Saturday, October 24, 2009

CHICOMS PLANNING NOW FOR FUTURE SUPREMACY!
















You could probably write a pretty good science-fiction book on how the Chinese will in the future rule the planet militarily, financially and in every way Pretty scarey stuff thinking we will one day be their slaves. (We already are financially since we are in hock up the, well, Ying Yang, to them.





Here is a story that freaked me out...,





China 'building cyberwarfare capability' US report claims
China is building its cyberwarfare capabilities and appears to be using the growing technical abilities to collect US intelligence through a sophisticated and long-term computer attack campaign, according to an independent report.





The study, released by a congressional advisory panel, found cases suggesting that China's elite hacker community has ties to the Beijing government, although there is little hard evidence.
The commission report details a cyberattack against a US company several years ago that appeared to either originate in or come through China and was similar to other incidents also believed to be connected to the country.





According to the analysis, the company noticed that over several days, data from its network was being sent to multiple computers in the US and overseas.
While the report does not identify the company, it contends that the attackers targeted specific data, suggesting a very coordinated and sophisticated operation by people who had the expertise to use the high-tech information.
An internet protocol (IP) address located in China was used at times during the episode.
Barring proof, the study by the US-China Economic and Security Review Commission warns that the sort of expansive and sophisticated computer resources that have been seen in cyberattacks on the US and other countries "is difficult at best without some type of state sponsorship."
The study contends that the Chinese, long reported to be stoking a massive military build up, has also made computer warfare a priority.
The Chinese government is said to view such cyberprowess as critical for victory in future conflicts - similar to the priority on offensive cyber abilities stressed by some U.S. officials.
Potential Chinese targets in the US, according to the report, would likely include Pentagon networks and databases to disrupt command and control communications, and possibly corrupt encrypted data.
The report notes, however, that penetrating such classified systems would be time consuming and difficult










Also, this story...,















China's global cyber-espionage network GhostNet penetrates 103 countries
A vast Chinese cyber-espionage network, codenamed GhostNet, has penetrated 103 countries and infects at least a dozen new computers every week, according to researchers.





The sophisticated computer attacks have been 'devastatingly effective'





The discovery of GhostNet, which is designed to infiltrate sensitive ministries and embassies - and is known to have succeeded in many cases - is the latest sign of China's determination to win a future "information war". A ten-month investigation by the Munk Centre for International Studies in Toronto has revealed that GhostNet not only searches computers for information and taps their emails, but also turns them into giant listening devices.
Once a computer has been infected, hackers can turn on its web camera and microphones and record any conversations within range.





The study revealed that almost a third of the targets infected by GhostNet are "considered high-value and include computers located at ministries of foreign affairs, embassies, international organisations, news media and NGOs". This global web of espionage has been constructed in the last two years.
Another report from Cambridge University said the sophisticated computer attacks had been "devastatingly effective" and that "few organisations, outside the defence and intelligence sector, could withstand such an attack".
The report stopped short of accusing the Beijing government of responsibility for the network, but said the vast majority of cyber attacks originated from inside China. It also remains unclear whether GhostNet was built by the Chinese government, or by independent hackers inside the country.
Ronald Deibert, one of the researchers, said: "We're a bit careful about it, knowing the nuance of what happens in subterranean realms. This could also well be the CIA or the Russians. It's a murky realm that we're lifting the lid on."
However, the US Defence department has repeatedly warned of China's increasing capabilities in electronic warfare. A report from the Pentagon, issued last week, said that the Chinese army "often cites the need in modern warfare to control information, sometimes termed 'information dominance'."
The report added: "China has made steady progress in recent years in developing offensive nuclear, space and cyber-warfare capabilities, the only aspects of China's armed forces that, today, have the potential to be truly global."
The Chinese government decided long ago to make control of information a central plank of the country's policy. At the 10th National People's Congress, in 2003, the Chinese army announced the creation of "information warfare units". General Dai Qingmin said internet attacks would run in advance of any military operation to cripple enemies.
But on Sunday night the Chinese government denied any involvement in cyber-spying. Liu Weimin, a spokesman for the Chinese embassy in London, said Beijing had also fallen victim to hackers and dismissed the report as part of the Dalai Lama's "media and propaganda campaign".
The discovery of GhostNet was prompted when the office of the Dalai Lama in Dharamsala, India, contacted experts to investigate if it was being bugged.
Ross Anderson, at Cambridge University, and Shishir Nagaraja at the University of Illinois, wrote in a new report: "The office of the Dalai Lama started to suspect it was under surveillance while setting up meetings between His Holiness and foreign dignitaries. They sent an email invitation on behalf of His Holiness to a foreign diplomat, but before they could follow it up with a courtesy telephone call, the diplomat's office was contacted by the Chinese government and warned not to go ahead with the meeting."
Mr Nagaraja travelled to Dharamsala last September and discovered that the Tibetan computer system had been breached from inside China. The Tibetan computers contained highly sensitive details about refugees and schools, both of which are possible targets for Chinese reprisals.





No comments:

Post a Comment