Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Chinese hack into White House network
FT.COM ^ | November 7 2008 | Demetri Sevastopulo

Posted on 11/06/2008 10:18:13 PM PST by Jet Jaguar

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-60 next last
To: pissant

The Pentagon got hit a couple years ago too.....The Chinese rebuilt Cisco routers/switching equipment allowing a backdoor, then became the lowest bidder on the government contracts.....Pretty smart if you ask me.


21 posted on 11/06/2008 11:37:53 PM PST by BurbankKarl (a)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Jet Jaguar

This is why they have crypto devices.


22 posted on 11/07/2008 12:44:58 AM PST by stuartcr (Election year.....Who we gonna hate, in '08?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar
In 2001 I proposed an approach to the National Security Counsel that would have build a NORAD like traffic monitoring for the Internet. It would have provided early detection of and rapid response to these type of attacks.

Due to Democrat tactics of scare mongering and lawsuits against the early Bush presidency, the idea was not accepted. Now with Obama in, we have no hope for it's adoption.

23 posted on 11/07/2008 1:05:56 AM PST by taxcontrol
[ Post Reply | Private Reply | To 1 | View Replies]

To: americanophile
Okay, I keep reading about these stories.

Secure intranets people...unplug these damn things from the Internet!

You are right, it's the rehashing of the same story... email systems are on the intranet (caveat: except mobile devices, which should be at least on VPN). At the most, what Chinese are getting (if anything, if the story has any truth to it) would be some stuff that looks like email dump that's planted in the honey-pot in the DMZ area. I think these stories are done periodically to "confirm" to Chinese that they really got something of value, and for domestic consumption to promote the importance and funding of government's and military technology infrastucture.

My computers are probed all the time, mostly from China IPs - it's not difficult to throw them off or feed them some garbage (depending on the mood or method of attack), most of the damage is usually a slowdown of access.

24 posted on 11/07/2008 1:59:10 AM PST by CutePuppy (If you don't ask the right questions you may not get the right answers)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Jet Jaguar

You have to think that the US and other western governments are doing the same thing to the chinese because so little is said publicly about these incidents.


25 posted on 11/07/2008 2:41:05 AM PST by ckilmer (Phi)
[ Post Reply | Private Reply | To 1 | View Replies]

To: CutePuppy
At the most, what Chinese are getting (if anything, if the story has any truth to it) would be some stuff that looks like email dump that's planted in the honey-pot in the DMZ area. I think these stories are done periodically to "confirm" to Chinese that they really got something of value, and for domestic consumption to promote the importance and funding of government's and military technology infrastucture.

That's largely my take also. Certainly it's far more likely that Red China is simply getting what we wanted them to have. The Chicoms also probably realize that they haven't actually received any useful data.

I am not sure about your last point "...to promote the importance and funding of government's and military technology infrastructure", because whatever value such tales have in scaring up funding, these same woeful tales also have the negative effect of making people think our government technical honchos are complete dolts.

Certainly I don't feel inclined to add any funding to the already unlimited amounts that these folks already spend just because they want to broadcast that they have mishandled the situation up to this point. Instead, I would just as soon see them replaced with people who are apparently more technically adroit.

26 posted on 11/07/2008 3:01:47 AM PST by snowsislander (NRA -- join today! 1-877-NRA-2000)
[ Post Reply | Private Reply | To 24 | View Replies]

To: Jet Jaguar

I wonder if there’s not a cold war type thing going on between the US and China. We never hear of our hacks on them that are discovered. Communist countrys don’t publicize their failures.


27 posted on 11/07/2008 3:55:43 AM PST by bkepley
[ Post Reply | Private Reply | To 1 | View Replies]

To: pissant

>>>What kind of idiots do we have running the IT systems there?

Well, they got into the Pentagon. That would make the White House a piece of cake.

http://www.freerepublic.com/focus/f-news/1890608/posts
Chinese military hacked into Pentagon

http://www.freerepublic.com/focus/news/2099361/posts
China-sourced fake chips used in US military, says BusinessWeek

http://www.freerepublic.com/focus/f-news/1891445/posts
Pentagon: China Gearing Up for High-Tech Warfare

http://www.freerepublic.com/focus/f-news/1913355/posts
China hijacks Google, Yahoo, MSN, Youtube...

http://209.157.64.200/focus/f-news/1904123/posts
Selling National Security (China bids for portion of 3Com)

http://www.freerepublic.com/focus/f-news/1908575/posts
Will 3Com Deal Funnel U.S. Secrets to China?

http://www.news.com/8301-10784_3-9784235-7.html
Cisco partners with Chinese appliance maker

http://harvardbusinessonline.hbsp.harvard.edu/b02/en/common/item_detail.jhtml?id=302069
Cisco China

>>>Designed to show how Cisco has taken its U.S.-based infrastructure and applied it to China. It is stunning in its impact as one notes how so much of what is being done in the United States in terms of the intranet has been transferred to China.<<<

http://newsroom.cisco.com/dlls/global/asiapac/news/2006/pr_07-05b.html
China Telecom Selects Cisco as Primary Supplier for ChinaNet 2006 Expansion


28 posted on 11/07/2008 4:16:44 AM PST by Calpernia (Hunters Rangers - Raising the Bar of Integrity http://www.barofintegrity.us)
[ Post Reply | Private Reply | To 4 | View Replies]

To: JACKRUSSELL; TigerLikesRooster; AmericanInTokyo; KylaStarr; Cindy; StillProud2BeFree; ...

ping


29 posted on 11/07/2008 4:18:32 AM PST by Calpernia (Hunters Rangers - Raising the Bar of Integrity http://www.barofintegrity.us)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jet Jaguar

Alarming bit of news.

