News / USA

US Works to Head Off Cyber Threat

While a U.S. computer security company links China’s government to scores of cyber attacks in the United States, there are fears in Washington that the U.S. risks losing a cyber-war. Analysts say computer hackers are attacking more often, and in more sophisticated ways.

President Barack Obama has ordered government agencies to share information about cyber-threats with private companies, and Congress is considering new laws to increase protection for vulnerable firms.

Officials have been investigating and prosecuting computer hackers around the world for years.

On Tuesday, Mandiant, a U.S. cyber-security company, linked scores of attacks to a specific Shanghai building, the headquarters of a Chinese military unit blamed for cyber-spying. Mandiant says the group it calls APT1 has hundreds of hackers working within a few blocks of one another.

Taking action

Map of the APT1 hacking headquarters in Shanghai, China.Map of the APT1 hacking headquarters in Shanghai, China.
x
Map of the APT1 hacking headquarters in Shanghai, China.
Map of the APT1 hacking headquarters in Shanghai, China.
Even before the latest revelations, U.S. Congressman Mike Rogers, chairman of the House Intelligence Committee, said it’s time to get tough.

“We are in a cyber-war. Most Americans don’t know it. Most folks in the world probably don’t know it. And, at this point, we are losing,” said Rogers.

The U.S. government warns that hackers could cause chaos by damaging the electrical grid, disrupting air traffic, fouling up the financial system or stealing trade secrets. Mandiant says that over the past few years, APT1 hackers increasingly have been probing those systems.

China’s Foreign Ministry rejects the accusations.

“We have stressed many times that hacking attacks are transnational and anonymous. Determining their origins is extremely difficult. We don't know how the evidence in this so-called report can be tenable,'' said Hong Lei, China's foreign ministry spokesman.

Congressman Rogers is sponsoring a bill to help U.S. companies protect their computer systems by cutting barriers to sharing information among companies and with the government.  


Key findings of Mandiant's report:

  • Links hacker group APT1 to secretive unit of the People's Liberation Army (PLA)
  • Says group is responsible for stealing data from at least 141 global organizations since 2006
  • Tracks dozens of cyber attacks to neighborhood surrounding PLA building in Shanghai
  • Says attackers commonly used emails containing malicious attachments to inflitrate networks
Privacy concerns

But Michelle Richardson of the American Civil Liberties Union said this could allow companies to collect information that has nothing to do with security.

"Right now, [it] would eviscerate all the current privacy laws on the books, and allow companies that collect our very sensitive and personal information share with each other and with the government, without making any efforts to protect privacy or limitations on how it could be used,” said Richardson.

Charles Renert, vice president of the security company Websense, told VOA via Skype that it's possible to balance privacy and security.

“We have to scan the attacks. We have to understand the nature of the attacks, and those rarely compromise the privacy of the individual if properly executed," said Renert.

While Rogers’ bill failed to pass a previous Congress, there is growing concern in Washington about the threat of cyber attacks - both military and economic. So pressure may be building for action.


Key findings of Mandiant's report:

  • Links hacker group APT1 to secretive unit of the People's Liberation Army (PLA)
  • Says group is responsible for stealing data from at least 141 global organizations since 2006
  • Tracks dozens of cyber attacks to neighborhood surrounding PLA building in Shanghai
  • Says attackers commonly used emails containing malicious attachments to inflitrate networks

You May Like

French Refugee Drama Wins Cannes Top Prize

Dheepan is about a group of Sri Lankan refugees who pretend to be a family in order to flee their war-torn country for a housing project in France More

Photogallery Crisis in Macedonia Requires Meaningful and Swift Measures

The international community has called on Macedonian leadership to take concrete measures in support of democracy in order to exit the crisis More

Activists: IS Executes 217 Civilians, Soldiers Near Palmyra

British-based Syrian Observatory for Human Rights on Sunday said the victims include nurses, women, children and Syrian government fighters More

This forum has been closed.
Comment Sorting
Comments
     
by: Terrence Healy from: California
February 20, 2013 1:59 AM
The sleeping Giant, China has awoke. They are Hungry and stealing everything in sight and the Government is using Plausable Deniability. The US needs to fight back and do it now.
The Chinese Government Redirected all traffic going to the pentagon through China for 20 minutes and claimed it was an accident. I have to stop and wonder about the fact that China has let North Korea develop a Nuclear Weapon and the Soviet Union has Helped Iran develop Nuclear Weapons. America needs to wake up to the threat coming and should have 20 years ago. We should enlist an Agency of thousands of our best and brightest to deal with the Computer hacking problem and do it now. We have the technology, is someone in the Whitehouse ever going to wake up before a 911 happens due to lack of the will to block them through the Internet.
In Response

by: dan from: Vancouver
February 20, 2013 8:51 AM
"Over the past few years, China has been one of the biggest offenders. China alone has stolen information from American companies equivalent to 50 times the current print collection of the U.S. Library of Congress. In fact, the U.S.-China Economic and Security Review Commission highlights an incident from April 2010, when for 18 minutes nearly 15 percent of the world’s Internet traffic was redirected through computer servers in China. Emails and Internet traffic to and from such vital government sites as the U.S. Senate, the Department of Commerce, NASA, the Office of the Secretary of Defense, and the Departments of the Army, Navy, and the Air Force as well as commercial sites such as Dell, Yahoo, Microsoft and IBM were hijacked and manipulated by China Telecom, a state-controlled Internet carrier."

http://goodlatte.house.gov/columns/protecting-our-economic-and-national-security

by: dan from: Vancouver
February 20, 2013 1:29 AM
Ask yourself:

When was the last time you remember China, their computer science academics, enterprise, whatever, contributing to uncovering vulnerabilities, uncovering potential exploits, zero-days, flaws, and the like?

All this sharing to make computing more secure comes from places OUTSIDE of China. The computing community in China is huge. Their programmers are second to none. Their budgets are mind-boggling. Yet they add nothing. Why do you think that is?

Because vulnerabilities are capital to be used, not exposed.

So please ask yourself next time there's a White Hat or Black Hat conference and everyone is talking about security: Where is China?

It is a question that never gets asked.

Featured Videos

Your JavaScript is turned off or you have an old version of Adobe's Flash Player. Get the latest Flash player.
Turkey's Main Opposition Party Hopes for Election Breakthroughi
X
May 22, 2015 10:23 AM
Turkey’s main opposition Republican People’s Party has sought an image change ahead of the June 7 general election. The move comes after suffering successive defeats at the hands of the Islamist-rooted AK Party, which has portrayed it as hostile to religion. Dorian Jones reports from the western city of Izmir.
Video

Video Turkey's Main Opposition Party Hopes for Election Breakthrough

Turkey’s main opposition Republican People’s Party has sought an image change ahead of the June 7 general election. The move comes after suffering successive defeats at the hands of the Islamist-rooted AK Party, which has portrayed it as hostile to religion. Dorian Jones reports from the western city of Izmir.
Video

Video Europe Follows US Lead in Tackling ‘Conflict Minerals’

Metals mined from conflict zones in places like the Democratic Republic of Congo are often sold by warlords to buy weapons. This week European lawmakers voted to force manufacturers to prove that their supply chains are not inadvertently fueling conflicts and human rights abuses. Henry Ridgwell reports from London.
Video

Video Class Tackles Questions of Race, Discrimination

Unrest in some U.S. cities is more than just a trending news item at Ladue Middle School in St. Louis, Missouri. As VOA’s Kane Farabaugh reports, it’s a focus of a multicultural studies class engaging students in wide-ranging discussions about racial tensions and police aggression.
Video

Video Mind-Controlled Prosthetics Are Getting Closer

Scientists and engineers are making substantial advances towards the ultimate goal in prosthetics – creation of limbs that can be controlled by the wearer’s mind. Thanks to sophisticated sensors capable of picking up the brain’s signals, an amputee in Iceland is literally bringing us one step closer to that goal. VOA’s George Putic reports.
Video

Video Afghan Economy Sinks As Foreign Troops Depart

As international troops prepare to leave Afghanistan, and many foreign aid groups follow, Afghans are grappling with how the exodus will affect the country's fragile economy. Ayesha Tanzeem reports from the Afghan capital, Kabul.
Video

Video Poverty, Ignorance Force Underage Girls Into Marriage

The recent marriage of a 17-year old Chechen girl to a local police chief who was 30 years older and already had a wife caused an outcry in Russia and beyond. The bride was reportedly forced to marry and her parents were intimidated into giving their consent. The union spotlighted yet again the plight of many underage girls in developing countries. Zlatica Hoke reports poverty, ignorance and fear are behind the practice, especially in Asia and Africa.
Video

Video South Korea Marks Gwangju Uprising Anniversary

South Korea this week marked the 35th anniversary of a protest that turned deadly. The Gwangju Uprising is credited with starting the country’s democratic revolution after it was violently quelled by South Korea’s former military rulers. But as Jason Strother reports, some observers worry that democracy has recently been eroded.
Video

Video California’s Water System Not Created To Handle Current Drought

The drought in California is moving into its fourth year. While the state's governor is mandating a reduction in urban water use, most of the water used in California is for agriculture. But both city dwellers and farmers are feeling the impact of the drought. Some experts say the state’s water system was not created to handle long periods of drought. Elizabeth Lee reports from Ventura County, an agricultural region just northwest of Los Angeles.
Video

Video How to Clone a Mammoth: The Science of De-Extinction

An international team of scientists has sequenced the complete genome of the woolly mammoth. Led by the Swedish Museum of Natural History in Stockholm, the work opens the door to recreate the huge herbivore, which last roamed the Earth 4,000 years ago. VOA’s Rosanne Skirble considers the science of de-extinction and its place on the planet
Video

Video Blind Boy Defines His Life with Music

Cole Moran was born blind. He also has cognitive delays and other birth defects. He has to learn everything by ear. Nevertheless, the 12-year-old has had an insatiable love for music since he was born. VOA’s June Soh introduces us to the young phenomenal harmonica player.

VOA Blogs