China Denies Pentagon Network Trespass

 
 
By Lisa Vaas  |  Posted 2007-09-05 Email Print this article Print
 
 
 
 
 
 
 

China denounces charges that its army hacked into a Pentagon network.

In a routine thats become as regular as the waxing moon, China has once again denounced charges that the Peoples Liberation Army has been engaged in hostile hacking of government sites—in this case, a Pentagon network—calling the charges "wild accusations" that smack of Cold War mentality. "The Chinese government has all along [been] opposed to and cracked down upon any cyber crimes undermining the computer network including hacking, according to law," Foreign Ministry Spokesperson Jiang Yu said during a press conference on Sept. 4. "… Some people make wild accusations against China, suggesting that the PLA made cyber-raid against the Pentagon. This is totally groundless and a reflection of Cold War mentality." The Financial Times on Sept. 3 reported that the PLA had penetrated a Pentagon network in June in what current and former government officials are calling "the most successful cyber attack on the US [defense] department."
The Financial Times went on to report that the Pentagon acknowledged shutting down part of a computer system serving the office of Defense Secretary Robert Gates but then declined to point fingers at who might be behind the attack. The Financial Times did cite officials whove said that an internal investigation has traced the attack back to the PLA, however.
Jian Yu on Aug. 27 rejected German media reports that German government computers had been attacked by Chinese operators. Angela Merkel, Germanys chancellor, had earlier in the month brought up the issue in a meeting with Wen Jiabao, Chinas premier of the State Council, during a visit to Beijing. Click here to read about how the U.S. National Security Agency keeps up with technology evolution to hone its spying capabilities. "The Chinese Government has always [been] opposed to and forbidden any criminal acts undermining computer systems including hacking. We have explicit laws and regulations in this regard," Jian Yu said at the time. "Hacking is an international issue and China is also a frequent victim. China has established a sound mechanism of cooperation with many countries in jointly countering Internet crimes. China is willing to cooperate with Germany in this regard."
The Department of Defense has long been tracking the PLA as a potent cyber-threat. According to the DODs annual report to Congress on Chinas military power, the PLA has established tactics to protect its own computer systems and networks and those of friendly states. Since 2005, the PLA has been including offensive network attacks into its exercises, "primarily in first strikes against enemy networks," according to the report. The Chinese military is also preparing for electronic warfare by setting up information warfare units that are developing viruses to attack enemy computers and networks, according to the DODs most recent findings. Chinas military is looking to establish what it calls "electromagnetic dominance" early in a conflict, specifically by launching electronic warfare against an enemys information systems on the battlefield, the DOD says. Beyond computer viruses, the PLA is investing in other electronic countermeasures, including electronic and infrared decoys, angle reflectors and false target generators. Of course, Chinas cyber espionage dates back even further. Ira Winkler, a former NSA (National Security Agency) analyst and former director of technology with the National Computer Security Association, told eWEEK back when the DOD report came out that China has had cyber security squads for at least a decade. Russia, for its part, has been at it for decades, and North Korea has had this type of behavior attributed to it as well, he said. Read more here about why Chinas IT development has currency. China has ample resources to lavish on the effort, both in terms of gathering intelligence against the United States as a whole, as well as in military preparation. "They have hundreds of people simultaneously working on this," Winkler said at the time. "Just by sheer numbers of people they have the largest agencies in world: cyber agencies, intelligence agencies, [etc.]" Titan Rain—the U.S. governments former code name (the current code name is classified) for a set of coordinated attacks against the countrys computer systems that were attributed to China and which were believed to have been first executed in 2003—is one example of Chinas ongoing computer espionage program. (For more on Titan Rain, Time has an in-depth article here.) Chinese hackers over that time period broke into U.S. computer networks including those of Lockheed Martin, Sandia National Laboratories and NASA. Winkler said that China devoted 10-12 hackers to the project, 24/7, as the PLA attempted to find systems that might have valuable information "in any way, shape or form." "They systematically access a system and suck up information as quickly as possible," he said. "They have it down to a science. In 20 minutes they can get into a system, suck up information and be out of there. Its been going on for years at this time. Theyve probably broken into tens of thousands of systems theyve sucked clean." Those hackers didnt get into Sandia Labs, U.S. Army systems and other military contractors systems because theyre brilliant, Winkler said. Rather, cyber espionage such as this is mostly enabled by Chinese hackers practice of being extremely methodical. Their success is also enabled by "incredibly poor security on the part of victims," Winkler said. "Most computer attack is based on poor security rather than the genius of an attacker," he said. But why would the PLA want to take down the Pentagons network? It wouldnt. Rather, the reason to get into the departments network would more likely be to plant tracking software on systems the PLA has broken into, in order to increase their intelligence-gathering capabilities, Winkler said in an earlier conversation. Check out eWEEK.coms Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEKs Security Watch blog.
 
 
 
 
Lisa Vaas is News Editor/Operations for eWEEK.com and also serves as editor of the Database topic center. Since 1995, she has also been a Webcast news show anchorperson and a reporter covering the IT industry. She has focused on customer relationship management technology, IT salaries and careers, effects of the H1-B visa on the technology workforce, wireless technology, security, and, most recently, databases and the technologies that touch upon them. Her articles have appeared in eWEEK's print edition, on eWEEK.com, and in the startup IT magazine PC Connection. Prior to becoming a journalist, Vaas experienced an array of eye-opening careers, including driving a cab in Boston, photographing cranky babies in shopping malls, selling cameras, typography and computer training. She stopped a hair short of finishing an M.A. in English at the University of Massachusetts in Boston. She earned a B.S. in Communications from Emerson College. She runs two open-mic reading series in Boston and currently keeps bees in her home in Mashpee, Mass.
 
 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
Manage your Newsletters: Login   Register My Newsletters























 
 
 
 
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date
Rocket Fuel