Unauthorized Access of Pentagon Network

Chinese military hacked into US defence secretary's office: Pentagon
10 September 2007

The cyber attack in June that targeted the office of US defence secretary Robert Gates was conducted by the Chinese military, sources in Washington DC have indicated. Senior US officials say there is a "very high level of confidence...trending towards total certainty" within the Pentagon that the People's Liberation Army (PLA) carried out the June attack.

US President George W Bush has acknowledged that the US is vulnerable to cyber-attack. He indirectly indicated that he would raise the issue with Chinese President Hu Jintao. The two were to meet in Sydney during the Asia-Pacific Economic Co-operation (APEC) summit on Thursday 6 September.

The US president's comments followed a report in London's Financial Times that the Chinese People's Liberation Army had hacked into the Pentagon's computer network. "I'm very aware that a lot of our systems are vulnerable to cyber-attack from a variety of places," said Bush, who was in Sydney for the annual APEC summit. He added that he "may" raise the matter with countries the US suspected of cyber warfare, without acknowledging China's alleged role in the Pentagon incident.

The Pentagon cyber attack was particularly disquieting, apparently, as it involved not just passive snooping, but disruption of networks as well. The FT quoted a former official as saying that: "The PLA has demonstrated the ability to conduct attacks that disable our system." The Pentagon had to close parts of its unclassified computer system in June to deal with the attacks.

The US military warned quite some time ago that the PLA's rising cyber-warfare capability was a cause for concern. It released a report earlier this year that China "is expanding from the traditional land, air, and sea dimensions of the modern battlefield to include space and cyber-space".

This is not the first allegation about the Chinese PLA's cyber snooping and hacking abilities. Earlier, German newspapers reported about of the insertion of spyware, by the PLA, into German government computers at the Chancellery and three ministries.

The British government also seems to have suffered similar attacks. Eliza Manningham-Buller, former head of MI5, is supposed to have privately told a group of businessmen last year that the UK government had been the target of hacking attacks from China that were suspected to be state sponsored. The Guardian recently reported that parliament and the Foreign Office had been attacked by hackers.

Targets are not limited to governments, but include private companies too. However, some experts point out that while China has come under scrutiny after the PLA hacking allegations, the US has the same capabilities, which it is widely believed to use.

They say the Pentagon is concerned because cyberspace is the one domain where the Chinese can challenge US dominance. China generally lags behind the US in the more conventional spheres of air and sea combat.

Chinese military strategy places increasing emphasis on space and cyberspace as key domains in modern wars, where the information that flows over networks is central to the battle effort. Not so long ago, China launched a 'satellite-killer' missile, which knocked out one of its own aging satellites. At a time when the US is trying to use networks and satellite communications to transform the nature of war, this creates deep disquiet.

But China itself strongly denies that its military was behind the cyber-attack on the US defence department. A Chinese foreign ministry spokesman said the allegations were "absurd" and reflected "cold war thinking

Please, Log in or Register to view URLs content!


I'm not sure if this has been posted already, but I found this article pretty interesting. Firstly, do you think that the PLA carried out the operation? I personally do not think so. Secondly, do you guys think that the PLA is actually developing cyberwarfare skills as an actual strategem for use in times of war? How useful do you think such cyber attacks would actually be in times of war? Would they influence the course of a war at all?
 

Autumn Child

Junior Member
Nope. I don't think PLA is stupid enough to do that. It will be a direct confrontation. Even if the PLA is capable of doing so, it will not use it during peacetime overtly. They probably would do that only during high tension situation. The hacking is probably done by local patriotic chinese that do it in the name of "because i can do it" mentality. The pentagon in return just use this incident to boost the China threat theory.
 

dollarman

New Member
PLA, teenage hackers, teenage hackers working for the PLA, whats the difference? If the attacks found out something valuable, the PLA WILL know eventually.
 

RedMercury

Junior Member
Just as likely to be a false flag operation. It's not hard to hack into the millions of underprotected PCs in China to get a Chinese IP address.
 

yongke

New Member
I agree, the world don't see it that way thought, in fact, the whole China threat thing is burning as brightly as ever.
 

Vlad Plasmius

Junior Member
Why is it I have a hard time believing we don't do the same thing?

Even if China is doing this it's only to test themselves out against the best in the world. It should actually be flattering they'd show some much dedication to go at it as much as they have.

Even if it was just regular hackers, I think they'll soon be getting a recruitment call from the PLA.
 

