Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Cyber officials: Chinese hackers attack 'anything and everything'
fcw.com ^ | February 13, 2007 | Josh Rogin

Posted on 02/17/2007 10:45:50 PM PST by Windcatcher

click here to read article


Navigation: use the links below to view more comments.
first 1-2021-28 next last
I'm struck by the fact that attempting to hack into Chinese servers would land someone in jail here, yet they are apparently free to wage their undeclared war on us without the slightest peep from our government. We still sleepily buy their goods, enriching their war machine which is day by day attempting to catch up to us (and they know how much they have to catch up because of the information they're stealing). And yet we just keep enriching them, while it's as clear as day that these people mean us harm.
1 posted on 02/17/2007 10:45:53 PM PST by Windcatcher
[ Post Reply | Private Reply | View Replies]

To: Windcatcher
You might be interested in a recent vanity of mine.

Look for Part III in the series, on China, tomorrow morning.

Cheers!

2 posted on 02/17/2007 10:49:54 PM PST by grey_whiskers (The opinions are solely those of the author and are subject to change without notice.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Windcatcher

It's actually good for us to have these kind of attacks going on. Teaches us to better defend our networks and keeps the DoD's cowboys well-trained and on their toes.


3 posted on 02/17/2007 10:53:54 PM PST by Zeroisanumber (Quis custodiet ipsos custodes?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Windcatcher

You would think we would create a private web for some of the vulnerable systems. That way users would have to be part of the system. I'm no expert....it's just a thought.


4 posted on 02/17/2007 11:00:27 PM PST by TheLion (How about "Comprehensive Immigration Enforcement," for a change)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Zeroisanumber

Well, yeah. As long as they aren't sucessful.


5 posted on 02/17/2007 11:01:40 PM PST by D-fendr
[ Post Reply | Private Reply | To 3 | View Replies]

To: Windcatcher

I would suggest sending 50 container ships back to China with their cargo everytime they attempt to hack into our computers.


6 posted on 02/17/2007 11:18:57 PM PST by A6M3
[ Post Reply | Private Reply | To 1 | View Replies]

Comment #7 Removed by Moderator

To: Yehuda

And that too.


8 posted on 02/17/2007 11:37:38 PM PST by A6M3
[ Post Reply | Private Reply | To 7 | View Replies]

To: Zeroisanumber
It's actually good for us to have these kind of attacks going on. Teaches us to better defend our networks and keeps the DoD's cowboys well-trained and on their toes.

Absolutely. Better now than after the shooting starts.

9 posted on 02/18/2007 12:01:18 AM PST by Northern Alliance
[ Post Reply | Private Reply | To 3 | View Replies]

To: Yehuda

I'll show this to my "smart guy"


10 posted on 02/18/2007 12:05:21 AM PST by Dad yer funny (FoxNews is morphing , and not for the better ,... internal struggle? Its hard to watch)
[ Post Reply | Private Reply | To 7 | View Replies]

To: D-fendr
Well, yeah. As long as they aren't sucessful.

I guess I'm not too worried about that. I can't imagine that the DoD keeps anything too valuable attached to a computer network.

11 posted on 02/18/2007 12:07:08 AM PST by Zeroisanumber (Quis custodiet ipsos custodes?)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Zeroisanumber

So the Chinese are just wasting their time?


12 posted on 02/18/2007 12:15:49 AM PST by D-fendr
[ Post Reply | Private Reply | To 11 | View Replies]

To: Windcatcher

Political sites are also probed and copied in Chinese attacks. Then the Chinese use the political information to complain against our USA at UN meetings. I've monitored such attacks in the past. Chinese techs. also use bots (spiders, crawlers,...) to gather e-mail addresses, then spam them.

Those efforts, IMO, are mostly for the purpose of pushing US political site admins. to block Chinese zones for the purpose of walling our part of the Net from Chinese civilians. I encourage civilian admins. here to keep those IP zones (first octets) open. Our US Defense and other sensitive facility admins., though, should probably block them.


13 posted on 02/18/2007 1:09:00 AM PST by familyop
[ Post Reply | Private Reply | To 1 | View Replies]

To: Windcatcher

*BUMP*!


14 posted on 02/18/2007 3:47:56 AM PST by ex-Texan (Matthew 7: 1 - 6)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ATLDiver

Ping. You probably already knew this.


15 posted on 02/18/2007 4:11:51 AM PST by FreedomPoster (Guns themselves are fairly robust; their chief enemies are rust and politicians) (NRA)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TheLion

The sensitive ones are already on complete, separate secure networks. No connection to the Internet whatsoever. Still not immune from inside attack but at least the intruder will have to be someone you know and can lay hands on as opposed to a PRC-financed, directed, and supervised cell in China.

What we are dealing with in these hacking attacks are Defense Department networks that have been deliberately provided access to the Internet for all of the convenience it provides. By doing this, the government doesnot have to duplicate all of the communication infrastructure that already exists in the Internet. In addition, there is a lot of open source material on the Internet that the government wants easy access to. In a way, it is sort of like connecting to the public telephone system or using wireless networks. They are open systems anyone, including those with malicious intent, can connect to. Protection against these types of intrusion comes from the security measures you adopt at the threshold of your computer/network-to-Internet connection point and the layers of defense you put up around the more sensitive parts of your system and the data stored on it.

Unfortunately, most of the government is wedded (welded might be a better term) to the Microsoft family of operating systems and the applications based on it. This is a fork in the government computing and network deployment road taken nearly 25 years ago. Like it or not, until the government concludes it really needs something better and someone will build it for them, the compelling massiveness of the government's use of Microsoft's systems is going to dictate its use by a lot of commercial companies and private users (including yours truly). In the mean time, it will continue to provide a lot of opportunity for hacking attacks due to the numerous and severe flaws in its security.

(At this point, I invite the Apple users to remind us, ONE MORE TIME, of the vastly superior security of the Apple family of operating systems. Right after that, they can explain why Apple computers have to continue to cost so much more than PCs. (Outside of pure greed, that is.))


16 posted on 02/18/2007 4:15:07 AM PST by Captain Rhino ( Dollars spent in India help a friend; dollars spent in China arm an enemy.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Captain Rhino

Would sending these hackers a 10 terabyte message filled with gibberish slow their computers and hacking efforts down?


17 posted on 02/18/2007 5:27:19 AM PST by sergeantdave (Consider that nearly half the people you pass on the street meet Lenin's definition of useful idiot)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Windcatcher
A very good friend of mine works in cyber-security for the Marines, and he says that the ChiComs/PLA have been mounting an organized, full-blown military assault on the U.S. Defense Networks for some time now. It's bad, but of course the MSM could give a rat's patoot about it.

The really frustrating thing about this is that most of these PLA hackers were trained in computer science/engineering programs in American universities under international student exchange programs during the Clinton years. Now, these American-trained ChiCom hackers are in the PLA and are turning their training against us in cyberspace.

18 posted on 02/18/2007 5:47:58 AM PST by Virginia Ridgerunner ("Si vis pacem para bellum")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Windcatcher
I'm struck by the fact that attempting to hack into Chinese servers would land someone in jail here, yet they are apparently free to wage their undeclared war on us without the slightest peep from our government. We still sleepily buy their goods, enriching their war machine which is day by day attempting to catch up to us (and they know how much they have to catch up because of the information they're stealing). And yet we just keep enriching them, while it's as clear as day that these people mean us harm.
And we allow them to come over here and attend our colleges, then take the technology and science they've learned back to China. In my opinion, there ought to be an acceptable level of "cyber behavior" that every country that wants to be on the Internet must meet. Failure to have and enforce adequate laws against this sort of activity (or outright sponsoring of it) should result in immediate disconnection of your connections to the rest of the world.
19 posted on 02/18/2007 5:55:08 AM PST by Scutter
[ Post Reply | Private Reply | To 1 | View Replies]

To: sergeantdave

Probably not.

That would be a form of denial of service attack and the countermove is just to stop receiving packets from your Internet address (which is part of each packet). Not to mention, I think it is a federal crime to launch such an attack from US soil.

Probable outcomes:

- Jam your own computer (do you realize how long it would take to SEND a 10 terabyte message? If my math is correct, at say, 1MB/s, it's 10 million seconds or about 115 days!),

- Really, really annoy your ISP, and, lastly,

- Get a visit from the Feds.

From some classes and discussions I have had over the years with Internet security people dealing with these issues, you get the feeling we (the US government and specifically, DoD) are gaining valuable insight into enemy operations by letting these attacks occur, learning how to recognize their onset and defeat/mitigate them, and making US systems more secure against attack from any quarter by making the general on-line population improve their security practices. (Remember, whose fault is it if you or your organization has poor information assurance and data security/recovery practices? Clue: not the attackers.)

Personally, I'd say it is the Chinese who need to worry about what we will do to them if a cyberwar comes. Just how competent are they to defend against continuing attacks on the same scale, magnitude, and sophistication as the attacks we are now having to routinely deal with? Not to mention dealing with all the stuff we are cooking up on our own. They are showing us their approaches, techniques and tactics, I doubt we are showing them much of ours.

But, I could be wrong. Time will tell.







20 posted on 02/18/2007 6:40:40 AM PST by Captain Rhino ( Dollars spent in India help a friend; dollars spent in China arm an enemy.)
[ Post Reply | Private Reply | To 17 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-28 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson