Go Back   Professional Soldiers ® > At Ease > The Early Bird

Reply
 
Thread Tools Display Modes
Old 03-29-2009, 06:58   #1
Richard
Quiet Professional
 
Richard's Avatar
 
Join Date: Aug 2004
Location: NorCal
Posts: 15,370
Vast Spy System Loots Computers in 103 Countries

With friends like these...

Richard's $.02


Vast Spy System Loots Computers in 103 Countries
John Malkoff, NYT, 28 Mar 2009

A vast electronic spying operation has infiltrated computers and has stolen documents from hundreds of government and private offices around the world, including those of the Dalai Lama, Canadian researchers have concluded.

In a report to be issued this weekend, the researchers said that the system was being controlled from computers based almost exclusively in China, but that they could not say conclusively that the Chinese government was involved.

http://www.nytimes.com/2009/03/29/te...er=rss&emc=rss
__________________
“Sometimes the Bible in the hand of one man is worse than a whisky bottle in the hand of (another)… There are just some kind of men who – who’re so busy worrying about the next world they’ve never learned to live in this one, and you can look down the street and see the results.” - To Kill A Mockingbird (Atticus Finch)

“Almost any sect, cult, or religion will legislate its creed into law if it acquires the political power to do so.” - Robert Heinlein
Richard is offline   Reply With Quote
Old 03-29-2009, 07:39   #2
blue02hd
Quiet Professional
 
blue02hd's Avatar
 
Join Date: Feb 2007
Location: Near the flag pole
Posts: 1,168
I wonder if Al Gore saw this one coming? Maybe the Chinese paid him to invent the Internet for this single reason? He got rich, we got porn?

Hmm,,,
__________________
"It's not my aim, it's these damn crooked bullets,,,"

Verified Tax Payer and Future Sex Symbol
blue02hd is offline   Reply With Quote
Old 03-29-2009, 09:39   #3
nmap
Area Commander
 
nmap's Avatar
 
Join Date: Jun 2007
Location: San Antonio, Texas
Posts: 2,760
I'm not quite sure how to say this, since I don't want to violate site policy.

Without getting too detailed, the problem is that the great majority of people are not very focused on the security of their personal or organizational computers and networks. They don't even know that they don't know. But discussing it gives potential aid to the bad guys.

It's true that China should not do such things (if they are, in fact, doing them), but it doesn't seem good to make it easy for them - which, in many cases, we do.

That said, I'll hush.
__________________
Carpe diem quam minimum credula postero

Acronym Key:

MOO: My Opinion Only
YMMV: Your Mileage May Vary
ETF: Exchange Traded Fund


Oil Chart

30 year Treasury Bond
nmap is offline   Reply With Quote
Old 03-29-2009, 11:07   #4
dennisw
Area Commander
 
dennisw's Avatar
 
Join Date: Feb 2005
Location: Pinehurst,NC
Posts: 1,091
From N.Y.T. article :
Quote:
For example, they said, after an e-mail invitation was sent by the Dalai Lama’s office to a foreign diplomat, the Chinese government made a call to the diplomat discouraging a visit. And a woman working for a group making Internet contacts between Tibetan exiles and Chinese citizens was stopped by Chinese intelligence officers on her way back to Tibet, shown transcripts of her online conversations and warned to stop her political activities
.

I find it interesting the pervasive hesitancy to say the Chinese government is involved when both examples of the spying cited involve the Chinease government's use of the information. If the government is not involved, how did they get the information? Our media is incredible.
__________________
Let us conduct ourselves in such a fashion that all nations wish to be our friends and all fear to be our enemies. The Virtues of War - Steven Pressfield
dennisw is offline   Reply With Quote
Old 03-29-2009, 13:32   #5
ZonieDiver
Quiet Professional
 
ZonieDiver's Avatar
 
Join Date: Apr 2008
Location: Georgetown, SC
Posts: 4,204
Quote:
Originally Posted by Richard View Post
With friends like these...

Richard's $.02


Vast Spy System Loots Computers in 103 Countries
John Malkoff, NYT, 28 Mar 2009

A vast electronic spying operation has infiltrated computers and has stolen documents from hundreds of government and private offices around the world, including those of the Dalai Lama, Canadian researchers have concluded.

In a report to be issued this weekend, the researchers said that the system was being controlled from computers based almost exclusively in China, but that they could not say conclusively that the Chinese government was involved.

http://www.nytimes.com/2009/03/29/te...er=rss&emc=rss
I think it is pretty safe to say that if it is happening in China, the Chinese government IS involved!
__________________
"I took a different route from most and came into Special Forces..." - Col. Nick Rowe
ZonieDiver is offline   Reply With Quote
Old 03-30-2009, 06:29   #6
Richard
Quiet Professional
 
Richard's Avatar
 
Join Date: Aug 2004
Location: NorCal
Posts: 15,370
FWIW - cyber-espionage has been an on-going issue for a very long time now. Wargames was in 1983 and we had issues in NATO in the mid-70s...especially from the various Euro-pacifist groups like the Dutch. Industrial cyber-espionage is a HUGE problem. It can only get worse.

Richard's $.02
__________________
“Sometimes the Bible in the hand of one man is worse than a whisky bottle in the hand of (another)… There are just some kind of men who – who’re so busy worrying about the next world they’ve never learned to live in this one, and you can look down the street and see the results.” - To Kill A Mockingbird (Atticus Finch)

“Almost any sect, cult, or religion will legislate its creed into law if it acquires the political power to do so.” - Robert Heinlein
Richard is offline   Reply With Quote
Old 03-30-2009, 07:55   #7
JJ_BPK
Quiet Professional
 
JJ_BPK's Avatar
 
Join Date: Apr 2008
Location: 18 yrs upstate NY, 30 yrs South Florida, 20 yrs Conch Republic, now chasing G-Kids in NOVA & UK
Posts: 11,901
Quote:
Originally Posted by Richard View Post
FWIW - cyber-espionage has been an on-going issue for a very long time now. Wargames was in 1983 and we had issues in NATO in the mid-70s...especially from the various Euro-pacifist groups like the Dutch. Industrial cyber-espionage is a HUGE problem. It can only get worse.

Richard's $.02
I have been out of my lane for 13 years(systems designer) but I'll add a couple points.

1)Richard is very correct, It's not new,, but is changing.

I started looking at security holes in the 80t's. They were all physical at that time. You had to put your hand on the computer to corrupt or steal data. Security was simple,, don't let anyone in that didn't have reason to access.

In the 90t's, as net-works came on line, things could be snatched off un-protected net-works, but that was still physical hands on. You had to cut wire to add your "box" to capture and store the data you stole. Security was physical access and we started adding encryption software to scramble data.

After spending to mush time on the 2000 apocalypse phantom date problem, we jumped into multi-tasking software that we could "send" to another remote computer. This opened Pandora's Box. Now you could spy from afar, but there was still physical tracking of data via the net-works. Although you can and should encrypt data,, when data is being sent there are "tags" put at each end that id who's it from & for, were it's going, how big is it. This is were the current generation of "spy's" have a problem. You can't send/receive without these tags.. and the tags are the key to tracing to the source.

Now we have "firewalls", specific software/hardware that prevents unauthorized access.. BUT to make it work,, someone has the the Keys to the Box..

My point, although the article doesn't specify the "how",, I believe someone is planting the seed(s) physicaly.. and there are bunches of ways to do that.

Open your computer up and look at any of the various chips mounted in the case. Only someone with very special test equipment can verify that any one chip is doing what it design for,, and not something else.

If your curious as to how small computer can get, google "embedded computers" or "pc/104 standards". You can buy off the shelve PC's that are 3.5inch by 3.5 inch by .6 inch.. Want one smaller,, ask..

The newest generation of James Bond has a PHD in computer design and has a grudge about not being picked for the T-ball team, back in grade school and has a autographed collection of Bill Gates posters..

My $00.0002
Attached Images
File Type: jpg bill_gates.jpg (25.3 KB, 31 views)
__________________
Go raibh tú leathuair ar Neamh sula mbeadh a fhios ag an diabhal go bhfuil tú marbh

"May you be a half hour in heaven before the devil knows you’re dead"
JJ_BPK is offline   Reply With Quote
Old 03-30-2009, 14:00   #8
greenberetTFS
Quiet Professional (RIP)
 
greenberetTFS's Avatar
 
Join Date: May 2007
Location: Carriere,Ms.
Posts: 6,922
Has anyone seen the 60 minutes broadcast last night? It discussed the new virus that is embedded into most of our computers waiting to be activated on possibly April 1st. If it does, it could bring down our entire internet network................

GB TFS
__________________
I believe that SF is a 'calling' - not too different from the calling missionaries I know received. I knew instantly that it was for me, and that I would do all I could to achieve it. Most others I know in SF experienced something similar. If, as you say, you HAVE searched and read, and you do not KNOW if this is the path for you --- it is not....
Zonie Diver

SF is a calling and it requires commitment and dedication that the uninitiated will never understand......
Jack Moroney

SFA M-2527, Chapter XXXVII
greenberetTFS is offline   Reply With Quote
Old 03-30-2009, 14:11   #9
Richard
Quiet Professional
 
Richard's Avatar
 
Join Date: Aug 2004
Location: NorCal
Posts: 15,370
Quote:
Originally Posted by greenberetTFS View Post
Has anyone seen the 60 minutes broadcast last night? It discussed the new virus that is embedded into most of our computers waiting to be activated on possibly April 1st. If it does, it could bring down our entire internet network................

GB TFS
Conficker C Worm aka April 1st Virus and April 1 Virus: Info and Removal Tool

However, if push comes to shove and you are infected with Conficker C, don’t worry too much. On April 1st, antivirus softwares will most likely have the cure already and all you’ll need to do is run a virus check on your computer on April 1st to make sure this virus gets eliminated from your system. Stay safe from malicious programs like these. Schedule a virus check daily if you’re a heavy computer user.

http://www.kokeytechnology.com/inter...-removal-tool/

FWIW - I use Norton on-line security auto-protect.

Richard's $.02
__________________
“Sometimes the Bible in the hand of one man is worse than a whisky bottle in the hand of (another)… There are just some kind of men who – who’re so busy worrying about the next world they’ve never learned to live in this one, and you can look down the street and see the results.” - To Kill A Mockingbird (Atticus Finch)

“Almost any sect, cult, or religion will legislate its creed into law if it acquires the political power to do so.” - Robert Heinlein
Richard is offline   Reply With Quote
Old 03-30-2009, 14:25   #10
Sigaba
Area Commander
 
Join Date: Aug 2008
Location: Southern California
Posts: 4,478
Question Is hacking cultural discourse?

Quote:
Originally Posted by JJ_BPK View Post
The newest generation of James Bond has a PHD in computer design and has a grudge about not being picked for the T-ball team, back in grade school and has a autographed collection of Bill Gates posters..
JJ_BPK--

Sir, IMHO, your post touches on a component of this dynamic that merits more attention: the culture of hacking. In addition to end users sharing tips to compromise the security of hardware and software, hackers propagate the argument that they not only have the right to hack but a moral obligation to do so. If someone points out that they're stealing, that person is quickly shouted down in a barrage of proto-class consciousness arguments that are, in my view, laughable. (In many instances, these are the same folks who think that The Matrix trilogy is a cinematic masterpiece. )

On the other side of the equation, one can find software engineers, support technicians, IT staff, and quality assurance testers who are frequently ambivalent to the task of securing platforms and programs.

During a stint at a R&D lab, I witnessed on numerous occasions marathon conference calls that were the result of massive email strings that resulted from a lapse in security. After the smoke cleared, friends and colleagues would bemoan how the conference call had sidetracked their project schedules. Rarely would they take umbrage with the source of the issue as they rolled up their sleeves (metaphorically) to fix a bug, banged out a new build, or grit their teeth to get a server reformatted in time for the FedEx pick up. "Hey, we got any more Mountain Dew?"

ETA: My solution is ZoneAlarm Extreme. (I think the "extreme" refers to the app's drain on hardware resources and the likelihood that it is going to crash Firefox 3 right in the middle of doing research for a BB post. Oh yeah, I'm bitter.)

Last edited by Sigaba; 03-30-2009 at 14:27.
Sigaba is offline   Reply With Quote
Old 03-30-2009, 14:57   #11
nmap
Area Commander
 
nmap's Avatar
 
Join Date: Jun 2007
Location: San Antonio, Texas
Posts: 2,760
China can bring Britain to a halt

Excerpt:

Intelligence chiefs have warned that China may have gained the capability to shut down Britain by crippling its telecom and utilities.


They have told ministers of their fears that equipment installed by Huawei, the Chinese telecom giant, in BT’s (the main British telecom company) new communications network could be used to halt critical services such as power, food and water supplies. The warnings coincide with growing cyberwarfare attacks on UK by foreign intelligence services, particularly from Russia and China.

A confidential document circulating in Whitehall says that while BT has taken steps to reduce the risk of attacks by hackers or organised crime, “we believe that the mitigating measures are not effective against deliberate attack by China”. It is understood that Alex Allan, chairman of the Joint Intelligence Committee, briefed members of the ministerial committee on national security about the threat from China at a top-secret Whitehall meeting in January.




LINK
__________________
Carpe diem quam minimum credula postero

Acronym Key:

MOO: My Opinion Only
YMMV: Your Mileage May Vary
ETF: Exchange Traded Fund


Oil Chart

30 year Treasury Bond
nmap is offline   Reply With Quote
Reply


Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off

Forum Jump



All times are GMT -6. The time now is 17:26.



Copyright 2004-2022 by Professional Soldiers ®
Site Designed, Maintained, & Hosted by Hilliker Technologies