Cyber Tensions Flare Amongst U.S., Chinese Military
March 12, 2008 5:28 PM
comment(s) - last by
Reports claim the U.S. and Chinese armed forces have begun to wage an escalating, silent war on the internet
Surveillance and subterfuge are timeless traditions. In ancient Japan, daimyo ninjas carried out dangerous spy missions to the highest bidder. Their surveillance missions and assasinations created fear and chaos within their enemies.
More recently in the days of the Cold War, espionage expanded to an unprecedented scale as the CIA and Britain's MI6 waged silent war against the Soviet Union's KGB agents. Telephoto cameras, spy planes and phone bugs were the most high-tech tools employed for monitoring.
Today a new war of intelligence has begun, this time online. China, the world's most populus nation, began to exert its digital will. The U.S. military reported numerous successful attacks on Defense Department computers originating from China. While the U.S. military has not put it in these exact words, it indicates that the U.S. is on the verge of entering into a digital war with the Chinese government, much akin to the war of surveillance which occurred against Russia during the Cold War era.
The Defense department reported multiple attacks over the course of the last year. Among them was a successful June 2007 system
penetration which shutdown Homeland Security networks and potentially compromised sensitive data
. The Department of Homeland security traced the attacks back to the Chinese People's Liberation Army (PLA) and blamed the breach on
lax security standards at the government contractor Unisys
. Unisys was not alone though -- in Fall 2006 hackers gained access to the Naval War College's computer network and temporarily crippled it. And also in June of last year, another attack gained access to the unclassified Pentagon email system used by the offices of Defense Secretary Robert Gates. The email system had to be taken offline and reworked.
Some of these attacks likely were launched by China's burgeoning free lance hacker community.
, in a meeting with high profile Chinese hackers, recently discussed the attacks. Several of the hackers claimed knowledge of friends in the Chinese underground hacking community who launched successful assaults on the Pentagon. More interestingly, the hackers reported the
Chinese government subsidized them for successful attacks
. While the Chinese government ardently denies such claims it appears, much like Japanese warlords used the ninjas of old, the Chinese government is employing these legions of hackers to create chaos and steal information on U.S. networks -- for a price.
Meanwhile, according to U.S. intelligence, the PLA is building up its own force of elite hackers to wage cyberwarfare. A Pentagon report,
released this month
notes that China is expanding its military presence in "the land, air and sea dimensions of the traditional battlefield into the space and cyber-space domains." Further, it notes, "The PLA has established information-warfare units to develop viruses to attack enemy computer systems and networks, and tactics and measures to protect friendly computer systems and network."
The Chinese foreign ministry and its spokesman Gang Qin dismissed these intelligence assessments, calling them paranoid and misleading. Gang stated in recent public comments that the U.S. needs "to drop its Cold War mentality."
However, few familiar with China's military efforts can deny that its cyber-warfare efforts seem particularly active. General Kevin Chilton, who heads U.S. Strategic Command in Bellevue, Nebraska, stated, "The thing about China that gives you pause is that they've written openly about their emphasis in particular areas -- space and cyberspace ... you can kind of connect the dots."
The government is also very concerned about possible attacks on vulnerable civilian infrastructure such as power and water treatment plants. In October 2006, according to U.S. Government Accountability Office reports, a Harrisburg, Pa., computer was hacked and software was planted that could affect the plant's water processing. It has not been officially stated whether the attack originated from inside or outside the country.
In a statement to reporters Chilton indicated that despite China's dismissive attitude, the country is entering into a Cold War-esque digital intelligence campaign against the U.S. He says its efforts focus on breaching U.S. military networks and mining data which can be used to steal weapons designs, monitor command decisions, and monitor the U.S. armed forces' state of combat readiness. He states, "Twenty years ago you'd have hired somebody to go in the middle of the night with a flashlight in their teeth to open the drawer and do a bunch of photography of files. [Today] you can do it from your home country, wherever it might be."
General Chilton also fears that future attacks may focus on crippling entire military systems, leaving entire armed forces branches without communications. He points to such an attack against Estonia's government in the Spring of 2007, effectively shutting down the majority of Estonia's government networks. General Chilton stated, "You don't shut the system down completely, but you slow it down. I would consider that an attack."
The U.S. is not alone in its belief that China is flexing its cyber-spy muscle. The United Kingdom has accused the Chinese Army of directly trying to
infiltrate British networks and steal information
, including personal financial information. It has distributed letters of warning to various financial institutions.
It will likely be virtually impossible for civilians to determine when exactly the cyberwar between China and the U.S. begins. It appears, however, the first shots have already been fired and with reports of attacks and buildup mounting, it is clear that we are heading towards a silent cyberwar with China, if we are not engaged in one already.
This article is over a month old, voting and posting comments is disabled
RE: Why ?
3/12/2008 9:30:23 PM
Because you have your perceptions all skewed. America spies on other countries which in most cases does not involve attacking. They do that in the interests of national securiteeeeeeeee, get it?
What china is doing is sabotage not spying, there's a bit of a difference I think, but I could be wrong......
"Nowadays, security guys break the Mac every single day. Every single day, they come out with a total exploit, your machine can be taken over totally. I dare anybody to do that once a month on the Windows machine." -- Bill Gates
Chinese Hackers Take On the World with Ease
March 7, 2008, 7:26 PM
United Kingdom Points Finger at Chinese Army for Increased Cyber-attacks
December 2, 2007, 3:24 AM
Unisys Blamed for China-Connected Homeland Security Hacks
September 26, 2007, 10:08 AM
Chinese Military Suspected of Hack on Pentagon
September 4, 2007, 2:54 AM
Creationists are Mad About Google Doodle Depicting Evolution
November 24, 2015, 8:48 PM
DHS and TSA: Whoops, We Missed That 73 Airport Employees May be Terrorists
November 19, 2015, 2:16 PM
Star Wars Spinoff Film "Rogue One", Theme Park Attractions Announced
August 17, 2015, 12:20 PM
SpaceX Falcon 9's Seventh Supply Mission to ISS Ends w/ Fiery Stage 1 Explosion
June 28, 2015, 1:10 PM
Cool Science Video: Glowing Millipede Prowls the Nevada Desert
May 18, 2015, 12:00 PM
Newly Discovered Costa Rican Glass Frog is Kermit's Doppelgänger
April 22, 2015, 11:26 AM
Most Popular Articles
Free Windows 10 offer ends July 29th, 2016: 10 Reasons to Upgrade Immediately
July 22, 2016, 9:19 PM
Top 5 Smart Watches
July 21, 2016, 11:48 PM
Latest Blog Posts
Sceptre Airs 27", 120 Hz. 1080p Monitor/HDTV w/ 5 ms Response Time for $220
Dec 3, 2014, 10:32 PM
Costco Gives Employees Thanksgiving Off; Wal-Mart Leads "Black Thursday" Charge
Oct 29, 2014, 9:57 PM
"Bear Selfies" Fad Could Turn Deadly, Warn Nevada Wildlife Officials
Oct 28, 2014, 12:00 PM
The Surface Mini That Was Never Released Gets "Hands On" Treatment
Sep 26, 2014, 8:22 AM
ISIS Imposes Ban on Teaching Evolution in Iraq
Sep 17, 2014, 5:22 PM
More Blog Posts
Copyright 2016 DailyTech LLC. -
Terms, Conditions & Privacy Information