Chinese hack attacks and relying on your strengths

This is a story that I don’t think has received enough attention. A group of Chinese hackers, possibly with support from the Chinese government, has breached the security of U. S. military computers:

Security experts have revealed details about a group of Chinese hackers who are suspected of launching intelligence-gathering attacks against the U.S. government.

The hackers, believed to be based in the Chinese province of Guangdong, are thought to have stolen U.S. military secrets, including aviation specifications and flight-planning software.

The U.S. government has coined the term “Titan Rain” to describe the hackers.

“From the Redstone Arsenal, home to the Army Aviation and Missile Command, the attackers grabbed specs for the aviation mission-planning system for Army helicopters, as well as Falconview 3.2, the flight-planning software used by the Army and Air Force,” Alan Paller, the director of the SANS Institute, said on Tuesday.

The team is thought to consist of 20 hackers. Paller said that the Chinese government is the most likely recipient of the information they intercepted.

“Of course, it’s the government. Governments will pay anything for control of other governments’ computers. All governments will pay anything. It’s so much better than tapping a phone,” Paller said at an event at the British Department of Trade and Industry.

Titan Rain first came to public attention this summer, when the Washington Post reported that Web sites in China were being used to target computer networks in the Defense Department and other U.S. agencies.

Time magazine later reported that Titan Rain had been counter-hacked by a U.S. security expert called Shawn Carpenter.

The ongoing attacks were particularly effective on the night of Nov. 1, 2004, said Paller, who outlined his version of how the hackers first scanned, then broke into, U.S. government computers:

• At 10:23 p.m. PST, the Titan Rain hackers exploited vulnerabilities at the U.S. Army Information Systems Engineering Command at Fort Huachuca, Ariz.

• At 1:19 a.m., they exploited the same hole in computers at the Defense Information Systems Agency in Arlington, Va.

• At 3:25 a.m., they hit the Naval Ocean Systems Center, a Defense Department installation in San Diego, Calif.

• At 4:46 a.m., they struck the U.S. Army Space and Strategic Defense installation in Huntsville, Ala.

The United Kingdom is also under intelligence-gathering cyberattack from the Far East, according to National Infrastructure Security Co-ordination Centre. The government body cannot name the countries concerned as this may “ruin diplomatic efforts to halt the attacks,” NISCC director Roger Cummings said Tuesday.

It’s important to remember that there’s no such thing as a hack-proof system. Some systems are more secure than others.

That’s as true for Chinese government computers as it is for U. S. government computers.

If I were the U. S. government I would be quietly suggesting to the Chinese government that, if they actually want to have computer systems, they might want to refrain from hacking into ours. The equipment that blocks their people from certain sites around the world is hackable by the right people with the right knowledge in the right place and with the right equipment of their own.

Historically, the strength of the U. S. particularly in war has depended on the individual initiative and abilities of its people. This is as true now (if not truer) in Iraq as it was was in World War I with the Alvin Yorks who capitalized on their hunting skills and in World War II with the thousands of eager young men with mechanical skills. There are millions and millions of young American with computers and Internet connections.

0 comments… add one

Leave a Comment