Given the amount of money we’ve borrowed from China and how dependent our economy is on them- I expect NOTHING to be done about this -maybe a little tsk-tsking- but nothing meaningful.


30 posted on 11/07/2008 4:25:30 AM PST by SE Mom (Proud mom of an Iraq war combat vet)
[ Post Reply | Private Reply | To 1 | View Replies]

To: bkepley

In the realm of risk, unmanaged possibilities become probabilities: These data breaches and thefts are due to a lagging business culture. As CIO, I’m always looking for ways to help my team, business teams, and ad hoc measures of various vendors, contractors and internal team members. A book that is required reading is “I.T. WARS: Managing the Business-Technology Weave in the New Millennium.”
We keep a few copies kicking around - it would be a bit much to expect outside agencies to purchase it on our say-so. But, particularly when entertaining bids for projects and in the face of challenging change, we ask potential solutions partners to review relevant parts of the book, and it ensures that these agencies understand our values and practices.
The author, David Scott, has an interview here that is a great exposure: http://businessforum.com/DScott_02.html
The book came to us as a tip from one of our interns who attended a course at University of Wisconsin, where the book is in use. It has helped us to understand that, while various systems of security are important, no system can overcome laxity, ignorance, or deliberate intent to harm. The real crux of the matter is education and training to the organization as a whole – and a recurring schedule of training – in building a sustained culture and awareness; an efficient prism through which every activity is viewed from a security perspective prior to action.
I like to pass along things that work, in the hope that good ideas continue to make their way to me.


31 posted on 11/07/2008 4:29:01 AM PST by johnfranks999
[ Post Reply | Private Reply | To 27 | View Replies]

To: Jet Jaguar
Meanwhile, from last month...

World Bank (Allegedly) Hacked

Related....?

32 posted on 11/07/2008 4:30:16 AM PST by mewzilla (In politics the middle way is none at all. John Adams)
[ Post Reply | Private Reply | To 1 | View Replies]

To: George Smiley
I doubt this.

I know what operating system the White House backbone runs on, and it’s not Windows

You doubt what? Do you believe that systems using Unix, Linux, etc. cannot be hacked?

33 posted on 11/07/2008 5:03:22 AM PST by ding_dong_daddy_from_dumas (I want to "Buy American" but the only things for sale made in the USA are politicians)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Calpernia

My guess is we have chinese moles strategically planted throughout the gov’t as well, with prestigious jobs and IT degrees.

Hell, we have had plenty of spies working in our nuke labs, with the full blessings of the Clinton Administration.


34 posted on 11/07/2008 5:56:45 AM PST by pissant (THE Conservative party: www.falconparty.com)
[ Post Reply | Private Reply | To 28 | View Replies]

To: BurbankKarl

Smart for them. Incredibly retarded for us.


35 posted on 11/07/2008 5:59:35 AM PST by pissant (THE Conservative party: www.falconparty.com)
[ Post Reply | Private Reply | To 21 | View Replies]

To: CutePuppy

They’ll just install sniffers in Lafayette Park.


36 posted on 11/07/2008 6:04:58 AM PST by AppyPappy (If you aren't part of the solution, there is good money to be made prolonging the problem.)
[ Post Reply | Private Reply | To 24 | View Replies]

To: pissant

Remember the hacking during the primaries? The software company that the sites used had backdowns. There were former pentagon officials that now work at that China Based software company.


37 posted on 11/07/2008 6:11:33 AM PST by Calpernia (Hunters Rangers - Raising the Bar of Integrity http://www.barofintegrity.us)
[ Post Reply | Private Reply | To 34 | View Replies]

To: Calpernia

Nice. And I recall Duncan Hunter scuttling the Chicoms and Romney’s attempts to sell 3-COM to the PLA.


38 posted on 11/07/2008 6:23:44 AM PST by pissant (THE Conservative party: www.falconparty.com)
[ Post Reply | Private Reply | To 37 | View Replies]

To: pissant
I would guess that we are doing the same to them.

This is a big cat and mouse game. What I would be more afraid would be us never catching them hacking our network.

39 posted on 11/07/2008 6:31:14 AM PST by A Texan (Oderint dum metuant)
[ Post Reply | Private Reply | To 34 | View Replies]

To: Jet Jaguar
Remember the report right after the financial crisis came to light that China and Russia hacked into World Bank's computer? Then they hacked the McCain and Obama camapigns computers and now this?!?!?!?
40 posted on 11/07/2008 6:31:41 AM PST by Dubya-M-DeesWent2SyriaStupid!
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-60 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson