Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Cyber officials: Chinese hackers attack 'anything and everything'
fcw.com ^ | February 13, 2007 | Josh Rogin

Posted on 02/17/2007 10:45:50 PM PST by Windcatcher

NORFOLK, Va. -- At the Naval Network Warfare Command here, U.S. cyber defenders track and investigate hundreds of suspicious events each day. But the predominant threat comes from Chinese hackers, who are constantly waging all-out warfare against Defense Department networks, Netwarcom officials said.

Attacks coming from China, probably with government support, far outstrip other attackers in terms of volume, proficiency and sophistication, said a senior Netwarcom official, who spoke to reporters on background Feb 12. The conflict has reached the level of a campaign-style, force-on-force engagement, he said.

“They will exploit anything and everything,” the senior official said, referring to the Chinese hackers’ strategy. And although it is impossible to confirm the involvement of China’s government, the attacks are so deliberate, “it’s hard to believe it’s not government-driven,” the official said.

The motives of Chinese hackers run the gamut, including technology theft, intelligence gathering, exfiltration, research on DOD operations and the creation of dormant presences in DOD networks for future action, the official said.

A recent Chinese military white paper states that China plans to be able to win an “informationized war” by the middle of this century. Overall, China seeks a position of power to ensure its freedom of action in international affairs and the ability to influence the global economy, the senior official said.

Chinese hackers were responsible for an intrusion in November 2006 that disabled the Naval War College’s network, forcing the college to shut down its e-mail and computer systems for several weeks, the official said. Forensic analysis showed that the Chinese were seeking information on war games in development at NWC, the official said.

NWC was vulnerable because it was not part of the Navy Marine Corps Intranet and did not have the latest security protections, the official explained. He said this was indicative of the Chinese strategy to focus on weak points in the network.

China has also been using spear phishing, sending deceptive mass e-mail messages to lure DOD users into clicking on a malicious URL, the official said. China is also using more traditional hacking methods, such as Trojan horse viruses and worms, but in innovative ways.

For example, a hacker will plant a virus as a distraction and then come in “slow and low” to hide in a system while the monitors are distracted. Hackers will also use coordinated, multipronged attacks, the official added.

Chinese hackers gained notoriety in the United States when a series of devastating intrusions, beginning in 2003, was traced to a team of researchers in Guangdong Province. The program, which DOD called Titan Rain, was first reported by Federal Computer Week in August 2005. Following that incident, DOD renamed the program and then classified the new name.

That particular set of hackers is still active, the Netwarcom official said. He would not confirm whether the Titan Rain group was linked to the NWC attack or any other recent high-profile intrusions.

Other senior military officials have spoken out recently on U.S. cyber strategy, saying the country urgently needs to develop new policies and procedures for fighting in the cyber domain.

Current U.S. cyber warfare strategy is dysfunctional, said Gen. James Cartwright, commander of the Strategic Command (Stratcom), in a speech at the Air Warfare Symposium in Orlando, Fla., last week. Offensive, defensive and reconnaissance efforts among U.S. cyber forces are incompatible and don’t communicate with one another, resulting in a disjointed effort, Cartwright said.

Gen. Ronald Keys, commander of Air Combat Command, told reporters at the conference that current policies prevent the United States from pursuing cyberthreats based in foreign countries. Technology has outpaced policy in cyberspace, he said.

The United States should take more aggressive measures against foreign hackers and Web sites that help others attack government systems, Keys said. It may take a cyber version of the 2001 terrorist attacks for the country to realize it must re-examine its approach to cyber warfare, he added.

Netwarcom officials described their approach as an active defense, in which monitors build defenses around the perimeter of DOD systems, work to mitigate the effects of attacks and restore damaged parts of the network.

Meanwhile, the consolidation of DOD’s cyber resources is ongoing. Netwarcom works directly with the Joint Task Force for Global Network Operations, DOD’s lead agency on network defense and operations, a component of Stratcom.

Netwarcom, the Navy’s lead cyber agency, is moving from monitoring the networks to full command-and-control capabilities. The Air Force announced in October 2006 that it will create a Cyber Command, based on the infrastructure of the 8th Air Force under Lt. Gen. Robert Elder, at Barksdale Air Force Base, La., to coordinate its cyber warfare efforts.

In the end, the cyberthreat is revolutionary, officials said, because it has no battle lines, the intelligence is intangible, and attacks come without warning, leaving no time to prepare defenses. Education and training of computer users, not enforcement, are the most effective defense measures, officials said.


TOPICS: Crime/Corruption; Foreign Affairs
KEYWORDS: china; espionage; hackers; security
Navigation: use the links below to view more comments.
first previous 1-2021-28 last
To: Virginia Ridgerunner
The really frustrating thing about this is that most of these PLA hackers were trained in computer science/engineering programs in American universities under international student exchange programs during the Clinton years. Now, these American-trained ChiCom hackers are in the PLA and are turning their training against us in cyberspace.

Yup, though it's still going on today... When I was in school, back in 1986, while in the engineering buildings, I could go days without hearing English spoken once, outside of classes. And in fact, we had a "visiting professor" from China teaching a digital logic class, who would occassionally lapse into Chinese during his lectures (his English was horrible and the Chinese students in the class had a habit of asking questions in Chinese, and he'd answer them in Chinese as well! Yes, we complained to the EE department).

Mark

21 posted on 02/18/2007 6:51:07 AM PST by MarkL (When Kaylee says "No power in the `verse can stop me," it's cute. When River says it, it's scary!)
[ Post Reply | Private Reply | To 18 | View Replies]

To: MarkL
Information flowing............................................................................>

22 posted on 02/18/2007 6:59:40 AM PST by Wolverine (A Concerned Citizen)
[ Post Reply | Private Reply | To 21 | View Replies]

To: sergeantdave

We need to get our teenage hacking communities to target China.


23 posted on 02/18/2007 8:31:39 AM PST by aimhigh
[ Post Reply | Private Reply | To 17 | View Replies]

To: sergeantdave

I'm afraid that would upset the Waltons (as well as many others).


24 posted on 02/18/2007 8:39:10 AM PST by Riverine
[ Post Reply | Private Reply | To 17 | View Replies]

To: Captain Rhino
At this point, I invite the Apple users to remind us, ONE MORE TIME, of the vastly superior security of the Apple family of operating systems. Right after that, they can explain why Apple computers have to continue to cost so much more than PCs. (Outside of pure greed, that is.)

You're hereby reminded as requested. Most Mac users don't even feel the need to run antivirus software. If you're happy with Windows, though, more power to ya'.

As to their cost, current Macs are about on par with mid- and high-end PCs having equivalent specs. What aren't available from Apple are stripped-down entry-level machines priced as loss leaders.

25 posted on 02/18/2007 9:36:11 AM PST by doc11355
[ Post Reply | Private Reply | To 16 | View Replies]

To: Windcatcher

Anyone that believes that China is our "friend" is a fool.


26 posted on 02/18/2007 10:49:02 AM PST by EEDUDE
[ Post Reply | Private Reply | To 1 | View Replies]

To: Yehuda

Yeah, I'm hoping we're returning the favor.


27 posted on 02/18/2007 1:20:22 PM PST by johnmark7
[ Post Reply | Private Reply | To 7 | View Replies]

To: Captain Rhino

Thanks for that info.


28 posted on 02/18/2007 4:44:08 PM PST by TheLion (How about "Comprehensive Immigration Enforcement," for a change)
[ Post Reply | Private Reply | To 16 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-28 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson