China's Cyber-Warfare Capabilities Overstated 140
An anonymous reader writes "A new paper argues that China's cyber-warfare capability is actually pretty poor. '[China has] evinced little proficiency with more sophisticated hacking techniques. The viruses and Trojan Horses they have used have been fairly easy to detect and remove before any damage has been done or data stolen. There is no evidence that China's cyber-warriors can penetrate highly secure networks or covertly steal or falsify critical data,' the paper reads (PDF). 'They would be unable to systematically cripple selected command and control, air defense and intelligence networks and databases of advanced adversaries, or to conduct deception operations by secretly manipulating the data in these networks.'"
Yeah (Score:2)
Re: (Score:2)
no, *that's* what they want you to think.
Re: (Score:1)
Re: (Score:3)
No, US wants people to think China is some powerful enemy and that cyberwar is constant threat. This enables them to pass new more powerful laws, keeps citizens in constant fear and allows US to use things like Stuxnet against Iran.
All US has to do is shut off a range of IP addresses from Mainland China - that would pretty much stop it. Drastic, yes, but perhaps they day will come. The US Government threatens some IP addresses in Russia, from time to time, so they certainly have dictated to those who route traffic they had best have some controls and a switch for Washington to flip if and when it wants to. Can't say I'd find the concept hard to believe.
It's actually all coming from an attempt by Elma Sniddle to hack a C64 ...
Re: (Score:1)
Re: (Score:3)
Re: (Score:1)
China has a high software piracy rate, many systems are still running Windows XP, some without any service packs. They also have fairly large pipes that provide quicker scanning from an attackers perspective. Couple this with the fact that the compromised box is in China, and i doubt the authorities would release any sort of connection logs to the USA, or other nations.. It's pretty plausible the attackers are not actually even in China - just suing a compromised box there.
Re: (Score:1)
You're painting a scene of isolated/unrelated computers around China being hapless members of some great botnet out of reach of Chinese authorities, yet most of these attacks are traced to Chinese universities, and you can be sure those universities are running firewalls and running secured operating systems more often than the general public.
I question your veracity and motivation.
Re: (Score:2)
"Never ascribe to malice that which is adequately explained by incompetence."
Re: (Score:1)
Re: (Score:2)
A rational nation-state planning for possible cyberwar would have domestic attacks preprogrammed to act in the event of significant (perhaps more than a few days, and with a backup in-country operator) disruption of links to the offensive nation. A communications disruption can mean only one thing...
Re: (Score:1)
Re: (Score:1)
You can tell that to the Chinese when they invade.
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Stop using term cyber (Score:1)
Can we all just agree not to use the word "Cyber" anymore? It sound like some sort of silly late 80s early 90s grade B film.
Re: (Score:2)
Re: (Score:2)
That's only OK if China's national anthom is "Close to the Edit".
Re: (Score:1)
That's a genre of music isn't it? Not very good music either.
Uh Oh. Now, I'll be moded flamebait by some aging punk rocker who switched to techno.
Re: (Score:2)
Online, electronic, internet, or lots of other normal words that can already describe these sort of things. No new alternative is needed.
Re: (Score:2)
Electronic sex.. hm, it could be kinky, but no thanks.
Internet sex.. well that's just boring.
Now cybersex. That's something, and it's kinky too!
Re: (Score:1)
Re: (Score:2)
How about Technosex?
A/S/L?
Re: (Score:2)
"Online warfare" - Would that include stuxnet, which attacked stand alone systems and needed to be airgapped over?
"Electronic warfare" - Lots of prior art here. This includes stuff like radar jamming. Oh, and my calculator, thermostat, and car navigation system are electronic. Are they now in this war?
"Internet warfare" - What is that, World of Warcraft? Flame wars?
Changing a name in midstream, so to speak, would add to the confusion for most people, not decrease it.
Re: (Score:2)
awwwww...
Re: (Score:2)
I'll agree to give it up as an adjective, but the verb is here to stay.
Would you rather? (Score:4, Interesting)
Would you rather overestimate their abilities or underestimate them?
Re:Would you rather? (Score:4, Insightful)
I wouldn't be so sure that it is the case. Given my experience with a few large scale projects, the ineptitude of middle managers and a summary of what was provided as a solution for what price, I would worry about how much it would end up costing a government to make systems "impregnable". While I could well be wrong, but I wouldn't at all be surprised if the final cost of such an undertaking ended up being simply astronomical.
If you worry too much about your neighbour getting too much advantage in manufacturing, stop buying ALL their stuff and stop sending your designs to be made there then sold back to your own country. It's not an easy fix, it's not a short term fix, but if a country doesn't have markets for anything and everything they sell, they won't be raking in all that much money - meaning that you can once again sit unfettered on the top of the SuperPower steps.
Re: (Score:1)
Re: (Score:3)
Personally, I'd rather we far overstated China's abilities and designed our systems to counter such a threat.
So, like terrorism, then?
Do you really want the TSA administering network security as well?
Re: (Score:2)
Re: (Score:2)
That's just the start.
I mean, consider that you aren't allowed to board a plane with dangerous objects like nail clippers or a can of sprite.
Do you really think they'd allow you to connect a personal computer that they didn't completely control to any network in their jurisdiction?
Good God man, you can't just attach your laptop to the internet... you could be the pawn of a chinese hacker group and that laptop could be full of attack tools. Better not chance it. You aren't allowed on the network.
Re: (Score:2)
Perhaps the Mig-25 is a better comparison (Score:2)
Re: (Score:1)
I'm sure the states have a plan to disable china's internet access physically, no system is impenetrable.
Re: (Score:3)
It depends on whether it's done for action or voter consumption. For the former, I'd far prefer it to be overestimated and dealt with. However, I despair of DHS or DoD actually being capable of countering anything more threatening than house flies.
For voter consumption, I'd far prefer there to be no estimate at all. The use of estimates to manipulate the population is very Humphrey Appleby. It is Psych Ops against the population the government is sworn to protect and serve, regardless of which way it is don
Re: (Score:3)
No Evidence (Score:5, Insightful)
Because governments love to publicize when someone breaks into their highly secure networks. Every day, the spokespeople for various government agencies get to work and say to themselves, "Boy, I really wish I could announce that our networks have been hacked! That would really make my day!!". The leaders of said agencies go to sleep every night wishing that they could spend tomorrow being grilled by a legislative body over their swiss-cheese network defenses. But alas, tomorrow just brings another boring day of budget meetings.
Or just maybe they don't talk about it.
Tiger Trapped --- Not!!! (Score:2)
There is plenty of proof (Score:2)
looks like top gun! buzz the tower!! (Score:2)
looks like top gun! buzz the tower!!
Re: (Score:2)
Re: (Score:2)
What stealth bomber?
Links?
As far as I can tell they don't have one, and only some internet rumors claimed they did.
Re: (Score:2, Funny)
That's because it's invisible, duh!
Re: (Score:1)
Re: (Score:2)
That is the BS internet rumor I was talking about. The picture is not even of a Chinese plane.
Re: (Score:2)
BTW, the first flight of YF22/YF23 was in 1990, 7 years before the birth of /., the first flight of this J20 is 2011, that's 21 years, not "a few years" as in the GP. And F117 was publicly revealed in 1988 ...
Re:There is plenty of proof (Score:5, Insightful)
So you're going to fault them for taking shortcuts instead of reinventing the wheel?
That's nuts. Nobody reinvents wheels if they can get clues/technology/etc, from elsewhere. Absolutely nobody. Only idiots make stuff from scratch without referring to other technology and practices.
Come the fuck on, the industrial revolution was started in the US along the Blackstone River with "stolen" British ideas. Samuel Slater was no dummy.
What a load of crap, sir.
--
BMO
China high speed rail is a cheap copy of japan (Score:2)
with out the safety
In the japan system there is a 45-year, nearly 7 billion-passenger history, there have been no passenger fatalities due to derailments or collisions,
China system is no where near that.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Yeah, I'll buy that argument.
The stereotype of American companies being shortsighted is a stereotype because it's true. It's not just defense contractors.
--
BMO
Re: (Score:2)
This is late, and I don't expect you to read it because anon cowards never do, but I am going to state for the record that calling it spying is a load of hypocrisy when people like Samuel Slater (one of many) are called heroes here in the US.
--
BMO
fool (Score:2)
Re: (Score:1)
http://www.defenceaviation.com/2007/11/xian-h-8-chinese-stealth-bomber.html [defenceaviation.com]
The fighter is called the J-20 which is nearly identical to the F-22
They look familiar don't you think?
Re: (Score:2)
It may look similar but it's not likely to have the fancy internals that the F-22 has. For one thing, it lacks the thrust vectoring nozzles on the engines. That is a significant component of the aircraft's capabilities. You can copy the outside by looking at a recent copy of Aviation Week. It doesn't mean you downloaded the PCBs and code.
Re: (Score:1)
http://www.retrothing.com/2009/03/boeing-f-15se-stealth-fighter.html [retrothing.com]
Doesn't like the a duplicate of the F-22 to me.
Re: (Score:1)
there is only one shape that deflects/refracts/breaks radio waves _in a way to make them less detectable_.
yes. read up. the shapes for that are defined. you need to break and deflect the waves, while also absorbing it with absorbent material. thats why b2s had visible radar image compared to f117s. mainly due to the round shape of the cockpit of b2s.
Re: (Score:2)
i have a plastic model at home that looks like the stealth bomber as well. however, if you really press me on it, i'd have to come clean and admit it doesn't fly, it's made out of plastic, and exhibits no stealth capabilities whatsoever.
Beware teh Chinese (Score:3)
Does the summary strike anyone else as a bit xenophobic? Or perhaps a bit skewed toward occidental cultures?
Re: (Score:2)
How so? Because there are instances of "China" and "they"? I'm not really feeling it -- replace it with "American" or "the Americans" and you'll find thousands of instances on this site, especially in articles about the US throwing its weight around. I'm Chinese-American and I can assure you you'll have a far more interesting time analyzing the possible linguistic indicators of xenophobia in the Chinese language. For example, "foreigner" is is a common word in Chinese that most people don't give much though
Re: (Score:2)
Yes I suppose it is in fact the use of "China" and "they" rather than some specific organization within China referred to as "they". If the article is about capabilities within the US or Europe, it typically refers to a specific organization of sub-group rather than the entire nation.
Interesting point about the linguistic aspects. It's funny how vague and quaint language can be compared to experience.
Re: (Score:1)
We're Americans, it's our job to be afraid (Score:1)
Did we really need this paper to tell us that China's pathetic, underpaid skeleton of a software industry was no match for the NSA?
The Imperial mindset is this - if a potential rival or adversary is capable of even token resistance, then this is a major emergency and they are a threat to our entire way of life! See also, Sandanistas three days drive from Texas, the peril posed by Sioux and Mexicans, Saddam and his mushroom cloud, and of course the Yellow Peril.
I don't doubt that the Chines
Oh Noes! (Score:1)
A few years ago, in Ramadi Iraq I got shot by a sniper (twice!). It was pretty bad, but not nearly as horrific as if a foreign nation had totally crashed my web domain and/or email server. God help me if those bastard wrecked my telnet... I probably wouldn't be here today to tell the tale.
What a relief! (Score:2)
I don't know who this Desmond Ball person is, but... he published a paper! Wow.
Slashdot = Disinformative
This sounds a lot like... (Score:4, Insightful)
..whistling past the graveyard. It sounds a /lot/ like what US automobile manufacturers said about the Japanese in the 60s and 70s. And then the Japanese whipped Ford, Chrysler, and GM's collective asses.
Go ahead, dismiss your opponent as incompetent. Down that road lies complacency and defeat.
--
BMO
This reminds me of something... (Score:2)
Have they learned from the Japanese!
http://www.southparkstudios.com/clips/103420/japanese-charm [southparkstudios.com]
So... (Score:1)
Newsflash (Score:2)
Politicians and journalists from English speaking countries ALWAYS overstate the potential of national threats. And boy do they love their security theatre. The best one: The American president giving a speech abroad. Hilarious!
Re: (Score:2)
The American president giving a speech abroad. Hilarious!
You've got a derp on your chin, you might want to wipe that.
But... (Score:2)
They would be unable to systematically cripple selected command and control, air defense and intelligence networks and databases of advanced adversaries, or to conduct deception operations by secretly manipulating the data in these networks.
But, could we (as in the US) do those things? Because that would be super.
Apologist much? (Score:3)
What difference does it make whether the attacks are detectable? DDoS for example is detectable, but that doesn't make it any less potent of a weapon. As someone who has dealt with blocking Chinese break-in attempts for years, and at one point blacklisted IP blocks from the entire region, I can tell you that China is a scourge on the internet at best, and a damaging force against major targets at worst. There's more than enough evidence of that.
The really good hackers (Score:5, Insightful)
are the ones that don't get caught. Americans only detect the lousy attempts.
Don't need sophistication when your enemies use MS (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Did you go read that article about Turbo Pascal? Isn't that the precursor to Delphi?
Cyber Gap (Score:1)
Sounds kind of like the Bomber Gap [wikipedia.org].
Really, who gives a year of the rat's ass??? (Score:2)
The threat still exists (Score:1)
Some people tend to worry more about fires, floods, hurricanes, tornadoes, etc, than they likely need to. But they still happen, and you don't want to be the unlucky individual hit by one and be unprepared for it.
Drink with a national.... (Score:2)
I got drunk with a Chinese national in college once, he started going on about how China will be great in the future the way the US is great now, maybe greater.... real national pride coming through in a way I have never seen in any American, even the NASA heads in Houston weren't that fervently patriotic.
They outnumber the US in population by more than 3-1, they have at least as many children educated to a level where they can didactically learn h4x0r 5x1llz like our kids do. And, if they give these kids
The problem is not China is the US... (Score:2)
ION, Chinese scientists continues to impress (Score:2)
In other news, Chinese scientists-make blood from rice!
http://www.cbsnews.com/8301-504763_162-20128572-10391704/scientists-get-blood-protein-from-rice-whats-it-for/ [cbsnews.com]
"Scientists have found a way to use rice to "grow" the critical human blood protein albumin, which is used to make vaccines and to treat cirrhosis of the liver and other medical problems. "It looks like an interesting technological step forward," Dr. Richard J. Benjamin, chief medical officer for the American National Red Cross, told Fox News. "I
Ironic. (Score:1)
I find it very ironic that someone posts a story about Chinese ability to hack, and it is a PDF. No way in hell I am clicking on that sucker.
To quote Sun Tzu... (Score:1)
"Appear weak when you are strong, and strong when you are weak.”
Cyber-cold war (Score:2)
How about this (Score:1)
Really, this is beyond their capabilities? A bit optimistic, aren't we?
Re: (Score:2)
So far all their attacks I've heard about were made by sending emails to employees at a company and asking them to run exe files. If that's all it takes then everyone who can speak decent English and has access to off-the-shelf Trojans is a potential Hacker.
It's not that the Chinese jump high, it's just that the bar is so low.