Autumn Child

Junior Member
Before the hack, the US armay actually accepted the fact that PLA is one of the few armies in the world that have the ability to hack into the pentagon. So I see no reason PLA need to reming the US that they still can do it. By the way...why would the Pentagon announce to the world that they got hacked? wouldn't they encourage even more hackers from all over the world? Its either they are really stupid or playing up the China theory. anyone have any other idea?
 

crobato

Colonel
VIP Professional
China emerges as leader in cyberwarfare

In recent weeks, China has been accused of hacking the Pentagon as well as British and German government offices.
By Robert Marquand and Ben Arnoldy | Staff writers of The Christian Science Monitor

Paris; and Oakland, Calif.
Please, Log in or Register to view URLs content!


When suspected Chinese hackers penetrated the Pentagon this summer, reports downplayed the cyberattack. The hackers hit a secure Pentagon system known as NIPRNet – but it only carries unclassified information and general e-mail, Department of Defense officials said.

Yet a central aim of the Chinese hackers may not have been top secrets, but a probe of the Pentagon network structure itself, some analysts argue. The NIPRNet (Non-classified Internet Protocol Router Network) is crucial in the quick deployment of US forces should China attack Taiwan. By crippling a Pentagon Net used to call US forces, China gains crucial hours and minutes in a lightning attack designed to force a Taiwan surrender, experts say.

China's presumed infiltration underscores an ever bolder and more advanced capability by its cybershock troops. Today, of an estimated 120 countries working on cyberwarfare, China, seeking great power status, has emerged as a leader.

"The Chinese are the first to use cyberattacks for political and military goals," says James Mulvenon, an expert on Chin's military and director of the Center for Intelligence and Research in Washington. "Whether it is battlefield preparation or hacking networks connected to the German chancellor, they are the first state actor to jump feet first into 21st-century cyberwarfare technology. This is clearly becoming a more serious and open problem."

China is hardly the only state conducting cyberespionage. "Everybody is hacking everybody," says Johannes Ullrich, an expert with the SANS Technology Institute, pointing to Israeli hacks against the US, and French hacks against European Union partners. But aspects of the Chinese approach worry him. "The part I am most afraid of is … staging probes inside key industries. It's almost like sleeper cells, having ways to [disrupt] systems when you need to if it ever came to war."

In recent weeks, China stands accused not only of the Pentagon attack, but also of daily striking German federal ministries and British government offices, including Parliament. After an investigation in May, officials at Germany's Office of the Protection of the Constitution told Der Speigel that 60 percent of all cyberattacks on German systems come from China. Most originate in the cities of Lanzhou and Beijing, and in Guangdong Province, centers of high-tech military operations.

German Chancellor Angela Merkel publicly raised the issue with Chinese Premier Wen Jiabao in Beijing last month. Mr. Wen did not deny China's activity, but said it should stop. President George Bush, prior to his meeting with Chinese President Hu Jintao in Sydney, Australia, at the APEC summit last week, stated that respect of computer "systems" is "what we expect from people with whom we trade."

The accusations, hard to prove conclusively, still illumine an emerging theater of low-level attacks among nations. This spring, presumed Russian hackers made headlines with a one-off cyberblitz of Estonia, shutting down one of the most wired countries in Europe for a week – blunt payback for removal of a Soviet war memorial.

But China's cyberstrategy is deemed murkier and more widespread. The tenaciousness of Chinese hackers, whose skills were once derided by US cyberexperts, has begun to sink in to Western states and their intelligence services.

Probes of the Pentagon system that would bring US intervention should China attack Taiwan are part of a program dating to the 1990s that links cyberwarfare to real-world military action by China's People's Liberation Army. The very probe shows success in China's long-term program, experts say.

"The Chinese want to disrupt that unofficial network in a crucial time-frame inside a Taiwan scenario," says Mr. Mulvenon. "It is something they've written about. When you read what Chinese strategists say, it is the unclassified network they will go after … to delay deployment. China is developing tremendous capability."

Much of the hacking prowess in China is attributed to "gray hat" hackers – techie mercenaries, often younger males, geeks proud of the title – who can be mobilized to attack systems if needed, experts say.

In cyberparlance, black hats are hackers whose professional life is spent trying to attack other systems. White hats are those who defend against attacks. But China is regarded as having a substantial number of hackers in the gray middle – cutting-edge technopatriots loosely affiliated with the Chinese government, but who are not formal agents of the state.

This allows many Chinese hackers to exist in a zone of deniability. To be sure, provability and deniability are central in cyberwarfare. The most difficult problem is how to prove who hacks a system.

In recent weeks, Beijing has officially expressed shock, pain, and denial of news reports like those in Der Speigel fingering China, and at a host of official and semi-official accusations. But China's ardent denials, in the face of its own professed desire to be a cyberattack specialist, are not entirely persuasive, analysts say.

"Sometimes [Chinese] will brag about their exploits, and other times they'll disclaim them entirely, blaming unknown rogue individuals," says Bill Woodcock, research director at Packet Clearing House, a nonprofit research institute that focuses on Internet security and stability.

The new focus by other governments on China's capabilities are part of getting to know a country long criticized for a lack of transparency. "China's ambitions are quite extensive. It is a great power that is rising, and so other people want to scrutinize you. That's part of being a great society," says a veteran European China-watcher in Beijing. "When you hack into the private files of other governments, people want to know what you are doing. If you talk about a harmonious world, and a harmonious society, and then you do things that aren't harmonious – you get called out."

Of particular alarm for Washington and other world capitals are so-called "zero-day attacks" – cyberpenetrations that look for software flaws to exploit. This is not an uncommon pastime for hackers. But in China's case, suspicion falls on professional hackers, says Sami Saydjari, a Defense Department computer-security veteran who now heads a firm called Cyber Defense Agency in Wisconsin.

"The Chinese ... [put] very strong controls over … their Internet, and it's highly unlikely there are hacker groups that have any substantial level of capability they don't control," says Mr. Saydjari.

Analysts say China constantly probes US military networks. But attributing this conclusively to the People's Liberation Army, fingered by German officials in Der Speigel, is almost impossible. To trace attacks to their source requires the help of those who control each link, or router.

Proving cyberattacks involves what Mulvenon calls the "Tarzana, California, problem." How does one know an attack "isn't coming from a kid in Tarzana who is bouncing off a Chinese server?" Mulvenon asks. "You don't. You can't predicate a response based on perfect knowledge of the attacker. But we think that correlation is causation. That is, 'Who benefits?' The best-case analysis is to correlate attacks with what Chinese have always said and written their goals are, which makes them by far the most likely suspect."

Cyberpenetration runs the gamut, from simple to sophisticated. There's a simple "Trojan horse attack," for example, said to be used against the German chancellery. Hackers send what appears to be a legitimate e-mail. When opened, it installs malicious software that allows hackers to open files in a private network, or disrupt it. A Trojan horse is not surprising in an unclassified system, says Saydjari. "But some of the attacks attributed to China have been quite sophisticated."

Beijing's control showed in September 2003, when the company that administers .com and .net domain names made unilateral changes to the Internet's functioning. System administrators around the world scrambled to make piecemeal fixes.

"The domain-name system was broken for more than two weeks for the rest of the world, but after a brief interruption, it got mysteriously … unbroken inside China after eight days," says Mr. Woodcock.

PLA doctrine explicitly states that information-technology disruption is part of "asymmetric" warfare. The US is more vulnerable than China to a cyberattack, says Saydjari, because of its greater reliance on high-tech, networked systems.

The PLA's "People's War" doctrine argues that all able-minded People's Republic computer users have a responsibility to fight for China with their laptops, says Woodcock. He argues that Beijing might call on ethnic Chinese hackers in any part of the world, hoping they might help. Even nonhackers might be asked to participate in "denial of service" (DoS) attacks – a weapon to shut down enemy websites that requires massive numbers of computers to accomplish. "The power of numbers is on their side," Woodcock says. China has the largest DoS capability in the world, he says, a concern to private-sector companies as well.

So far, China doesn't seem to be organizing DoS attacks, says Mr. Ullrich. During the EP-3 spy plane spat between the US and China in early 2001, some Chinese youths launched DoS attacks. But the government curtailed the attacks.

For several years, China has focused most of its military research and production on a high-tech air and missile-attack force – to overwhelm Taiwan. Hence, China's probe of the Pentagon NIPRNet. "They want to be able to attack the Net. They don't need a supersexy penetration program," Mulvenon argues. "They just bomb the Net itself. They disrupt the deployment of our military, simultaneously saturate Taiwan, delay the US arrival, and Taiwan capitulates. It's what they talk about."

Please, Log in or Register to view URLs content!
 

Asymptote

Banned Idiot
Haha, I can almost hear the hackers saying ...

"I WILL SUCK THE INTERNET DRY"...
or
"Laptop in hand"
"I can cripple thier facilities"
"Batteries charged"
"Uplink cables ready"
"There's always a way in"
"No system is safe"

Please, Log in or Register to view URLs content!
 

Finn McCool

Captain
Registered Member
Didn't an American admiral visit China just a while ago, which would have been during or just after these attacks? If China was really responisble, the Pentagon probably would have cancelled the trip.

If China was responsible the Pentagon released the information for the same reason that anyone releases knowledge of an enemy's cladestine activities. To embarass them. The DoD wants everyone to know that they knew about this, and furthermore wants everyone to know (or at least believe) that China is acting agressively.

It seems to me that this hacking took place over a period of several weeks. That time frame would have given the DoD time to place misinformation for the hackers to find.

The Russians could have been responsible for this. They launched a massive cyber attack on Estonia several months ago and took down lots of government websites and networks, hit the Defense Ministry, and generally messed with the whole country.
 
Top