News / USA

    Hacking: Not Just China

    Part of the building of 'Unit 61398', a secretive Chinese military unit believed to be behind a series of hacking attacks, is seen in the outskirts of Shanghai, February 19, 2013. Part of the building of 'Unit 61398', a secretive Chinese military unit believed to be behind a series of hacking attacks, is seen in the outskirts of Shanghai, February 19, 2013.
    x
    Part of the building of 'Unit 61398', a secretive Chinese military unit believed to be behind a series of hacking attacks, is seen in the outskirts of Shanghai, February 19, 2013.
    Part of the building of 'Unit 61398', a secretive Chinese military unit believed to be behind a series of hacking attacks, is seen in the outskirts of Shanghai, February 19, 2013.
    Computer hacking by the Chinese has been causing a stir in recent weeks, but experts warn that focusing too much on Beijing could open the door to cyber spies from other countries the U.S. government is monitoring.

    For example, the most recent National Intelligence Estimate, a classified document said to represent a consensus view of the U.S. intelligence community, named Russia, Israel and France, in addition to China, as leading countries engaged in hacking against U.S. targets for economic gain.

    “In my opinion, while China is getting, and may even deserve, the lion’s share of the attention, they are not the only ones dabbling in cyber mischief,” said Christopher Burgess, author of Secrets Stolen, Fortunes Lost, Preventing Economic Espionage and Intellectual Property Theft in the 21st Century.

    Narrowly focusing on China can have negative consequences, says Jeffrey Carr, founder and CEO of Taia Group, a cybersecurity firm, who wrote a blog post critical of a recent, and oft-cited study by the computer security firm, Mandiant, that focused on China’s hacking capabilities.

    Carr said always blaming China, could cause “unnecessary ramping up of tensions” between the two rivals. He also said a narrow focus on China gives an “inaccurate picture of the global threat landscape, which leads to poor defense planning.” Finally, he said, too much emphasis on China could give “companies a false sense of security when they operate in countries besides China.”

    Russia, for example, reportedly pulled off two very high-profile cyber attacks in recent years. In 2007, after a row with Estonia, cyber attacks said to be from Russia shut down Estonian government, media and financial computers. In 2008, during the South Ossetia War, Georgian computers faced similar attacks. The two incidents were enough for the U.S. Army to commission a paper analyzing the Russian cyber threat.

    Late last year, Iran was seen as the likely culprit in a cyber attack on the Saudi oil industry, which brought down computers and even affected some U.S. financial institutions. In the wake of the attack, U.S Defense Secretary Leon Panetta warned of a “cyber Pearl Harbor.”

    Iran also has been the victim of cyber attack. It is widely believed the U.S. and Israel were behind the so-called Stuxnet worm that damaged key components of Iran’s nuclear facilities.

    The U.S. also was accused of hacking into the Elysée Palace computers in May of last year just before François Hollande succeeded Nicolas Sarkozy as president of France. The U.S. denied the charges.

    Massive, Noisy, Familiar

    The cost of cybercrime is a hotly debated topic, but there’s no doubt it costs the U.S. economy billions. And while other countries may be more discreet in their hacking activities, China appears to be comfortable conducting at least some of their cyber espionage in what experts call a “noisy” manner, meaning they’re not careful to cover their footprints.

    Matthew Aid, an intelligence historian, said the Chinese have operated over the past decade “as if they don't care who knows what they are doing,” which he says probably represents the mindset of the generals who run the cyber espionage programs.

    “This may, in part, be a reflection of the enormous pressure the Chinese intelligence 'mandarins' have been under from their political masters in Beijing to produce all of the commercial data needed to push forward the Chinese economy and spot opportunities for growth outside of China,” he said. “The Chinese perhaps calculated that the U.S. and other western nations would not do anything about their spying activities because of China's enormous new economic power on the world stage and Washington's need for Chinese cooperation on global issues like North Korea and Iran.”

    Because Chinese cyber espionage can be noisy and easily discovered, experts say at least some of China’s activities in cyberspace are easy to understand because they’re familiar and persistent.

    “I think in terms of sheer volume [China’s threat] is not an exaggeration, but it’s too simplistic,” said Aid. “It’s easy to make the Chinese the bogeyman. We know a great deal more about them, but we know so much less about Russia, Israel, France and Iran.”

    It’s possible, Aid added, that Russia in particular may be even more successful than the Chinese because “they’ve been able to remain secret and covert.”

    And while China is certainly on everyone’s mind now, Burgess said governments and corporations need to realize that a cyber threat can come from anywhere.
     
    “The prudent strategy is prepare for all who may attack your infrastructure and be pleasantly surprised when they don't, and prepared if they do,” he said.

    He also added that China’s noise is likely masking more sophisticated, quiet efforts.

    Badge of Honor

    It used to be a stigma for a U.S. company to be hacked by China, but as China’s stature has risen, more and more companies are coming forward claiming they’ve been hacked by the Chinese as some kind of badge of honor.

    Recently, many U.S. media outlets, including the New York Times, Wall Street Journal, Bloomberg and the Washington Post, have all claimed to have been hacked by the Chinese.

    Carr relates the story of a client whose company was hacked by the Chinese.

    The company computers were infiltrated, he said, after an executive visited China and returned to the U.S. The hack was cleaned up, but the executive went back to China, this time with a clean laptop.

    “That was breached when he was asleep in his hotel room,” Carr said. “One of the executives for the company later said ‘our work has never been in the limelight. We’ve gotten some kind of status. All of a sudden, we matter.’”

    Carr said that kind of thinking struck him as “weird.”

    “If you had your choice of being hacked by Slovakia or China, the latter is much more interesting,” he said.

    Nothing new

    China’s aims are nothing new, says Burgess, citing the 863 Program, created by China in March of 1986 with the goal of identifying needed technologies -- and either developing them domestically or, as a 2011 report by the National Counterintelligence Executive said, “to clandestinely acquire U.S. technology and sensitive economic information.”

    Aid said China has become “reasonably good at producing on a Detroit-style mass production basis vast amounts of foreign economic intelligence information by exploiting weaknesses in computer software and security systems.”

    ”You cannot measure the success or failure of Chinese espionage by our standards,” he said. “You have to try to put yourself in the shoes of the Chinese political leadership in Beijing, who perhaps feel that they have a narrow window of opportunity to work with, and who still fear the U.S. is still a substantial military power in East Asia, and the recent trends of pivoting U.S. national security strategy away from South Asia towards East Asia.”

    Cover, for Now

    Not only does China engage in massive cyber espionage, but the scale of it could very well allow other states to conduct their own spying behind the Chinese flag. In the short term, China may very well be doing Israel, France, Russia and, to a lesser extent, Iran, a favor.

    “China is the best cover there is in the world for acts of cyber espionage,” said Carr. “Every foreign intelligence service should set up a front business in Shanghai or Beijing for that very reason.”

    According to Burgess, a would-be cyber thief would not even have to physically be in China.

    “I can make that connection bounce all over the world and you’re not going to be able to pinpoint where I’m coming from,” he said. “I can be sitting in Munich and make it look like like I’m in Beijing.”

    Carr wondered why other states active in cyber espionage are never caught.

    “It's not because they do it less, or because China is incompetent at it,” he said. “It could be because they are using China for cover. It could be because the Chinese government isn't involved at all; that it is the work of professional hacker crews who are Chinese, Eastern European, Brazilian, etc. and who then sell the information to China and/or other nation states. How is it that they’ve never one time discovered Russia, France or Israel doing these things? How can that happen, statistically speaking. I don’t understand.”

    Over the long term, there could, however, be a silver lining to the Chinese cyber espionage story.

    “The Chinese have done us a great service by making plain the nature and extent of the cyber threat that the U.S. and its allies face from countries such as, but not limited to, China,” said Aid. “With recognition of the threat comes the inevitable move to strengthen our cyber defenses, which not only will inevitably strangle off many of the most productive cyber targets that the Chinese have been exploiting, but also in the process kill off many of the targets in the U.S., Europe and Japan that Russia, France, and Israel have been more secretly monitoring for their own intelligence purposes.

    “In effect,” Carr concluded, “the Chinese have queered the pitch for all the other nations that were quietly using cyber espionage to gather needed economic and political intelligence on the U.S. and its allies.”

    You May Like

    Video Democrats Clinton, Kaine Offer 'Very Different Vision' Than Trump

    In a jab at Trump, Clinton says her team wants to 'build bridges, not walls'; Obama Hails Kaine's record; Trump calls Kaine a 'job-killer'

    Turkey Wants Pakistan to Close Down institutions, Businesses Linked to Gulen

    Thousands of Pakistani students are enrolled in Gulen's commercial network of around two dozen institutions operating in Pakistan for over two decades

    AU Passport A Work in Progress

    Who will get the passport and what the benefits are still need to be worked out

    This forum has been closed.
    Comment Sorting
    Comments
         
    by: WoW from: USA
    February 22, 2013 11:30 AM
    Wow! One of very few intelligent views on the subject! China's information security and IT aren't as mature as more developed countries. The systems there can be hacked relatively simply. If you talk to the people there, you'd know how much they hate hacking and most of them have bad experiences with it. China has lots of college students with a lot of free time. It will definitely be a fertile ground for hacking.

    Featured Videos

    Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
    In State of Emergency, Turkey’s Erdogan Focuses on Spiritual Movementi
    X
    July 22, 2016 11:49 AM
    The state of emergency that Turkish President Recep Tayyip Erdogan has declared is giving him even more power to expand a purge that has seen an estimated 60,000 people either arrested or suspended from their jobs. VOA Europe correspondent Luis Ramirez reports from Istanbul.
    Video

    Video In State of Emergency, Turkey’s Erdogan Focuses on Spiritual Movement

    The state of emergency that Turkish President Recep Tayyip Erdogan has declared is giving him even more power to expand a purge that has seen an estimated 60,000 people either arrested or suspended from their jobs. VOA Europe correspondent Luis Ramirez reports from Istanbul.
    Video

    Video Scientists in Poland Race to Save Honeybees

    Honeybees are in danger worldwide. Causes of what's known as colony collapse disorder range from pesticides and loss of habitat to infections. But scientists in Poland say they are on track to finding a cure for one of the diseases. VOA’s George Putic reports.
    Video

    Video Wall Already Runs Along Parts of US-Mexico Border

    The Republican Party’s presidential nominee, Donald Trump, gained the support of many voters by saying he would build a wall to keep undocumented immigrants and drugs from coming across the border from Mexico. Critics have called his idea impractical and offensive to Mexico, while supporters say such a bold approach is needed to control the border. VOA’s Greg Flakus has more from the border town of Nogales, Arizona.
    Video

    Video New HIV Tests Emphasize Rapid Results

    As the global fight against AIDS intensifies, activists have placed increasing importance on getting people to know their HIV status. Some companies are developing new HIV testing methods designed to be quick, easy and accurate. Thuso Khumalo looks at the latest methods, presented at the International AIDS conference in Durban, South Africa.
    Video

    Video African Youth with HIV Urge More Support

    HIV, the virus that causes AIDS, is the top killer of teens in sub-Saharan Africa. But many youths say their experience with the virus is unique and needs to be addressed differently than the adult epidemic. VOA South African Correspondent Anita Powell reports.
    Video

    Video Poor Residents in Cleveland Not Feeling High Hopes of Republican Convention

    With the Republican Party's National Convention underway in Cleveland, Ohio, delegates and visitors are gathered in the host city's downtown - waiting to hear from the party's presidential candidate, Donald Trump. But a few kilometers from the convention's venue, Cleveland's poorest residents are not convinced Trump or his policies will make a difference in their lives. VOA's Ramon Taylor spoke with some of these residents as well as some of the Republican delegates and filed this report.
    Video

    Video Pop-Up Art Comes to Your Living Room, Backyard and Elsewhere

    Around the world, independent artists and musicians wrestle with a common problem: where to exhibit or perform? Traditional spaces such as museums and galleries are reserved for bigger names, and renting a space is not feasible for many. Enter ArtsUp, which connects artists with venue owners. Whether it’s a living room, restaurant, office or even a boat, pop-up events are bringing music and art to unexpected places. Tina Trinh has more.
    Video

    Video With Yosemite as Backdrop, Obama Praises National Parks

    Last month, President Barack Obama and his family visited some of the most beautiful national parks in the U.S. Using the majestic backdrop of a towering waterfall in California's Yosemite National Park, Obama praised the national park system which celebrates its 100th anniversary this year. He talked about the importance of America’s “national treasures” and the need to protect them from climate change and other threats. VOA’s Julie Taboh reports.
    Video

    Video Counter-Islamic State Coalition Plots Next Steps

    As momentum shifts against Islamic State in Iraq, discussions are taking place about the next steps for driving the terrorist group from its final strongholds. Secretary of State John Kerry is hosting a counter-IS meeting at the State Department, a day after defense ministers from more than 30 countries reviewed and agreed upon a course of action. VOA Pentagon correspondent Carla Babb reports.
    Video

    Video Russia's Participation at Brazil Olympic Games Still In Question

    The International Olympic Committee has delayed a decision on whether to ban all Russian teams from competing in next month's Olympic Games in Brazil over allegations of an elaborate doping scheme. The World Anti-Doping Agency recently released an independent report alleging widespread doping by Russian athletes at the 2014 Winter Olympics in Sochi. So far, only Russian track and field athletes have been barred from the Summer Games in Brazil. VOA's Zlatica Hoke has more.
    Video

    Video Scotland’s Booming Whisky Industry Fears Brexit Hangover

    After Britain’s vote to leave the European Union, Scotland’s government wants to break away from the United Kingdom – fearing the nation’s exports are at risk. Among the biggest of these is whisky. Henry Ridgwell reports on a time of turmoil for those involved in the ancient art of distilling Scotland’s most famous product.
    Video

    Video Millennials Could Determine Who Wins Race to White House

    With only four months to go until Americans elect a new president, one group of voters is getting a lot more attention these days: those ages 18 to 35, a generation known as millennials. It’s a demographic that some analysts say could have the power to decide the 2016 election. But a lot depends on whether they actually turn out to vote. VOA’s Alexa Lamanna reports.

    Special Report

    Adrift The Invisible African Diaspora