google-warns-of-china-exit-over-hacking\/","url_meta":{"origin":4894,"position":2},"title":"Google Warns of China Exit Over Hacking","author":"hevangel","date":"January 13, 2010","format":false,"excerpt":"Bravo to Google. They really live up to their corporate motto: \"Don't do evil\". They have the guts say no to the Chinese government. No one know where history will lead, but Google may very well trigger the fall of the communist party. By JESSICA E. VASCELLARO, JASON DEAN and\u2026","rel":"","context":"In &quot;News Clips&quot;","block_context":{"text":"News Clips","link":"https:\/\/www.horace.org\/blog\/category\/_reference\/_newsclips\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3144,"url":"https:\/\/www.horace.org\/blog\/2009\/06\/22\/no-more-economist\/","url_meta":{"origin":4894,"position":3},"title":"No more Economist","author":"hevangel","date":"June 22, 2009","format":false,"excerpt":"In the economy downturn, first the company laid off the librarian, then it cut all the magazine subscriptions and close down the library. I am a long time loyal reader of the Economist since university. I used to read the article on the website using my dad's subscription account. I\u2026","rel":"","context":"In &quot;Daily Scribble&quot;","block_context":{"text":"Daily Scribble","link":"https:\/\/www.horace.org\/blog\/category\/_scribble\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":110,"url":"https:\/\/www.horace.org\/blog\/2005\/06\/03\/the-economist\/","url_meta":{"origin":4894,"position":4},"title":"The Economist","author":"hevangel","date":"June 3, 2005","format":false,"excerpt":"Today when I was reading Economist, one of the colleague walked by cube, peaked his head and asked me what makes me read the Economist. That gets me start thinking how did I get start in this magazine. I have been known as the sole reader of the copy subscribed\u2026","rel":"","context":"In &quot;Daily Scribble&quot;","block_context":{"text":"Daily Scribble","link":"https:\/\/www.horace.org\/blog\/category\/_scribble\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":485,"url":"https:\/\/www.horace.org\/blog\/2006\/08\/19\/ttf-friends-2\/","url_meta":{"origin":4894,"position":5},"title":"TTF friends","author":"hevangel","date":"August 19, 2006","format":false,"excerpt":"Tonight I went out to have dinner with friends in the TTF forum. One of them is visiting Vancouver from LA, so we have a small group of five people come out to meet each other. I discuss various issuses (a.k.a. blow water) with them in the forum for a\u2026","rel":"","context":"In &quot;Daily Scribble&quot;","block_context":{"text":"Daily Scribble","link":"https:\/\/www.horace.org\/blog\/category\/_scribble\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":false,"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/posts\/4894","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/comments?post=4894"}],"version-history":[{"count":1,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/posts\/4894\/revisions"}],"predecessor-version":[{"id":4895,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/posts\/4894\/revisions\/4895"}],"wp:attachment":[{"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/media?parent=4894"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/categories?post=4894"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.horace.org\/blog\/wp-json\/wp\/v2\/tags?post=4894"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}