Is this the same level of certainty
as the WMDs in Iraq?
Great track record...
Sources in Washington have indicated that the cyber attack last June which targeted the office of US Defence Secretary Robert Gates was conducted by the Chinese military. According to a report in the London Financial Times, "senior US officials" and "persons familiar with the event" have briefed that there is a “very high …
Would these be the same intelligence experts who swore blind that Iraq was crawling with WMD's? I would not trust them to tell me the time of day.
On the other hand I'd be very surprised if China or the Palestinians were not doing everything in their power to keep tabs on the US. It's not like their networks are hard to hack (see Gary McKinnon).
Surely it is time to stop dealing with the Chinese, they want rid of the West and we want rid of them so why the kid glove responses to this act of war? Did America learn nothing with Hitler? Obviously not, .... after all America is late into every war but there is no-one to hold the fort for them now, it is kill or be killed. And the clock is ticking.
Don't worry Fred, I'm sure there's plenty of yanks who think the PLA are in bed with the PLO, just like they thought Saddam was in bed with Bin Laden (a ridiculous theory that Prez Bush and the absurd VP Cheney were happy to push).
After all, if you're not with them, you're against them...
instead of trying to find any old excuse to jump into a war, for example WMD or perhaps even a "very high level of confidence...trending towards total certainty" it may be better if the whole North American continent was disconnected; it would even help them with their online gambling grievances. It would certainly stop the spam I have to deal with coming from DoD IP addresses.
Lets nuke the Chinese!! Kept the Japs quiet last time didnt it?
And while were at it lets nuke the Russians - we know what theyre up too now.
And the middle east - heck bomb them too.
French - theyre gone.
The welsh - they need seeing off.
Canadians they need sorting.
That guy next door to me - he has radio 3 on too loud after 9pm - hes gone (but can we keep his wife, she cute)
Personally - I'd like you to take youre them, us and ticking clock and shove it up your rs'
CIA balls'd up Iraq intelligence, then again I don't trust China's government either.
P.S. I would see China's horrendous human rights abuses as reason enough to think twice about trading with them - regardless of whether they actually hacked anything or not.
According to Human Rights Watch, China is a world leader - in executions.
They could just take all the really *critical* systems offline where the internet is concerned, and/or place them on a dedicated network. Then there really wouldn't be much of a problem...
Unless (GASP!) that's that they've already done and this is just a ploy for funds?? Only a total idiot would place critical systems online, and anyone who's seen wargames will tell you why. It ain't rocket science.
When I worked on (UK gov) sensitive systems, it was a basic requirement that you had two networks - a blue network for classified material and a red one with Internet connectivity - with an air gap between them. E-mails discussing "where shall we have lunch?" went on the red network and the ones that read "we attack at dawn" went on the blue network.
This was all a few years ago, but I would hope that modern US military systems observe a similar distinction. Perhaps Lewis can tell us if this is still the case (or is the information classified)?
Over-react much? A simple hack is an "act of war"? Lets go to war with a nuclear power 'cos they "shut down Robert Gates's unclassified email"?
Please tell me you're posting anonymously 'cos you're trolling for kicks. I would have assumed that no-one could be this stupid, until I started suspecting that Webster Phreaky is actually serious.
Em? Methinks that someone in US High Command has been playing to much CnC Generals. "The chinese have hackers in this great game I'm playing that really looks like real life. I mean they got a US General who specializes in lasers too".
Misspelling of "specializes" for the benefit of any high command officials that read this....
....ring any bells? This whole scenario seems just as ridiculous as that film (which whilst fairly entertaining to watch at the lowest level, was utterly braindead action trash, devoid of any connection with reality).
What is it with America? Really.....life is NOT an action movie. Society will not melt down because a bunch of computers get hacked, it really won't and if it really will, and it's possible to launch such a completely devestating attack using *only* computer based systems, then frankly governments and Utilities companies really need to sort it out...
Oh and Duncan, I like it - although why only "specializes" and not "lazer"? Which also makes me wonder why the Americans dont spell Chinese, Chineze...
Don't you just love the understatement in the Financial Times ..."– and the Pentagon is widely assumed to scan Chinese networks –".
The problem, although it is really a safeguard in CyberSpace, is that it is Intelligence which rules the roost and a big bullying stick to wield in a Shock and Awe campaign just doesn't exist. In fact, all such monies are wasted, which must sort of toll the death-knell bells for all those warmonger outfits with only archaic hardware to sell to a Digital World ......which must have a military industrial complex somewhat concerned, to say the least.
But hey, that's Progress and it's about time the neanderthal mind was laid to Rest in Peace.
And boy, is it gonna be a Bonanza for the Virtual Virtuozzo Messengers with all that pentagram money to play with.
Oops, sorry that should have been Pentagon. An easy mistake to make. Dig deep and you find all sorts of tales spinning in the background radiation enriching the environment or opening closets ....... http://www.paranoiamagazine.com/skeleton.html ....... and the Game hasn't really even started yet.
The Sub-Prime fiasco is only the warm-up?
Classified military networks are not connected to the Public Internet. The US military have a global intranet - the Global Information Grid, GIG - that is where the important information flows, how a UAV flying over A'stan is piloted by a bloke sat in an air-conditioned room located just outside Las Vegas and how US Divisional HQ for Iraq II was located in Florida (can't let generals get their uniforms dusty).
The big cyberwar threat is not to military networks; rather, it is to information systems that manage aspects of critical national infrastructure: power, telecoms, water, other utilities. If the US DoD is *serious* about providing a warning to the Administration it should be saying "this is evidence of latent capability: more funds need to be allocated to the Department of Homeland Defense in order to beef up the cyber defenses of these infrastructures"
The current pleading is, frankly, arrant nonsense.
China has been pounding on the Military firewall routers every few months for years now.
if they want to prevent their systems from being compromised they need to move to a core OS that can be burnt on a prom or eprom but not something that can be flashed with software. It is well within their ability to roll out an OS as a hardware upgrade. Dependant software can be white listed and trip wired by the secured core. ( I was actually disappointed when apple didn't adopt a similar configuration when they switched to intel processors ) I guess there is just to much money to be made in the anti-virus software market.
As for being concerned about China attacking the network, I believe they are simply driving the US to spend more than they can afford on upgrading, just like the US did to Soviet Union with Star Wars.
Now if you'll excuse me I'm going to try to install the second life client on my new bootleg copy of Windows for Warships ... :p
Yeah right. As the article states, it isn't in the interest of the PLO to show their hand. If a system was taken off line, it was either that Chinese MilHats made a mistake (port scanner set too aggresively and causing DOS, buffer overflow exploit against wrong version exe crashing machine, etc), or (more likely) that some kid happened to zombie a machine in an unclassified .mil.ca network and used that as a proxy to do some playing around in the Pentagon.
War Games 2? :-)
"Classified military networks are not connected to the Public Internet."
Is that the problem, Dave? Two quite separate networks working in a real world environment with both disabled and unable to talk to each other and just doing their thing, y'all. With one plotting and playing war games costing real American lives too and all controlled by couch potatoes sat in an air-conditioned room located just outside Las Vegas. All American heroes?
And after a hard day's work, a night hooking on the town snorting a line and toasting absent friends. Oh what a lovely war for some but don't be shouting IT from the rooftops or there'll be hell to pay and heads to roll.
I guess I should expect this, considering it's the Register and all, but seriously...
1. The DoD maintains seperate networks for seperate purposes. NIPRnet, SIPRnet and JWICS are all physically seperate networks, operating at different levels of classifications. SIPRnet and JWICS are totally isolate, and don't talk to each other.
2. amanfromMars: all DoD personnel undergo random drug testing. Most people get popped for a test twice a year or so. Failure = dishonorable discharge, do not pass go, do not collect $200.
3. The military (Air Force in particular) have a tendency to mix electronic warfare with this whole "cyber" warfare thing; the two are extremely different, where one is concerned with defeating RADAR systems and radio links, and the other more in the world y'all understand. Both are referred to as network warfare, as they involve the destruction or disruption of autonomous agents communicating in a complex scheme. Network warfare is also applied to power systems, lines of communication (roads, railroads etc for you non-mil types) and other interconnected systems. Yes, the brass confuse the hell out of the matter. Meh...what can you do?
4. Dave: agreed, and there is much spending in just the manner you posted on. The DHS is a new, massive department though, and are necessarily incompetent.
5. Finally the intelligence thing: the intelligence community never asserted many of the things stated above, but by the same measure they didn't actively counter the memes as they spread. As always, the reality is very muddy, and the intel people tend not to convey ambiguity very well. Which is very important, as military types are very black/white, yes/no, go/no-go etc.
Carry on.
Just because someone posts anonymously, it doesn't mean they're trolling (although in this case, I think they are).
Sometimes it's because they know that their opinion is controversial and that they are likely to get some pretty unpleasant and vicious abuse instead of constructive counter-argument. To resort to abuse is an admission that you either can't or won't counter their argument. Neither option is helpful to the debate.
N.B. If you think somebody is trolling, DO NOT FEED THEM! They thrive on getting attention, regardless of whether it's positive or negative.
.....they should have secured some of their systems and changed system accounts away from default passwords...... As discussed here some weeks ago.
....And in related news, analysis of the header (which can't always be taken at face value, I appreciate...) of a spam email I received recently, punting the ever popular penis pills suggests that someone at Yuma on a DoD site really needs to brush up their security. It's reassuring that the US military appear to be just as bad at spreading spam as everyone else.
if it's true or not. And the air gap is irrelevant. If the Israelis have it (and they have pretty much everything save the launch codes, which they don't care about as they's got their own), then the Russian have it, which means the Chinese have it, or soon will. And if it's important, then the Israelis have it. At least when the Mob on the Hill finally decamp to their hideouts in Paraguy and places, we'll be able to shop around for the best deal on their bank account numbers to get the loot back. Or maybe it'll just be simpler to print up some more, preferably of the Treasury variety.
And to think. The Chinese actually discovered the *east* coast of America about 70 years before Columbus. Their Emperor was so impressed he let the fleet rot (remind you of anyone?). How different things might have been if they'd stayed.
We might have had Ninja Mutant Turtles, Bruce Lee movies and takeaway dinners about 300 years earlier. Instead we have The End of History (on a permanent basis).
why anonymous ?
Sometimes our employers (or associates) wouldn't appreciate our comments
to mr anon (the one who went Sigh... @ 17:47 GMT)
Separate network : Thats the separate network that is unusable because if the powerpoint presentations being whizzed about between important people. Or is that the network that couldn't be used in Bosnia because it had to be kept clear (at all times) for the less than daily top brass video conference ?
Such systems are seldom used for their true purpose they become the personal property (and status symbol) of the senior management, whether it is private industry, goverment or military
DoD personnel undergo drug testing,
Still dosn't stop them though does it, (better to use coke/crack or acid than weed as it clears the body quicker), don't forget to keep your hair short ! US service people using stimulants (to do what is asked of them) it would never happen.
Radar / radio comms intercept / traffic analysis / spoofing, always fell into Sig Int and ECM. This cyber warfare only turned up when they wanted more miney so they didn't actually have to attend any warzones in person (Oh yean and to scare the US public that the bad guys where on the publics doorstep)
The poor buggers out on the front line are having a bad enough time, without the shrinking violets back at home talking up another threat, to avoid facing some real shit.
Brent : the system probably went off line because they where listening to a Sony protected CD
for the intelligence community, the only product thay have is fear, to the public or the politicians it dosn't matter as long as they justify their own existance.
If any deeply critical utility puts their control systems on the internet, (even via VPN tunnels) then they should be closed down on general principle If you are that critical then you can afford private circuits.
Re: to separate network
Bandwidth hogs are still fairly common, though it's less "important people" then it is idiots sending gigantic emails around. Most network abuse is due to people not understanding the concept of limited bandwidth, rather then general conceit as you seem to imply. Bandwidth has improved dramatically over the last few years, thankfully.
Your implication that networks are used as status trophies is just being angry. SIPRnet and JWICS are just very large intranets, and as such, are used for web publishing and email, much like any other intranet. SIPRnet has many many many users and JWICS, though operating at a high classification, has a large userbase as well. Believe me, as the near polar opposite of "senior management" I experience no mission-ending delay on the network, either here or CONUS. Your attempt to make this an emotional appeal against those Evil, Dark Overlords is sad, really.
Re: Drug Testing
Yes, of *course* people use drugs in the military. And those idiots rarely last long. My whole point was that drug testing is frequent, unpredictable and nearly irrefutable. Dishonorable discharges or a dismissal of a commission is a permanent scar on one's life, and it's a huge risk to take. Your assertion that people in the DoD take drugs to comply with the unreasonable demands of the same Dark Overlords that take all our bandwidth in video chat is, again, a needless emotional appeal.
Re: Cyber Warfare
Again, emotional appeal. You say much about the evil, nefarious schemes of massively powerful corporations or individuals...great fun, I must admit, but ignorance is a better explanation. In government, things rarely start from a point of malice. They generally start because of fear and ignorance. In this case, Cyber attack entered vogue a number of years ago as an emerging threat against systems in the gov't. Remember, old warfighters (generals and admirals) aren't as tech-savvy as us, and so will naturally relate the concept to warfighting methods they *do* understand, and the result is that they think of cyber warfare as similar to network warfare.
Network warfare, for those unaware, is the idea that complex enemies fight in systems, which can be abstracted into nodes which affect the status of a system. In network warfare, the idea is to destroy or neutralize the points in an abstract network that will best disable the enemy's ability to fight. Taking out a bridge on a major highway (thus interrupting an enemy's transportation system) or destroying an early warning RADAR (thus blinding the enemy's intelligence network) is a perfect example of this.
The problem with this approach from cyber warfare's standpoint is that it leads people to think of cyberspace as a traditional battlespace, and to draw metaphors appropriately. This, combined with the deep arcana of modern information systems leads to, well, what we have now.
Re: Sony protected CD
Cute.
Re: intelligence community
You sound genuinely embittered here. On the one hand, it's not surprising considering how secretive such a business is. On the other hand, it's kinda sad. Intelligence is, by its very nature, educated guesswork. Many times they get it right. Sometimes, they fail spectacularly. That is to be expected. And this is something you probably realize, but choose to ignore; when has logic and rationality stopped a good strong hate? After all, the truthiness behind Big Evil DoD is the intellectually easier route to take. The idea that it is simply a massive, unwieldy organization whose nature and mission make weirdness like this inevitable isn't very sexy, after all. Better to go with aliens and oppression.
I would also recommend running a post through a spell checker before you post.
No, just disconnect the Pentagon. It amazes me that a target like the pentagon is connected al the time to the Internet. Why not hang a sign out announcing "Here we are, come f**k with our network!"
Email's important, but have they never heard of UUCP? Even Exchange can use UUCP, no? If they don't use Exchange they should: whenever the Sec of Defense or Prez needs to 'lose' an email message, they can blame it's loss quite plausibly on Exchange.
But, more likely, the Pentagon and Executive share a squirrel(ly)mail server with the CIA!
Well when an unemployed, technically illiterate person, the likes of Gary McKinnon hacks into your networks and your response is to get the arse with him rather than get the arse with yourselves for being such muppets then you'd have to be a moron to think that you didn't have a wide open door to the Chineese military.
Their biggest problem isn't technical, my bet is they first need to get rid of the morons and then change their attitudes.
Firstly nothing I typed was supposed to be a personal attack, despite addressing points made.
As somebody who has already spent 30 years of his life living through a previous war on terror, and being way too close to several car & van bombs to ever take walking safely down the street for granted. I do understand the intent of security agencys and also the dreadful things that they encounter, and also the choices (& trade offs) they must make to keep people alive.
But right now theres so much shouting wolf going on, people are not going to listen when it is real.
Thats a big worry to me, and it should be to everybody else.
Surely you are supposed to tell a somebody when they're is going wrong.
Anyway :
The practice of keeping networks free for most of the day (for a scheduled 30 minute video conference) was from 3 friends who where stationed in Bosnia. Similar issues are still reported by the one who is still currently serving (in Afganistan ATM.)
Too many friends who have not survived their combat tours (both UK & US forces) some due to what turned out to be misleading intellegence reports (two of these cases the information was known to be known to be incorrect before the operation started). Nothing to do with misdirection or protecting sources, just intel staff not wishing to own up to a mistake in the first place.
The funny thing is I object to that (do you ?), especially as the culprits where 'promoted out of harms way'
Any large organisation is like an living organism, it becomes self serving, to the detriment of other organisms around it (when nessicary for it's own continued good health). This may not be intentional but it happens (sorry folks)
However such lessons from the past have been forgotten (again). The reasons given for invading Afginstan and Iraq is one example. I was called cynical & wrong at the time. Lies and fabrication is what it turned out to be.
I'm not blaming the armed forces for this mess BTW
Drugs : from those I knew who operated multi day missions within Iraq, (pre Dersert Storm invasion) refused stimulants. Official or unofficial it still occured and don't simply say 17 years have passed.
Yes there is a potential of some form of information war, unhappily from previous hacks much of the US goverment agencys (I will have the decency to leave out the 'real military' out of this) could learn the some of the lessons that even home users have learned.
Yeah I liked the Sony comment myself thanks ;)
I don't want sexy theorys, I don't need them at all thank you. The real world generates enough wierdness for me. However I do keep a very careful eye out for the self serving variety, as thats the one that causes the political problems in work.
BTW I didn't pick on anybodys spelling (or made up words in this thread), currently I'm working with 2 broken fingers and a fingertip that would prefer to leave the rest of the finger so please don't get petty about my left handed typing. It's the best I can manage for a while.
However this will not cause anybodys demise (I hope).
"all DoD personnel undergo random drug testing. Most people get popped for a test twice a year or so. Failure = dishonorable discharge, do not pass go, do not collect $200."
It depends on quite a few things. For example what drug shows up in your urinalysis, if you gave a statement (confession) before the results were back indicating you had drugs in your system, the current drug policy atmosphere where you are stationed, and yes unfortunately it depends on who you are.
I have seen many people simply get sent to a rehab program when they "piss hot" showing cocaine or marijuana in their system. A few had been doing extacy and got pulled for a urinalysis and subsequently dishonorably discharged.
It's not as easy to get kicked out as it may have been in the past. I myself had somewhat of an experience with this. It's regarding how I found this website to begin with. ;)
http://www.theregister.co.uk/2001/05/08/us_airman_charged_in_korean/
http://ww2.pstripes.osd.mil/01/jul01/ed072701g.html <-- by this time i had been relieved of some rank heh
I continued to serve my country until 2003 and received an Honorable discharge.
When I see at least two people have answered amanfromars "criticisms?" considering he is just a script/dada engine/AI and although he's gotten better he's still a little out there we have just too many gullible folks reading this for there not to be a ton of trolls. There is blood in the water what do you expect.Anybody who wants
to know about the time honored tradition of trolling can look the word up at wikipedia they have a nice long article about it there.
No I am who I say I am I don't care what you think.
This type of report always reminds me of the latter day James Bond (or more likely, Austin Powers) movie - Dr. Evil in his secret liar surrounded by hordes of Russian, Albanian or Chinese lackeys (depending on the vintage) dreaming up schemes to bring down the free world with some death ray (in this case 'death code').
We must not take this seriously. Even if the reports are true its amateurishness of the highest order to carry sensitive information on unsecured systems connected to the public Internet. You leave a door open on a crowded street then someone is going to try to come in, its just the way people are. If we allow these people to play their 'cyberwarfare' games then we're going to suffer collateral damage like Mr. McKinnon who - if his Law Lords appeal fails -- is going to be thrown to a legal system that I wouldn't go near with a ten foot pole (and I'm an American.....). Don't pander to the scaremongers, we're professionals.
So the US military doesn't operate its network on the basis of a sandbox concept? Or maybe its referring to the Whitehouse website being hacked yet again. This whiffs of the usual 'don't worry, public, trust us - you wouldn't understand this techie stuff' excuse to pump more funding into the deep pockets of the military-industrial complex. And of course the US taxpayer is easily whooped-up and will happily stump up the cash along with relinquishing whatever rights and freedoms they currently enjoy in 'cyberspace'.
@Sigh 17:47 GMT
"all DoD personnel undergo random drug testing. Most people get popped for a test twice a year or so. Failure = dishonorable discharge, do not pass go, do not collect $200."
I can imagine that is naive and in a war situation, also ridiculous. We will agree to disagree if you say that drugs are not taken by military personnel....... which is not to say that it is either rife or that it is condoned just that it happens and in special cases, accepted. And it is a sensitive subject upon which I would wish to comment nothing further.
"5. Finally the intelligence thing: the intelligence community never asserted many of the things stated above, but by the same measure they didn't actively counter the memes as they spread. As always, the reality is very muddy, and the intel people tend not to convey ambiguity very well. Which is very important, as military types are very black/white, yes/no, go/no-go etc."
That would then be a Failure of CounterIntelligence Services? And a very clear Reality.
Carry on.
"Is it me...
By Joe
Posted Tuesday 4th September 2007 23:01 GMT
...or did amanfromMars just make some sense in that post?"
It is you, Joe, you must be learning. The implication in your post is that you should be able to understand anything which is preposterous if you don't know of everything surely?
"of course there are trolls here
By Alan Donaly" ........ Ok, Alan, please be so bold as to venture an opinion as to whether you are talking to a man or a machine or a Virtual Machine or a Program whenever you reply to amfM HyperRadioProActivity....... for is that the question you are indirectly asking?
Maybe One can be All ...and more .....by Virtue of Growth in Processing Power? Would you like to agree on that?
No they don't as far as agressive war is concerned China is really quite passive.
And why would we want rid of them, China's a wonderful country with jolly nice people in it. Where would we be without sweet and sour chicken eh?
Just leave 'em be and start using passwords.
Time and again, red China had been probing for weaknesses on US government systems' security. Their cyberwarfare units have already amassed a significant amount of information about our security vulnerabilities. Hey, it's like them knowing where you left your undies at home when you can't find it! Hacking in China is serious business. Their large pool of bored and talented techies in search of short-term glory doing all those intrusions and probes are essentially being encouraged by their government. The roughly 2,500 physical and "logical" ports of your PCs are never safe from these determined mercenaries. Chinese hackers have also developed a hacking tool that can initiate a scan and present a multiple scenario of suggested intrusions (cyber attacks) based success probability (in percentages) and estimated time of interception by the security systems (in number of hours / minutes). Developed using OpenSource initially and tested in a Beijing gov't tech lab, but the guys are now busy porting this application to "increase it's potency" as applied to the more sophisticated networks being targeted by Red China. In the next 6 months or so, the US can expect bolder intrusions from Red China hackers (both gov't sanctioned and independent). You can all laugh for now, but just wait until your machines start crashing one after another. Their new tool, Dragon Sword, is now under final testing at an undisclosed lab in Beijing. This tool is meant to remotely re-program your CPU and initiate a power overload on your PC or servers and thus burning the units. Not science fiction anymore, folks. It had been done in the lab... soon, you'll more of it in US computer labs... computers / servers getting "burned" even under temperature controlled facilities.