Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

2 lawmakers say computers hacked by Chinese
AP on Breitbart.com ^ | 6/11/08 | Pete Yost and Lara Jakes Jordan - ap

Posted on 06/11/2008 12:34:17 PM PDT by NormsRevenge

WASHINGTON (AP) - Two House members said Wednesday their Capitol Hill computers, containing information about political dissidents from around the world, have been hacked by sources apparently working out of China. Virginia Rep. Frank Wolf says four of his computers were hacked. New Jersey Rep. Chris Smith says two of his computers were compromised in December 2006 and March 2007.

The two lawmakers are longtime critics of China's record on human rights.

In an interview Wednesday, Wolf said the hacking of computers in his Capitol Hill office began in August 2006. He says a computer at a House committee office also was hacked, and he suggested others in the House and possibly the Senate could be involved.

The FBI declined to comment.

Wolf said that in his office, the hackers "got everything," including all the casework regarding political dissidents around the world.

In comments to The Associated Press earlier in the day, Wolf suggested the problem probably goes further. "If it's been done in the House, don't you think that they're doing the same thing in the Senate?"

"I think this is very bad because you have the Chinese compromising and gaining access to computers of any number of members of the House and a major committee of the House," Wolf said. "We don't know how many others."

In calling for hearings in both the House and Senate, Wolf said there "probably are members serving in Congress whose computers have been compromised and they may not even know it."

Separately, U.S. authorities are investigating whether Chinese officials secretly copied the contents of a government laptop computer during a visit to China by Commerce Secretary Carlos M. Gutierrez and used the information to try to hack into Commerce Department computers.

The FBI declined to comment. In Beijing, the Chinese Ministry of Foreign Affairs had no immediate comment. Last week, China denied the accusations regarding Gutierrez's laptop and the alleged effort to hack Commerce Department computers.

Wolf said he has known about the hacking for a long time but was discouraged from discussing it publicly by people inside U.S. government, whom he refused to identify.

"The problem has been that no one wants to talk about this issue," said Wolf. "Every time I've started to do something I've been told 'You can't do this.' A lot of people have made it very, very difficult."

Wolf plans to introduce a resolution that he says will help ensure protection for all House computers and information systems. In a draft of prepared remarks he planned to deliver on the House floor Wednesday afternoon, Wolf says he is "deeply concerned that Congress is not adequately aware of or protected" from cyber attacks.

"My own suspicion is I was targeted by China because of my long history of speaking out about China's abysmal human rights record," Wolf says in his remarks. He said Congress should hold hearings, specifically the House Intelligence Committee, Armed Services Committee and Government Operations Committee.

Wolf's resolution calls for the chief administrative officer and sergeant at arms of the House, in consultation with the FBI, to alert House members and their staffs to the danger of electronic attacks. He also wants lawmakers to be fully briefed on ways to safeguard official records from electronic security breaches.

Speaking generally in May 2006, Wolf called Chinese spying efforts "frightening" and said it was no secret that the United States is a principal target of Chinese intelligence services.


TOPICS: Crime/Corruption; Foreign Affairs; Government; Politics/Elections
KEYWORDS: china; chinese; chinesehackers; computers; congress; hacked; hackers; lawmakers
Navigation: use the links below to view more comments.
first 1-2021-29 next last

1 posted on 06/11/2008 12:34:17 PM PDT by NormsRevenge
[ Post Reply | Private Reply | View Replies]

In this Sept. 20, 2006 file photo, Rep. Frank R. Wolf, R-Va. gestures during a news conference on Capitol Hill in Washington. Wolf said Wednesday, June 11,2 008, the FBI has found that four of his government computers have been hacked by sources working out of China. (AP Photo/Lawrence Jackson, File)


2 posted on 06/11/2008 12:36:25 PM PDT by NormsRevenge (Semper Fi ... Godspeed ... ICE toll-free tip hotline 1-866-DHS-2-ICE ... 9/11 .. Never FoRget!!!)
[ Post Reply | Private Reply | To 1 | View Replies]

The FBI declined to comment. In Beijing, the Chinese Ministry of Foreign Affairs had no immediate comment. Last week, China denied the accusations regarding Gutierrez’s laptop and the alleged effort to hack Commerce Department computers.

Wolf said he has known about the hacking for a long time but was discouraged from discussing it publicly by people inside U.S. government, whom he refused to identify.

“The problem has been that no one wants to talk about this issue,” said Wolf. “Every time I’ve started to do something I’ve been told ‘You can’t do this.’ A lot of people have made it very, very difficult.”


3 posted on 06/11/2008 12:37:24 PM PDT by NormsRevenge (Semper Fi ... Godspeed ... ICE toll-free tip hotline 1-866-DHS-2-ICE ... 9/11 .. Never FoRget!!!)
[ Post Reply | Private Reply | To 2 | View Replies]

To: NormsRevenge

What a bunch of dummies! Sensitive files should never be kept on a computer that has portals to the internet.

The home computer we have that has a portal to the internet unfortunately has an IP address that is within the range used by government computers. We get hacked all the time!

Sensitive data - financial records and favorite recipes - are kept on our other computer, a stand alone.


4 posted on 06/11/2008 12:38:08 PM PDT by SatinDoll (Desperately desiring a conservative government.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SatinDoll

Good idea to have a computer that can’t connect to the internet.


5 posted on 06/11/2008 12:41:32 PM PDT by wastedyears (Like a bat outta Hell.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: wastedyears
Good idea to have a computer that can’t connect to the internet.

I have no prolems with security... and connect with all four of my Macs, networked, and open to Mr. Gore's invention. Try and get in! It's on right now!


6 posted on 06/11/2008 12:47:03 PM PDT by WVKayaker ( "Life is pleasant. Death is peaceful. It's the transition that's troublesome..." I. Asimov)
[ Post Reply | Private Reply | To 5 | View Replies]

To: WVKayaker

Not sure why this is news; my firewall gets felt up by the far east just about every day.


7 posted on 06/11/2008 12:53:33 PM PDT by DonaldC
[ Post Reply | Private Reply | To 6 | View Replies]

To: WVKayaker

All evidence to the contrary.

http://www.infoworld.com/article/08/03/27/Gone-in-2-minutes-Mac-gets-hacked-first-in-contest_1.html


8 posted on 06/11/2008 1:00:12 PM PDT by TexasGunLover ("Either you're with us or you're with the terrorists."-- President George W. Bush)
[ Post Reply | Private Reply | To 6 | View Replies]

To: TexasGunLover

“Nobody was able to hack into the systems on the first day of the contest when contestants were only allowed to attack the computers over the network, but on Thursday the rules were relaxed so that attackers could direct contest organizers using the computers to do things like visit Web sites or open e-mail messages.”

This is funny. Just shows computer security is as good as the idiot driving it. Course without local access to the machine, it seemed pretty secure.


9 posted on 06/11/2008 1:06:33 PM PDT by DonaldC
[ Post Reply | Private Reply | To 8 | View Replies]

To: DonaldC

That was a quote from the infoworld link, by the way. :)


10 posted on 06/11/2008 1:16:33 PM PDT by DonaldC
[ Post Reply | Private Reply | To 9 | View Replies]

To: NormsRevenge

chicom bump for later............


11 posted on 06/11/2008 1:16:41 PM PDT by indthkr
[ Post Reply | Private Reply | To 1 | View Replies]

To: DonaldC
Computers are inherently insecure.

Linux, Windows, Mac OS, other flavors of Unix, all have their faults. Fan boys will defend one over the other, but the fact is they all have their stability, security and reliability problems.
12 posted on 06/11/2008 1:19:27 PM PDT by TexasGunLover ("Either you're with us or you're with the terrorists."-- President George W. Bush)
[ Post Reply | Private Reply | To 9 | View Replies]

To: NormsRevenge
Wolf said that in his office, the hackers "got everything," including all the casework regarding political dissidents around the world.

