Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

India set to counter Chinese net attacks
Heise Online Germany ^ | 08 May 2008 | Heise Online, Germany

Posted on 05/08/2008 5:52:59 AM PDT by CarrotAndStick

The Indian media are reporting sustained internet-based attacks from China against Indian networks. These attacks, they say, are not just isolated incidents and are sophisticated and broad in scope. Government officials have confirmed off the record that the cyber warfare threat from China is much more serious than attacks carried out from other countries.

They believe the Chinese attackers have been scanning and mapping India's networks for around one and a half years. They are primarily using bots – approximately 50,000 of which are currently installed on Indian systems, key loggers and network topology mapping, which allows information to be gathered on how the Indian networks could be disabled, or at least degraded, in the event of a crisis. Large-scale attacks are said to have been directed against the National Infomatics Centre (NIC), and other government networks been targeted, but not disabled.

India is now making its first serious efforts to set up a defence system, although electronic warfare has yet to become a major component of India's security strategy. Dedicated but short-funded teams of specialists are currently working to deflect the daily attacks. The real weakness is that they have not yet developed a system for carrying out retaliatory strikes. It would not be difficult to develop such a system, however, as Chinese networks are porous and India is an IT giant.

A Chinese embassy official disputed these allegations, saying that the claims of Chinese government complicity with the attacks are untenable and without foundation. "The Chinese government has nothing to do with it. The Chinese government discourages such activities against all countries, including India. These reports … are not compatible with the developing trust and friendship between India and China. 'Hacking' is a worldwide phenomenon. The Chinese networks have also been victims of hacking."


TOPICS: Business/Economy; Culture/Society; Extended News; News/Current Events
KEYWORDS: china; cyberwarfare; india; trojans

1 posted on 05/08/2008 5:52:59 AM PDT by CarrotAndStick
[ Post Reply | Private Reply | View Replies]

To: CarrotAndStick
All attacks are routed into a network of Indian Call Centers, where they are flustered out of existence.

Image and video hosting by TinyPic

2 posted on 05/08/2008 5:57:43 AM PDT by Sax
[ Post Reply | Private Reply | To 1 | View Replies]

To: CarrotAndStick
At some point the Chinese will have to face the fact that they aren't very good liars.
3 posted on 05/08/2008 5:57:49 AM PDT by Last Dakotan
[ Post Reply | Private Reply | To 1 | View Replies]

To: CarrotAndStick
 
Belgium Names China in Hacking Incidents
 
Whether hackers breached government network not known

 

One good spy is worth 10,000 men.
--Chinese Proverb


Over the last few weeks, hackers have repeatedly attempted to break inside the computer network of the Belgium Federal Government as well as other organizations located in Belgium.

On Friday, May 2, Jo Vandeurzen, the Belgian minister of justice, announced that his government believes the attacks were conducted from China, most likely at the request of Beijing. He admitted that he could not provide irrefutable evidence.

"The context of this affair and all the clues lead to China," Vandeurzen said. The Belgian Minister added that it was not known whether the hackers had succeeded in their attempt to hack the Belgian government network.

Although it is also unclear why Beijing would target the Belgium network, Vandeurzen suggested that China's interest likely results from the presence in the country of most of the European Union institutions as well as the Headquarters of the North Atlantic Treaty Organization (NATO).

Vandeurzen also suggested that the role played by Belgium in Central Africa might be relevant to this affair.

"There is an ongoing investigation, but I can tell you that we have more than mere suspicions," a spokesperson of the Foreign Affairs Ministry said.

The Surete de l' Etat, a Belgian Intelligence Agency equivalent to Britain's MI5, has confirmed a "clear and real threat" to the security of the state.

Karel De Gucht, the controversial Belgian minister of foreign affairs, had already told parliament that his ministry was the object of cyber-spying conducted by Chinese agents several weeks ago.
 

It is not clear at the moment why Belgian officials have decided to go public with these allegations. In the past, the Belgian government reacted with great discretion to this kind of affair.

In 2005, a Chinese defector revealed the magnitude of the Chinese spying effort against European governments and technology industry, alleging among other things that hundreds of students and scholars were involved in espionage in European countries.

"There is a large Chinese intelligence operation in northern Europe spanning communications, space, defense, chemicals and heavy industries," said Claude Monique, a Brussels-based intelligence analyst.

"The Chinese agent has given details of hundreds of experts and their activities. As a result national inquiries have been launched, certainly by the German, French, Netherlands and Belgian agencies and, I believe, in Britain too."

"The Chinese operate at many levels, from the pure intelligence agents based at embassies to researchers sent to Europe for training to individual citizens who work apparently independently for 5 or 10 years until they are in a position to prove their usefulness," an intelligence official said.

The phenomenon is by no mean limited to Europe. In the United States, the FBI has estimated that spying activity against technology companies conducted by Chinese agents is increasing at the annual rate of 20 to 30 percent. In the Los Angeles area, it is not entirely clear whether the FBI is infiltrating the Chinese Mafia, or if the opposite is taking place.

"I think you see it where something that would normally take 10 years to develop takes them two or three," said David Szady, the chief of FBI counterintelligence operations in 2005.

"What they are looking for are the systems or materials or the designs or the batteries or the air-conditioning or the things that make that thing tick," Szady said. "That's what they are very good at collecting, going after both the private sector, the industrial complexes, as well as the colleges and universities in collecting scientific developments that they need," Szady added.

Many experts believe that it is thanks to industrial espionage that Chinese scientists have managed to match the US, Japan and Europe technology in various areas such as supercomputing, communications, space and nano technologies.

Some military advances seem suspicious too, such as a new cruise missile extremely similar to the US Tomahawk or a sea-borne defense system that looks like the twin of the Aegis.

In their 2007 report to Congress, the US-China Economic and Security Review Commission (USCC) stated that "Chinese espionage activities in the United States are so extensive that they comprise the single greatest risk to the security of American technologies."


http://english.ohmynews.com/articleview/article_view.asp?at_code=434212

 

 

4 posted on 05/08/2008 5:57:51 AM PDT by CarrotAndStick (The articles posted by me needn't necessarily reflect my opinion.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Sax
All attacks are routed into a network of Indian Call Centers, where they are flustered out of existence.

Now that's funny!

5 posted on 05/08/2008 5:59:29 AM PDT by Fundamentally Fair (There was once consensus that the world was flat.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: CarrotAndStick

I believe the Chinese government has declared a “cyber-cold war” against her strongest competitors; India & the USA. I’m not aware of any “Geneva Convention” governing cyber warfare. Probably needs to be one, but it will be hard to enforce (how do you get computer systems to wear uniforms?)

My fear is, what software is being loaded into all those Hewlett Packard and other systems that are manufactured in China and shipped to the US? In the rush to get these systems in the hands of consumers, there is no way the chipsets and hard drives on these systems are being checked in any way.

China could soon, if not already have, a world-wide bot army numbering in millions of computers.


6 posted on 05/08/2008 6:02:25 AM PDT by henkster (I'm a typical white guy.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: CarrotAndStick
http://www.asiasentinel.com/index.php?option=com_content&task=view&id=1177&Itemid=35

 

 

China’s Cybersnoops Scour the World

 

02 May 2008

Beijing’s intrusions into government computers across the planet — most recently in India — are illegal and outrageous


 

china-internetcrime While world publicity has mainly focused on the intrusion of the Chinese into the email system of US Defense Secretary Robert Gates last year, the fact is that Chinese hackers have been crawling all over the computer systems of a growing number of countries. The latest example is their recent foray into the web servers of India’s Ministry of External Affairs.

The Indian incursion is being treated as the Internet equivalent of a terrorist attack on a national institution, threatening the security of India’s diplomatic and military communications. Although Chinese embassy officials in Delhi reacted angrily to news of the event as an “irresponsible fabrication,” the incident fits an emerging pattern of planned Chinese penetration of government websites and subsequent denial of responsibility.

In May 2007, for instance, it came to light that the Chinese had hacked into the computers of German Chancellor Angela Merkel’s office and three of her ministries. In June came the announcement by US officials that they had hacked into Gates’ email system. In September the British government disclosed that a hacking unit traceable to the Chinese People’s Liberation Army had hit the networks of the Foreign Office and other key departments in London.

