Subscribe free to our newsletters via your
. Military Space News .

Subscribe free to our newsletters via your

Chinese Cyberattacks Target US Think Tanks

disclaimer: image is for illustration purposes only
by Shaun Waterman
Washington DC (UPI) Mar 07, 2008
Defense-related think tanks and contractors, as well as the Pentagon and other U.S. agencies, were the target of repeated computer network intrusions last year apparently originating in China, the Department of Defense said this week.

In its annual report to lawmakers on China's military power, the department said the intrusions "appeared to originate in" China but added, "It is unclear if these intrusions were conducted by, or with the endorsement of" the Chinese government or military.

The report gave few details, but one China expert who works in the private sector told United Press International that in the last 18 months, China scholars who have close links to the U.S. government have been the repeated targets of sophisticated hacking attempts, using malicious software packages called Trojan horses hidden in e-mail attachments.

"Almost every think tank in Washington has dealt with this," said the expert, who did not want to be named because of the ongoing investigations into the intrusions. "I personally have received more than two dozen" such e-mails, which arrive purportedly sent by other China-watchers.

"They would spoof the addresses to make it look like the e-mail was coming from someone I knew and give the attachment a name żż designed to catch my attention," said the expert.

The e-mails varied in sophistication. "The vast majority are fairly primitive," said the expert, "littered with 'Chinglish' misspellings" or other obvious errors. But one purporting to come from a U.S. Air Force e-mail account was "very legitimate looking," said the expert, adding, "I would have opened the attachment, but fortunately it was on a subject I wasn't interested in."

If the attachment is opened, the Trojan horse software hidden inside is designed to bury itself deep in the computer's operating system and begin covertly exporting data from the target's calendar, contacts and e-mail folders to an Internet address in China, the expert said.

"This was a comprehensive intelligence-gathering effort by the Chinese, aimed at (China-watchers) with one foot in the government," said the expert. "People who likely have unclassified but still sensitive material on their computers."

At the RAND Corp., a think tank with historic links to the U.S. Air Force, the expert said, the infections were buried so deep that the FBI physically removed some computer hardware.

A statement from RAND Chief Information Officer Woody Stoeger confirmed that the think tank "has faced periodic attacks on our computer systems as have many organizations across the nation."

Stoeger added RAND was "vigilant in guarding against (such) attacks" but declined to comment in any more detail about their nature or where they might have originated from.

Because of the geographically dispersed nature of the Internet and the ability of hackers to launch attacks and intrusion efforts from "slave" computers they have secretly taken control of, attribution has been highlighted as one of the biggest problems for U.S. military planners developing cyberwar strategies.

Nonetheless, defense officials said the language used in the report was the most direct used so far by the administration and had been carefully chosen.

The language in the report had been "coordinated through a multiagency process" involving the National Security Council, the director of national intelligence and the State Department, Pentagon Asian affairs spokesman Maj. Stewart Upton told UPI. He called it "the strongest language yet from the (Department of Defense) about these intrusions."

"While we're not able to definitively label them as the work of the (People's Liberation Army, as the Chinese military calls itself) or the Chinese government, the techniques that are used, the way these intrusions are conducted are certainly very consistent with what you would need if you were going to actually carry out cyberwarfare," Deputy Assistant Secretary of Defense for East Asia David Sedney said Monday at a briefing for reporters.

He added that the intrusions "are certainly the kinds of things that espionage agencies would do," adding that developing cyberwar capacities like the ability to employ Trojan horse software was "consistent with a lot of writings we see from Chinese military and Chinese military theorists."

Sedney said the report was careful to distinguish between intrusions to copy and remove data, "which we know have been happening," and actual attacks to destroy or alter data, "which are things that can happen and can use the (same cyberwar) techniques" and capabilities.

He said the process was different from someone breaking into a house and stealing the furniture. "It's more like if someone went into your house and took a picture and left what was there, but then they went off żż with the image of it."

"Large amounts of data have been taken out in these intrusions," he said. "That doesn't mean that that data has been destroyed, but it could have been. It doesn't mean it's been altered, but it could have been."

Some military officials say it is this last possibility -- that U.S. government data could be corrupted or altered without the knowledge of officials entrusted with it -- that troubles them the most about potential cyberconflicts.

Email This Article
Comment On This Article

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues

Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News

OMB Issues Report Of US Federal Govt IT Security
Washington DC (UPI) Mar 05, 2008
The White House Office of Management and Budget says that the number of computer security incidents reported by federal network managers more than doubled last year, largely due to big increases in the disclosure or loss of personal data and intrusions of an as-yet undetermined character.

  • Germany Wants New Strategic Partnership With Russia
  • Taiwan boosts military spending amid China increase
  • China announces big rise in military spending, amid US tensions
  • Pentagon voices concern over China's military power

  • Iran Set For Showdown On Multiple Fronts
  • Experts evaluating nuclear blast detection system: CTBTO commission
  • Outside View: Concerts and nukes
  • North Korea Blames US For Impasse In Nuclear Talks

  • US cutting operations at main Pacific missile testing range
  • India, Israel to jointly develop anti-aircraft missiles
  • Pakistan says Indian missile test to trigger arms race: report
  • India test-fires sea-based nuclear-capable missile: ministry

  • BrahMos-2 Tests Mark Major Progress On Indian Cruise Missile
  • US confident of Europe missile deal soon: Fried
  • US offers Poland military plan for missile shield: ministry
  • US, Czech on cusp of missile shield deal

  • Northrop, EADS to invest 600 mln dlrs in Alabama site
  • China air passenger traffic up 16.8 percent in 2007: state media
  • Environmentalists climb on Heathrow jet in airport protest: officials
  • NASA opens a rotary wing research project

  • Global Hawk Marks 10-Year Anniversary
  • QinetiQ Selects Aonix PERC For Taranis UAV
  • Autonomous Technology Is Cool For CATS
  • Assembly Starts Of Taranis Unmanned Combat Air Vehicle

  • Iraq 'surge' downsizes as 2,000 US soldiers return home
  • US-Iraq pact won't tie Bush successor's hands: White House
  • Ex-Pentagon official settles scores in book on Iraq: report
  • Top US military officer opposes timetable for Iraq withdrawal

  • Singapore puts ammo under ground
  • Lockheed Martin Receives Contract To Demonstrate A C-RAM Interceptor System
  • Tank Warfare And Doctrine Part Six
  • URI Selected By DHS To Co-lead New Center Of Excellence For Explosives Detection

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement