It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Hacker Attacks Linked To Chinese Military

page: 1
0
<<   2 >>

log in

join
share:

posted on Dec, 13 2005 @ 09:38 AM
link   
This doesn't surprise me at all, I don't trust the Chinese any farther than I could throw them. Just more proof that they are at war with us and Americans and their government need to wake up to this fact.


www.breitbart.com

Dec 12 5:56 PM US/Eastern

A systematic effort by hackers to penetrate US government and industry computer networks stems most likely from the Chinese military, the head of a leading security institute said.

"These attacks come from someone with intense discipline. No other organization could do this if they were not a military organization," Paller said

In the attacks, Paller said, the perpetrators "were in and out with no keystroke errors and left no fingerprints, and created a backdoor in less than 30 minutes. How can this be done by anyone other than a military organization?"

Paller said the US government strategy appears to be to downplay the attacks, which has not helped the situation.

Although Paller said the hackers probably have not obtained classified documents from the Pentagon, which uses a more secure network, it is possible they stole "extremely sensitive" information.

He said it has been documented that US military flight planning software from its Redstone Arsenal was stolen.


And in the meantime Americans still buy Chinese products produced by slave labor just to save a dollar here and there.

mod edit:
Quote Reference (review link)

Posting work written by others. **ALL MEMBERS READ** (review link)

[edit on 19-1-2006 by UK Wizard]



posted on Dec, 13 2005 @ 01:30 PM
link   
I know this off topic, just a tad, but notice one of My comments, about hackers in the middle of all that.


War on Terror

The "War on Terror" & events like 9/11 are all leading towards an eventual stealing off all of our American freedoms. The way they're going to steal it away from us totally, they are in the process of taking it away now, with people letting them willingly, is the "War on Terror". See, "terrorism" has such a large & open & vague definition.

A terrorist isn't just an Arab with a towel on his head, & a bomb in his backpack, at least not what the US will use as the only definition. They will eventually use that as a definition of terrorism, along with bank robbery, computer hacking, peaceful protest marches, you name it, it will be defined as a "terrorist action". Even comments like this one, will be seen as a seditionist, or traitorous comment, which could potentially be seen as turning people into terrorists if you listened to it, or I was standing on My soapbox & saying anti-government speeches.

Along with all of this, eventually there will be a second Civil War in America, after years of struggle & many many deaths, the government will eventually reign the US population in after taking away all of our guns (by the way, we as Americans do not have the "right to Bear Arms" as most people think we do, there is more to that part of the Constitution, it says "The Right to Bear Arms, in a Military or Militia Group" which means, you have to be in the Military, or a Militia group[the Government has been cracking down on all Private Militia groups, as they've gotten too Militaristic for the Governments liking] or very close to that, My apologies for the crude interpretation) & weapons, & they will use things like 9/11 as a "Remember the Alamo" to inspire us to "Unite" again, after a bloody Civil War, which will more than likely be Hispanic on Black on White inspired.

You know how they will do it? With images of 9/11, images of the many different "terrorist actions" along with image of "United Airlines" & "America Airlines", which were 2 of the airlines that went down in 9/11. You take the first name of each, & you have "United America" & you can switch it even, to "America United", that way it is interchangeable. There's more to it than just this simple & uncomplicated explanation I've given here. As I'm sure you're aware, it takes time to type it all out on this & I'll suggest you watch My posts, as I'll fill it in where I can in response to other peoples comments on here.



posted on Dec, 13 2005 @ 01:54 PM
link   
Is this what you were referring to:




A terrorist isn't just an Arab with a towel on his head, & a bomb in his backpack, at least not what the US will use as the only definition. They will eventually use that as a definition of terrorism, along with bank robbery, computer hacking, peaceful protest marches, you name it, it will be defined as a "terrorist action".


I fail to see what point you are trying to make with that. The article didn't make any mention of anyone calling it a terrorist attack. In fact, I don't care what they call it---they can call it anything that they want to.

The fact of the matter is; the Chinese military is hacking into US computer networks to steal sensitive information. This is nothing new, the Chinese have been caught many times before doing similar types of things. Is this an act of terrorism? As far as I am concerned you can call it anything that you want but one thing for sure the United States needs to wake up to the fact that the current Chinese government is not our friends, have never been our friends, and never will be our friends.



posted on Dec, 14 2005 @ 12:48 AM
link   
I was pointing out that computer hacking, here in the US will be considered a "terrorist action" at some point in the near future.



posted on Dec, 14 2005 @ 05:48 AM
link   
Do you folks actually have any idea how much or what projects have been hacked by people looking for intelligence information?? Whether Chinese or others?? Curious about this here??
I get the feeling that if you want to keep secret certain projects for any length of time you can never put them on computer and severely limit access to certain informations. A ineffecient way to do buisness but this is how much of it was done before the advent of computers.
One of the problems we have is some dumb ignorant public servants put in office by the highest bidders...not necessarily Americans concerns but the highest bidders and they are not serving the American public but special intrests. They have to be kept out of the loop too.

Orangetom



posted on Dec, 14 2005 @ 06:26 AM
link   
It doesn't take alot to hack US systems

Read an interview with one English Hacker:

www.guardian.co.uk...


He claims to have found evidence of UFO/Spacecraft ect ect
and 'Non Terrestrial Officers'

What do they mean by that ????

Personally i think the 'Truth' lies within these systems myself and 'ALL Gov/Military Systems' from any world power should be hacked by everyone capable to free the information.
Just my personal view.



posted on Dec, 14 2005 @ 08:37 AM
link   

Originally posted by orangetom1999
Do you folks actually have any idea how much or what projects have been hacked by people looking for intelligence information?? Whether Chinese or others?? Curious about this here??


According to the article, it has been documented that US military flight planning software from its Redstone Arsenal was stolen.

As far as the Chinese goes, it seems like every other week there is a story about them commiting some kind of similar act.



posted on Dec, 14 2005 @ 08:43 AM
link   
Well... Sorry to break the news for you... but USA isn't any better... They've done the exact same thing... teh difference is just that they didn't get cought...



posted on Dec, 14 2005 @ 09:01 AM
link   
This isnt a question about morals or playing nicely. It is about the need for Americans to get their heads out of the sand and wake up and realise who our real enemies are.

[edit on 12/14/2005 by Classified Info]



posted on Dec, 14 2005 @ 09:48 AM
link   
Well, seriously, every country is doing this to each other for as long as humans walked the Earth.

Remember one thing folks

There are no PERMANENT FRIENDS, Just PERMANENT INTRESTS.


Lets ask ourselves this question.

IS my own country also gulity of hacking?

[edit on 14-12-2005 by Humster]



posted on Dec, 14 2005 @ 10:26 AM
link   
Problem is, we are suppose to be winning.

Another problem is that the Chinese dont have anything of value for us to steal, other than troop placements and reports..



posted on Dec, 14 2005 @ 11:53 AM
link   
Here's an old article that relate to this topic. China are roaming DRMO surplus to buy weapons parts, encryption devices, and classified hard drives auctionned as scrap metal not properly demilitarized.

This goes to show that China will do anything to gain secrets, whether by computer hacking or smuggling military surplus.

U.S. News Weapons Bazaar
www.usnews.com...


Foreign buyers are purchasing many of the Pentagon's high-tech surplus military parts and shipping them overseas, hiding them in seagoing containers under tons of metal scrap, seizure records show. Customs officials say Iran and Iraq are active buyers, but by far the biggest customer is China. Among the items seized from Chinese "scrap dealers" were fully operational encryption devices, submarine propulsion parts, radar systems, electron tubes for Patriot guided missiles, even F-117A Stealth fighter parts. Many of these parts, sold as "surplus," were brand new.


What they found were thousands of top-secret encryption devices, hard-cased field computers used for sending coded communications, as well as classified radio transmitter-receivers. None had been properly demilitarized. There was also a pile of banged-up Wang computers, but many still had their hard drives, and two had 5¼-inch floppy disks in them. One disk was marked "Classified SCI" (special compartmented information). The other was marked "Top Secret, SCI. Contains Special Intelligence." Murphree checked and found that the equipment had come from the most secure sector of Kelly Air Force Base, known as "Security Hill." "None of this material," Murphree said, "should have ever left the DRMO." The equipment's intended destination was Hong Kong, a common transshipment point for goods bound for China. Kelly Air Force Base took it all back. No charges were filed against Cal Industries, which had bought the stuff legally. "Candidly," says former U.S. Attorney Wiggins, "the way we handle this stuff so recklessly, it's hard to pin anyone down or hold them liable."


Of the many countries pursuing Pentagon surplus weapons, China is clearly running hardest. "China is the most aggressive country worldwide in the acquisition of military hardware," says customs agent Hensley. "Anything that seems to us to be mid-tech, or slightly out of date, is high tech to them. They can leapfrog R&D costs. They either reverse-engineer this stuff, or if they get enough, they just use them."

Operations. Customs agents are now convinced that a Chinese surplus-smuggling operation began as many as 15 years ago, when a flood of Chinese men and women entered the United States, established themselves as residents and then set up shop. Operating with little more than a fax machine and a bank account, they apparently form the lowest tier of the Chinese espionage network, agents say.



posted on Dec, 14 2005 @ 12:10 PM
link   
As a computer network security egineer. I see hundreds of "hits" from computers on my networks. 95% of them are virus's or trojans doing their dirty deeds of looking for host's or infected host's. Most of the new virus's originate from Russia. HS (homeland security), has a list of the Ip address's of known hacker groups. and they monitor the traffic, watch in irc chat's for stuff. China has one of the largest populations of pc's in the world. What I am finding is the trafic generated by these probes are no more than port scans.

isc.sans.org...

Now, there was a large breach in Cisco Routers, and i am sure that these rouge attacks, are probably nothing more than viru's exploiting known vulnerablities, that haven't been patched. Of course every government is trying to secure their own networks.. and breaking into others. Most of our govt networks and pc's are outdated. So i don't think it's that complicated. What isn't reported is where the root kit was planted. in the router.. which is not a big deal to shut down the port. or in a Server, workstation.. .lol.. probably some body was out looking at porn, cleaned their tracks.. but got infected from the site..lmao



posted on Jan, 19 2006 @ 09:05 AM
link   

Originally posted by ufia
Here's an old article that relate to this topic. China are roaming DRMO surplus to buy weapons parts, encryption devices, and classified hard drives auctionned as scrap metal not properly demilitarized.

This goes to show that China will do anything to gain secrets, whether by computer hacking or smuggling military surplus.

U.S. News Weapons Bazaar
www.usnews.com...


Foreign buyers are purchasing many of the Pentagon's high-tech surplus military parts and shipping them overseas, hiding them in seagoing containers under tons of metal scrap, seizure records show. Customs officials say Iran and Iraq are active buyers, but by far the biggest customer is China. Among the items seized from Chinese "scrap dealers" were fully operational encryption devices, submarine propulsion parts, radar systems, electron tubes for Patriot guided missiles, even F-117A Stealth fighter parts. Many of these parts, sold as "surplus," were brand new.


What they found were thousands of top-secret encryption devices, hard-cased field computers used for sending coded communications, as well as classified radio transmitter-receivers. None had been properly demilitarized. There was also a pile of banged-up Wang computers, but many still had their hard drives, and two had 5¼-inch floppy disks in them. One disk was marked "Classified SCI" (special compartmented information). The other was marked "Top Secret, SCI. Contains Special Intelligence." Murphree checked and found that the equipment had come from the most secure sector of Kelly Air Force Base, known as "Security Hill." "None of this material," Murphree said, "should have ever left the DRMO." The equipment's intended destination was Hong Kong, a common transshipment point for goods bound for China. Kelly Air Force Base took it all back. No charges were filed against Cal Industries, which had bought the stuff legally. "Candidly," says former U.S. Attorney Wiggins, "the way we handle this stuff so recklessly, it's hard to pin anyone down or hold them liable."


Of the many countries pursuing Pentagon surplus weapons, China is clearly running hardest. "China is the most aggressive country worldwide in the acquisition of military hardware," says customs agent Hensley. "Anything that seems to us to be mid-tech, or slightly out of date, is high tech to them. They can leapfrog R&D costs. They either reverse-engineer this stuff, or if they get enough, they just use them."

Operations. Customs agents are now convinced that a Chinese surplus-smuggling operation began as many as 15 years ago, when a flood of Chinese men and women entered the United States, established themselves as residents and then set up shop. Operating with little more than a fax machine and a bank account, they apparently form the lowest tier of the Chinese espionage network, agents say.



you americans need to wake up and smell the #ing coffee. The chinese hacked into some of your top computers, buy top secret material legally and the only thing that you are bothered about is whether or not the US government hack.



Another problem is that the Chinese dont have anything of value for us to steal, other than troop placements and reports..


The chinese have lots of things that you could steal, such as the specification of their planes, ships, tanks, artillery etc. while you are far more advanced and therefore you couldnt reverse engineer any of there stuff, but it would help you to keep well ahead and stop them from catching up unobserved



posted on Jan, 19 2006 @ 06:46 PM
link   
What do you propose we do? Cut them off from the internet lines going into the USA? Digitally blockade them, and listen to the fudge everyone already speaks about us? Attack them right back? All illegal.

And you cant just build a perfect computer security network. It simply isnt possible...



posted on Jan, 19 2006 @ 08:29 PM
link   

Originally posted by Classified Info
This doesn't surprise me at all, I don't trust the Chinese any farther than I could throw them. Just more proof that they are at war with us and Americans and their government need to wake up to this fact.

[edit on 19-1-2006 by UK Wizard]


Just because the Chinese are hacking to steal American information doesn't mean that they are at war with us. Americans, Russians, Brits, EVERYONE has spies that are stealing info from everyone else. To say that it is "proof they are at war with us" is plain hillarious.



posted on Jan, 20 2006 @ 03:57 AM
link   
hmm.lots of anti-china paranoia amongst american ATS new-blood..
Is this the general perception in the US public?
What about its perceptions of say, Russia or India?..Very interesting..



posted on Jan, 21 2006 @ 12:44 AM
link   
Surprisingly yes... Most Americans still think everyone in China ride bicycles and think that the Chinese army is a bunch of peasants holding aks...



posted on Jan, 21 2006 @ 08:12 AM
link   
China now is pretty the No.1 hi-tech exporter in the world. Soon you will see China Goverment ban more sensitive technolodgy export to certain county like Iran, Usa, Afganistan, Libya...



posted on Jan, 21 2006 @ 08:50 AM
link   

Originally posted by Classified Info
This isnt a question about morals or playing nicely. It is about the need for Americans to get their heads out of the sand and wake up and realise who our real enemies are.

[edit on 12/14/2005 by Classified Info]

Well Classified Info, the Pentagon nor the US military has any secrets on 'open' networks. That is like a unwritten rule( It may be written but you get the point!)
All classified military and intelligence information is stored on computers that are completely isolated from the internet. ( completely like, their is no terminal to the net in the entire building! ) All classified and vital information is transfered throught a military high speed network that run on different protocols and different standards than existing on the internet. What ever info that they have connected to the internet is generally mundane administarative and general information.
You dont think that a nation that invented the net would not think of the dangers it would pose to security if every civilian had access to it ?



new topics

top topics



 
0
<<   2 >>

log in

join