Although Beijing has vehemently objected to each of the allegations as malicious propaganda, the scale and nature of data stolen in these operations leaves little doubt about Chinese state involvement. The argument that the hackers, whose IP addresses go back to mainland China, are loose cannons working on their own simply to demonstrate their destructive technical skills does not square with the reality that Beijing has never prosecuted any of this burgeoning tribe.

It is ironic that in a so-called communist country where unionizing is banned for the working class, there exist hackers’ “unions” and “Red alliances” that pool Chinese software programmers willing to work for so-called patriotic causes. From 1998 to 2002, “Red hackers” broke into thousands of websites and paralyzed computer systems in the US, Indonesia, Taiwan and Japan.

The Honker Union, based in mainland China, attained legendary status as a national asset during the 2001 spy plane standoff with the US. Its members went on a hacking spree and defaced the home pages of several American government websites and were answered through a tit-for-tat by American hacking professionals.

Following that high-profile cyber battle, the Honker Union mobilized anti-Japanese protests and petitions online in 2003. In 2005, hacking squads attacked dozens of public and private websites in Japan in what the Washington Post described as “the heaviest assault ever perpetrated on the nation's computer systems from overseas.” Domestic public opinion about the Honkers was overwhelmingly positive and even led to the coronation of celebrity hackers who gave interviews to media outlets and flaunted their exploits.

Instead of arresting the cyber criminals who are in contravention of the norms of international diplomacy, both Chinese society and state have hailed them as national heroes. Chinese Public Relations scholar Xu Wu has written that hacking for the sake of the motherland is a “natural extension from China’s century-long nationalist movement.” State-run research institutes and media houses glorify them as implementers of the Maoist doctrine of “harming if you do harm to me.” In such a permissive environment hacking has become a growth industry.

The free rein afforded to hackers contrasts sharply with the tight control the state attempts to exercise on Internet search engines and politically objectionable websites. Authoritarian China fears technologies that allow its citizens access to subversive information on democracy, human rights, religious freedoms and self-determination struggles, such as Tibet and Xinjiang. The agreement in 2004 between the Chinese government and Google to omit contentious news stories from search results in China illustrates the determination with which Beijing polices cyberspace.

In March, as the Tibetan tumult cascaded, China swiftly blocked Google News and YouTube for a week in an attempt at damage control. Internet censorship by the Chinese government on the issues of Tibet or the Falun Gong spiritual movement is the obverse of the long rope given to hackers to incite anti-Japanese riots or to steal state secrets from targeted countries. This contradictory situation suggests that New Economy-enabling technology is a double-edged sword for China’s regime.

If the Internet can be China’s best friend as well as its worst enemy, crafty state management of it becomes an imperative. Beijing’s policy is to continue developing its cyberwar abilities as part of its military modernization drive while acting as a vigilant gatekeeper against websites that can fuel dissent and unrest among its people.

Legal experts say that effectively outlawing cyber crime is difficult due to the nature of the Internet. Even if there were an international convention regulating cyberspace, norm-offending states like China cannot be expected to adhere to rules of the book.

The only option for victim states like India is to publicize each incident of Chinese hacking into its domains and to raise international attention of this patently aggressive behavior.

The more China’s hacking strategy is exposed before the world, the greater will be the urgency to improve internet network security. India’s global leadership in software programming gives it a distinct advantage in developing foolproof defenses against infiltration by Chinese hackers. As to the counteroffensive option, Indian hackers are known to have waged mini-cyber wars against Pakistani websites in the past. They will need to organise better against the much more formidable challenge posed by the Chinese.

Sreeram Chaulia is a researcher on international affairs at the Maxwell School of Citizenship in Syracuse, New York.


7 posted on 05/08/2008 6:05:31 AM PDT by CarrotAndStick (The articles posted by me needn't necessarily reflect my opinion.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Sax

Nice. Give ‘em the 1-800 number for Dell and let them experience first-hand a true clusterf__k.


8 posted on 05/08/2008 6:07:32 AM PDT by Disturbin (Liberals: buying votes with your tax dollars)
[ Post Reply | Private Reply | To 2 | View Replies]

To: CarrotAndStick

1 billion Indians cut off from their porn. The mind boggles at the consequences. Not a pretty scenerio


9 posted on 05/08/2008 6:08:26 AM PDT by tlb
[ Post Reply | Private Reply | To 1 | View Replies]

To: CarrotAndStick

The most favored nation China is working to steal everything they can. The rope to hang us has been sold.


10 posted on 05/08/2008 6:11:03 AM PDT by bmwcyle (I always rely on God and Guns in that order)
[ Post Reply | Private Reply | To 1 | View Replies]

To: henkster

We must close the bot gap... Microsoft should just preinstall bots on the OS - ohh wait they do that already.

but seroiusly folks - China wants to be the dominant power in it’s world, just like in the good old imperial days.


11 posted on 05/08/2008 6:15:07 AM PDT by Waverunner ( "Think for yourselves and let others enjoy the privilege to do so too." Voltaire)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Sax
LOL! Now, that's just mean!! <chortling>
12 posted on 05/08/2008 6:21:04 AM PDT by lentulusgracchus ("Whatever." -- sinkspur)
[ Post Reply | Private Reply | To 2 | View Replies]

To: CarrotAndStick
China and Russia should simply be unplugged from the landline net. Nothing comes out of either but terrorism, piracy and spam. Everyone knows it. Pull the plug already.
13 posted on 05/08/2008 6:21:20 AM PDT by JasonC
[ Post Reply | Private Reply | To 1 | View Replies]

To: Waverunner
The story is not what China wants, which is "water is wet". The story is the west sitting on its backside doing nothing about any of it. Just cut the bastards off from all internet connections. If they want to talk to the rest of the world, let them use a cellphone - or clean up their act.
14 posted on 05/08/2008 6:23:10 AM PDT by JasonC
[ Post Reply | Private Reply | To 11 | View Replies]

To: henkster
"My fear is, what software is being loaded into all those Hewlett Packard and other systems that are manufactured in China and shipped to the US? In the rush to get these systems in the hands of consumers, there is no way the chipsets and hard drives on these systems are being checked in any way."

This morning when I went to turn on the computer I found several grains of rice on the desk next to the machine.

I am very concerned.

15 posted on 05/08/2008 6:29:50 AM PDT by lexusppd
[ Post Reply | Private Reply | To 6 | View Replies]

To: jahp; LilAngel; metmom; EggsAckley; Battle Axe; SweetCaroline; Grizzled Bear; goldfinch; B4Ranch; ..
MADE IN CHINA POTTERY STAMP

A ping list dedicated to exposing the quality, safety and security issues of food and other products made in China.


Please FReepmail me if you would like to be on or off of the list.

(This can be a high volume ping list.)

16 posted on 05/08/2008 6:34:38 AM PDT by JACKRUSSELL
[ Post Reply | Private Reply | To 1 | View Replies]

To: JasonC

Concurring-bump BTTT.


17 posted on 05/08/2008 7:31:32 AM PDT by lentulusgracchus ("Whatever." -- sinkspur)
[ Post Reply | Private Reply | To 13 | View Replies]

To: lexusppd

I wonder why you’re not concerned, prolific Newbie.


18 posted on 05/08/2008 8:02:55 AM PDT by at bay ("We actually did an evil......" Eric Schmidt, CEO, Google)
[ Post Reply | Private Reply | To 15 | View Replies]

To: at bay
Who said I'm not? Would you have me wring my hands? Is that what you are doing? Tell me the answer, genius, what should we do?

Besides, as you said, I'm a “newbie” so according to the likes of you I should just stay quiet while in the presence of of all the awesome veterans here.

Right?

19 posted on 05/08/2008 8:46:56 AM PDT by lexusppd
[ Post Reply | Private Reply | To 18 | View Replies]

To: lexusppd

Your post makes light of the threat. It may not have been your intent, I dunno. It is a serious threat. I tend not to make light of terrorist threats of other kinds as well.


20 posted on 05/08/2008 10:18:17 AM PDT by at bay ("We actually did an evil......" Eric Schmidt, CEO, Google)
[ Post Reply | Private Reply | To 19 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson