Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

China Has Penetrated Key U.S. Databases: SANS Director
SC Magazine ^ | January 18, 2008 | By Jack Rogers

Posted on 01/18/2008 4:41:50 PM PST by JACKRUSSELL

An aggressive, non-stop campaign by China to penetrate key government and industry databases in the United States already has succeeded and the United States urgently needs to monitor all internet traffic to critical government and private-sector networks “to find the enemy within,” SANS Institute Director of Research Alan Paller told SCMagazineUS.com.

“They are already in and we have to find them,” Paller said.

Paller said that empirical evidence analyzed by researchers leaves little doubt that the Chinese government has mounted a non-stop, well-financed attack to breach key national security and industry databases, adding that it is likely that this effort is making use of personnel provided by China's People's Liberation Army.

The “smoking guns” pointing to a government-directed effort are keystroke logs of the attacks, which have been devoid of errors usually found in amateur hack attacks, the use of spear phishing to gain entry into computer networks, and the massively repetitive nature of the assault, the SANS research director said.

“This is not amateur hacking. They are going back to the same places 100 times a day, every day. This kind of an effort requires a massive amount of money and resources,” Paller told SCMagazineUS.com.

Paller said that monitoring all internet traffic – including email – to government and private-sector networks is necessary in order to pinpoint breaches and, ultimately, to prevent cyberspies from extracting critical data. The traffic must be carefully analyzed to detect “micro-patterns” that reveal breaches, he said.

“We have to find the needle in the haystack,” he said.

SANS earlier this week placed espionage from China and other nations near the top of its annual list of cybersecurity menaces, reporting that targeted spear phishing is the weapon of choice used in the assault on U.S. databases and those of its allies.

“They are using spear phishing because it is so effective, and it is the least difficult technique [of gaining entry]” Paller said. “They can target anyone within an organization who has a computer. Once they get in, they can go everywhere.”

In November, President Bush requested $154 million in funding for what is expected to be a seven-year, multibillion-dollar program to track cyberthreats on government and private networks. The proposed countermeasures include the reduction of access points between government computers and the internet from a current level of 2,000 to 50, and the assignment of up to 2,000 DHS and NSA security experts to full-time monitoring of critical infrastructure networks to prevent unauthorized instrusion.

Key members of Congressional oversight committees have complained that they have not been fully briefed on the proposal and they have raised concerns about the potential infringement on privacy.

According to SANS' research director, the monitoring envisioned by the government's cybersecurity plan can be implemented without trampling on privacy rights as long as procedures are in place to ensure that it is the traffic itself, rather than the contents of email messages, that is being monitored.

“Monitoring email traffic is not the same thing as reading everyone's email,” Paller said.

The scope of the cybersecurity problem was underlined this week in a profile of U.S. Director of National Intelligence (DNI) Mike McConnell published this week in the New Yorker magazine.

The New Yorker article reported that the Defense Department currently is detecting about three million unauthorized probes on its computer networks every day, while the State Department fends off two million probes daily.

These probes often turn into full-scale attacks, the magazine reported, such as the assault last year on the Pentagon that required 1,500 computers to be taken offline. American allies also have been targeted: In May, the German government blamed the Chinese military after it discovered a spyware program had been planted inside government computers in several key ministries. Chinese officials called the accusation “preposterous.”

McConnell has made information security a top priority for the myriad intelligence agencies he oversees, including the NSA, CIA and the Pentagon's intelligence arm.

The DNI said that Chinese computer attacks have intensified in recent months, while hacking activity emanating from Russia has remained at Cold War levels. Ed Giorgio, a security consultant who worked at the NSA under McConnell, told the New Yorker that China now has 40,000 hackers collecting intelligence off U.S. information systems and those of U.S. allies.

As intense as the assault on U.S. intelligence networks appears to be, cyberespionage directed by foreign governments against U.S. companies is an even bigger problem, McConnell said. “The real question is what to do about industry. Ninety-five percent of this is a private-sector problem,” he told the New Yorker.

The SANS Institute's annual listing of top 10 cyber menaces reported that China and other nations last year had engineered “massive penetration” of U.S. federal agencies and defense contractors, stealing terabytes of data. The institue said that these attacks are expected to intensify this year.

“In 2008, despite intense scrutiny, these nation-state attacks will expand,” SANS warned. “More targets and increased sophistication will mean many successes for attackers. Economic espionage will be increasingly common as nation-states use cybertheft of data to gain economic advantage in multinational deals.”

SANS said the “attack of choice” by foreign cyberwarriors is a form of targeted spear phishing using attachments and well-researched social engineering methods to make the victim believe that an attachment comes from a trusted source. SANS also said overseas hackers are making use of newly discovered Microsoft Office vulnerabilities and hiding their techniques to circumvent virus checking.

McAfee's Avert Labs, in its McAfee Virtual Criminology Report, predicted that the rise in international cyber spying will pose the number one security threat in 2008.


TOPICS: Front Page News; News/Current Events
KEYWORDS: abledanger; bushfault; bushlegacy; chicoms; china; clintonlegacy; communism; cybersecurity; espionage; internet; lenovo; loral; securitybreach; traitor; yearoftherat
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-72 next last
To: JACKRUSSELL

btt


21 posted on 01/18/2008 7:58:03 PM PST by Cacique (quos Deus vult perdere, prius dementat ( Islamia Delenda Est ))
[ Post Reply | Private Reply | To 1 | View Replies]

To: cripplecreek
If you think there is no difference between a RINO and a hardcore Stalinist commie, you are foolishly mistaken. I don’t like RINOs any more than any other conservative, but we have only seen the tip of the iceberg when it comes to what the Stalinists who ran the WH from 92 to 2000 gave to our enemies. Gertz has done a good job of exposing the Clintons, who were guilty of ‘sins of commission.’ Bush has been weak, too, but his wrongs fall more into the category of ‘sins of omission.’ Not excusable, but hardly on a par with taken campaign contributions from known ChiComs and rewarding them with missile-guidance technology. And the Clintons are still at it. Let’s not forget their recent campaign scandals involving the ChiComs.
22 posted on 01/18/2008 8:00:52 PM PST by Ghost of Philip Marlowe (If Hillary is elected, her legacy will be telling the American people: Better put some ice on that.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: huldah1776

Yup. Try colleges and universities. We teach them how to do what they do, and we pay them to do it while they’re here.


23 posted on 01/18/2008 8:04:20 PM PST by petitfour
[ Post Reply | Private Reply | To 15 | View Replies]

To: JACKRUSSELL

24 posted on 01/18/2008 8:43:10 PM PST by winstonwolf33 ("Priapus, king and master! Master of the Universe! King of the Jungle!"--Bonfire of the Vanities)
[ Post Reply | Private Reply | To 1 | View Replies]

To: JACKRUSSELL

I assume in any hot confrontation with china, the US military and government would see exactly what they can do to US networks. Trash-talk and one-liners aside, I assume this would not be pretty.


25 posted on 01/18/2008 8:50:52 PM PST by WoofDog123
[ Post Reply | Private Reply | To 1 | View Replies]

To: Gideon7

Where would I find a list of the IP ranges used by China and Russia? simply banning both makes too much sense to not do it.


26 posted on 01/18/2008 8:52:14 PM PST by WoofDog123
[ Post Reply | Private Reply | To 20 | View Replies]

To: JACKRUSSELL
Let them in and let them conviently find the plans for a nuclear retaliation if they mess with Taiwan.

You could also provide credible plans for overthrowing their government.

27 posted on 01/18/2008 8:58:31 PM PST by maui_hawaii
[ Post Reply | Private Reply | To 1 | View Replies]

To: milford421; Founding Father; Calpernia

Ping.


28 posted on 01/18/2008 9:51:40 PM PST by nw_arizona_granny (http://www.freerepublic.com/focus/news/1886546/posts?page=4972#4972 45 Item Communist Manifesto)
[ Post Reply | Private Reply | To 1 | View Replies]

To: JACKRUSSELL

Bump


29 posted on 01/18/2008 10:56:36 PM PST by AmericaUnite
[ Post Reply | Private Reply | To 1 | View Replies]

To: JACKRUSSELL

Please Jack, Freepmail everyone per Satindoll:

With all this penetration, is it possible that China is planning an attack on the US by using a DDOS attack? Maybe, and I’m just guessing here, but from what I have seen before on other networks, is it perhaps that they aren’t looking just for information. I’m not 100% sure on this, but it fits a scenario that I’ve seen elsewhere on a much smaller scale.


30 posted on 01/18/2008 11:35:56 PM PST by SatinDoll (Fredhead and proud of it!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: JACKRUSSELL
"'This kind of an effort requires a massive amount of money and resources,' Paller told SCMagazineUS.com."

Why would he tell such a lie, especially while our business and government leadership is funding China's military buildup?

"Paller said that monitoring all internet traffic – including email – to government and private-sector networks is necessary...In November, President Bush requested $154 million in funding for what is expected to be a seven-year, multibillion-dollar program to track cyberthreats on government and private networks."

Oh, I see... so their MS-using, degreed retards can help to railroad and imprison more victims whose computers have been cracked and controlled by their US-educated, offshore PLA employees.


31 posted on 01/19/2008 12:21:38 AM PST by familyop (cbt. engr. (cbt), '89-'96)
[ Post Reply | Private Reply | To 1 | View Replies]

To: JACKRUSSELL

They are waging war on us and we can’t even get them adjust their currency. Something’s not right here.


32 posted on 01/19/2008 12:43:52 AM PST by TheThinker
[ Post Reply | Private Reply | To 1 | View Replies]

To: JACKRUSSELL

bttt


33 posted on 01/19/2008 12:52:43 AM PST by AnimalLover ( ((Are there special rules and regulations for the big guys?)))
[ Post Reply | Private Reply | To 1 | View Replies]

To: TheThinker

The truth of the matter is that China has been adjusting its currency. But that raises the prices of Chinese exports to here (the USA). Our import business and government leadership don’t want the dollar to go down with respect to foreign currencies, and they don’t want freight fuel to go up. After about 40 years, our bosses’ (both political parties and most of the biggest businesses) game is about to end. They’re freaking out, and they’re lying to us.

I say let ‘er rip. May oil go to $200 per barrel and the dollar to equal the yuan. We’re spoiled rotten. We need to learn some lessons and get right with G-d, family and country (in that order—not the other way around).


34 posted on 01/19/2008 12:56:57 AM PST by familyop (cbt. engr. (cbt), '89-'96, will write Duncan Hunter in)
[ Post Reply | Private Reply | To 32 | View Replies]

To: JACKRUSSELL
Maybe the gov't should switch to Macs.
I keep reading on FR that they are hacker-proof :)
35 posted on 01/19/2008 1:39:24 AM PST by ComputerGuy (An expert is a person who avoids the small errors while sweeping on to the grand fallacy)
[ Post Reply | Private Reply | To 1 | View Replies]

To: AmericanVictory
Does this make it clear that we cannot again have a Clinton in the White House.

Consider the possibility McCain is a tool of the Chinese communists... they had him as a captive for quite a while...

36 posted on 01/19/2008 1:52:30 AM PST by Sir Francis Dashwood (LET'S ROLL!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Sir Francis Dashwood

Yep, McCain is a tool, just not sure whose tool he is but I too would bet on the Chinese communists... they had him as a captive for quite a while, 5+years is long enough!


37 posted on 01/19/2008 3:56:35 AM PST by iopscusa (El Vaquero. (SC Lowcountry Cowboy))
[ Post Reply | Private Reply | To 36 | View Replies]

To: KylaStarr; Cindy; StillProud2BeFree; nw_arizona_granny; Velveeta; Dolphy; appalachian_dweller; ...

ping


38 posted on 01/19/2008 4:03:25 AM PST by Calpernia (Hunters Rangers - Raising the Bar of Integrity http://www.barofintegrity.us)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Citizen Tom Paine

>>>“Employment of Secret Agents”

“Disarm your enemy in peace by diplomacy and trade if you would conquer him more readily on the field of battle”

- Klaus von Clausewitz, father of German militarism


39 posted on 01/19/2008 4:12:56 AM PST by Calpernia (Hunters Rangers - Raising the Bar of Integrity http://www.barofintegrity.us)
[ Post Reply | Private Reply | To 16 | View Replies]

To: Gideon7
We recently banned all Chinese IP addrs at the firewall. We get less than 0.1% sales from China and most of those are stolen credit cards anyway. (We banned Russia years ago for the same reason.) .

That must be a massive database, though. I already hit the size limit for my .htaccess for my site denials..there are so many IP adresses. You must have to work on it constantly.

Any tips will be appreciated!

40 posted on 01/19/2008 4:14:11 AM PST by Gorzaloon
[ Post Reply | Private Reply | To 20 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-72 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson