Chinese Cyberwarfare capabilities - Enter the cyber dragon....

Status
Not open for further replies.
http://www.militaryphotos.net/forums/showthread.php?231890-Hidden-chips-launch-spam-attacks-from-irons
 
CHINESE FIRM PAID US GOV'T INTELLIGENCE ADVISER Associated Press

WASHINGTON (AP) -- A longtime adviser to the U.S. Director of National Intelligence has resigned after the government learned he has worked since 2010 as a paid consultant for Huawei Technologies Ltd., the Chinese technology company the U.S. has condemned as an espionage threat, The Associated Press has learned.

Theodore H. Moran, a respected expert on China's international investment and professor at Georgetown University, had served since 2007 as adviser to the intelligence director's advisory panel on foreign investment in the United States. Moran also was an adviser to the National Intelligence Council, a group of 18 senior analysts and policy experts who provide U.S. spy agencies with judgments on important international issues.

The case highlights the ongoing fractious relationship between the U.S. government and Huawei, China's leading developer of telephone and Internet infrastructure, which has been condemned in the U.S. as a potential national security threat. Huawei has aggressively disputed this, and its chief executive, Ren Zhengfei, has said the company has decided to abandon the U.S. market.
 
http://www.militaryphotos.net/forums/showthread.php?235251
 
http://www.telegraph.co.uk/news/worldnews/asia/china/10608245/China-kills-off-discussion-on-Weibo-after-internet-crackdown.html
 
There is a better link to the document here.

What I think is really interesting here is the three pages of UFO pics. There is not a transcription to go with this presentation, so we don't know what was said in reference to the UFO pics. But since the topic is clearly disinformation, I imagine that the UFO legend is an often used tool to muck up any exotic platform sighting that might happen from time to time.
 
Chinese military unit charged with cyber-espionage against U.S. firms


Attorney General Eric Holder formally announced the U.S. plan to bring charges against members of the Chinese People's Liberation Army for hacking into the computers of six organizations in western Pennsylvania.

Victimized by the cyberspying were Westinghouse Electric Co., Alcoa, Allegheny Technologies Inc., United States Steel, the United Steel Workers Union and SolarWorld, officials said.

But the charges involving hacking against defense related industry are the ones we really want to see.....
 
The investigation also found gaps in reporting requirements and a lack of information sharing among U.S. government entities. That in turn left the U.S. military largely unaware of computer compromises of its contractors.

If only the NSA wasn't spending all its time monitoring the American people it might have some time to protect our military contractors....
 
sublight is back said:
If the NSA even used a fraction of those resources to protect our defense contractors, do you think they would have been hacked?


Yes.
 
http://www.defensenews.com/article/20140917/CONGRESSWATCH/309170037
 
http://www.washingtonpost.com/business/technology/cyberattacks-trigger-talk-of-hacking-back/2014/10/09/6f0b7a24-4f02-11e4-8c24-487e92bc997b_story.html
 
sublight is back said:
Really? Because I am thinking "Sentry Raven" is not helpful to US companies. They are unwittingly using crippled encryption that is ripe for Chinese exploitation.


Yes, really. Your question was:


sublight is back said:
If the NSA even used a fraction of those resources to protect our defense contractors, do you think they would have been hacked?


SENTRY RAVEN has little to nothing to do with this. Do you REALLY think that adversaries are just sitting there breaking encryption to gain access?
Really?

A determined attacker will get in, and it doesn't take all that much determination.
 
quellish said:
SENTRY RAVEN has little to nothing to do with this. Do you REALLY think that adversaries are just sitting there breaking encryption to gain access?
Really?

SENTRY RAVEN is but one of many programs to install back doors into various pieces of networking and systems hardware. The Chinese and others make very quick work of finding these holes and exploiting them. If I was a fortune 500 company and the Chinese came through a hole that the NSA left, I would be pretty pissed off.
 
http://www.washingtonpost.com/local/chinese-hack-us-weather-systems-satellite-network/2014/11/12/bef1206a-68e9-11e4-b053-65cea7903f2e_story.html
 
http://edition.cnn.com/2014/11/20/politics/nsa-china-power-grid/index.html
 
http://www.theguardian.com/technology/2014/nov/21/e-cigarettes-malware-computers

Not an entirely objective article, I suspect...
 
Grey Havoc said:
Not an entirely objective article, I suspect...

.. but there seems to be at least a grain of truth in it:
http://www.chip.de/news/BadUSB-Erstes-Exploit-umgeht-Schutzmassnahmen-am-PC_73091055.html

For short: The "BadUSB" security risk is already known for quite a while,, but was regarded as a theoretical danger
only. But on the Black Hat Hacker Conference, Kartesn Nohl, a German expert for IT security presented the first
real BadUSB exploit, still without making the code public, as it was regarded as too dangerous.
But too other experts, Adam Caudill and Brandon Wilson, after analysing the same firmware said, that they will
publish that exploits, because they regard this a s the only way to force industry to close that security gap.
And another of theri arguments is, that concealment would work for those, who are already using such an exploit.
They assuem, that it's long since for example the NSA is using it ...
 
And now e-cigarettes?

https://www.yahoo.com/tech/e-cigarette-from-china-infected-mans-computer-with-103466334849.html

Smoking will not only damage your health but also your computer, as e-cigarettes manufactured in China are reportedly being used to spread malicious software through the USB connection used to charge the device.
A recent post to social news site Reddit detailed how the computer of an executive at a “large corporation” had been infected with malware from an undetermined source. Further investigation apparently revealed that it had stemmed from a $5 e-cigarette bought from the online auction site eBay.

“The executive’s system was patched up to date, had antivirus and anti-malware protection,” Reddit user Jrockilla said. “Web logs were scoured and all attempts made to identify the source of the infection but to no avail. Finally after all traditional means of infection were covered, IT started looking into other possibilities. They finally asked the executive: ‘Have there been any changes in your life recently?’ The executive answered: ‘Well yes, I quit smoking two weeks ago and switched to e-cigarettes.’ And that was the answer they were looking for.”

The e-cigarette was found to have malware hard-coded into the charger, which “phoned home” and infected the system when plugged into the computer’s USB port. Pierluigi Paganini, chief information security officer at ID management firm Bit4Id, said that electronic cigarettes were just the latest vector to serve the spread of malicious software.
 
Creative said:
And now e-cigarettes?

As already pointed to in the link given by Grey Havoc. ;)

The danger of an infection increases with the cheapness of the product, as the traceability
often is greatly reduced then.
 
;D


http://www.reuters.com/article/2014/12/05/us-sony-cybersecurity-northkorea-idUSKCN0JJ08B20141205
 
in case people are wondering what's going on in the interwebs and what China has been up to:

http://map.ipviking.com/?_ga=1.106938115.1477390587.1388686673
 
Chinese rules requiring foreign firms to hand over source code and other measures.

Hahaha, handing over source code would be the stupidest thing we have EVER done. It is clearly time to stop doing business with the dragon, it has gotten too big for its own good.
 
Tell China the answer is NO! I believe that the Chinese are falling so far behind in modern systems design and technology that even massive cyber theft is not enough to keep them in the game. They are being forced to resort to blatant measures just to keep up. Hence this outrageous request for source code.


This behavior by China is the bitter harvest of them attempting to build their progress on copying others people's IP.
 
http://www.reuters.com/article/2015/02/04/us-china-internet-censorship-idUSKBN0L80ZF20150204
 
http://www.bloomberg.com/news/articles/2015-02-05/signs-of-china-sponsored-hackers-seen-in-anthem-attack
 
http://www.reuters.com/article/2015/02/25/us-china-tech-exclusive-idUSKBN0LT1B020150225
 
https://ca.news.yahoo.com/internet-key-front-chinas-battle-western-hostile-forces-120506329.html
 
Grey Havoc said:
https://ca.news.yahoo.com/internet-key-front-chinas-battle-western-hostile-forces-120506329.html

The Communist Party has long railed against Western values, including concepts such as multi-party democracy, judicial independence and universal human rights.

China has 2.3 million households of "millionaires", and that number is growing pretty fast. Those people aren't going to drink "Mao's Kool Aide" forever. Capitalism fever has a permanent foothold there, and democracy fever is not far behind...
 
Status
Not open for further replies.

Similar threads

Back
Top Bottom