Krypt3ia

(Greek: κρυπτεία / krupteía, from κρυπτός / kruptós, “hidden, secret things”)

Is Someone in China Reading Your Emails?

leave a comment »

Is Someone in China Reading Your Emails?

By Maura Moynihan, AlterNet

Posted on January 12, 2009, Printed on January 13, 2009

http://www.alternet.org/story/119064/

On December 16th 2008, Time Magazine announced the annual People Of the Year List.  Barack Obama topped the list, and one runner-up was China’s Zhang Yimou, the epic filmmaker and Olympic impresario, for creating “arguably the grandest spectacle of the new millennium,” the opening and closing ceremonies of the 2008 Beijing Olympics Games, which “showcased the rise of China as a world power.”

The bland celebration of China’s version of Leni Riefenstahl dodged the uncomfortable truth that the Olympics enabled the Chinese Communist Party to expand their intelligence operations within the corporations and governments who flew to Beijing for a sports party. China is now flexing its post-Olympic power with an aggressive new cyber-espionage campaign, targeting government, military and civilians with equal force. If you use Windows, the Chinese Communist Party to knows how to hack into your laptop. If you have friends and associates in China, they’re reading your emails.

The Pentagon, the State Department and the US Congress have been monitoring China’s cyber intelligence campaigns for years. The Congressional Record has a long list of hearings on the matter.  In 2008 press statements, the Pentagon report that Chinese cyber espionage has “increased dramatically” before and after the Olympic Games.

During preparations for the Olympics, China installed massive new surveillance and security systems with the generous assist of the U.S. corporations Honeywell, General Electric, United Technologies and IBM. Throughout the Olympic gold rush the Bush administration routinely sidestepped the 1990 law stipulating that high-tech must not benefit the Chinese military. After all, the People’s Republic of China was a paying customer and owns a majority share of U.S. Treasury Bills.

The craven posturing of the Olympic Committee and their corporate sponsors allowed Beijing party bosses to break every pledge to improve human rights, duly sworn when they lobbied for the contract. And what has the result been of this blind quest for corporate profit? On November 20, 2008, the bipartisan U.S. China Economic and Security Review Commission sent its annual report to the United States Congress. It states: “China is targeting U.S. government and commercial computers for espionage (and) is stealing vast amounts of sensitive information from U.S. computer networks.”

The website of an independent research consortium infowar-monitor.net provides updates on China’s web infiltration methods. One alarming new report describes tracking devices carefully affixed into computers manufactured in China that route information to the Chinese Communist Party’s Public Security Bureau. Cyber intelligence is linked into a vast human intelligence gathering operation of Chinese citizens recruited to spy for the Motherland known as “a thousand grains of sand.”  This network involves tourists, businessmen and some of the over 100,000 Chinese students who study overseas each year. Every one is questioned by intelligence officers before and after their foreign tour and offered lucrative rewards for valued intelligence.

China’s military academies are also diligently training thousands of young workers in computer hacking. Larry M. Wortzel, the author of a 2007 US Army War College report on China’s cyber campaigns said: “The thing that should give us pause is that in many Chinese military manuals they identify the U.S. as the country they are most likely to go to war with. They are moving very rapidly to master this new form of warfare.” Two Chinese army hackers produced a “virtual guidebook for electronic warfare and jamming” after studying dozens of US and NATO manuals on military tactics.

Chinese cyber hackers have made numerous incursions into classified US networks.  In November 2006, Retired Air Force Major General Richard Goetze, a Naval War College professor, said the Chinese “took down” the entire Naval War College computer network — an operation that prompted the U.S. Strategic Command to raise the security alert level for the Pentagon’s 12,000 computer networks and 5 million computers. In June 2007, 150 computers in the $1.75 billion computer network at the Department of Homeland Security was quietly with programs that sent an unknown quantity of information to a Chinese-language Web site. Unisys Corporation, the manager of the DHS computers, allegedly covered up the penetration for three months.

Do a brief web search and you will find a long list of U.S. educated, high level Chinese-born agents serving time in U.S. prisons for spying and stealing military secrets for their homeland.  Last fall FBI agents warned the Obama and McCain campaigns that Chinese networks were monitoring their computers. In June 2008, Rep. Frank Wolf (R-VA.) revealed that computers in the House International Relations Committee had been hacked by Chinese agents.  “These cyber attacks permitted the source to probe our computers to evaluate our system’s defenses, and to view and copy information,” said Wolf. “My suspicion is that I was targeted by Chinese sources because of my long history of speaking out about China’s abysmal human rights record.”

On Feb. 15, 2006, representatives of Google, Yahoo, Microsoft, and Cisco Systems were summoned before the House International Relations Committee to defend what Rep. Chris Smith (R-N.J.) called a “sickening collaboration” with the Chinese government that was “decapitating the voice of the dissidents.” The web executives defended their dealings with the Chinese government on the grounds that China is a global market.

The global market provides endless opportunities for cyber-espionage. A February 2005 report from the Defense Science Board states “a significant migration of critical microelectronics manufacturing from the United States to other foreign countries has [occurred] and will continue to occur.” America’s defense systems are based on “trusted and classified” microchips. The February 2005 Defense Science Board report said, “Trust cannot be added to integrated circuits after fabrication; electrical testing and reverse engineering cannot be relied upon to detect undesired alterations in military integrated circuits.”

After Deng Xiaopeng took Chairman Mao to the shopping mall, Wall Street analysts proclaimed that China’s Maoists were different from Stalin’s Bolsheviks, and that Coca Cola would magically engender democracy within a totalitarian state. China’s Maoists were supposedly different, making the economy work without dismantling state surveillance and control.

The financial tsunami that gushed out of Wall Street this fall forced the closure of over 30 Chinese factories, the ones that make the plastic Santas, socks and other such junk available at Walmart. But plenty more Chinese factories are churning out computers, digital chips, satellites, and rockets for the high-tech universe that China has staked out as the next frontier of world war. Let’s hope that the only thing “Made in China” next Christmas is a plastic Santa — not spyware in our computers, where Big Brother, wearing, a Mao cap, is shifting through our cyber profiles.

Those of you who know me from LJ will no doubt again say “Shit, here he goes again on China!” but, let me tell you this is only the half of it! You folks are not privy to the other darker side of the street. Suffice to say that China will overtake us I think.

Why?

Because this country is too fat, slothy, and stupid to fix the shit and not allow China to take over.

Doomed we are.

Ni hao my Chinese overlords!

Written by Krypt3ia

2009/01/14 at 00:43

Posted in Cyber, Infosec

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: