Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

China Has Penetrated Key U.S. Databases: SANS Director
SC Magazine ^ | January 18, 2008 | By Jack Rogers

Posted on 01/18/2008 4:41:50 PM PST by JACKRUSSELL

An aggressive, non-stop campaign by China to penetrate key government and industry databases in the United States already has succeeded and the United States urgently needs to monitor all internet traffic to critical government and private-sector networks “to find the enemy within,” SANS Institute Director of Research Alan Paller told SCMagazineUS.com.

“They are already in and we have to find them,” Paller said.

Paller said that empirical evidence analyzed by researchers leaves little doubt that the Chinese government has mounted a non-stop, well-financed attack to breach key national security and industry databases, adding that it is likely that this effort is making use of personnel provided by China's People's Liberation Army.

The “smoking guns” pointing to a government-directed effort are keystroke logs of the attacks, which have been devoid of errors usually found in amateur hack attacks, the use of spear phishing to gain entry into computer networks, and the massively repetitive nature of the assault, the SANS research director said.

“This is not amateur hacking. They are going back to the same places 100 times a day, every day. This kind of an effort requires a massive amount of money and resources,” Paller told SCMagazineUS.com.

Paller said that monitoring all internet traffic – including email – to government and private-sector networks is necessary in order to pinpoint breaches and, ultimately, to prevent cyberspies from extracting critical data. The traffic must be carefully analyzed to detect “micro-patterns” that reveal breaches, he said.

“We have to find the needle in the haystack,” he said.

SANS earlier this week placed espionage from China and other nations near the top of its annual list of cybersecurity menaces, reporting that targeted spear phishing is the weapon of choice used in the assault on U.S. databases and those of its allies.

“They are using spear phishing because it is so effective, and it is the least difficult technique [of gaining entry]” Paller said. “They can target anyone within an organization who has a computer. Once they get in, they can go everywhere.”

In November, President Bush requested $154 million in funding for what is expected to be a seven-year, multibillion-dollar program to track cyberthreats on government and private networks. The proposed countermeasures include the reduction of access points between government computers and the internet from a current level of 2,000 to 50, and the assignment of up to 2,000 DHS and NSA security experts to full-time monitoring of critical infrastructure networks to prevent unauthorized instrusion.

Key members of Congressional oversight committees have complained that they have not been fully briefed on the proposal and they have raised concerns about the potential infringement on privacy.

According to SANS' research director, the monitoring envisioned by the government's cybersecurity plan can be implemented without trampling on privacy rights as long as procedures are in place to ensure that it is the traffic itself, rather than the contents of email messages, that is being monitored.

“Monitoring email traffic is not the same thing as reading everyone's email,” Paller said.

The scope of the cybersecurity problem was underlined this week in a profile of U.S. Director of National Intelligence (DNI) Mike McConnell published this week in the New Yorker magazine.

The New Yorker article reported that the Defense Department currently is detecting about three million unauthorized probes on its computer networks every day, while the State Department fends off two million probes daily.

These probes often turn into full-scale attacks, the magazine reported, such as the assault last year on the Pentagon that required 1,500 computers to be taken offline. American allies also have been targeted: In May, the German government blamed the Chinese military after it discovered a spyware program had been planted inside government computers in several key ministries. Chinese officials called the accusation “preposterous.”

McConnell has made information security a top priority for the myriad intelligence agencies he oversees, including the NSA, CIA and the Pentagon's intelligence arm.

The DNI said that Chinese computer attacks have intensified in recent months, while hacking activity emanating from Russia has remained at Cold War levels. Ed Giorgio, a security consultant who worked at the NSA under McConnell, told the New Yorker that China now has 40,000 hackers collecting intelligence off U.S. information systems and those of U.S. allies.

As intense as the assault on U.S. intelligence networks appears to be, cyberespionage directed by foreign governments against U.S. companies is an even bigger problem, McConnell said. “The real question is what to do about industry. Ninety-five percent of this is a private-sector problem,” he told the New Yorker.

The SANS Institute's annual listing of top 10 cyber menaces reported that China and other nations last year had engineered “massive penetration” of U.S. federal agencies and defense contractors, stealing terabytes of data. The institue said that these attacks are expected to intensify this year.

“In 2008, despite intense scrutiny, these nation-state attacks will expand,” SANS warned. “More targets and increased sophistication will mean many successes for attackers. Economic espionage will be increasingly common as nation-states use cybertheft of data to gain economic advantage in multinational deals.”

