{"page":"\u003clink rel=\"stylesheet\" href=\"https://lessonplanet.com/assets/packs/css/resources-c03aa079.css\" /\u003e\n\u003clink rel=\"stylesheet\" href=\"https://lessonplanet.com/assets/packs/css/lp_boclips_stylesheets-517835be.css\" media=\"all\" /\u003e\n\u003cdiv data-title='WRAP US congressmen say sources in China hack computers ADDS reax, file' data-url='/boclips/videos/5c54c363d8eafeecae160e31' data-video-url='/boclips/videos/5c54c363d8eafeecae160e31' id='bo_player_modal'\u003e\n\u003cdiv class='boclips-resource-page modal-dialog panel-container'\u003e\n\u003cdiv class='react-notifications-root'\u003e\u003c/div\u003e\n\u003cdiv class='rp-header'\u003e\n\u003cdiv class='rp-type'\u003e\n\u003ci aria-hidden='true' class='fai fa-regular fa-circle-play'\u003e\u003c/i\u003e\nVideo\n\u003c/div\u003e\n\u003ch1 class='rp-title' id='video-title'\u003e\nWRAP US congressmen say sources in China hack computers ADDS reax, file\n\u003c/h1\u003e\n\u003cdiv class='rp-actions'\u003e\n\u003cdiv class='mr-1'\u003e\n\u003ca class=\"btn btn-success\" data-posthog-event=\"Signup: LP Signup Activity\" data-posthog-location=\"body_link_boclips\" data-remote=\"true\" href=\"/subscription/new\"\u003e\u003cspan\u003e\u003cspan\u003eGet Free Access\u003c/span\u003e\u003cspan class=\"\"\u003e for 10 Days\u003c/span\u003e\u003cspan\u003e!\u003c/span\u003e\u003c/span\u003e\u003c/a\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv class='rp-body'\u003e\n\u003cdiv class='rp-info'\u003e\n\u003cdiv aria-label='Hide resource details' class='rp-hide-info' role='button' tabindex='0'\u003e\u0026times;\u003c/div\u003e\n\u003ci aria-label='Expand resource details' class='rp-expand-info fai fa-solid fa-up-right-and-down-left-from-center' role='button' tabindex='0'\u003e\u003c/i\u003e\n\u003ci aria-label='Compress resource details' class='rp-compress-info fai fa-solid fa-down-left-and-up-right-to-center' role='button' tabindex='0'\u003e\u003c/i\u003e\n\u003cdiv class='rp-rating'\u003e\n\u003cspan class='resource-pool'\u003e\n\u003cspan class='pool-label'\u003ePublisher:\u003c/span\u003e\n\u003cspan class='pool-name'\u003e\n\u003cspan class='text'\u003e\u003ca data-publisher-id=\"30356011\" href=\"/search?publisher_ids%5B%5D=30356011\"\u003eCurated Video\u003c/a\u003e\u003c/span\u003e\n\u003c/span\u003e\n\u003c/span\u003e\n\u003c/div\u003e\n\u003cdiv class='rp-description'\u003e\n\u003cspan class='short-description'\u003eAP TelevisionWashington, DC - 11 June 20081. Wide of news conference2. SOUNDBITE (English) Frank Wolf, US House of Representatives Member:\"A source from China hacked into the computer of my foreign policy and human rights staff person,...\u003c/span\u003e\n\u003cspan class='full-description hide'\u003eAP Television\u003cbr/\u003eWashington, DC - 11 June 2008\u003cbr/\u003e1. Wide of news conference\u003cbr/\u003e2. SOUNDBITE (English) Frank Wolf, US House of Representatives Member:\u003cbr/\u003e\"A source from China hacked into the computer of my foreign policy and human rights staff person, then the computers of my chief of staff, my legislative director, and my judiciary staff person also. On these computers was information about all the casework I have done on behalf of political dissidents and human rights activists around the world. That kind of information, as well as everything else on my office computers, emails, memos, correspondence, district casework, was open to outside eyes.\"\u003cbr/\u003e3. Cutaway of media \u003cbr/\u003eAP Television\u003cbr/\u003eWashington, DC - 11 June 2008\u003cbr/\u003e4. Wide of entrance to Wolf's office, zoom in of office sign\u003cbr/\u003e5. Various of woman sitting behind front desk in office\u003cbr/\u003e6. Close of monitor showing Frank Wolf's webpage\u003cbr/\u003e7. Pan of women working in Wolf's office\u003cbr/\u003eWashington, DC - 11 June 2008\u003cbr/\u003e8. Wide of House of Representatives floor\u003cbr/\u003e9. SOUNDBITE (English) Frank Wolf, US House of Representatives Member:\u003cbr/\u003e\"The form of my resolution is as follows - directing the Chief Administrative Officer and the Sergeant At Arms of the House of Representatives to take timely action to ensure that all members, committee, and offices of House are alerted of the dangers of electronic attacks on the computers and information systems used in carrying out their official duties and are fully briefed on how to protect themselves, their official records, and their communications from electronic security breaches.\"\u003cbr/\u003eAP Television\u003cbr/\u003eWashington, DC - 11 June 2008\u003cbr/\u003e10. Wide of news conference\u003cbr/\u003e11. SOUNDBITE (English) Chris Smith, US House of Representatives Member:\u003cbr/\u003e\"In December of '06 and March of 2007, my human rights computers on the subcommittee, called \"Africa: Global Human Rights International Operations\" were attacked. We asked the people in the House when the virus was put in. They said it was intended to take control of the computers.  When they cleaned the computers, they informed us that the attack seemed to come from the Peoples Republic of China. It had a Chinese IP (Internet Protocol) address.\"\u003cbr/\u003e12. Mid of media, pull out to wide of Wolf speaking at podium\u003cbr/\u003eAP Television\u003cbr/\u003eFILE: Washington, DC - 29 May 2008\u003cbr/\u003e13. Wide of exterior of the US Department of Commerce building \u003cbr/\u003e14. Sign reading: (English) \"Department of Commerce\" \u003cbr/\u003eAP Television\u003cbr/\u003eFILE: Beijing, China -  December 2007\u003cbr/\u003e15. US Commerce Secretary Carlos M. Gutierrez  walking with officials at trade talks\u003cbr/\u003e16. Close of Gutierrez, pan to officials standing for photo opportunity\u003cbr/\u003e17. Wide of officials seated at table during trade talks with Chinese officials\u003cbr/\u003e18. Wide of Gutierrez speaking at trade talks\u003cbr/\u003eTwo US lawmakers who are longtime critics of Beijing's human rights record said on Wednesday their office computers, containing information about political dissidents from around the world, had been hacked by sources apparently working out of China.\u003cbr/\u003eOne of the lawmakers said he had been discouraged from disclosing the computer attacks by other US officials.\u003cbr/\u003eSpeaking at a news conference in Washington, Representative Frank Wolf said four of his computers had been hacked.\u003cbr/\u003e\"On these computers was information about all the casework I have done on behalf of political dissidents and human rights activists around the world,\" Wolf said. \u003cbr/\u003e\"That kind of information, as well as everything else on my office computers, emails, memos, correspondence, district casework, was open to outside eyes.\"\u003cbr/\u003eRepresentative Chris Smith said two of his computers were compromised in December 2006 and March 2007.\u003cbr/\u003e\"We asked the people in the House when the virus was put in,\" Smith said. \"They said it was intended to take control of the computers. When they cleaned the computes, they informed us that the attack seemed to come from the Peoples Republic of China.\"\u003cbr/\u003eWolf said that after one of the attacks, a car with license plates belonging to Chinese officials went to the home of a dissident in Fairfax County, Virginia, outside Washington and photographed it.\u003cbr/\u003eDuring the same time period, the House International Relations Committee, as Foreign Affairs then was known, was targeted at least once by someone working inside China, said a committee spokeswoman. \u003cbr/\u003eUS authorities continued to investigate whether Chinese officials secretly copied the contents of a government laptop computer during a visit to China by Commerce Secretary Carlos M. Gutierrez and used the information to try to hack into Commerce Department computers.\u003cbr/\u003eThe US Defence Department acknowledged last month at a closed House intelligence committee meeting that its vast computer network is scanned or attacked by outsiders more than 300 (m) million times each day.\u003cbr/\u003eWolf said the FBI had told him that computers of other House members and at least one House committee had been accessed by sources working from inside China. \u003cbr/\u003eThe Republican suggested that Senate computers could have been attacked as well.\u003cbr/\u003eHe said the hacking of computers in his Capitol Hill office began in August 2006, that he had known about it for a long time and that he had been discouraged from disclosing it by people in the US government whom he refused to identify.\u003cbr/\u003eSpeaking at the House of Representatives on Wednesday afternoon, Wolf put forward a proposed resolution that he said would help ensure protection for all House computers and information systems. \u003cbr/\u003eWolf said it is important to \"ensure that all members, committee, and offices of House are alerted of the dangers of electronic attacks on the computers and information systems used in carrying out their official duties and are fully briefed on how to protect themselves, their official records, and their communications from electronic security breaches.\" \u003cbr/\u003eThe FBI and the White House would not comment.\u003cbr/\u003eThe Bush administration has been increasingly reluctant to discuss or acknowledge cyber attacks publicly, especially ones traced to China.\u003cbr/\u003eIn Beijing, the Chinese Ministry of Foreign Affairs had no immediate comment on the allegations by Wolf and Smith.\u003cbr/\u003eLast week, China denied the accusations regarding Gutierrez's laptop and the alleged effort to hack Commerce Department computers.\u003cbr/\u003e\u003c/span\u003e\n\u003c/div\u003e\n\u003cdiv class='action-container flex justify-between'\u003e\n\u003cbutton aria-expanded='false' aria-label='Read more description' class='rp-full-description' type='button'\u003e\n\u003ci class='fai fa-solid fa-align-left'\u003e\u003c/i\u003e\n\u003cspan id='read_more'\u003eRead More\u003c/span\u003e\n\u003c/button\u003e\n\u003cdiv class='rp-report'\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv aria-labelledby='resource-details-heading' class='rp-info-section'\u003e\n\u003ch2 class='title' id='resource-details-heading'\u003eResource Details\u003c/h2\u003e\n\u003cdiv class='rp-resource-details clearfix'\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eCurator Rating\u003c/dt\u003e\n\u003cdd\u003e\u003cspan class=\"star-rating\" aria-label=\"3.5 out of 5 stars\" role=\"img\"\u003e\u003ci class=\"fa-solid fa-star text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003ci class=\"fa-solid fa-star text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003ci class=\"fa-solid fa-star text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003ci class=\"fa-solid fa-star-half-stroke text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003ci class=\"fa-regular fa-star text-action\" aria-hidden=\"true\"\u003e\u003c/i\u003e\u003c/span\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt class=\"educator-rating-title\"\u003eEducator Rating\u003c/dt\u003e\u003cdd\u003e\u003cdiv class=\"educator-rating-details\" data-path=\"/educator_ratings/rrp_data?resourceable_id=1134236\u0026amp;resourceable_type=Boclips%3A%3AVideoMetadata\"\u003e\u003cspan class=\"not-yet-rated\"\u003eNot yet Rated\u003c/span\u003e\u003c/div\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eGrade\u003c/dt\u003e\u003cdd title=\"Grade\"\u003eHigher Ed\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eSubjects\u003c/dt\u003e\u003cdd\u003e\u003cspan\u003e\u003ca href=\"/search?grade_ids%5B%5D=259\u0026amp;search_tab_id=1\u0026amp;subject_ids%5B%5D=1216220\"\u003eAll Subjects\u003c/a\u003e\u003c/span\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eMedia Type\u003c/dt\u003e\u003cdd\u003e\u003cspan\u003e\u003ca href=\"/search?grade_ids%5B%5D=259\u0026amp;search_tab_id=2\u0026amp;type_ids%5B%5D=4543650\"\u003eNews Clips\u003c/a\u003e\u003c/span\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eSource:\u003c/dt\u003e\n\u003cdd\u003e\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eDate\u003c/dt\u003e\n\u003cdd\u003e2008\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003ci aria-hidden='true' class='fai fa-solid fa-language'\u003e\u003c/i\u003e\n\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\u003cdt\u003eAudiences\u003c/dt\u003e\u003cdd\u003e\u003cspan\u003e\u003ca href=\"/search?audience_ids%5B%5D=371079\u0026amp;grade_ids%5B%5D=259\u0026amp;search_tab_id=1\"\u003eFor Teacher Use\u003c/a\u003e\u003c/span\u003e\u003c/dd\u003e\u003cdd class=\"text-muted\"\u003e\u003ci class=\"fa-solid fa-lock mr5\"\u003e\u003c/i\u003e2 more...\u003c/dd\u003e\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003cdiv class='detail'\u003e\n\u003cdl\u003e\n\n\u003c/dl\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv aria-labelledby='concepts-heading' class='rp-info-section'\u003e\n\u003ch2 class='title' id='concepts-heading'\u003eConcepts\u003c/h2\u003e\n\u003cdiv class='clearfix'\u003e\n\u003cdiv class='details-list concepts' data-identifier='Boclips::VideoDecorator' data-type='concepts'\u003egenocide, china, social issues, darfur, east asia, north america, computers, asia, beijing, international relations\u003c/div\u003e\n\u003cdiv class='concepts-toggle-buttons' data-identifier='Boclips::VideoDecorator'\u003e\n\u003cbutton aria-expanded='false' class='more btn-link' type='button'\u003e\n\u003cspan\u003eShow More\u003c/span\u003e\n\u003ci aria-hidden='true' class='fa-solid fa-caret-down ml5'\u003e\u003c/i\u003e\n\u003c/button\u003e\n\u003cbutton aria-expanded='true' class='less btn-link' style='display: none;' type='button'\u003e\n\u003cspan\u003eShow Less\u003c/span\u003e\n\u003ci aria-hidden='true' class='fa-solid fa-caret-up ml5'\u003e\u003c/i\u003e\n\u003c/button\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv aria-labelledby='additional-tags-heading' class='rp-info-section'\u003e\n\u003ch2 class='title' id='additional-tags-heading'\u003eAdditional Tags\u003c/h2\u003e\n\u003cdiv class='clearfix'\u003e\n\u003cdiv class='details-list keyterms' data-identifier='Boclips::VideoDecorator' data-type='keyterms'\u003eu.s. department of commerce, subcommittee, united states house of representatives, legislature, member, political issues, attacks, united states, government and politics, technology issues, staff, united states government, committee, information, people, regard, computer, human rights and civil liberties, frank wolf, political activism, form, side, district of columbia, united states congress, social affairs, staff person, chief, carlos gutierrez, hacking, call, house, greater china\u003c/div\u003e\n\u003cdiv class='keyterms-toggle-buttons' data-identifier='Boclips::VideoDecorator'\u003e\n\u003cbutton aria-expanded='false' class='more btn-link' type='button'\u003e\n\u003cspan\u003eShow More\u003c/span\u003e\n\u003ci aria-hidden='true' class='fa-solid fa-caret-down ml5'\u003e\u003c/i\u003e\n\u003c/button\u003e\n\u003cbutton aria-expanded='true' class='less btn-link' style='display: none;' type='button'\u003e\n\u003cspan\u003eShow Less\u003c/span\u003e\n\u003ci aria-hidden='true' class='fa-solid fa-caret-up ml5'\u003e\u003c/i\u003e\n\u003c/button\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv aria-labelledby='educator-ratings-heading' class='rp-info-section'\u003e\n\u003ch2 class='title sr-only' id='educator-ratings-heading'\u003eEducator Ratings\u003c/h2\u003e\n\u003cdiv id=\"educator-ratings-root\"\u003e\u003c/div\u003e\u003cdiv id=\"all-educator-ratings-root\"\u003e\u003c/div\u003e\u003cdiv id=\"educator-rating-form-root\"\u003e\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003cdiv class='rp-resource'\u003e\n\u003cdiv aria-label='Show resource details' class='rp-show-info' role='button' tabindex='0'\u003e\n\u003ci class='fai fa-solid fa-align-left'\u003e\u003c/i\u003e\nShow resource details\n\u003c/div\u003e\n\u003cdiv aria-label='Video player' class='player' id='player-wrapper' role='region'\u003e\n\u003cdiv class='relative container mx-auto' id='lp-boclips-visitor-thumbnail'\u003e\n\u003ca class=\"block\" data-html=\"true\" data-placement=\"bottom\" data-trigger=\"click\" data-content=\"\u003cdiv class=\u0026quot;text-center py-2\u0026quot;\u003e\u003ca class=\u0026quot;bold\u0026quot; href=\u0026quot;/auth/users/sign_in\u0026quot;\u003eSign in\u003c/a\u003e or \u003ca class=\u0026quot;bold text-danger\u0026quot; data-posthog-event=\u0026quot;Signup: LP Signup Activity\u0026quot; data-posthog-location=\u0026quot;body_link_boclips\u0026quot; data-remote=\u0026quot;true\u0026quot; href=\u0026quot;/subscription/new\u0026quot;\u003eJoin Now\u003c/a\u003e\u003c/div\u003e\" data-title=\"Get Full Access\" data-container=\"body\" rel=\"popover\" tabindex=\"0\" aria-label=\"Play video: WRAP US congressmen say sources in China hack computers ADDS reax, file\" href=\"/subscription/new\"\u003e\u003cimg class=\"resource-img img-thumbnail img-responsive z-10 lp-boclips-thumbnail w-full h-full lozad\" alt=\"WRAP US congressmen say sources in China hack computers ADDS reax, file\" title=\"WRAP US congressmen say sources in China hack computers ADDS reax, file\" onError=\"handleImageNotLoadedError(this)\" data-default-image=\"https://static.lp.lexp.cloud/images/attachment_defaults/resource/large/missing.png\" data-src=\"https://static.lp.lexp.cloud/images/attachment_defaults/resource/large/missing.png\" width=\"315\" height=\"220\" src=\"data:image/png;base64,R0lGODlhAQABAAD/ACwAAAAAAQABAAACADs\" /\u003e\n\u003cspan aria-hidden='true' class='flex justify-center items-center bg-white rounded-full w-16 h-16 absolute top-1/2 left-1/2 -mt-8 -ml-8 cursor-pointer z-0 border-2 border-primary drop-shadow-md lp-boclips-thumbnail-playBtn'\u003e\n\u003ci class='fa-solid fa-play text-primary text-3xl ml-1 drop-shadow-xl'\u003e\u003c/i\u003e\n\u003c/span\u003e\n\u003c/a\u003e\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n\u003c/div\u003e\n"}