What a 1st class imbecile this guy is..
He is known to be anti-Chicom, and and working on Chinese human right issues - AND HE PUTS THAT INFO ON HIS UNSECURED LAPTOP - even though everyone and his mother know the chicoms have been hacking into everthing they think has value???
A lot of good people over in China could die because of this lame-brain..

13 posted on 06/11/2008 1:26:03 PM PDT by Riodacat (Legum servi sumus ut liberi esse possimus.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TexasGunLover
All Some evidence to the contrary.

Please explain what happened. I think I know. If you're interested in a proper explanation, you can scan Swordmaker's files, or just ask him. I just use my computers.

I can leave my Mac on all the time. Unfortunately, viruses are programs, and can only rub if I tell them to do so. Of course, it has to get past a firewall, built into OSX.

Show evidence of something real, in the wild, that can actually penetrate my native security, and not something from somebody trying to sell anti-whatever software!

I'll buy you a bottle of your choice if you can prove the ability to spy on my computer exists. Take over my computer, and I'll buy you a case!

14 posted on 06/11/2008 1:44:13 PM PDT by WVKayaker ( "Life is pleasant. Death is peaceful. It's the transition that's troublesome..." I. Asimov)
[ Post Reply | Private Reply | To 8 | View Replies]

To: WVKayaker
OSX/Inqtana.A, and Leap.A are examples of viruses that have been seen in the wild that affect the Mac OS X platform.

Like any other OS, Macs can be, have been, and are being cracked right now. As the article stated, like other OS's Mac OS was not able to be cracked over the network. This also applies to Vista and recent Linux distributions.

With physical access, like other platforms including Windows and Linux, I can gain access to your files with nothing more than a Mac OS installation disk. No password required.

Due to the very nature of the TCP/IP stack, your non-SSL network traffic is completely interpretable.
15 posted on 06/11/2008 2:04:30 PM PDT by TexasGunLover ("Either you're with us or you're with the terrorists."-- President George W. Bush)
[ Post Reply | Private Reply | To 14 | View Replies]

To: WVKayaker

I hear there’s a backdoor if you’re watching the “China Syndrome” on a Mac.

I wouldn’t taunt them if I were you.


16 posted on 06/11/2008 2:07:33 PM PDT by wolfcreek (I see miles and miles of Texas....let's keep it that way.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: TexasGunLover
With physical access, like other platforms including Windows and Linux, I can gain access to your files with nothing more than a Mac OS installation disk. No password required.

Smith & Wesson may limit your access...

17 posted on 06/11/2008 2:09:31 PM PDT by WVKayaker ( "Life is pleasant. Death is peaceful. It's the transition that's troublesome..." I. Asimov)
[ Post Reply | Private Reply | To 15 | View Replies]

To: wolfcreek
Never cared for Kurt. I'm a Jet Li guy! (after Chuck Norris, of course!)


18 posted on 06/11/2008 2:16:55 PM PDT by WVKayaker ( "Life is pleasant. Death is peaceful. It's the transition that's troublesome..." I. Asimov)
[ Post Reply | Private Reply | To 16 | View Replies]

To: WVKayaker
& Wesson may limit your access...

Never the point of the argument. The point is, they're all unsecure. Besides, you don't stay at home all day long do you?

Where there's a will, there's a way.
19 posted on 06/11/2008 2:18:22 PM PDT by TexasGunLover ("Either you're with us or you're with the terrorists."-- President George W. Bush)
[ Post Reply | Private Reply | To 17 | View Replies]

To: TexasGunLover
whatever...


20 posted on 06/11/2008 2:34:35 PM PDT by WVKayaker ( "Life is pleasant. Death is peaceful. It's the transition that's troublesome..." I. Asimov)
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-29 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson