Print 87 comment(s) - last by anandtech02148.. on Apr 3 at 12:10 AM

  (Source: ScreenRant)
NSA director fingers China in recent RSA intrusion and subsequent data thefts, U.S. oblivious its at war

Well, no more hemming and hawing about, it's official -- the Chinese hacked EMC Corp. (EMC) subsidiary RSA and stole the secrets of its proprietary security algorithm according to the chief of the U.S. National Security Agency.

I. A Grave Threat

U.S. Cyber Command leader and NSA director Gen. Keith Alexander made the information public on Tuesday in a briefing to the Senate Armed Services Committee, in which he testified, "I can't go into the specifics here, but we do see [thefts] from defense industrial base companies.  There are some very public [attacks], though. The most recent one was the RSA exploits."

China successfully used the information to hack into Lockheed Martin Corp. (LMT), a top U.S. defense contractor.  It is thought that China's remarkable progress in stealth fighter technology has been fueled by stolen U.S. Department of Defense Secrets.

Indeed a massive amount of intellectual property is being stolen from both the public and private sector by Chinese hackers, according to Gen. Alexander.  The U.S. has done precious little to protect its own economic prosperity, as it has been overwhelmed by the Chinese thieves.  One official in past commentary graphically described a cyberwarfare compaign of an unnamed nation state (suspected to be China) as "raping" the world.

Whether the Chinese government is perpetrating these attacks first hand, sponsoring third parties to conduct them, or merely condoning corporate interests to conduct them is almost as hazy as the sketchy financial ties the Chinese government holds to many of its private sector business (to be fair such allegations have increasingly been raised about the U.S. gov't).

But at the end of the day, the result is the same -- the destruction of the U.S. economy at the hands of the Chinese attackers.

RSA dongle
Spearphishing and an unreleased Flash exploit allowed China to hack the RSA standard and steal secrets from U.S. DOD contractors, according to NSA testimony.
[Image Source: RSA Security]

U.S. companies who speak out against the attacks are threatened by the Chinese.  The Chinese government is more than willing to ban U.S. firms that rock the boat, locking them out of the lucrative emerging market of almost 1 billion internet-active device users.

Complains Gen. Alexander, "We need to make it more difficult for the Chinese to do what they're doing.  Intellectual property isn't well protected, and we can do a better job at protecting it."

The security official shared interesting details of the attack.  He says the RSA hack used a zero-day (unreleased) exploit of Adobe System Inc.'s (ADBE) Flash player (somewhere the spirit of Steve Jobs is smirking) and used "spearphishing" (targeted phishing) to get an RSA employee to click on the offending executable, resulting on backdoors being installed on the company's servers.  Ironically, the Subcommittee hearings were livecast using Flash.

II.  Are the NSA's Cyber Command Efforts Really Helping?

Sen. Carl Levin (D-Mich.) criticized Gen. Alexander's commentary as just lip service.  He pointed out that a DOD pilot program to share malware signatures with defense contractors did not contribute significantly to new awareness, according to a Carnegie Mellon University study.  

Gen. Alexander responded, "Industry has a bunch of signatures, government has those too.  All of us need to work together to provide the best set of signatures."

He then countered that private sector communications efforts have been hindered by red tape.  He compares the situation to a bank robbery in which no one can tell the police.  He points to one incident in which the NSA detected 3 GB of data being stolen, stating, "I think that industry should have the ability to see these attacks and share them with us in real time.  It's like neighborhood watch. Somebody is breaking into a bank, and somebody needs to be in touch with the police to stop it."

surrender flag
Is the U.S. surrendering its future by allowing China to victimize its businesses and defenses with no response?  The hacks may go down in U.S. history as the nation's first unofficial surrender. [Image Source: Allison Nazarian]

On the upside Gen. Alexander says DOD efforts to establish a Cyber Command outpost at every major geographical and functional Combatant Command branch are coming along nicely.  He points to a major recent combat exercise at Nellis Air Force base as a sign of that progress.

Tensions between the U.S. and China are running high after the U.S. filed a World Trade Organization complaint against China for cutting off its supply of rare earth metals.  China argued the complaint was unfair and that it's all about playing by the rules.

Source: U.S. Senate

Comments     Threshold

This article is over a month old, voting and posting comments is disabled

RE: We prosecute our hackers
By tayb on 3/29/2012 12:28:08 AM , Rating: 4
Oh look, Reclaimer is here to go off the deep end. Thanks Reclaimer.

RE: We prosecute our hackers
By Reclaimer77 on 3/29/12, Rating: -1
RE: We prosecute our hackers
By Paj on 3/29/2012 7:12:42 AM , Rating: 5
Pretty sure he didn't say anything about releasing murderers. Unless I missed something?

Plenty of people working in cryptography and antivirus started out as hackers and phreakers. The vast majority of them grow out of it by the time they meet girls, start a family and need a job to support them. They quickly realise they have a unique skill set that pays handsomely.

The goal would not be to get the hackers to attack China, but to use their skills to find holes in the defenses, and use their expertise to shore them up.

RE: We prosecute our hackers
By Reclaimer77 on 3/29/12, Rating: -1
RE: We prosecute our hackers
By TSS on 3/29/2012 9:00:39 AM , Rating: 2
Well lets see, does the government build safes and safe technology, in order to improve the national security of monitary deposits? no.

"currency manipulation consultants" already exist and work in droves at the fed and treasury. Using the criminals would be a step up here.

You don't need the hackers to attack china. They don't have anything worth stealing anyway. What you need hackers for, is to continually attack domestic networks without causing damage, or as little as possible. You want them to hack the same stuff as the chinese hack, before the chinese hack it, so that you can secure it against them.

And secretly remove from prison? lol, are you so stuck in thinking in totalitarian terms? Just offer them a choice when they get caught. Either go to jail or sign a job contract of the same lenght. One has possibly electronic house arrest and monitoring software, the other ass rape. And incase you didn't know, the majority of hackers isn't exactly physically fit.

And build a super, super secure webpage and server. Put a single file on there containing contact information where to apply for the security job for the government. Then put out an open call to hackers to hack it, then wait for the applications to fill in. They won't cause damage and you've got somebody with already a base level skill, which can then be heightened through training.

But no, you're right. Lets send everybody to prison, it has worked so well in the past. Every person walking out of there is a shining beacon of reformed model citizen, so it'll be a far better option then anything... "productive".

RE: We prosecute our hackers
By Reclaimer77 on 3/29/12, Rating: -1
RE: We prosecute our hackers
By Paj on 3/30/2012 7:35:14 AM , Rating: 2
It's a pretty slippery slope. Theres a big difference between hacking and murder, and the two shouldn't be given equal weight as premises in an argument.

I would be surprised if someone working for the NSA right now didn't get discovered by doing something illegal.

I do get your drift though, and I'll grant that it could set a precedent.

RE: We prosecute our hackers
By SlyNine on 3/29/12, Rating: 0
RE: We prosecute our hackers
By retrospooty on 3/29/2012 8:32:22 AM , Rating: 2
"Oh look, Reclaimer is here to go off the deep end"

You compare this to Reclaimer going off the deep end? Well, I have seen Reclaimer going off the deep end.... He's done it in threads of mine... And this is not Reclaimer going off the deep end. ;)

RE: We prosecute our hackers
By Reclaimer77 on 3/29/2012 9:05:10 AM , Rating: 2
There you go again, throwing me under the bus. Oh the pain... :P

RE: We prosecute our hackers
By retrospooty on 3/29/2012 10:58:58 AM , Rating: 2
LOL... Sorry, maybe that just came out wrong.

Your argument here is sound and not off the deep end at all. The hippie/communist nightmares in your head must have been calm last night ;)

"We’re Apple. We don’t wear suits. We don’t even own suits." -- Apple CEO Steve Jobs

Most Popular ArticlesAre you ready for this ? HyperDrive Aircraft
September 24, 2016, 9:29 AM
Leaked – Samsung S8 is a Dream and a Dream 2
September 25, 2016, 8:00 AM
Yahoo Hacked - Change Your Passwords and Security Info ASAP!
September 23, 2016, 5:45 AM
A is for Apples
September 23, 2016, 5:32 AM
Walmart may get "Robot Shopping Carts?"
September 17, 2016, 6:01 AM

Copyright 2016 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki