US ready to strike back against China cyberattacks

SajeevJino

Long walk
Senior Member
Joined
Feb 21, 2012
Messages
6,017
Likes
3,364
Country flag
US ready to strike back against China cyberattacks


As public evidence mounts that the Chinese military is responsible for stealing massive amounts of U.S. government data and corporate trade secrets, the Obama administration is eyeing fines and other trade actions it may take against Beijing or any other country guilty of cyberespionage.





According to officials familiar with the plans, the White House will lay out a new report Wednesday that suggests initial, more-aggressive steps the U.S. would take in response to what top authorities say has been an unrelenting campaign of cyberstealing linked to the Chinese government. The officials spoke on condition of anonymity because they were not authorized to speak publicly about the threatened action.

The White House plans come after a Virginia-based cybersecurity firm released a torrent of details Monday that tied a secret Chinese military unit in Shanghai to years of cyberattacks against U.S. companies. After analyzing breaches that compromised more than 140 companies, Mandiant has concluded that they can be linked to the People's Liberation Army's Unit 61398.

Military experts believe the unit is part of the People's Liberation Army's cyber-command, which is under the direct authority of the General Staff Department, China's version of the Joint Chiefs of Staff. As such, its activities would be likely to be authorized at the highest levels of China's military.

The release of Mandiant's report, complete with details on three of the alleged hackers and photographs of one of the military unit's buildings in Shanghai, makes public what U.S. authorities have said less publicly for years. But it also increases the pressure on the U.S. to take more forceful action against the Chinese for what experts say has been years of systematic espionage.

"If the Chinese government flew planes into our airspace, our planes would escort them away. If it happened two, three or four times, the president would be on the phone and there would be threats of retaliation," said former FBI executive assistant director Shawn Henry. "This is happening thousands of times a day. There needs to be some definition of where the red line is and what the repercussions would be."

Henry, now president of the security firm CrowdStrike, said that rather than tell companies to increase their cybersecurity the government needs to focus more on how to deter the hackers and the nations that are backing them.

James Lewis, a cybersecurity expert at the Center for Strategic and International Studies, said that in the past year the White House has been taking a serious look at responding to China, adding that "this will be the year they will put more pressure on, even while realizing it will be hard for the Chinese to change. There's not an on-off switch."

The Chinese government, meanwhile, has denied involvement in the cyber-attacks tracked by Mandiant. Instead, the Foreign Ministry said that China, too, is a victim of hacking, some of it traced to the U.S. Foreign Ministry spokesman Hong Lei cited a report by an agency under the Ministry of Information Technology and Industry that said in 2012 alone that foreign hackers used viruses and other malicious software to seize control of 1,400 computers in China and 38,000 websites.

"Among the above attacks, those from the U.S. numbered the most," Hong said at a daily media briefing, lodging the most specific allegations the Chinese government has made about foreign hacking.

Cybersecurity experts say U.S. authorities do not conduct similar attacks or steal data from Chinese companies, but acknowledge that intelligence agencies routinely spy on other countries.

China is clearly a target of interest, said Lewis, noting that the U.S. would be interested in Beijing's military policies, such as any plans for action against Taiwan or Japan.

In its report, Mandiant said it traced the hacking back to a neighborhood in the outskirts of Shanghai that includes a white 12-story office building run by the PLA's Unit 61398.

Mandiant said there are only two viable conclusions about the involvement of the Chinese military in the cyberattacks: Either Unit 61398 is responsible for the persistent attacks or they are being done by a secret organization of Chinese speakers with direct access to the Shanghai telecommunications infrastructure who are engaged in a multi-year espionage campaign being run right outside the military unit's gates.

"In a state that rigorously monitors Internet use, it is highly unlikely that the Chinese government is unaware of an attack group that operates from the Pudong New Area of Shanghai," the Mandiant report said, concluding that the only way the group could function is with the "full knowledge and cooperation" of the Beijing government.

The unit "has systematically stolen hundreds of terabytes of data from at least 141 organizations," Mandiant wrote. A terabyte is 1,000 gigabytes. The most popular version of the new iPhone 5, for example, has 16 gigabytes of space, while the more expensive iPads have as much as 64 gigabytes of space. The U.S. Library of Congress' 2006-2010 Twitter archive of about 170 billion tweets totals 133.2 terabytes.

"At some point we do have to call the Chinese out on this," said Michael Chertoff, Homeland Security secretary under President George W. Bush and now chairman of the Chertoff Group, a global security firm. "Simply rolling over and averting our eyes, I don't think is a long-term strategy."

Richard Bejtlich, the chief security officer at Mandiant, said the company decided to make its report public in part to help send a message to both the Chinese and U.S. governments.

"At the government level, I see this as a tool that they can use to have discussions with the Chinese, with allies, with others who are concerned about this problem and have an open dialogue without having to worry about sensitivities around disclosing classified information," Bejtlich said. "This problem is overclassified."

He said the release of an unclassified report that provides detailed evidence will allow authorities to have an open discussion about what to do.

Mandiant's report is filled with high-tech details and juicy nuggets that led to its conclusion, including the code names of some of the hackers, like Ugly Gorilla, Dota and SuperHard, and that Dota appears to be a fan of Harry Potter because references to the book and movie character appear as answers to his computer security questions.

The White House would not comment on the report expected Wednesday.

"We have repeatedly raised our concerns at the highest levels about cybertheft with senior Chinese officials, including in the military, and we will continue to do so," said Caitlin Hayden, spokeswoman for the National Security Council. "The United States and China are among the world's largest cyber actors, and it is vital that we continue a sustained, meaningful dialogue and work together to develop an understanding of acceptable behavior in cyberspace."

Sen. Dianne Feinstein, D-Calif., chairman of the Senate Intelligence Committee, said the report reinforces the need for international agreements that prohibit cybercrimes and have a workable enforcement mechanism.



News from The Associated Press



Late Pick up :hmm:
 

satish007

Senior Member
Joined
May 7, 2011
Messages
1,458
Likes
203
Why they need ready,they always doing that. Welcome hacking, it is our honor being a cyber fighting counterpart.
 

hit&run

United States of Hindu Empire
Mod
Joined
May 29, 2009
Messages
14,104
Likes
63,370
USA should sneak some F-22 in and pound those buildings which it has identified.
 

hit&run

United States of Hindu Empire
Mod
Joined
May 29, 2009
Messages
14,104
Likes
63,370
All I know USA can pound Chinese ass and they have declared doctrine about it specifically for cyber attack chini chors have been doing against all the civilized world.

Am I wrong on that (bold) account @W.G.Ewald;
 
Last edited by a moderator:

hit&run

United States of Hindu Empire
Mod
Joined
May 29, 2009
Messages
14,104
Likes
63,370
You do know that F-22 is an air superiority fighter, right? Or maybe you dont........:scared1:
Then that makes it better intruder, all it needs one fat building buster under its belly along with other ammunition it usually caries.
 

W.G.Ewald

Defence Professionals/ DFI member of 2
Professional
Joined
Sep 28, 2011
Messages
14,139
Likes
8,594
All I know USA can pound Chinese ass and they have declared doctrine about it specifically for cyber attack chini chors have been doing against all the civilized world.

Am I wrong on that (bold) account @W.G.Ewald;
I do not know if the US cyberwarfare doctrine calls for military response to cyber attack.
In 2009, President Barack Obama declared America's digital infrastructure to be a "strategic national asset," and in May 2010 the Pentagon set up its new U.S. Cyber Command (USCYBERCOM), headed by General Keith B. Alexander, director of the National Security Agency (NSA), to defend American military networks and attack other countries' systems. The EU has set up ENISA (European Network and Information Security Agency) which is headed by Prof. Udo Helmbrecht and there are now further plans to significantly expand ENISA's capabilities. The United Kingdom has also set up a cyber-security and "operations centre" based in Government Communications Headquarters (GCHQ), the British equivalent of the NSA. In the U.S. however, Cyber Command is only set up to protect the military, whereas the government and corporate infrastructures are primarily the responsibility respectively of the Department of Homeland Security and private companies.[3]
Cyberwarfare - Wikipedia, the free encyclopedia

[PDF]http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1123&context=jss&sei-redir=1&referer=http%3A%2F%2Fwww.google.com%2Furl%3Fsa%3Dt%26rct%3Dj%26q%3Dus%2520cyber%2520warfare%2520doctrine%26source%3Dweb%26cd%3D2%26sqi%3D2%26ved%3D0CDUQFjAB%26url%3Dhttp%253A%252F%252Fscholarcommons.usf.edu%252Fcgi%252Fviewcontent.cgi%253Farticle%253D1123%2526context%253Djss%26ei%3DfccoUY_bJuXD0QGwloDYAg%26usg%3DAFQjCNFmqjkSULHrBkFTCTNjOlj-RbU0Pg%26bvm%3Dbv.42768644%2Cd.dmg#search=%22us%20cyber%20warfare%20doctrine%22[/PDF]
 
Last edited by a moderator:

hit&run

United States of Hindu Empire
Mod
Joined
May 29, 2009
Messages
14,104
Likes
63,370
I do not know if the US cyberwarfare doctrine calls for military response to cyber attack.

Cyberwarfare - Wikipedia, the free encyclopedia

[PDF]http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=1123&context=jss&sei-redir=1&referer=http%3A%2F%2Fwww.google.com%2Furl%3Fsa%3Dt%26rct%3Dj%26q%3Dus%2520cyber%2520warfare%2520doctrine%26source%3Dweb%26cd%3D2%26sqi%3D2%26ved%3D0CDUQFjAB%26url%3Dhttp%253A%252F%252Fscholarcommons.usf.edu%252Fcgi%252Fviewcontent.cgi%253Farticle%253D1123%2526context%253Djss%26ei%3DfccoUY_bJuXD0QGwloDYAg%26usg%3DAFQjCNFmqjkSULHrBkFTCTNjOlj-RbU0Pg%26bvm%3Dbv.42768644%2Cd.dmg#search=%22us%20cyber%20warfare%20doctrine%22[/PDF]
Ok,

The plans are their and being discussed or there should have been more progress made. This is 2011 article

DoD Report: Cyber Attacks Could Elicit Military Response

"When warranted, we will respond to hostile attacks in cyberspace as we would to any other threat to our country. We reserve the right to use all necessary means - diplomatic, informational, military and economic - to defend our nation, our allies, our partners and our interests," the report stated.

Earlier this year, the Department of Defense had concluded that the Laws of Armed Conflict, which govern the level of appropriate military action in the face of naked aggression by a foreign power, should also extend to the cyberspace field of operations.
"If directed by the president, DoD will conduct offensive cyber operations in a manner consistent with the policy principles and legal regimes that the department follows for kinetic capabilities, including the law of armed conflict," the report continued.
I think we had such a thread ^ here at DFI before on this, not sure though.
 

W.G.Ewald

Defence Professionals/ DFI member of 2
Professional
Joined
Sep 28, 2011
Messages
14,139
Likes
8,594
http://www.nytimes.com/2013/03/05/opinion/brooks-the-brutality-cascade.html?ref=davidbrooks&_r=0

Americans and Europeans tend to think it is self-defeating to engage in cyberattacks on private companies in a foreign country. You may learn something, but you destroy the trust that lubricates free exchange. Pretty soon your trade dries up because nobody wants to do business with a pirate. Investors go off in search of more transparent partners.

But China's cybermercantilists regard deceit as a natural tool of warfare. Cyberattacks make perfect sense. Your competitors have worked hard to acquire intellectual property. Your system is more closed so innovation is not your competitive advantage. It is quicker and cheaper to steal. They will hate you for it, but who cares? They were going to hate you anyway. C'est la guerre.
 

Global Defence

New threads

Articles

Top