China's Cyber-Militia 196
D. J. Keenan notes that the cover story of the current issue of National Journal reports in depth on China's cyber-aggression against US targets in the government, military, and business. We have discussed China's actions on numerous occasions over the years. The news in this report is the suggestion that Chinese cyber-attackers may have been involved in major power outages in the US. "Computer hackers in China, including those working on behalf of the Chinese government and military, have penetrated deeply into the information systems of US companies and government agencies, stolen proprietary information from American executives in advance of their business meetings in China, and, in a few cases, gained access to electric power plants in the United States, possibly triggering two recent and widespread blackouts in Florida and the Northeast, according to US government officials and computer-security experts..."
Microsoft? Windows? (Score:3, Insightful)
"A computer virus" is as close as this article came to the reason power companies are so wide open to any aggressor.
It's not just power companies. (Score:3, Insightful)
The article mentions large scale government, military and industry intrusions. They also mention criminal gangs and others besides China as those responsible.
This is an odd issue that gives neo-conservatives fits. They like trading with China, so they don't like hearing old school anti-Communist and human rights complaints. They place the interests of large American companies above those of American people, so they don't like hearing bad things about Microsoft. This leads to a large scale head in sand
Re: (Score:1, Offtopic)
Such a basic mistake... I thought that the multiple accounts game was "dreadfully easy"?
Re:It's not just power companies. (Score:5, Insightful)
The article mentions large scale government, military and industry intrusions. They also mention criminal gangs and others besides China as those responsible.
China is well situated. (Score:4, Insightful)
The submitter quotes the most frightening parts of the article [slashdot.org] and our current "trade partner" China is well positioned to spy. We trust them to make equipment and non free software like Cisco routere has proved itself impossible to check.
Still, most of the hacks are common and anyone could do it. Time and time again we read about autopropagating botnets for Windows and how they cover large parts of the internet [usatoday.com]. When that system is used on corporate and government desktops, anyone can exploit it.
My power went out for an hour yesterday (Score:2)
You may be more involved than you think you are. (Score:1)
If you run Windows on a cable modem or DSL, there's a good chance your computer is part of a botnet.
Re: (Score:2)
That'll teach them reds! Oh, wait.
Huh!? (Score:5, Insightful)
Re:Huh!? (Score:5, Insightful)
That ANY major infrastructure would be connected to the internet is shocking, and I'd really like to believe that people aren't that stupid...
Re: (Score:1)
Snarking a bit more, Google has a HUGE amount of infrastructure connected to the internet. It's almost as if their business depends on it. That isn't the kind of infrastructure you are talking about, but it is still a mildly amusing counterpoint.
Re: (Score:2)
You should be able to verify this with your doctor.
Hospitals and agencies may try to jazz the system, but Medicare doesn't have to suffer electronic break-ins.
Re: (Score:2)
To be fair, your school probably didn't have to worry about remote management or distributed load-balancing issues, problems which are well suited to control systems operating over a computer network. Proactive security would dictate that this should all be conducted over a private, dedicated line; cost effectiveness says that it should be done over the Internet. Guess which imperative is more likely to win the hearts and minds of shareholders?
I agree, they should know better. I'd bet most of them do k
of course (Score:2)
draw a line, cutting off more-vital parts from the
less-vital parts.
There mechanical protection systems, so you won't
be making meltdowns over the net.
Re:of course (Score:5, Insightful)
Re: (Score:3, Funny)
The computers which control the plant should be physically separated from the computers which are needed/wanted for connection with the internet. Otherwise you are begging for disasters.
It's more like the trees which grow next to the powerlines should be kept trimmed.
Otherwise you are begging for disasters.
Did Hackers Cause the 2003 Northeast Blackout? Umm, No
http://blog.wired.com/27bstroke6/2008/05/did-hackers-cau.html [wired.com]
So China would have to have planted the race condition in a [General Electric] product used around the world, then, using the most devious malware ever devised, arranged for trees to grow up into exactly the right power lines at precisely the right time to trigger the cascade.
Re: (Score:2)
Why does communication need to be on the same network as the critical systems? Surely critical systems should be kept off ANY system connected to the internet. Hell, even communications should probably be done over a private network/system that isn't integrated with the main internet...
Re: (Score:2)
Things line Demilitarized network zones, staging servers and protocol filters can do an excellent job of deciding what information goes in what direction.
Actually bothering to design and implement them is, unfortunately, beyond the interest (and knowledge) of your average factory operator.
(Yes, I have worked for one)
They will happily say:
80% of MD's in the US use a MS SBS server.
I say:
80% of MD's in the US don't know the difference between a modem, a router and a fire
Re: (Score:1)
Re: (Score:3, Insightful)
There's a lot of reason to believe that doing so would result in less secure software. The software would have less people trying to break it, thus less opportunity to find and fix the inevitable bugs. There's something to be said for the trial-by-fire that is a public release of software. And in many cases it probably wouldn't get the
Re:MIlitary doesn't allow Firefox (Score:1)
Clearly military security is reactive, as opposed to proactive -- sad, but true.
Re: (Score:2)
Re: (Score:3, Informative)
I've always heard it as "Commercial Off The Shelf" - and Google seems to agree with me. (Yes, even Linux use would generally be commercial, because it usually comes with support contracts from someone.)
But anyway, part of the reason for using COTS products in general is that people bitch about "government waste" and things like "$500 hammers" - so in response, the government and the DOD started a mandate to use more COTS products.
The idea is to save money by not reinventing the wheel where it isn't need
Re: (Score:1)
I remember years ago I was consultant for the NSA, and on one occasion I entered a computer room at the Friendship Annex ("why is that red light flashing?" "Because you're in here"). I saw the low security machine that I would use to communicate with my contracting officers, and right next
Re: (Score:2)
However, the computers that hook into the SCADA systems are.
Although, I would love to see the manual for operating a power plant start like ths:
"Open a web browser (internet explorer is recommended(read:required due to some fucking activex crap on the page)) and navigate to http://10.8.0.15441/ [8.0.15441] you will be promted to log in. The default password is "Admin" with no username. Please change this as soon as possible".
I hope this guy isn't getting paid (Score:5, Funny)
Wow, has professional writing ever gone downhill. Ever heard of a period?
Re: (Score:1, Offtopic)
Re:I hope this guy isn't getting paid (Score:4, Insightful)
Re:I hope this guy isn't getting paid (Score:5, Informative)
Professional writing used to be a competition to put on paper the longest sentence with the least amount of punctuation possible.
What we call a paragraph, they called a sentence.
Re: (Score:3, Funny)
No
Some quotes from the article (Score:5, Interesting)
It is a long article, but worth reading. The suspicion of Chinese involvement in two major U.S. power outages is extremely worrying. Following are quotes on related aspects.
Re: (Score:3, Informative)
If you don't want to go there, the short version is that the data for hacking into the power systems is pretty darn weak.
Since we can't beat up Iran anymore, we have to have somebody to hate.
Re: (Score:3, Interesting)
The content is too breathless. The words fed us smell like the b.s. we had before on lesser security issues. This all makes me dubious. I find it har
Re: (Score:2)
And the point of the article is...? (Score:1, Insightful)
China isn't the only country hacking US interests so whats the big deal here? I'm pretty sure we have just as many hackers hacking into not only Chinese systems, but probably every country out there that doesn't align with our interests.
This just seems like more propaganda.Re: (Score:3, Insightful)
Re: (Score:2)
In the generic sense, there is "nothing wrong with" this, but whatever can get people to realize that outsourcing and free trade, especially with commies like China is bad for us, then I'm cool with attention being brought.
It's only an issue if they start making stuff up. I'm not cool with being lied
Re: (Score:2)
Re: (Score:2)
Re: (Score:3, Funny)
Re: (Score:2)
Yes, but China is known to A) do more hacking than other nations (perhaps because it has more people in general) and B) to do better hacking/cyber crimes than a lot of other nations. Most other nations (example: Nigeria) have people who commit cybercrimes and fraud, but th
Ahhh anger at China (Score:2)
oh...wait...familiar that.....sounds like a good chunk of humanity.
Not saying its not wrong, just putting a perspective stick in the spokes.
Re: (Score:2)
This is not the worst thing done in preparation for a (possible) war.
Just wait (Score:5, Funny)
"hacked by chinese" (Score:4, Funny)
We are at war... (Score:2, Insightful)
If you go to any US port, you will find that almost every single shipping container in almost every US port is loaded and moved with a container
What kind of un-patched Windows crap... (Score:4, Insightful)
What kind of un-patched Windows crap is running the power grid?
Of course the attackers are guilty; but that doesn't excuse foolish security practices. Nevermind bad security on the end-point, or in the software. It seems like the power company, with all its rights-of-way, shouldn't even have to route over the public network. Routing over a private network would provide physical security. Breaking into that requires putting your actual body at the point of attack. Since the power company came before the Internet, I would have thought they had a private network of some kind in place already, or close cooperation with telcos. I guess not.
Re: (Score:2)
Re: (Score:2)
With a name like "Frosty Piss" you should have no trouble recognizing a good Karma-whoring when you see it.
Re: (Score:2)
If you are operating a system under configuration control, you can't just apply patches to Windows without a process to test and approve them. Testing can be very expensive, and third-party software vendors may only provide support for their software in configurations that have been tested in their own lab.
Re: (Score:2)
Re: (Score:2)
Or.... (Score:2, Insightful)
And the recent power outages are due to badly maintained and or out of date hardware thats not very fault tolerant.
I might have my cynical head on though.
Re: (Score:1)
Re: (Score:3, Insightful)
You may find it instructive to research how England got its first tea plants from China. That is possibly one of the finest feats of industrial espionage in history.
Also, check out the antics of the East India company, and ponder what happened to all that money and power, think it evaporated away and england is all cuddles and sweetness now?
Re: (Score:2)
Did Red China really hire the hackers? (Score:4, Insightful)
Computer hackers in China, including those working on behalf of the Chinese government and military
Can they prove that? This sounds like regular old corporate espionage -- nothing unusual or even foreign there. Is xenophobia starting to take hold, or are those statements substantiated? No time to RTFA.
Re: (Score:1)
I don't know if you're familiar with how business works in a communist country, or have ever lived in one to see it up close, but I worked for a foreign-owned consulting company in a communist country in East Asia, and a great deal of the companies there are government corporations, in whol
Re: (Score:2)
In short, to say it's regular old corporate espionage when you're talking about a communist country is pretty much the same as saying "those working on behalf of the government and military" because most of the corporations are in fact owned by the government or military.
Wow, that is an excellent point. Those damn commies.
Re: (Score:2)
Just to touch on the power outage issue, that's not the sort of thing corporate spies do.
You must have forgotten about Enron already. Granted, they had some unique motivations (energy in cali was deregulated so they could turn off the power to create artificial price spikes), but I could probably stretch my imagination and name a few foreign companies that would benefit from power shortages in the U.S. ... like Japanese automobile manufacturers!
Re: (Score:2)
Stop and think about my example. One of the primary sources of competition for Japanese auto manufacturers in the U.S. is locally-based auto manufacturers, like Ford. If those Japanese companies (or even German companies, for that matter) could hire hackers to cut off the power to large municipalities that supported locally-based auto factories, it would necessarily drive up the cost of American automobiles because the power shortages would reduce the amount of time available for production, increase the co
Re: (Score:2)
"those Japanese companies" have their factories in US too.
"German companies" are moving their toys to US, too. Ever heard about Airbus ?
Check your statistics
Re: (Score:2)
Please have a look at the documentary "Enron -- The Smartest Guys in the Room." There are taped conversations of low-level energy traders at Enron doing things like calling the managers of power plants and telling them to find a creative reason to trigger a "forced outage."
Whether or not California has enough power plants today is a separate issue. The fact is that as soon as California let the price of electricity in the state float, Enron used the opportunity to engineer a shortage with their monopoly in
Re: (Score:2)
P.S. Your point about the US being the largest industrial producer in the world is irrelevant to my suggestion that hackers could perform a targeted attack on the power infrastructure in a specific municipality. If it were within their power to do that, then they could just figure out what "zones" their competitor's factories were in and cut the power there while maintaining power in zones that their factories operate in. Any company from any country could do it -- after all, if someone were to attack the e
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:1, Insightful)
If China continues to grow at its current rate - economically, technology, and in terms of its military abilities (militarily? is that a word?), it'll eat the USA and Europe for breakfast in a generation or two at most.
Brace yourself for a US-led war against China in the mid-term future. This is really just the foundations - the FUD that is supposed to ingrain the "evil Chinese are our enemies" thinking in the general population.
Re: (Score:2)
Re: (Score:2)
FUD by US Gov (Score:1)
Re: (Score:2)
Complain all you want... (Score:2)
Even if it is Chinese Government sponsored hackers, the american people still want their cheap goods.
Just like most americans we care more about the price of gas, than what type of government is in Iraq.
We want fresh fruit picked by illegal immigrants who have no healthcare.
We want cheap power, but as long as the nuclear power plant is built in someone elses backyard.
solution .. (Score:2)
Solution is, don't put your SCADA units on the Internet. And even if this were true the more likely explanation is that they didn't have enough spare capacity.
What really happened .. (Score:3, Informative)
No, what really happened was the grid was overloaded and the SQL virus was playing havoc with connectivity, then a tree fell over and tripped out a line, which spread in a domino effect all the way to Canada. A similar virus tripped out the control system in a Nuclear power plant.
http://www.nationaljournal.com/njmagazine/cs_20080531_6948.php [nationaljournal.com]
"During the hour before the Aug. 14 blackout, engineers in the control center of an Ohio utility struggled to figure out why transmission lines were failing and complained that a computer failure was making it difficult to determine what was going on, transcripts of telephone communications released Wednesday show"
http://www.wired.com/science/discoveries/news/2003/09/60285 [wired.com]
"Software failure cited in August blackout investigation
http://www.nrc.gov/reading-rm/doc-collections/gen-comm/info-notices/2003/in200314.pdf [nrc.gov]
http://www.computerworld.com/securitytopics/security/recovery/story/0,10801,87400,00.html [computerworld.com]
It sounds like China is saying that they involved (Score:2)
Thank you China (Score:4, Insightful)
Re: (Score:2)
China certainly has a looming presence, and they could become a terrible enemy. However, it doesn't have to turn out that way, and I try to keep a positive outlook. Frankly, it's
good old propaganda (Score:3, Interesting)
Now, if I was a Chinese spy, I'd infiltrate General Electric, install a bug in the operating software responsible for the control of the energy distribution network, wait till those dumb ol americans had got complacent and then, for no strategic advantage whatsoever, cripple their energy distribution network, and then laugh my black communist heart out.
Re: (Score:2)
Well, the USA needs an enemy, now that "terrorists" have replaced "drugs" instead of the USSR.
Re: (Score:2)
Looking for a scrap ... (Score:2)
For about 40 years now all kinds of utility companies have wiped their collective backsides with the idea that any kind of information processing system that has any kind of actuator needs to be thoroughly secured. After all, when was the last time you casually strolled into a waterworks or a power plant? All those things are locked down, if not guarded.
Has it come to
Scaremongering (Score:5, Insightful)
Apart from that, it isn't exactly difficult to break in to this kind of system - in the past we have seen hackers walk all over the place where they aren't supposed to have been. If script kiddies can do it, is isn't surprising if higly trained miltary personnel can do it too.
But I sincerely doubt that they would leave lots of traces and clues lying around for the more paranoid factions on slashdot to play with. Script-kiddies, yes, but if you are professional, whether criminal or some foreign government, you don't just blunder stupidly in and trigger alarms, or leave your droppings all over the place.
I can see how this kind of nonsense is politically useful. Hasn't the American public caught on to this yet?
You couldn't make this shit up! (Score:2, Funny)
Re: (Score:2, Funny)
right?
So, how do you seriously get to the point where a couple of blackouts and some economic competition justifies bombing around 1 billion people because you're paying too much for gas? Do you kick puppies for training, or are you just born that much of an asshole naturally?
Re: (Score:1)
When will we retailate? As soon as... (Score:5, Insightful)
Till then, they get to do as they please, same as any nuclear-armed country.
Re: (Score:3, Insightful)
The concept of M.A.D. is what is keep the world in one piece, and not a giant puddle of radioactive sludge. Thanks to modern intelligence tech, all countries capable of launching ICBMs are also capable of knowing when OTHER ICBMs are launched, within minutes. If one gets launch, then other countries will launch retaliatory strikes, and eventually, EVERYONE will launch their weapons, hoping to at least destroy the enemy before they are destroyed themselves.
China is a threat t
Deterrence has been beneficial... (Score:2)
M.A.D. just squashes down the desire to slaughter each other by the millions. Eventually it's going to pop back out of the box with a vengence.
Re: (Score:2)
You are clueless and naive to a degree that is both astounding and frightening. Good job.
Re: (Score:2)
...cut out the multi-billion dollar toy trade and China's toast.
Are you on glue?
From this site [uschina.org] it lists 2007 total imports from China at 321.5 b$, Imports of "toys and games" as 26.1 b$. While significant, I really don't think an 8% change in China->US imports is going to make China close up shop. (This leaves aside the ridiculousness of getting consumers and businesses to collectively say "We're willing to do without or pay more just to shave a few percent off of China's trade." Good luck.)
As far as the EMP nonsense is concerned, it's possible that such a t
Re:wake up people (Score:4, Insightful)
Re: (Score:1)
World War 3 will start with a conflict with China, not these arabs hiding in caves.
Neither government is stupid enough to ever fight each other. In today's modern global economy, the entire world's economy would go to shit if the US and China went to war.
The only front that a war with China will take place on is the digital front.
Re:Washington is full of pussies (Score:4, Insightful)
Funnily enough, that's what everyone in Europe was saying in 1913.
Re: (Score:2)
You mean, sit it out for the first half of the war while our main rivals for world domination blow the hell out of each other, quietly take over all their markets and business interests overseas, and then get involved late on and claim all the credit and a major say in the post-war settlement?
Interesting idea. Sounds good, actually. Might work very well. Has it ever been tried before, do you know?
Re: (Score:2, Funny)
Re: (Score:2)
It's hard to prosecute hackers and spammers when they hide behind the Great Firewall of China. The information is of course in the NAT logs, but these are controlled by their government.
You do know that the Great Firewall is not, in fact, a NAT? It's just a simple filtering service applied on the master gateways to the outside world. It does proxy DNS, but that's it; all other packets are either passed through unchanged or blocked entirely, depending on the firewall policy.
Go look at the Wikipedia article; it's got a reasonable amount of technical information.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)