By MIKE MCCONNELL, MICHAEL CHERTOFF AND WILLIAM LYNNOnly three months ago, we would have violated U.S. secrecy laws by sharing what we write here—even though, as a former director of national intelligence, secretary of homeland security, and deputy secretary of defense, we have long known it to be true. The Chinese government has a national policy of economic espionage in cyberspace. In fact, the Chinese are the worlds most active and persistent practitioners of cyber espionage today.Evidence of Chinas economically devastating theft of proprietary technologies and other intellectual property from U.S. companies is growing. Only in October 2011 were details declassified in a report to Congress by the Office of the National Counterintelligence Executive. Each of us has been speaking publicly for years about the ability of cyber terrorists to cripple our critical infrastructure, including financial networks and the power grid. Now this report finally reveals what we couldnt say before: The threat of economic cyber espionage looms even more ominously.
Category Archives: Cyber Warfare
McConnell, Chertoff and Lynn: Chinas Cyber Thievery Is National Policy—And Must Be Challenged – WSJ.com
Defense Ministry spokesman Geng Yansheng hosts the ministry’s second regular press conference in Beijing, May 25, 2011. [Photo/China Daily, mod.gov.cn]
The People’s Liberation Army (PLA) confirmed in May 2011 that it has established an “Online Blue Army” to improve China’s defense capability and ensure the security of the country’s military network. The announcement drew close attention from military watchers and experts worldwide.
Zhang Shaozhong, a military expert and a professor from PLA National Defense University, told the People’s Daily that China is increasingly dependent on the Internet, but makes no domestic root servers, and various other types of software and Internet hardware are U.S. made. In this sense, China can be described as merely a computer user with a fairly fragile Internet security system. These are circumstances that cry out for the build up of Internet security forces.
Throughout 2010, 480,000 Trojans viruses and 13,782 Zombie viruses were detected, with 221,000 Trojan and 6,531 Zombie remote control clients found to originate in foreign countries.
THIS week’s 60th anniversary Ausmin meeting in San Francisco deserves the overworked adjective historic. It marks a pivot point in which the US and Australia begin to redefine their region not as the Asia-Pacific, but as the Indo-Pacific.
U.S -Australia and India Ausmin PACT: The technologies are cyber warfare, missiles and nuclear weapons. The external nations are China, India and North Korea.
The addition of cyber war was the most important change in the scope of the alliance since New Zealand left in the mid-1980s. In a communique on cyber security, Australia and the US declared: “In the event of a cyber attack that threatens the territorial integrity, political independence or security of either of our nations, Australia and the US would consult together and determine appropriate options to address the threat.”
NEW YORK (CNNMoney) — On April 8, 2010, traffic to about 15% of the world’s websites was rerouted to China.
Cyber warfare is one form of espionage that is currently being waged between the U.S. and China. In the event of a full-scale conflict, how would this war be fought, and who would win the war? – David Wise (of big think) an intelligence expert does an excellent job of explaining the 5th Battlefield CyberSpace. David explains who has an upper hand in this US vs China Cyberspace battle. The United States is well aware of it’s own vulnerable infrastructure our electric grid, our communication networks and aviation grid. We as other governments are a highly industrialized society. China is becoming more and economic power so they in turn are vulnerable. China has been involved in hacking over 33 different companies in the US. The US is doing some of it’s own hacking we we don’t hear about it because were dam good. (The State department released that CHina’s SCADA system has major security problems).
David does make it clear that we don’t know who these hacker are sometimes a kid playing in his bedroom or a national government in Estonia making belive there in CHina or any other place. It easy to hide in the internet. This makes it difficult to say “Yes” it the Chinese government doing this and that we can’t be sure. David and I agree that dealing with China a communist country is difficult. China is a growing economic power base it need Cyberspace to grow. China is enjoying the money and its need to keep the Internet open to do business, this will also enable it’s people to become free in cyberspace.
This is an excellent Video David Wise is great. –my 2 cents- gatomalo
big_Think Youtube Channel See More > http://www.youtube.com/watch?v=ri20T5Dlggg
The Pentagon, the IMF, Google, and others have been hacked. It’s war out there, and a cyber-weapons industry is exploding to arm the combatants.
Cyber attacks used to be kept quiet. They often went undiscovered until long after the fact, and countries or companies that were hit usually declined to talk about attacks. That’s changed as a steady flow of brazen incursions has been exposed. Last year, for example, Google (GOOG) accused China of spying on the company’s workers and customers. It said at the time that at least 20 other companies were victims of the same attack, nicknamed Operation Aurora by the security firm McAfee. (INTC) The hacked included Adobe Systems (ADBE), Juniper Networks (JNPR), and Morgan Stanley. (MS) Joel F. Brenner, the head of U.S. counterintelligence until 2009, says the same operation that pulled off Aurora has claimed many more victims over several years. “It’d be fair to say that at least 2,000 companies have been hit,” Brenner says. “And that number is on the conservative side.”
A senior House Republican wants to hold the Obama administration accountable for what he says are violations of law limiting the sharing of space technology with China.
Rep. Frank R. Wolf, chairman of the House Appropriations subcommittee on Commerce, Justice, Science and related agencies, said in an interview that a law passed in April restricts technology-sharing with China following attempts by Chinese hackers to steal government secrets.
Cyber Capabilities of China
Good Day, my name is GaTo MaLo and I have worked in the IT world of corporate America for fortune 100 companies for over 35 years. In this presentation I hope to explain the state of China as an Internet Cyber Security leader. In today’s economy every government in the world is dealing with the Internet and Cyber Space. The Internet is were commerce happens, we go to our social networks, we find that ice cream shop that everyone is talking about, go out and get ice cream for the family. Cyber space is were the hackers that are stealing your credit card that you just used to buy ice cream for the family. Hackers are also stealing top-secret technology from our government and our corporation. As I compiled the China Cyber Timeline Project (Chinese Hacker-Cyber Timeline🙂 it was easy to connect the dots and see when China started its cyber push as a way to gain intellectual property, technology secrets, political and military secrets. The reason they are making headlines is because they are not very good and are getting caught.
Hacker Moto: -be hidden, be silent, listen and don’t get DOX (documented-revealed).
- Let’s take a look at their Offensive Capabilities.
From January-2010 to June-2011 China had the fastest Super Computer in the world on June 23, 2011 Japan became the new holder of the fastest super computer in the world, the US is in the top 5 but this alone shows what China can do in cyber space, the New York Times reported. China has now Nationalized Hacker groups to go out and hack making them patriot of the new Chinese (Digital Dragon-Warriors). China now has cyber spy schools popping up all over the place. China has also recently announced to have a cyber team called “PLA Online Blue Team” which is in charge of cyber espionage and intelligence for national security purpose and attacks on the 5th Battlefield (land, sea, air, space, cyber space), the Associated Press reported 2011. One of the key espionage and intelligence hacks come from the Chinese city of Jinan. It has over 6 million people, 12 Universities and a High Tech technology Zones for companies. It’s also the center for China’s PLA (Peoples Liberation Army) cyber warfare college and home to the “PLA-Online Blue Team”.
The city of Jinan, China – was traced back as the center of the Google e-mail attacks. And this is just one modern new City, as China grows every day new centers of technology will give China the technology to do almost anything they want in Cyber Space.
The only thing that is keeping China from going full out is “communism paranoia” they distrust everything not created internally. And they do not have the manpower today to fix it. China has fears that software & hardware that is created outside of China may have back doors. In July 15, 2011 –The US State department released information that hardware computer components manufactured abroad have embedded back door to the Internet that’s design to defeats security anti-virus software. China may be right. China been hard at work manufacturing our electronics and shipping them to the rest of the world. Made in China = “Zombie Computer”
- What are China’s Defensive Cyber Capabilities?
China has a big problem they lack the manpower to do everything they want to do in cyber space. They have people but they lack the education that is needed in high-tech areas.
China’s fear of all software and hardware not created in China is another big problem. For example the SCADA (supervisory control and data acquisition) computer systems that monitor Power Stations. The US DHS (Department of Homeland Security) announce that China’s SCADA software has major flaws. The US told the world of the problems now everyone in Cyber Space knows. Hacker groups like Anonymous and LutzSec may attack them now.
- What are the International Laws preventing Cyber Warfare or Espionage?
Cyber Space is getting more and more complicated. In one group of maybe 10 people [LulzSec] from all over the world. They never met face to face. Then hacked into all kind of government and private companies and nobody can find them. And so the LulzSec legend begins.
Since there are no International laws and hackers are even hacking international police like MI5, FBI and Interpol each country must do what it can to protect it self.
- 4. What can the USA do to protect itself from Cyber Warfare?
President Obama has signed executive orders outlining how far the United States military can go when launching cyber-attacks and other cyber-operations against enemies and as part of routine espionage activities, the Associated Press reported June 22. Since we have no International Cyber Laws every country has to protect itself. We as a Nation can reach individual treaties with different countries to make sure everyone knows the rules and in time we will see laws catching up to Cyber Space not until them, we must apply good cyber security to every aspect of our lives.
- 5. Conclusions:
As you can see even in a country like China a communist country today with a little education and lot’s of money they can gain access to the Internet and hack information about a country a corporation or an individual and cause great harm. If a foreign government can hack your financial system your country could go into a recession. Today Chinese nationalized hacker group can hack our Smart Grip (Electricity). Shutting everything down all the power in the eastern or western states.
Anyone of these scenarios could happen and some have happened already. America has to find and implement cyber International policies to prevent this. If cyber attacks happened we must react quickly and have a solid disaster recovery plan, repair the problems and implement retaliation against the perpetrator even if it’s China.
Thanks you for your time I hope I shared something interesting
Reference: HAND – OUT’S
(Reuters) – For two years, academic experts from the United States and China have quietly held talks on cyber-security, straining to establish rules of the road in a realm that has proven a persistent irritant between the world’s two largest economies.
The informal discussions have yielded modest progress in areas such as cooperation to combat Internet fraud, where both Beijing and Washington have an incentive to work together, according to participants.
But mostly, the talks appear to have exposed a wide gap between the United States and China over almost everything virtual: policing computer networks, moderating cyber warfare, even controlling information.
China’s contrasting view of cyber security was made clear as soon as the United States began discussing the need to protect computer networks, James Mulvenon, a China expert at the Defense Group Inc, told a recent Washington conference.
China wanted to talk about censorship. “The Chinese came back immediately and said no, no, no, we want to talk about information security, which is both protecting the network and policing the content on the network,” Mulvenon said.
“Right from the outset, we were talking past one another,” he added.
Digital attacks and cyber snooping on U.S. technology firms and government agencies including the Pentagon, many of them believed to have originated in or been routed through China, have pushed cyber-security up the list of thorny issues troubling Sino-American relations.
While Beijing denies it, U.S. officials and experts suspect China’s hand was behind the hacking and phishing of web-search giant Google Inc. this year and last, as well as intrusions into Pentagon networks.
On Thursday, the Pentagon is due to release its formal cyber-security strategy.
Unlike nuclear, chemical and biological weaponry, or trade wars, there are no existing international treaties that cover cyber-war, computer espionage or hacking.
Former Secretary of State Henry Kissinger, an architect of the U.S. opening with China in the 1970s, told a Thomson Reuters event last month that a high-level agreement between the two sides is needed. “If you take it case by case it will lead to accusations and counter-accusations,” he said.
UNOFFICIAL TALKS FIRST
But so far, there has been relatively little official movement.
The annual cabinet-level U.S.-China Strategic and Economic Dialogue included cyber security for the first time this year, but the session was just 90 minutes long, cut in half by translation and produced no breakthroughs.
The unofficial talks between experts began after China approached the United States with concerns that hacker intrusions were stoking bilateral tension, said James Lewis, a cybersecurity expert who leads the U.S. side of the talks.
The U.S. group and experts from the state-affiliated China Institutes of Contemporary International Relations have covered four areas: law enforcement, trade, military issues and espionage.
Five group meetings and three smaller informal meetings have made headway in the law enforcement area, said Lewis, of the Center for Strategic and International Studies, a Washington think tank.
In one instance, the FBI helped China’s law enforcement agencies by staging raids in New York on Chinese in the United States who were defrauding people back home, he said.
“It’s slow, but I think there’s a little bit of progress,” said Lewis, adding that the goal is to eventually hand the conversations over to official negotiating teams.
SAME WEB, DIFFERENT DREAMS
But the military and espionage tracks have been hard going, highlighting what analysts say is a huge U.S.-China perception gap over values, capabilities, interests — and even basic definitions of deterrence and cyber security.
Analysts say China’s People’s Liberation Army believes its ability to attack U.S. cyber infrastructure compensates for its conventional military weakness compared to the United States.
“I’m quite skeptical of the likelihood that any effective understanding of offensive operations can be reached with the Chinese government,” said Stewart Baker, a former U.S. Department of Homeland Security official, now at the law firm Steptoe & Johnson.
China’s eagerness to acquire foreign technology also has inspired cyber intrusions that anger trade partners.
Hackers based in China have been accused of trying to steal everything from Google’s valuable search algorithm to manuals for U.S. satellites to gigabytes of proprietary business information from Western energy companies.
But China’s spymasters, paradoxically for a centrally controlled government, do not keep a tight leash on hackers and others that they train, said Lewis, whose group will hold its next round of unofficial cyber-security talks later this year.
Lewis said he was skeptical that Beijing was directing the high-value intellectual property theft or could stop it.
“They do train people and they do use proxies but that doesn’t mean that everyone is under their control,” he said.
Even if the United States could verify that China was behind malicious cyber activity and Beijing had the capacity to rein it in, negotiations toward a cyber treaty might require concessions Washington would be loathe to put on the table.
Jack Goldsmith, an international law and cyber-security expert at Harvard Law School, says China and other countries would likely demand U.S. restraint in areas such as intelligence gathering and encouraging political activists who challenge curbs on Internet freedom.
“Until the United States gets serious about which concessions that are attractive to our adversaries it is willing and able to make, American talk of a cyber-arms agreement is empty,” Goldsmith wrote recently.
North Korea has been conducting “drills” for cyberwar against its southern neighbor using simple, but very effective denial-of-service attacks, according to security experts.
A team from McAfee looked into the attacks on South Korean internet networks in July 2009 and March this year, and concluded they were probably efforts by North Korea to test cyberwar weapons.
Those weapons are blunt and crude, but they work.