Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Hacker attacks in US linked to Chinese military: researchers
BreitBart ^ | December 12, 2005

Posted on 12/12/2005 3:16:48 PM PST by Irontank

A systematic effort by hackers to penetrate US government and industry computer networks stems most likely from the Chinese military, the head of a leading security institute said. The attacks have been traced to the Chinese province of Guangdong, and the techniques used make it appear unlikely to come from any other source than the military, said Alan Paller, the director of the SANS Institute, an education and research organization focusing on cybersecurity.

"These attacks come from someone with intense discipline. No other organization could do this if they were not a military organization," Paller said in a conference call to announced a new cybersecurity education program.

In the attacks, Paller said, the perpetrators "were in and out with no keystroke errors and left no fingerprints, and created a backdoor in less than 30 minutes. How can this be done by anyone other than a military organization?"

Paller said that despite what appears to be a systematic effort to target government agencies and defense contractors, defenses have remained weak in many areas.

"We know about major penetrations of defense contractors," he said.

Security among private-sector Pentagon contractors may not be as robust, said Paller, because "they are less willing to make it hard for mobile people to get their work done."

Paller said the US government strategy appears to be to downplay the attacks, which has not helped the situation.

"We have a problem that our computer networks have been terribly and deeply penetrated throughout the United States ... and we've been keeping it secret," he said.

"The people who benefit from keeping it secret are the attackers."

Although Paller said the hackers probably have not obtained classified documents from the Pentagon, which uses a more secure network, it is possible they stole "extremely sensitive" information.

He said it has been documented that US military flight planning software from its Redstone Arsenal was stolen.

Pentagon officials confirmed earlier this year that US Defense Department websites are probed hundreds of times a day by hackers, but maintained that no classified site is known to have been penetrated by hackers.

The US military has code-named the recent hacker effort "Titan Rain" and has made some strides in counter-hacking to identify the attackers, Paller said. This was first reported by Time magazine.

Paller said a series of attacks on British computer networks reported earlier this year may have similar goals, but seems to use different techniques.

In the United States, he said there are some areas of improvement such as the case of the Air Force, which has been insisting on better security from its IT vendors. But he argued that "the fundamental error is that America's security strategy relies on writing reports rather than hardening systems."


TOPICS: Computers/Internet; Conspiracy; Government; Military/Veterans; Politics; Science
KEYWORDS: afp; army; atta; british; bush; bush43; chinese; chinesemilitary; cia; clintonlegacy; computer; dod; espionage; frontpage; gwot; hacker; military; networks; terrorism; terrorists; wot

1 posted on 12/12/2005 3:16:49 PM PST by Irontank
[ Post Reply | Private Reply | View Replies]

To: Irontank
How can this be done by anyone other than a military organization?

*Snicker*

2 posted on 12/12/2005 3:22:58 PM PST by Michael Goldsberry (Lt. Bruce C. Fryar USN 01-02-70 Laos)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Michael Goldsberry

I am sure that they are just making sure that we have as much military technology as they do.


3 posted on 12/12/2005 3:24:04 PM PST by willyd (No nation has ever taxed its citizens into prosperity)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Michael Goldsberry

Yeah that line had me going, too. I don't doubt the premise though, that the ChiCom military is behind the attacks. I would go farther and say that the ChiComs are also behind most of the viruses that hit the 'net as well as spam e-mail (which I often trace back to China).


4 posted on 12/12/2005 3:45:49 PM PST by thoughtomator (What'ya mean you formatted the cat!?)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Irontank
More details in this August 29, 2005 article:

The Invasion of the Chinese Cyberspies (And the Man Who Tried to Stop Them)

Fascinating article.

5 posted on 12/12/2005 5:57:32 PM PST by FReepaholic (Admitted FReepaholic since 1998.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Michael Goldsberry
I wouldn't snicker so fast - considering we don't have the comments in full context, I'm sure that line was out of context. If you look at the location and other activity that went on, the amount of control over internet access in China, one could easily make an educated guess about the other side and who exactly is doing it (and it wasn't some bored Chinese peasant). Paller was probably flirting with a questioning from the FBI.

As far as security - I see lapses all the time - too many companies want their people to have mobile access, and any network stops being secure the moment there is access available from outside the building(s).

The only good thing - most lax security is exploited for financial gain - i.e. spammers and the like.
6 posted on 12/12/2005 6:01:52 PM PST by af_vet_rr
[ Post Reply | Private Reply | To 2 | View Replies]

To: af_vet_rr
As far as security - I see lapses all the time

Need I say more?

7 posted on 12/12/2005 6:10:53 PM PST by Michael Goldsberry (Lt. Bruce C. Fryar USN 01-02-70 Laos)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Irontank
Friends of Bill (Clintoon that is . . .)
8 posted on 12/12/2005 7:56:19 PM PST by BenLurkin (O beautiful for patriot dream - that sees beyond the years)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson