4.2 C
New York
Friday, November 22, 2024

Counteracting Our Edge

Counteracting Our Edge

Courtesy of Michael Panzner at When Giants Fall

China Korea Cyber Game 2005

Many of those who pooh-pooh the notion that America’s role in the world is in any way vulnerable often make reference to our superior military technology. But as The Daily Beast‘s chief investigative reporter, Gerald Posner, writes in "China’s Secret Cyberterrorism," one of our prospective rivals has made great strides in its efforts to counteract that advantage:

While Google weighs exiting China, a classified FBI report says that country has already developed a massive cyber army attacking the U.S. with “WMD-like” destruction capabilities.

A classified FBI report indicates that China has secretly developed an army of 180,000 cyberspies that “poses the largest single threat to the United States for cyberterrorism and has the potential to destroy vital infrastructure, interrupt banking and commerce, and compromise sensitive military and defense databases."

These spies are already launching 90,000 attacks a year just against U.S. Defense Department computers, according to a senior FBI analyst familiar with the contents of the report, making news Tuesday that the Chinese government may have hacked the email accountings of human-rights activists, prompting Google to consider withdrawing from that country, seem like child’s play.

The FBI report estimates that the Chinese Army has developed a network of over 30,000 Chinese military cyberspies, plus 150,000 private-sector computer experts, whose mission is to steal American military and technological secrets.

Cyber warfare is part of every developed country’s 21st century arsenal. Although no U.S. official will admit it, the Pentagon, CIA, and NSA regularly probe and try to hack into China’s military and industrial computer networks to obtain the information that years ago were brought back by the James Bonds of spy services. The U.S., and many of our European allies, try to find ways to wreck some havoc in the Chinese computer grid if a conflict ever takes place. The difference is that the Chinese are better than anyone else and lead the way in technological breakthroughs for the cyber battlefield. The FBI report concludes that a massive Chinese cyberattack could “be in the magnitude of a weapon of mass destruction," says the analyst, who requested anonymity because he was not authorized to speak about it, adding that it would do substantial damage to the American economy, telecommunications, electric power grid, and military preparedness.

The FBI report estimates that since 2003, the Chinese Army has specifically developed a network of over 30,000 Chinese military cyberspies, plus more than 150,000 private-sector computer experts, whose mission is to steal American military and technological secrets and cause mischief in government and financial services. China’s goal, says the FBI report, is to have the world’s premier “informationized armed forces” by 2020. According to the bureau’s classified information, the Chinese hackers are adept at implanting malicious computer code, and in 2009 companies in diverse industries such as oil and gas, banking, aerospace, and telecommunications encountered costly and at times debilitating problems with Chinese-implanted “malware.” The FBI analyst would not name the affected companies.

One of China’s most effective weapons, according to the FBI report, is a continuation of what Pentagon security investigators originally dubbed Titan Rain; it is a Chinese scanner program that probes national defense and high-tech industrial computer networks thousands of times a minute looking for vulnerabilities. The Chinese military hackers, the FBI analyst told me, enter without any keystroke errors, leave no digital fingerprints, and create a clean backdoor exit in under 20 minutes, feats considered capable only for a military or civilian spy agency of only a few governments.

These attacks are proliferating. The FBI report lays out the identifiable attacks originating from China just on the Defense Department computers; they increased from 44,000 in 2007 to 55,000 in 2008, and topped 90,000 last year. “They probe, they test our responses, as quick as we make changes and fix vulnerabilities, they are moving a step ahead,” the analyst told me.

The Chinese hackers aren’t after credit-card numbers or bank accounts or looking to steal private identities. Instead, they are hunting for information. Although the barrage of attacks may at times appear random, the FBI report concludes that it is part of a strategy to fully flush out U.S. military telecommunications and to better understand—and to attempt to intercept—intelligence being gathered by American spy agencies, particularly the National Security Agency.

“It’s the great irony of the Information Age that the very technologies that empower us to create and to build also empower those who would disrupt and destroy,” President Obama said last May when he announced a new White House office dedicated to protecting the nation’s computer systems. The Pentagon followed shortly after with a new military cyberspace command. In his remarks, the president said that, “In today’s world, acts of terror could come not only from a few extremists in suicide vests but from a few keystrokes of a computer.” And he admitted, “We’re not as prepared as we should be, as a government or as a country.”

Click here to read the rest.

 

Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments

Stay Connected

156,471FansLike
396,312FollowersFollow
2,320SubscribersSubscribe

Latest Articles

0
Would love your thoughts, please comment.x
()
x