SANS said the “attack of choice” by foreign cyberwarriors is a form of targeted spear phishing using attachments and well-researched social engineering methods to make the victim believe that an attachment comes from a trusted source. SANS also said overseas hackers are making use of newly discovered Microsoft Office vulnerabilities and hiding their techniques to circumvent virus checking.

McAfee's Avert Labs, in its McAfee Virtual Criminology Report, predicted that the rise in international cyber spying will pose the number one security threat in 2008.


TOPICS: Front Page News; News/Current Events
KEYWORDS: abledanger; bushfault; bushlegacy; chicoms; china; clintonlegacy; communism; cybersecurity; espionage; internet; lenovo; loral; securitybreach; traitor; yearoftherat
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-72 next last
To: Sir Francis Dashwood

~~memories~~

(1990) John McCain said on the floor of the Senate: “Mr. President, I am anxious to construct a new relationship with our old adversary (Vietnam)”. He, who was in a Vietnamese prison camps for five and a half years, was pushing hard for normalized relations with Hanoi long before anyone else was.

Between when Clinton said that he would not normalize relations with Vietnam until there was a full accounting of POWs/MIAs and the time he lifted the Trade Embargo only two Americans had been accounted for in Vietnam.

Lifting the embargo opened the door for the multi-billion dollar corporation, Lippo Group with American business partners, such as Stephens Investment of Little Rock, AR to conduct business in Vietnam. Mr A. Vernon Weaver, at that time the Vice-President for Operations in the Pacific Rim of Stephens Investment and a member of the Board of Visitors at the U.S. Naval Academy was instrumental in arranging an upgrade of the position of Commandant of the U.S. Naval Academy from two stars to four stars.

Former U.S. Navy officers, Senators John Kerry and John McCain supported this reorganization.

http://www.usvetdsp.com/billbell.htm

An indication of just how deep and subtle Red Chinese roots run in U.S. business and government affairs deals with McCain and Kerry. Both McCain and Kerry fought long and hard to provide the political cover Clinton needed when he made the controversial decision to normalize relations with Vietnam. McCain’s wife, Cindy, is the daughter of James Hensley, who is the second largest Anheuser-Busch distributor in the United States. McCain is an officer in Hensley & Co. and Cindy is a vice president. The McCain family owns several million dollars in Anheuser-Busch stock.

As a part of an aggressive campaign to enhance its international standing in the beer market, Anheuser-Busch has had signned contracts and invested hundreds of millions building brewery operations in China and Vietnam. I can’t link any of those contracts involve Lippo. Some docs retrieved from the net revealed that Riady’s Lippo is the holder of a license for Sea World in Indonesia and that Anheuser-Busch owns all the Sea World themeparks in the United States as well as some overseas.

Is there a connection between Anheuser-Busch and Lippo?
http://www.usvetdsp.com/billbell.htm

SeaWorld/Lippo Connection:

Old URL: http://www.lippo.co.id/Main.htm

Internet Cache: http://web.archive.org/web/19980530014836/http://www.lippo.co.id/Main.htm

Net cache shows Lippo holds/held the license on Sea World in Indonesia.

“Today I am lifting the trade embargo against Vietnam because I am absolutely convinced it offers us the best way to resolve the fate of those who remain missing and about whom we are not sure.” Two things happened between November 1992 and February 1994 which bear on this issue. One was that Senators John Kerry and John McCain lobbied the president to drop the embargo. The second thing was that in September 1993 the head of the Lippo Group, Mochtar Riady, led a trade mission of Asian bankers on a trip to Vietnam to (in his words) “size up business opportunities there.” Lippo helps, among other things, to finance trade deals. It therefore stood to benefit enormously from expanded trade between Vietnam and the United States;

Old URL: http://www.empower.org/html/policy/misc/roadmap3.htm

See Internet Cache:

http://web.archive.org/web/20000816001233/http://www.empower.org/html/policy/misc/roadmap3.htm


41 posted on 01/19/2008 4:25:03 AM PST by Calpernia (Hunters Rangers - Raising the Bar of Integrity http://www.barofintegrity.us)
[ Post Reply | Private Reply | To 36 | View Replies]

To: JACKRUSSELL
GREAT SCOTT! Just how much porn have the Chinese stolen?!?

After all, if they want our top secrets, they just need to ask...

42 posted on 01/19/2008 4:30:13 AM PST by Caipirabob (Communists... Socialists... Democrats...Traitors... Who can tell the difference?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SatinDoll; Duchess47; jahp; LilAngel; metmom; EggsAckley; Battle Axe; SweetCaroline; ...
Please Jack, Freepmail everyone per Satindoll:

With all this penetration, is it possible that China is planning an attack on the US by using a DDOS attack? Maybe, and I’m just guessing here, but from what I have seen before on other networks, is it perhaps that they aren’t looking just for information. I’m not 100% sure on this, but it fits a scenario that I’ve seen elsewhere on a much smaller scale.
43 posted on 01/19/2008 5:10:58 AM PST by JACKRUSSELL
[ Post Reply | Private Reply | To 30 | View Replies]

To: Calpernia

Bump.


44 posted on 01/19/2008 5:52:12 AM PST by nw_arizona_granny (http://www.freerepublic.com/focus/news/1886546/posts?page=4972#4972 45 Item Communist Manifesto)
[ Post Reply | Private Reply | To 38 | View Replies]

To: Calpernia

Interesting stuff...


45 posted on 01/19/2008 6:10:27 AM PST by Sir Francis Dashwood (LET'S ROLL!)
[ Post Reply | Private Reply | To 41 | View Replies]

To: JACKRUSSELL
Two words.

Cyber.

Warfare.

or

Electronic.

Blitzkrieg.

Think of The Art of War or Oriental philosophy in general -- lie about your intentions, soft-pedal your strengths, and attack in a way that you've won the war without having to risk open battle.

America's military and economic strength is predicated on its 'wiredness'.

If they disable our C-and-C (by denying us the ability to *communicate*) they can just waltz in and *take* Taiwan.

And put an end to the impression of American invulnerability.

Couple that with judiciously chosen sabotage and/or suicide attacks (say of key personnel at our Clintonized national labs), and the hollowing out of our infrastructure (we *import* apples from China!!? What happened to the state of Washington), and China sees itself as invincible -- they have us on manufacturing, technology, population, and (for Taiwan) short supply lines.

IF this happens, I hope President Thompson has the balls to summarily execute a couple dozen CEOs for treason.

(Please note that the 'common sense' punishment for those CEOs, the bill of attainder, is explicitly unconstitutional -- which is why all the Dems were pushing for 'censure plus' for Bill Clinton. Lying scum.)

Cheers!

46 posted on 01/19/2008 7:26:50 AM PST by grey_whiskers (The opinions are solely those of the author and are subject to change without notice.)
[ Post Reply | Private Reply | To 43 | View Replies]

To: JACKRUSSELL; rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; JosephW; ...

47 posted on 01/19/2008 7:36:23 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: decimon
Someone should create an alternative, or alternatives, to the internet. That sensitive information is so open to the world is madness.

We have it. It's called the SIPR Net. However, that doesn't prevent idiots from putting sensitive information on Internet-connected systems.

48 posted on 01/19/2008 9:04:09 AM PST by antiRepublicrat
[ Post Reply | Private Reply | To 6 | View Replies]

To: The Spirit Of Allegiance
Statement by the President - He’s loosening export controls on super computers! (1999 - CLINTON)

That one actually made sense. The export controls were pegged at a processing power that was formerly only attainable by huge supercomputers. At the time they were loosened, that power was available on a desktop. The static restriction meant our computer industry soon wouldn't be able to export anything, and foreign competitors would have filled the need. Only a few years after this people were able to make supercomputers using Sony's PlayStation 2 game console.

49 posted on 01/19/2008 9:10:56 AM PST by antiRepublicrat
[ Post Reply | Private Reply | To 19 | View Replies]

To: CJ Wolf

The House vote was 259-173 in favor.

146 Republicans and 112 Democrats took the floor to plead FOR MFN, including the speaker.

The Senate voted 60-38 for.

But, yet, you pick out FRed. What did your guy do? Sit on his thumbs?

Many people, including you, don’t realize what the effects of being left out of China’s trade would have meant.
The problem IS NOT that China has MFN status. It’s the Trade Agreement is bad!
Now, who negotiated that?

Notice, if you will, that FRed has been calling for FAIR & FREE Trade, saying, all along, that the agreement’s are skewed, and need to be re-negotiated.


50 posted on 01/19/2008 9:46:09 AM PST by papasmurf (I'm voting for FRed, even if I have to write him in.)
[ Post Reply | Private Reply | To 12 | View Replies]

To: familyop

I agree 1000%! Let the shiite fly now, rather than later when they are even more able and equipped to counter.

You nailed it...God, Family, Country!


51 posted on 01/19/2008 9:53:52 AM PST by papasmurf (I'm voting for FRed, even if I have to write him in.)
[ Post Reply | Private Reply | To 34 | View Replies]

To: Sir Francis Dashwood

Yes, you are right. If people would just do some research, they’d find film, still pictures, and several books to prove it.


52 posted on 01/19/2008 9:55:27 AM PST by papasmurf (I'm voting for FRed, even if I have to write him in.)
[ Post Reply | Private Reply | To 36 | View Replies]

To: JACKRUSSELL
Well Duh! You mean the writer is just now catching on to what has been going on for years? I say ban ANY, and ALL IP traffic from that part of the world. To include China, and Korea.
53 posted on 01/19/2008 9:56:38 AM PST by devane617 (Fred Thompson in '08.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: WoofDog123; Gorzaloon
Where would I find a list of the IP ranges used by China and Russia? simply banning both makes too much sense to not do it.

The blacklists can be found here:

http://blackholes.us/zones/countries/cn.txt and http://blackholes.us/zones/countries/ru.txt

54 posted on 01/19/2008 12:09:06 PM PST by Gideon7
[ Post Reply | Private Reply | To 26 | View Replies]

To: ComputerGuy
>>>>>>>Maybe the gov't should switch to Macs. I keep reading on FR that they are hacker-proof :)<<<<<<

Uncle Sam should switch to EQUIPMENT not made in China.

Ooops, there isn't any.

American hardware is made in China, American software is made in India, defense contractors in U.S. are foreign owned. Foreign brain is doing research in U.S. and Americans are busy running service economy (i.e."do you want fries with it, sir?")

Twenty years ago, American goverment learned from the French that Soviets use illegaly obtained American equipment on ther pipelines. The clandestine operation was set up, to pepper up the commercial equipment and let Ruskies buy it. As a result, one of the pipelines blew up, and the explosion mimicked nuclear attack

Methinks the history can and will repeat itself - U.S. goverment may already be in possession of "American" equipment peppered up by Chicoms or other hostile parties. Actually, there are reports of Chicoms already penetrating NORAD computers. The catch - computers are not connected to the Internet. Chicoms used powerlines and tampered equipment.

55 posted on 01/19/2008 1:03:39 PM PST by DTA (Advice to Condi: when you are in a hole, stop digging)
[ Post Reply | Private Reply | To 35 | View Replies]

To: Gideon7

thanks!

Are these blocked at the router level or the software level on each system?


56 posted on 01/19/2008 1:04:41 PM PST by WoofDog123
[ Post Reply | Private Reply | To 54 | View Replies]

To: Gideon7

My network and .htaccess thanks you! Here comes the great flushing sound~!


57 posted on 01/19/2008 1:15:25 PM PST by Gorzaloon
[ Post Reply | Private Reply | To 54 | View Replies]

To: Gorzaloon

ALL

Jeeesh you people worry too much about all of this.

The man in charge of our DOD defense computers, Chaing Xu Sui, say’s they are safe from Chinese hacker attempts.

What more do you want?


58 posted on 01/19/2008 1:22:00 PM PST by am452 (Globalist: Converting the American people to the Democrat party since 1992)
[ Post Reply | Private Reply | To 57 | View Replies]

To: am452
Jeeesh you people worry too much about all of this.

The man in charge of our DOD defense computers, Chaing Xu Sui, say’s they are safe from Chinese hacker attempts.

What more do you want?

A nice tasty rat to nibble on as I cut and paste all those "deny from"'s? :-)

The second list will require vodka, in honor of nashi protivnik.

I know, people are tired of hearing complaints but maybe if some of us began posting our firewall logs, it would give people cause to rethink the position. These people are not playing games, and they are good at what they do. Ask my neighbor, who just had her debit card cleaned out yesterday, among the more trivial examples.

59 posted on 01/19/2008 1:40:22 PM PST by Gorzaloon
[ Post Reply | Private Reply | To 58 | View Replies]

To: JACKRUSSELL
"“We have to find the needle in the haystack,” he said."

So they want to just go in and rummage through anything American citizens do on the Internet, just in case we're terrorists.

What liberty?

60 posted on 01/19/2008 2:02:54 PM PST by DaGman
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-72 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson