PDA

View Full Version : Chinese cyberattacks and espionage



GeneChing
07-17-2013, 11:22 AM
How's this for a new OT thread?


Universities Face a Rising Barrage of Cyberattacks (http://www.nytimes.com/2013/07/17/education/barrage-of-cyberattacks-challenges-campus-culture.html?pagewanted=all)
By RICHARD PÉREZ-PEÑA
Published: July 16, 2013 305 Comments

America’s research universities, among the most open and robust centers of information exchange in the world, are increasingly coming under cyberattack, most of it thought to be from China, with millions of hacking attempts weekly. Campuses are being forced to tighten security, constrict their culture of openness and try to determine what has been stolen.

University officials concede that some of the hacking attempts have succeeded. But they have declined to reveal specifics, other than those involving the theft of personal data like Social Security numbers. They acknowledge that they often do not learn of break-ins until much later, if ever, and that even after discovering the breaches they may not be able to tell what was taken.

Universities and their professors are awarded thousands of patents each year, some with vast potential value, in fields as disparate as prescription drugs, computer chips, fuel cells, aircraft and medical devices.

“The attacks are increasing exponentially, and so is the sophistication, and I think it’s outpaced our ability to respond,” said Rodney J. Petersen, who heads the cybersecurity program at Educause, a nonprofit alliance of schools and technology companies. “So everyone’s investing a lot more resources in detecting this, so we learn of even more incidents we wouldn’t have known about before.”

Tracy B. Mitrano, the director of information technology policy at Cornell University, said that detection was “probably our greatest area of concern, that the hackers’ ability to detect vulnerabilities and penetrate them without being detected has increased sharply.”

Like many of her counterparts, she said that while the largest number of attacks appeared to have originated in China, hackers have become adept at bouncing their work around the world. Officials do not know whether the hackers are private or governmental. A request for comment from the Chinese Embassy in Washington was not immediately answered.

Analysts can track where communications come from — a region, a service provider, sometimes even a user’s specific Internet address. But hackers often route their penetration attempts through multiple computers, even multiple countries, and the targeted organizations rarely go to the effort and expense — often fruitless — of trying to trace the origins. American government officials, security experts and university and corporate officials nonetheless say that China is clearly the leading source of efforts to steal information, but attributing individual attacks to specific people, groups or places is rare.

The increased threat of hacking has forced many universities to rethink the basic structure of their computer networks and their open style, though officials say they are resisting the temptation to create a fortress with high digital walls.

“A university environment is very different from a corporation or a government agency, because of the kind of openness and free flow of information you’re trying to promote,” said David J. Shaw, the chief information security officer at Purdue University. “The researchers want to collaborate with others, inside and outside the university, and to share their discoveries.”

Some universities no longer allow their professors to take laptops to certain countries, and that should be a standard practice, said James A. Lewis, a senior fellow at the Center for Strategic and International Studies, a policy group in Washington. “There are some countries, including China, where the minute you connect to a network, everything will be copied, or something will be planted on your computer in hopes that you’ll take that computer back home and connect to your home network, and then they’re in there,” he said. “Academics aren’t used to thinking that way.”

Bill Mellon of the University of Wisconsin said that when he set out to overhaul computer security recently, he was stunned by the sheer volume of hacking attempts.

“We get 90,000 to 100,000 attempts per day, from China alone, to penetrate our system,” said Mr. Mellon, the associate dean for research policy. “There are also a lot from Russia, and recently a lot from Vietnam, but it’s primarily China.”

Other universities report a similar number of attacks and say the figure is doubling every few years. What worries them most is the growing sophistication of the assault.

For corporations, cyberattacks have become a major concern, as they find evidence of persistent hacking by well-organized groups around the world — often suspected of being state-sponsored — that are looking to steal information that has commercial, political or national security value. The New York Times disclosed in January that hackers with possible links to the Chinese military had penetrated its computer systems, apparently looking for the sources of material embarrassing to China’s leaders.

This kind of industrial espionage has become a sticking point in United States-China relations, with the Obama administration complaining of organized cybertheft of trade secrets, and Chinese officials pointing to revelations of American spying.

Like major corporations, universities develop intellectual property that can turn into valuable products like prescription drugs or computer chips. But university systems are harder to secure, with thousands of students and staff members logging in with their own computers.

Mr. Shaw, of Purdue, said that he and many of his counterparts had accepted that the external shells of their systems must remain somewhat porous. The most sensitive data can be housed in the equivalent of smaller vaults that are harder to access and harder to move within, use data encryption, and sometimes are not even connected to the larger campus network, particularly when the work involves dangerous pathogens or research that could turn into weapons systems.

“It’s sort of the opposite of the corporate structure,” which is often tougher to enter but easier to navigate, said Paul Rivers, manager of system and network security at the University of California, Berkeley. “We treat the overall Berkeley network as just as hostile as the Internet outside.”

Berkeley’s cybersecurity budget, already in the millions of dollars, has doubled since last year, responding to what Larry Conrad, the associate vice chancellor and chief information officer, said were “millions of attempted break-ins every single week.”

Mr. Shaw, who arrived at Purdue last year, said, “I’ve had no resistance to any increased investment in security that I’ve advocated so far.” Mr. Mellon, at Wisconsin, said his university was spending more than $1 million to upgrade computer security in just one program, which works with infectious diseases.

Along with increased spending has come an array of policy changes, often after consultation with the F.B.I. Every research university contacted said it was in frequent contact with the bureau, which has programs specifically to advise universities on safeguarding data. The F.B.I. did not respond to requests to discuss those efforts.

Not all of the potential threats are digital. In April, a researcher from China who was working at the University of Wisconsin’s medical school was arrested and charged with trying to steal a cancer-fighting compound and related data.

Last year, Mr. Mellon said, Wisconsin began telling faculty members not to take their laptops and cellphones abroad, for fear of hacking. Most universities have not gone that far, but many say they have become more vigilant about urging professors to follow federal rules that prohibit taking some kinds of sensitive data out of the country, or have imposed their own restrictions, tighter than the government’s. Still others require that employees returning from abroad have their computers scrubbed by professionals.

That kind of precaution has been standard for some corporations and government agencies for a few years, but it is newer to academia.

Information officers say they have also learned the hard way that when a software publisher like Oracle or Microsoft announces that it has discovered a security vulnerability and has developed a “patch” to correct it, systems need to apply the patch right away. As soon as such a hole is disclosed, hacker groups begin designing programs to take advantage of it, hoping to release new attacks before people and organizations get around to installing the patch.

“The time between when a vulnerability is announced and when we see attempts to exploit it has become extremely small,” said Mr. Conrad, of Berkeley. “It’s days. Sometimes hours.”

GeneChing
11-08-2016, 10:44 AM
The first time I went to China, I actually did search my hotel room for bugs. It was more like that scene from Kentucky Fried Movie in the Fistful of Yen sketch. Then I thought about it and began to really pity the poor spy who had to listen to my hotel room drivel. Honestly, it's not like I have any state secrets to share...not even any company propriety information. :rolleyes:


Yes, Your Chinese Hotel Room Is Probably Bugged (http://www.hollywoodreporter.com/news/yes-your-chinese-hotel-room-is-bugged-943941)
8:00 AM PST 11/7/2016 by Ashley Cullins

http://cdn3.thr.com/sites/default/files/imagecache/landscape_928x523/2016/11/generic_hotel_room_bed_-_h_-_2016_0.jpg
Giuseppe Cacace/Getty Images

So says a security expert, who notes that anything with speakers — the TV, radio and landlines — can be tapped.

Cross-border partnerships are bringing entertainment executives from Hollywood and China in closer contact than ever before — but, given the country's rich history of corporate espionage, you may want to take precautions before having private conversations in your Beijing hotel room.

"You just have to assume the room is bugged," says physical security consultant Roger Johnston. "I wouldn't have any kind of confidential conversation in a hotel."

Johnston spent more than 30 years working for two U.S. government laboratories as a vulnerability assessor before entering semi-retirement to consult.

Bugs, he says, can be incredibly tiny, look like just about anything and don't always send radio-frequency signals. So in countries like China, Russia and Israel it's safer to just assume you're being listened to.

"Unlike the movies, bugs don't have blinking red lights to tell you you're being watched," says Johnston. "They can be very difficult to spot, even if you're an expert and you know what you're looking for."

And hiring someone to sweep your room would likely be a waste of money.

"It's an enormous problem if you have fabulous resources and you own the room or the building it's in," he says. "When traveling to China, even if you have a team of experts who can rip a hotel room apart, there's no guarantee."

Whether a hired expert would be able to find a bug also depends on who's doing the bugging. "If it's the Chinese government, they're not going to find them," Johnston says. "If it's amateurs, a competitor for example, it's possible. The problem is: If they don't find anything, that's no guarantee there's no bug."

To complicate matters further, a potential spy doesn't even have to hide a bug in your room to listen in. All speakers are also microphones, Johnston says, so your TV, radio and landline phone can all be tapped without an extra mic. It doesn't end there, though.

"The water in the toilet bowl is not a bad acoustic resonator," Johnston says. "So someone can tap into the plumbing and listen, to a certain extent."

Even a glass held to the wall from the room next door can be effective, he says, especially if whoever is listening has thinned the wall.

The spa at The Langham Shanghai, where the chairman suite runs $8,800.

If you have to share confidential information from your room, Johnston does have some advice — don't discuss it verbally. He recommends downloading an app that will encrypt your text messages. The iMessage app on Apple products is quite good, he says, and so is Knox for Samsung devices. Assuming your phone hasn't already been hacked, and you sit someplace where your screen can't be filmed, Johnston says those apps should keep your messages private — even if your room has been bugged. "I wouldn't sit in the middle of the room, or an obvious place like a desk," he says. "I'd sit on the floor with my back to the wall."

"Both at home and on the road, you should put Post-its over your video cameras until you need to use them," Johnston says. When you do open your laptop or pick up your iPhone to Skype someone back home, make sure there's nothing you wouldn't want to share visible in the background.

The same rules apply for meeting spaces.

"Don't meet in a conference room in a hotel that Westerners go to a lot," Johnston says. "Don't reserve it three weeks in advance in the name of your company. You're just asking for it."

He says a better plan would be having a local you trust reserve a room in a restaurant or hotel that Westerners don't go to in his or her name, so your name and your company's name aren't associated with the reservation.

One last note: Taking calls on the road is standard Hollywood procedure, but Johnston says it's important to realize vehicles aren't any more private than hotel rooms: "Avoid rental cars, and don't have confidential discussions in taxis."

boxerbilly
11-08-2016, 11:04 AM
http://www.disclose.tv/action/viewvideo/230395/hillary_clinton_just_threatens_russia_and_china_wi th_war/