Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Chinese hack into White House network
FT.COM ^ | November 7 2008 | Demetri Sevastopulo

Posted on 11/06/2008 10:18:13 PM PST by Jet Jaguar

Chinese hackers have penetrated the White House computer network on multiple occasions, and obtained e-mails between government officials, a senior US official told the FT.

The cyber attackers managed to penetrate the White House system for brief periods that allowed them to steal information before US government experts each time patched the system.

US government cyber experts suspect the attacks were sponsored by the Chinese government, although they cannot say for definite.

“We are getting very targeted Chinese attacks so its stretches credulity that these are not directed by government-related organisations,” said the official.

The National Cyber Investigative Joint Task Force, a unit established in 2007 to tackle security, detected the attacks. The official stressed the hackers had accessed only the unclassified computer network, and not the more secure classified network.

“For a short period of time, they successfully breach a wall, and then you rebuild the wall . . . it is not as if they have continued access,” said the official. “It is constant cat and mouse on this stuff.”

The US has increased efforts to tackle cyber security in the past year, especially since Chinese hackers penetrated the Pentagon last year, in an attack that obtained e-mails from the system serving Robert Gates, the defence secretary.

Separately, US government cyber investigations have determined that an attack this summer on the Obama and McCain campaign computer networks originated in China. Details of the attack were first reported by Newsweek. The secret service told the Obama and McCain campaigns that their networks had been comprised by foreign hackers.

The cyber attackers successfully downloaded large quantities of information from the campaign networks, which security agencies believed was an attempt to learn more about the contenders’ policy positions.

A second US official said government cyber experts had determined that the attacks originated from China, but he cautioned that they could not determine whether they were related to the government.

“There is no doubt that foreign governments are actively targeting cyber space not only for sensitive information but to influence our most sensitive processes such as the US presidential election,” said Sami Saydjari, head of the Cyber Defence Agency, a private company that advises government. “This underscores the need for president-elect Obama to take leadership in the cyber space race that is well under way.”

While the US has raised concerns about cyber attacks, many foreign governments believe the US is also engaged in electronic spying. Bob Woodward, the veteran Washington Post reporter, this year revealed that the US had been spying on the Iraqi government.


TOPICS: Crime/Corruption; Foreign Affairs; Front Page News; Government
KEYWORDS: china; hacker; honeypots; internet
Navigation: use the links below to view more comments.
first 1-2021-4041-60 next last

1 posted on 11/06/2008 10:18:13 PM PST by Jet Jaguar
[ Post Reply | Private Reply | View Replies]

To: Cindy

ping


2 posted on 11/06/2008 10:18:34 PM PST by Jet Jaguar (Who would the terrorists vote for?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar

The White House wants open borders, why not open hard drives?


3 posted on 11/06/2008 10:20:10 PM PST by DTogo (I haven't left the GOP, the GOP left me.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar; AuntB; Calpernia; cripplecreek

Just F*****G peachy. What kind of idiots do we have running the IT systems there?

And for crap sakes, how about threatening the chicoms with major sanctions.


4 posted on 11/06/2008 10:20:53 PM PST by pissant (THE Conservative party: www.falconparty.com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar

Okay, I keep reading about these stories. Why the f*ck are these computers hooked up to networks that have vulnerabilities? Secure intranets people...unplug these damn things from the Internet!


5 posted on 11/06/2008 10:22:37 PM PST by americanophile
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar

And things continue to get interesting. Does anyone else see this as a problem?


6 posted on 11/06/2008 10:22:40 PM PST by Billy Bud (Conservative Leadership)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar

i believe in any hot confrontation with china, the US will suffer various network outages of varying degrees of severity and gravity.

Hopefully DoD is at least aware of the fact they need to plan for asymmetric cyberwarfare.


7 posted on 11/06/2008 10:22:57 PM PST by WoofDog123
[ Post Reply | Private Reply | To 1 | View Replies]

To: pissant

I wonder if this has anything to do with Chinese made motherboards and chips that are in nearly every brand of computer...


8 posted on 11/06/2008 10:23:44 PM PST by Jet Jaguar (Who would the terrorists vote for?)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Jet Jaguar

So, if the Chinese are so good at this, does it mean that all the people there are secretly on the internet, in spite of the government’s attempts at control?


9 posted on 11/06/2008 10:24:34 PM PST by Pining_4_TX
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar

And now the bridge on the ship of state will be commanded by a 1st term Senator with no experience to speak of who’s written two autobiographies before age 45 and is the product of the Daley Machine.

I’m really glad students, professors, and poor people elected this guy. Basically people who have yet to prove they are capable of taking care of themselves. Deciding what the American taxpayer will pay for. Ugh.


10 posted on 11/06/2008 10:24:39 PM PST by Harry Wurzbach (Joe The Plumber & Rep. Thaddeus McCotter are my heroes.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar
Chinese hack into White House network
The jokes on them. In a few months the new President Hussein will hand them whatever they want, just for the asking.
11 posted on 11/06/2008 10:27:06 PM PST by lewislynn (What does the global warming movement and the Fairtax movement have in common? Disinformation)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar

If they’re patient, Obama will give them everything they want. He hates America.


12 posted on 11/06/2008 10:27:19 PM PST by lady lawyer
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar

oh s***


13 posted on 11/06/2008 10:44:48 PM PST by Liberty Valance (Keep a simple manner for a happy life ;o)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar

“US government cyber experts suspect the attacks were Sponsored by the Chinese government, although they cannot say for definite.”

Yes they can. Black hats working without consent of the chicoms would get shut down fast and hard. This isn’t spoofing or somebody using a node in Beijing. This is PLA/MSS.

But the Chicoms would be stupid NOT to run Intrusion OPS/hax. If they get in they get some datas without ANY fear of retribution from the US Government. If they fail they fail and Uncle Sam keeps it nice and quiet..so what.


14 posted on 11/06/2008 10:47:01 PM PST by happinesswithoutpeace (You are receiving this broadcast as a dream)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar

I doubt this.

I know what operating system the White House backbone runs on, and it’s not Windows.


15 posted on 11/06/2008 10:48:31 PM PST by George Smiley (Palin is the real deal.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar

We really need two separate networks for the Government and Military. Sensitive data shouldn’t be on networks with access to the public Internet.


16 posted on 11/06/2008 10:50:35 PM PST by neb52 (Get your Smokey on!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar

Bomb them


17 posted on 11/06/2008 11:04:39 PM PST by wastedyears (Every FReeper is on Obama's Black List. He will try to have us all "taken care of." Mark my words)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar
“For a short period of time, they successfully breach a wall, and then you rebuild the wall . . . it is not as if they have continued access,” said the official.

And there is the problem. With morons like these running the networks, it is no wonder they are breached. You do not need continued access. Get in once and plant a logger program and that is all you need.

18 posted on 11/06/2008 11:07:22 PM PST by TheCipher
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar

They have probably been doing it for ages.


19 posted on 11/06/2008 11:16:52 PM PST by freekitty (Give me back my conservative vote.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TheCipher

Since I know next to nothing about computers; I am impressed.


20 posted on 11/06/2008 11:17:54 PM PST by freekitty (Give me back my conservative vote.)
[ Post Reply | Private Reply | To 18 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-60 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson