recommended reading


Activists broadcast anti-Communist messages on Chinese TV

Network intrusion

Residents in Wenzhou, a city in eastern Zhejiang province, had their normal television programming interrupted the night of Aug.1 -- possibly by hacktivists who operate when TV supervisors aren’t looking.

One message stated, "Why is Liu Xiaobo of Charter 8 in prison, Communist bandits your words are just unadorned farts, you know the people know that everything you say are just farts." Liu is a Nobel Peace Prize-winning Chinese dissident; Charter 08 was a manifesto calling for constitutional reform.

A logo on the hacked TV screen is affiliated with the Anti-Communist Party Hackers. In an email response after the incident, the group denied responsibility, claiming instead that it was the work of "friendly forces" in the fight against the Communist Party, the FP reports.

In the past, individuals claiming to be from the group said they usually execute their attacks late at night, "because the website's managers are off work," and that the attacks usually last "for a few hours or the entire night."

TV viewers took to social media channels like Weibo, China's Twitter-like platform, to discuss the abnormal activity on Wenzhou Television.

They began posting photos of the messages, which appeared superimposed over regular evening programming.

About two hours after photos of the hackers' messages began appearing online, the official Weibo account of a Wenzhou media service provider began posting instructions for how to get rid of the messages.

"Remove and then re-insert the smart card from your set-top box; the black text should then go away,” the company directed.

Then, the search term "Wenzhou TV station hacked" was blocked on Weibo due to "relevant regulations." 


Government (Foreign); Media


August 1, 2014

reported by

Foreign Policy

number affected


location of breach

Wenzhou, China



location of perpetrators


date breach occurred

August 01, 2014

date breach detected

August 01, 2014

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.