Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Cyber Experts Have Proof That China Has Hijacked U.S.-Based Internet Traffic
National Defense Magazine blog ^ | November 12, 2010 | Stew Magnuson

Posted on 11/16/2010 3:11:21 AM PST by siunevada

For 18 minutes in April, China’s state-controlled telecommunications company hijacked 15 percent of the world’s Internet traffic, including data from U.S. military, civilian organizations and those of other U.S. allies.

This massive redirection of data has received scant attention in the mainstream media because the mechanics of how the hijacking was carried out and the implications of the incident are difficult for those outside the cybersecurity community to grasp, said a top security expert at McAfee, the world’s largest dedicated Internet security company.

In short, the Chinese could have carried out eavesdropping on unprotected communications — including emails and instant messaging — manipulated data passing through their country or decrypted messages, Dmitri Alperovitch, vice president of threat research at McAfee said.

Nobody outside of China can say, at least publicly, what happened to the terrabytes of data after it entered China.

The incident may receive more attention when the U.S.-China Economic and Security Review Commission, a congressional committee, releases its annual report on the bilateral relationship Nov. 17. A commission press release said the 2010 report will address “the increasingly sophisticated nature of malicious computer activity associated with China.”

Said Alperovitch: “This is one of the biggest — if not the biggest hijacks — we have ever seen.” And it could happen again, anywhere and anytime. It’s just the way the Internet works, he explained. “What happened to the traffic while it was in China? No one knows.”

(Excerpt) Read more at nationaldefensemagazine.org ...


TOPICS: Crime/Corruption; Foreign Affairs
KEYWORDS: chinainternet; ewarfare
Navigation: use the links below to view more comments.
first 1-2021-30 next last
“Imagine the capability and capacity that is built into their networks. I’m not sure there was anyone else in the world who could have taken on that much traffic without breaking a sweat”
1 posted on 11/16/2010 3:11:27 AM PST by siunevada
[ Post Reply | Private Reply | View Replies]

To: siunevada

I wonder if they can trap blackberry servers in canada?


2 posted on 11/16/2010 3:13:28 AM PST by x_plus_one (Democrats delenda est)
[ Post Reply | Private Reply | To 1 | View Replies]

To: siunevada

This is what the Chicoms have been after for the past 25 years, hi-tech theft and control. They know both the military and security systems of the West are controlled via the internet and satellite systems. A book was written about this 20 years ago. And all those Chinese nationals wandering around our campuses? How much engineering and hi-tech info. are they sending back, stolen, to the motherland? I suspect more than you can imagine.


3 posted on 11/16/2010 3:23:54 AM PST by john drake (Roman military maxim; "oderint dum metuant," i.e., "let them hate, as long as they fear.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: x_plus_one

Not to worry...90% of the traffic was porn.


4 posted on 11/16/2010 3:24:25 AM PST by spokeshave (Islamics and Democrats unite to cut off Adam Smith's invisible hand)
[ Post Reply | Private Reply | To 2 | View Replies]

To: spokeshave

“Not to worry...90% of the traffic was porn.”

8% emails containing jokes you’ve seen a hundred times.


5 posted on 11/16/2010 3:29:54 AM PST by siunevada (If we learn nothing from history, what's the point of having one? - Peggy Hill)
[ Post Reply | Private Reply | To 4 | View Replies]

To: siunevada

Don’t worry. Obama will do NOTHING. In fact, cyber security may be another possible budget cut. He doesn’t like our military and Obama has been bought and sold many times over. I say this because there is NO WAY,his base came up with record breaking money for his Presidential run. Obama’s main base is the tin cup crowd and utopian people.

Excerpt:

...

This happens accidentally a few times per year, Alperovitch said. What set this incident apart from other such mishaps was the fact that China Telecom could manage to absorb this large amount of data and send it back out again without anyone noticing a disruption in service. In previous incidents, the data would have reached a dead end, and users would not have been able to connect.

Also, the list of hijacked data just happened to include preselected destinations around the world that encompassed military, intelligence and many civilian networks in the United States and other allies such as Japan and Australia, he said. “Why would you keep that list?” Alperovitch asked.

...


6 posted on 11/16/2010 3:30:49 AM PST by nmh (Intelligent people recognize Intelligent Design (God).)
[ Post Reply | Private Reply | To 1 | View Replies]

To: siunevada

Must have wanted some insurance for all their loans vs just iou’s


7 posted on 11/16/2010 3:39:03 AM PST by Flavius
[ Post Reply | Private Reply | To 1 | View Replies]

To: siunevada
"“Not to worry...90% of the traffic was porn.”

8% emails containing jokes you’ve seen a hundred times.

And the rest 0bambi's speaches....joined together with:

and

err

let me make it clear

8 posted on 11/16/2010 3:43:00 AM PST by spokeshave (Islamics and Democrats unite to cut off Adam Smith's invisible hand)
[ Post Reply | Private Reply | To 5 | View Replies]

To: siunevada

Are they preparing for war or what?


9 posted on 11/16/2010 3:54:35 AM PST by cmj328
[ Post Reply | Private Reply | To 1 | View Replies]

To: siunevada

Well, by all means, let’s send our good friends another huge chunk of the American economy. They only have our best interests at heart.


10 posted on 11/16/2010 3:54:52 AM PST by RegulatorCountry
[ Post Reply | Private Reply | To 1 | View Replies]

To: siunevada

Very unsettling.


11 posted on 11/16/2010 3:55:37 AM PST by Think free or die
[ Post Reply | Private Reply | To 1 | View Replies]

To: siunevada
In short, the Chinese could have carried out eavesdropping on unprotected communications …

Hopefully important communications are protected.

12 posted on 11/16/2010 4:13:04 AM PST by R. Scott (Humanity i love you because when you're hard up you pawn your Intelligence to buy a drink)
[ Post Reply | Private Reply | To 1 | View Replies]

To: john drake

The saying here in Silicon Valley is:

Half the Chinese here are spying on us.
The other half are spying on them!


13 posted on 11/16/2010 4:24:32 AM PST by null and void (We are now in day 665 of our national holiday from reality. - 0bama really isn't one of US.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: siunevada

> terrabytes of data ???
Don’t think so small. This is way bigger than the Terabyte level.


14 posted on 11/16/2010 4:45:47 AM PST by BuffaloJack (The Recession is officially over. We are now into Obama's Depression.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: R. Scott
Given enough time, nothing is protected.

If the Chinese found an algorithm that they couldn't read, they now know where to go to get samples from our best codewarriors.

15 posted on 11/16/2010 4:53:05 AM PST by texas booster (Join FreeRepublic's Folding@Home team (Team # 36120) Cure Alzheimer's!)
[ Post Reply | Private Reply | To 12 | View Replies]

To: nmh

No, we have much bigger worries, like old ladies with knitting needles trying to board planes!


16 posted on 11/16/2010 5:07:34 AM PST by kevslisababy
[ Post Reply | Private Reply | To 6 | View Replies]

The incident may receive more attention when the U.S.-China Economic and Security Review Commission, a congressional committee, releases its annual report on the bilateral relationship Nov. 17.

But I wouldn't count on it. Obama himself poses a massive security breach and along with his democRAT controlled Congress (until January 2011) has some of the most rabid anti-Americans that any Congress has had.


17 posted on 11/16/2010 5:13:25 AM PST by pyx (Rule#1.The LEFT lies.Rule#2.See Rule#1. IF THE LEFT CONTROLS THE LANGUAGE, IT CONTROLS THE ARGUMENT.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: pyx

Gee Bill Clinton, thanks forgiving the Chicoms our supercomputors


18 posted on 11/16/2010 5:20:39 AM PST by South Dakota (Drill baby, drill)
[ Post Reply | Private Reply | To 17 | View Replies]

To: siunevada

Pretty soon they will be paying a premium for Navaho codetalkers.


19 posted on 11/16/2010 5:27:00 AM PST by The_Media_never_lie
[ Post Reply | Private Reply | To 1 | View Replies]

To: The_Media_never_lie

Wonder is they can decrypt Jive?


20 posted on 11/16/2010 5:27:38 AM PST by The_Media_never_lie
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-30 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson