Espionage involving China

AssassinsMace

Lieutenant General
Talk about backtracking...

Please, Log in or Register to view URLs content!


You know Obama indicted the Chinese officials because it was unprecedented and he wanted to make history. Now I read Asian allies are upset again at Obama because he didn't directly mention China in his foreign policy speech at West Point.
 

Equation

Lieutenant General
Talk about backtracking...

Please, Log in or Register to view URLs content!


You know Obama indicted the Chinese officials because it was unprecedented and he wanted to make history. Now I read Asian allies are upset again at Obama because he didn't directly mention China in his foreign policy speech at West Point.

I have to "log in" in order to read the whole story, can you post it?:(
 

AssassinsMace

Lieutenant General
I have to "log in" in order to read the whole story, can you post it?:(

Strange I didn't have to sign in last night. Well here's a copy from another link I found.



China Hacking Is Deep and Diverse, Experts Say

Intruders Often Work As Hackers For Hire, According to Officials


By Danny Yadron in San Francisco,


James T. Areddy in Shanghai and


Paul Mozur in Beijing



Updated May 29, 2014 8:24 p.m. ET


Alleged Chinese hacking has caused friction between the U.S. and China; above, President Barack Obama and Chinese President Xi Jinping last year. AFP/Getty Images

China's Internet espionage capabilities are deeper and more widely dispersed than the U.S. indictment of five army officers last week suggests, former top government officials say, extending to a sprawling hacking-industrial complex that shields the Chinese government but also sometimes backfires on Beijing.

Some of the most sophisticated intruders observed by U.S. officials and private-sector security firms work as hackers for hire and at makeshift defense contractors, not the government, and aren't among those named in the indictment. In recent years, engineers from this crowd have broken into servers at Google Inc., GOOGL -0.72% Lockheed Martin Corp. LMT +0.03% and top cybersecurity companies, former U.S. officials and security researchers alleged.

The Chinese have often told their U.S. counterparts they don't condone hacking but also that they can't police what they don't control, according to former U.S. officials. While it is possible Beijing makes this claim simply as an excuse for inaction—given its strict control of domestic Internet traffic—experts in the field, including former U.S. officials, say the Chinese hacking landscape is chaotic and hard to follow.

This structure brings "a political gain to being able to say 'we can't control all attacks,' " said Adam Segal, a China and cybersecurity scholar at the Council on Foreign Relations in New York. "But I think there is a cost when hackers go after targets that are too sensitive or get involved in a crisis and the government can't control the signaling."


Sometimes freelancers appear to take orders from the military, at other times from state-owned firms seeking a competitive advantage, U.S. security firms say. It remains unclear how exactly those orders are given, security researchers said.

This diffusion of China's hacking activities underscores the challenge the U.S. faces in addressing what Washington considers economic espionage.

"Part of the consternation when we were pushing them was there is not complete knowledge of what's going on," said a former U.S. official, recalling cyber negotiations with China.

Kevin Mandia, chief operating officer of FireEye Inc., FEYE -6.78% a cybersecurity firm, said some of the best hacks appear to be by one of several Chinese groups, which his colleagues refer to as "unknown."

China sharply criticized last week's indictments by the U.S. Justice Department, which included a People's Liberation Army officer the U.S. identified as Wang Dong and who is known online as UglyGorilla. China categorically denied the accusations and suspended cybersecurity talks with the U.S.

A spokesman for China's Ministry of National Defense on Tuesday likened the indictment to evidence of weapons of mass destruction produced by the U.S. before its 2003 invasion of Iraq.

"With its network technology and infrastructure, the U.S. has a unique superiority. It wouldn't be difficult for them to fabricate evidence," said Geng Yansheng at the ministry's monthly news conference. The ministry didn't respond to requests for comment for this article.

China has previously sought to tighten the leash on its cyberwarriors. Four years ago, authorities arrested three people for running a "hacker training website" called Black Hawk Safety Net with over 170,000 members.

Some researchers say they suspect China's government doesn't necessarily know when its military personnel are using their high-tech systems for alleged illegal activity. In a 2011 report, Mark Stokes, executive director of the Virginia-based think tank Project 2049 Institute, referred to one such incident rumored among analysts. He said an inability by the PLA "to control intrusive cyber activities directed against foreign entities may indicate a profound weakness in the governance of China's sprawling cyber-infrastructure."

Today, much of China's alleged state-sponsored hacking is conducted under the Third Department of the PLA's General Staff Department, which operates on a mandate similar to, if broader than, the National Security Agency, researchers say.

The Shanghai men named in last week's indictment are part of a group known in the hacking world as "Comment Crew," which operates within the Third Department that monitors North America. The Third Department also runs cryptology and cyberdefense research groups, as well as satellite interception operations, and has resources such as super computers, according to reports by experts who track such activity.

Nongovernment hacking, however, has continued to flourish, with strategies and lines of code being traded in anonymous Internet bazaars. The U.S. indictment hinted at a private-public partnership. It alleged the Shanghai PLA unit that is home to the five indicted men was "hired" by unnamed government-owned firms to "provide information technology services," meaning theft of U.S. corporate secrets.

A weakness of Army hackers is their ability or willingness to be identified, researchers say. Comment Crew is characterized by easily traceable electronic fingerprints like the repeated use of certain email addresses and nicknames. The indictment included photographs, full names, office address and working hours. None of the group could be reached for comment.

"If you know the name of the ninja, then obviously he's not a great secret warrior," said Jason Healey, an expert on cybersecurity at the Atlantic Council in Washington.

Security researchers say they are more impressed with those known only by the fallout from their work. U.S. officials and researchers say they are tracking between 20 and 30 Chinese groups.

In 2009, an anonymous group researchers refer to as "Aurora" infiltrated the servers that run Google's Gmail service and stole information from accounts. The hack was so stealthy the firm initially thought one of its employees was responsible, the former U.S. official said. A Google spokesman declined to comment.

Aurora is believed to include two teams totaling 10 to 15 members with university computer-sciences backgrounds, dispersed across various Chinese cities, said Darien Kindlund, director of threat research at FireEye.

In 2013, Mandiant, now a unit of FireEye, released its own report on Comment Crew. Much of that intelligence was contained in the U.S. indictment. Mr. Kindlund said he has files on several members Aurora but declined to release them. Because Aurora is made up of seemingly private citizens, "there is potential blowback" if the people he is monitoring aren't actually working for the state, he said.

Since the Google intrusions, Aurora hacked into Lockheed Martin, the U.S. Labor Department, RSA, EMC Cop's security unit and Bit9 Inc., a Massachusetts company with contracts to keep hackers out of some of the biggest U.S. firms and the U.S. government, according to people familiar with investigations into those intrusions.

Attribution in cyberspace isn't an exact science and relies on spotting strings of code and matching online personas to real-world people. Regardless, "whoever these guys are, they're pretty damn good," Mr. Mandia said of Aurora.
 

solarz

Brigadier
Strange I didn't have to sign in last night. Well here's a copy from another link I found.

The entire justification for those charges, according to Holden himself, is that while America hacks for political reasons, China hacks for economic reasons, and that the latter is somehow (more?) illegal.

Now it turns out the ones being charged weren't even involved in those "economic hacks".
 

bluewater2012

Junior Member
(Reuters) - Chinese state media lashed out at Google Inc, Apple Inc and other U.S. technology companies on Wednesday, calling on Beijing "to punish severely the pawns" of the U.S. government for monitoring China and stealing secrets.

U.S. companies such as Yahoo Inc, Cisco Systems Inc, Microsoft Corp and Facebook Inc threaten the cyber-security of China and its Internet users, said the People's Daily on its microblog, in comments echoed on the front page of the English-language China Daily.

It is not clear what sparked this latest round of vitriol, nor what information the U.S. firms are alleged to have stolen. But Chinese media have repeatedly attacked American tech companies for aiding the U.S. government's cyber espionage since U.S. National Security Agency (NSA) contractor Edward Snowden revealed widespread spying programs including PRISM.

*
Under PRISM, the NSA seized data from companies such as Google and Apple, according to revelations made by Snowden a year ago.

Chinese state-owned firms have since begun dispensing with the services of U.S. companies such as IBM Corp, Oracle Corp and Cisco in flavor of domestic technology. As a result, Snowden's revelations may cost U.S. companies billions of dollars, analysts say.

"U.S. companies including Apple, Microsoft, Google, Facebook, etc. are all coordinating with the PRISM program to monitor China," the People's Daily said on its official microblog.

"To resist the naked Internet hegemony, we will draw up international regulations, and strengthen technology safeguards, but we will also severely punish the pawns of the villain. The priority is strengthening penalties and punishments, and for anyone who steals our information, even though they are far away, we shall punish them!" it said.

Google has already had problems in China this week. On Monday, a China censorship watchdog said Google services were being disrupted ahead of Wednesday's 25th anniversary of the 1989 crackdown on pro-democracy demonstrators around Beijing's Tiananmen Square.

"We cannot say this more clearly - the (U.S.) government does not have access to Google servers - not directly, or via a back door, or a so-called drop box," said Google Chief Legal Officer David Drummond in an emailed statement on Wednesday. "We provide user data to governments only in accordance with the law."

Microsoft declined to provide immediate comment. Facebook, Yahoo, Apple and Cisco were not immediately available when Reuters sought comment by telephone and email.

Facebook is currently blocked by Chinese censors, but said last month it may open a sales office in China to provide more support to local advertisers who use the website to reach customers overseas.

ROCKY TIME

In December, Google, Microsoft, Apple, Facebook, Yahoo and other Internet companies issued an open letter to U.S. President Barack Obama and Congress to reform and introduce restrictions on surveillance activities.

Even so, U.S. tech companies have had a rocky time in China since the NSA revelations. Just last month, central government offices were banned from installing Windows 8, Microsoft's latest operating system, on new computers.

But the U.S. has responded with its own measures. In May, the U.S. Department of Justice charged five Chinese military officers with hacking U.S. companies to steal trade secrets.

The indictment sparked outrage in China and added urgency to Beijing's efforts to promote the development of local information technology (IT) companies.

Chinese media called the United States "a high-level hooligan" and officials accused Washington of applying "double standards" on issues of cyber spying.

After the charges were announced, China said it will investigate providers of important IT products and services to protect "national security" and "economic and social development."

(Reporting by Paul Carsten and Beijing Newsroom; Editing by Christopher Cushing)
Please, Log in or Register to view URLs content!
 

A.Man

Major
The Original

China Daily Online: Foreign tech firms pose threat on Internet

Please, Log in or Register to view URLs content!


Foreign technology services providers such as Google and Apple can become cyber security threats to Chinese users, security analysts said, one week after China announced that it will put in place a security review on imported technology equipment.

Other major tech companies, such as Yahoo, Cisco, Microsoft and Facebook, were required by the US National Security Agency to transfer their users' information, according to Wan Tao, founder of Intelligence Defense Friends Laboratory, an independent institution focusing on cybersecurity in China.

Wan said that online services have become a major way for the US to steal information globally.

Zhu Zhiqun, director of the China Institute and professor of political science and international relations at Bucknell University, said this should be a big concern for China, Chinese businesses and Chinese customers.

"In the cyber war between the US and China, obviously the US has the upper hand due to its superior technology and more extensive intelligence network," Zhu said.

Zhu believes while both the US and China wish to protect their national security and economic interests, their spying activities will only increase in the years ahead.

"It is time for the two sides to sit down and map out some basic protocol on cyber security. The two countries may not be able to narrow their differences regarding cyber espionage, but they can at least try to set some basic rules about cyber activities," he said.

Ning Jiajun, a senior researcher at the Advisory Committee for State Informatization, said, "Previously, the US asked companies to install wiretapping software on their technological products, but if users found and shut down related functions, its 'plan' would fail," he said.

For instance, information on a Chinese organization can be stolen when it places an order on an international shopping website, he said.

With technologies such as cloud computing and big data getting popular, information can be collected and analyzed immediately, which means the damage can be much greater and more difficult to prevent, analysts said.

"It can be said that those who master online services can get more information in cyberspace," said Du Yuejin, director at the National Engineering Laboratory for Cyber Security Emergency Response Technology.

Last month, China's Internet Media Research Center issued a report saying the NSA makes use of large technology companies for its wiretapping plans, including Prism, which was unmasked by former NSA intelligence leaker Edward Snowden, asking them to collect information on their users and urging them to hand in the data regularly.

The report also said that the NSA has taken iOS and Android, two leading mobile operating systems applied to iPhone and Samsung, as a "gold mine" of data.

The NSA grabbed users' information and stored most of it for analysis by invading database and communication networks of Yahoo and Google, while it has also controlled applications on smartphones with Britain, said the report released at the end of May.

"The US, in fact, could get these users' information or conduct the wiretapping by attacking the network instead of 'cooperating' with the enterprises, but it might take more time and money," said Wan.

The actions of the NSA have put huge pressure on US technology companies, as customers from Paris to Sao Paulo and from Beijing to Berlin worry about their privacy being invaded.

While US tech firms have tried one after the other to deny its collaboration with the NSA, NSA's general counsel Rajesh De revealed at a hearing in March that the tech companies knew about and assisted with PRISM's data collection.

"They [tech firms] would have received legal process in order to assist the government," De said.

A recent PBS documentary, United States of Secrets, aired in May, shows that NSA has gathered data from users from US tech companies both with and without their knowledge.

In an open letter to President Barack Obama on March 13, Facebook founder Mark Zuckerberg expressed his deep frustration with the US government.

"The US government should be the champion for the Internet, not a threat. They need to be much more transparent about what they're doing, or otherwise people will believe the worst," Zuckerberg wrote.

"I've called President Obama to express my frustration over the damage the government is creating for all of our future. Unfortunately, it seems like it will take a very long time for true full reform,"

In May, John Chambers, chairman and CEO of Cisco Systems, wrote a letter to Obama urging Washington to stop using the company for surveillance of its customers, according to an Al Jazeera report.

China Daily's request on Tuesday for comment sent to the press offices of Google, Yahoo, Facebook and Apple were unanswered by press time.

Obama held two discussions with CEOs of major US technology companies in the past six months about the NSA snooping, which led to a "reform" of the NSA to focus on protecting US citizens' privacy, but with little improvement on foreign organizations and citizens.
 

AssassinsMace

Lieutenant General
It's interesting reading news articles that write, not about how Obama's policies are hurting or going to hurt the US economy, but they try to spin how it's more a negative for those affected negatively by it to dare to challenge it. I'm sure Obama thought despite US technology is laced with NSA backdoors, China has no other alternative. I read one that dared to say that China's technology is more vulnerable to cyber espionage than American technology so China shouldn't switch to domestic sources. Which brings up how the US bans the sale of more advanced technology to China. US technology can't be much more superior if the US bans the sale of more advanced technology to China. It makes me wonder if China is just buying American in part for the brand name mentality.
 

A.Man

Major
Obama Hit A Great of China?

China state media calls for 'severe punishment' for Google, Apple, U.S. tech firms

Please, Log in or Register to view URLs content!


BEIJING (Reuters) - Chinese state media lashed out at Google Inc GOOGL.O, Apple Inc AAPL.O and other U.S. technology companies on Wednesday, calling on Beijing "to punish severely the pawns" of the U.S. government for monitoring China and stealing secrets.

U.S. companies such as Yahoo Inc YHOO.O, Cisco Systems Inc CSCO.O, Microsoft Corp MSFT.O and Facebook Inc FB.O threaten the cyber-security of China and its Internet users, said the People's Daily on its microblog, in comments echoed on the front page of the English-language China Daily.

It is not clear what sparked this latest round of vitriol, nor what information the U.S. firms are alleged to have stolen. But Chinese media have repeatedly attacked American tech companies for aiding the U.S. government's cyber espionage since U.S. National Security Agency (NSA) contractor Edward Snowden revealed widespread spying programs including PRISM.

Under PRISM, the NSA seized data from companies such as Google and Apple, according to revelations made by Snowden a year ago.

Chinese state-owned firms have since begun dispensing with the services of U.S. companies such as IBM Corp IBM.N, Oracle Corp ORCL.N and Cisco in favor of domestic technology. As a result, Snowden's revelations may cost U.S. companies billions of dollars, analysts say.

"U.S. companies including Apple, Microsoft, Google, Facebook, etc. are all coordinating with the PRISM program to monitor China," the People's Daily said on its official microblog.

"To resist the naked Internet hegemony, we will draw up international regulations, and strengthen technology safeguards, but we will also severely punish the pawns of the villain. The priority is strengthening penalties and punishments, and for anyone who steals our information, even though they are far away, we shall punish them!" it said.

Google has already had problems in China this week. On Monday, a China censorship watchdog said Google services were being disrupted ahead of Wednesday's 25th anniversary of the 1989 crackdown on pro-democracy demonstrators around Beijing's Tiananmen Square. (Full Story)

"We cannot say this more clearly - the (U.S.) government does not have access to Google servers - not directly, or via a back door, or a so-called drop box," said Google Chief Legal Officer David Drummond in an emailed statement on Wednesday. "We provide user data to governments only in accordance with the law."

Microsoft declined to provide immediate comment. Facebook, Yahoo and Cisco were not immediately available when Reuters sought comment. All of them have previously denied participating in sweeping surveillance efforts.

Apple on Wednesday referred to its previous statements on the matter.

"Much of what has been said isn't true. There is no back door. The government doesn't have access to our servers. They would have to cart us out in a box for that," Chief Executive Officer Tim Cook said in an April interview with ABC Television.


ROCKY TIME

Facebook is currently blocked by Chinese censors but said last month it may open a sales office in China to provide more support to local advertisers who use the website to reach customers overseas. (Full Story)

In December, Google, Microsoft, Apple, Facebook, Yahoo and other Internet companies issued an open letter to U.S. President Barack Obama and Congress to reform and introduce restrictions on surveillance activities. (Full Story)

Even so, U.S. tech companies have had a rocky time in China since the NSA revelations. Just last month, central government offices were banned from installing Windows 8, Microsoft's latest operating system, on new computers. (Full Story)

But the U.S. has responded with its own measures. In May, the U.S. Department of Justice charged five Chinese military officers with hacking U.S. companies to steal trade secrets.

The indictment sparked outrage in China and added urgency to Beijing's efforts to promote the development of local information technology (IT) companies.

Chinese media called the United States "a high-level hooligan" and officials accused Washington of applying "double standards" on issues of cyber spying.

After the charges were announced, China said it will investigate providers of important IT products and services to protect "national security" and "economic and social development." (Full Story)


(Reporting by Paul Carsten and Beijing Newsroom; Editing by Christopher Cushing)
 

A.Man

Major
The Wall Is Getting Thicker

Microsoft Faces China Backlash to Windows Amid U.S. Spat

Please, Log in or Register to view URLs content!




Jul 1Aug 1Sep 1Oct 1Nov 1Dec 1Jan 1Feb 1Mar 1Apr 1May 1Jun 132.5035.0037.5040.0042.50* Price chart for MICROSOFT CORP. Click flags for important stories. MSFT:US40.320.03 0.07%40.3206/04/2014

China’s government took another step against Microsoft Corp. (MSFT) by telling officials in one province not to use Windows 8 software, marking an escalation in the dispute with the U.S. over spying and hacking allegations.

Jiangsu province, south of Shanghai, canceled purchases of computers running the software in February after receiving a government notification, according to state-run China Central Television. A computer-science professor told the broadcaster that Windows 8’s security features benefit Microsoft “and that poses a big challenge to the national strategy for information security.”

The CCTV report comes after China said it would vet technology companies, and the Central Government Procurement Center excluded Windows 8 from a purchase of energy-efficient computers. Those moves follow indictments by U.S. prosecutors of five Chinese military officers for allegedly hacking into the computers of American companies, and former contractor Edward Snowden’s revelations of a National Security Agency spying program.

Microsoft, the world’s largest software maker, said it is committed to retaining the trust of its customers worldwide.

“Our Government Security Program allows governments to review our source code to confirm there are no back doors,” Kathy Roeder, a spokeswoman for Redmond, Washington-based Microsoft, said in an e-mail. “Customers around the world have evaluated and embraced Windows 8 as our most secure operating system.”

IBM Servers

Microsoft said last month it was “surprised” to learn of that central government’s decision. The official Xinhua News Agency called the national procurement center’s decision last month “a move to ensure computer security.”

Beijing’s municipal government has complained about the cost of Windows 8 being too high, and several local governments have dropped the operating system in favor of locally developed alternatives, the state broadcaster reported in yesterday’s midday newscast, according to a clip on its website.

Alternatives include Ubuntu Kylin.

China’s government said last month it will vet technology companies operating in the country, and the Financial Times reported May 25 that China ordered state-owned companies to cut ties with U.S. consulting firms.

China is also reviewing whether domestic banks’ reliance on high-end servers from International Business Machines Corp. (IBM) compromises the nation’s financial security, people familiar with the matter said last week.

In 2012, Microsoft asked China to stop the alleged use of pirated versions of its Office software by four state-owned companies, three people familiar with the matter said at the time. Microsoft alleged that more than 40 percent of Office and Windows server client software used by China National Petroleum Corp. was unlicensed, the people said.

China’s illegal software market in 2011 was worth about $9 billion, compared with a legal market of less than $3 billion, according to the Business Software Alliance.

To contact Bloomberg News staff for this story: Joshua Fellman in New York at [email protected]; Suker Wu in Beijing at [email protected]; Edmond Lococo in Beijing at [email protected]
 

ABC78

Junior Member
An interesting article from the Diplomat on espionage about America and China.

Please, Log in or Register to view URLs content!


What Are the Limits of Legitimate Economic Espionage?

Global norms protecting foreign intellectual property are a recent development and aren’t widely accepted.

What are the limits of legitimate economic espionage? The indictment of five PLA officers for stealing U.S. intellectual property brings economic espionage into the same spotlight lately enjoyed by diplomatic cryptography. The U.S. decision immediately produced a firestorm of criticism from China, as netizens and the government alike pointed out evidence of widespread hacking efforts on the part of the United States.

The United States attempts to distinguish legitimate from illegitimate espionage by concentrating on the theft of private secrets for public gain. Chinese hackers steal U.S. private property, and hand that property over to Chinese state firms. The United States, on the other hand, merely steals public (as in collectively owned) information for public gain. This includes intercepts of diplomatic communications that can give the U.S. an advantage in trade negotiations, as well as surveillance against foreign state-owned corporations. This last point is particularly important, as the United States intelligence community tends to regard (not entirely without cause) state owned firms as an arm of foreign governments.

These arguments aren’t quite wrong, but they do edge towards incoherence. For one, China is hardly the only country to employ espionage in furtherance of direct economic gain. As Robert Gates and others have pointed out, France regularly conducted economic espionage against its allies, with the fruits of intel benefitting major French firms. During the Cold War, the United States intelligence community regularly gathered intelligence about the Soviet military — data that eventually found its way to private defense contractors.

Indeed, even the idea that respect for intellectual property should cross international borders is a relatively recent phenomenon. The motivating concept for intellectual property protection is that legal defense for inventors can allow them to capitalize on a temporary monopoly over production. The granting of this temporary monopoly provides incentive for innovation, benefiting the entire public. However, over time the definition of “public” has changed. In the nineteenth century, “public” applied almost entirely to national communities, such that inventors who managed to copy or appropriate foreign intellectual property were regarded as national heroes. The change of “public” to refer to the international community is fairly recent, and is not fully accepted by many nations.

Ben Wittes and Dan Byman took a long stab at answering the question of appropriate limits on espionage in last month’s Foreign Affairs. They identify the problem with U.S. intelligence collection as the collapse of a decades-long compromise with U.S. intel agencies that began in the 1970s, and ended with 9/11. Changes in technology have opened a much wider space for the NSA to conduct surveillance, and rendered obsolete the rules on collection. Wittes and Byman suggest that the problem lies mainly in concern over potentially illicit activities by intelligence agencies, and that increased oversight and transparency are the answer. This might ameliorate the domestic problem, but does little to suggest viable rules of the road for international behavior.

None of this is meant to say that the U.S. Department of Justice was wrong to indict the five Chinese hackers, or that it’s wrong to pursue more robust efforts to defeat Chinese espionage attempts. But we can manage without the indignation, and without the suggestion that Chinese spying is worse by some order of magnitude than U.S. efforts. Indeed, Chinese efforts may appear more clumsy, but only because the U.S. NSA maintains such sophisticated capabilities for surveillance and analysis. However, as several writers have noted, because of Snowden and others, the United States no longer enjoys a “hypocrisy gap,” in which it can freely condemn Chinese behavior without enduring harsh scrutiny of its own intel agencies.
 
Top