Google vs. China: The Tip of the Cyberwar

It isn’t just Google, and it isn’t just China. Security experts say there’s a raging, worldwide cyberwar going on behind the scenes, and governments and businesses across the globe need to be on alert.

Security analysts say 20 countries, in addition to China, are actively engaged in so-called asymmetrical warfare,a term that originated with counterterrorism experts that now commonly refers to cyberattacks designed to destabilize governments. Countries engaged in this activity range from so-called friendly nations, such as the United Kingdom and Israel, to less friendly governments like North Korea, Russia, Kazakhstan, and Uzbekistan.

“There are least 100 countries with cyber espionage capabilities,” warns Alan Paller, director of research at the SANS Institute, an information security and training firm. Today there are thousands of hackers working on such programs around the world, “including al Qaeda cells that are acting as training centers for hackers,” he said.

“It’s been a widespread problem for some time,” says University of Texas at San Antonio professor and cyber security researcher Ravinderpal Sandhu. Paller and others agree, adding that the recent Google incident — in which the Internet giant discovered e-mail and corporate sites had been extensively hacked by programmers on the Chinese mainland — represents just the tip of the iceberg.

The Google Incident

“The Chinese air force has an asymmetrical warfare division” charged with developing cyberwarfare techniques to disable governments’ command and control systems, says Tom Patterson, chief security officer of security device manufacturer MagTek Inc.

“They are fully staffed, fully operational and fully active. And when you aim a governmental agency that size against any company, even the size of Google — well, it’s an overwhelming force,” Patterson says.

“It’s been going on in China since at least at least May 2002, with workstations running 24 hours a day, 7 days a week,” Peller says.

Google has been unable to conclusively tie the Chinese government to the recent attacks, but it did trace the source of those attacks to mainland China. Experts say the sophistication of the hackers indicates government support, or at least approval.

Such virtual attacks represent a very real danger. Government and security-firm sources say over 30 other companies were attacked in this latest hack, from software firms like Adobe and Juniper Networks to Northrop Grumman — a major U.S. defense contractor and manufacturer of nuclear-powered aircraft carriers and the Global Hawk unmanned drone.

It’s just part of a battle that’s been getting increasingly belligerent:

— In 2007, Britain’s security agency, MI5, issued a secret warning to CEOs and security leaders at 300 banks and legal firms that they were being attacked by “Chinese state organizations.” The letter was later leaked to the media.

— Late in the 2008 presidential campaign, FBI and Secret Service agents alerted the Obama and McCain camps that their computers had been hacked. The source of the attacks: hackers in China.

— Earlier that summer, in testimony before the House Armed Services Committee, James Shinn (assistant secretary of defense for Asian and Pacific security affairs at the time) and Maj. Gen. Philip Breedlove (of the Joint Chiefs of Staff) warned officials about China’s asymmetrical warfare capabilities.

Follow the Money

While many cyberattacks have been traced to sources with ties to China’s People’s Liberation Army, such attacks are not limited to government targets or to a single country. When there’s an economic interest, even countries friendly to the U.S. may deploy asymmetric warfare techniques to gain an advantage.

“Some  countries are friendly [toward the U.S.], but the fine line between using those departments for military or economic gain is getting thinner,” Patterson says. In other words, countries may use cyberattacks to further the interests of local companies competing for global contracts.

According to sources who requested anonymity, a large law firm in New York was recently informed by the FBI that it had been hacked. The intruders didn’t just steal passwords or account numbers. Rather, the thieves took every single document the firm had stored. Gaining such information could give competitors an advantage in bidding for contracts and allow them access to corporate intellectual property and secrets.

Finding the Source

Often, the criminals or spies are never found. One reason: victims don’t like to admit they are vulnerable.

“In spite of data breach laws, the general tendency of companies is to clam up,” Sandhu said. “So not every attack is reported, and for ones that are there’s little follow-up investigation.” He pointed out that Google still hasn’t provided many details about its case. He also said that a seemingly innocuous recent problem with AT&T network in which people were able to view personal (so-called secure) information on strangers’ Facebook pages could be a sign of a more serious cyberattack.

Even when companies are forthcoming, tracking the criminals can be difficult.

“Nobody attacks directly from their own computers anymore,” Sandhu said. Hackers typically invade computers in other countries and then launch incursions remotely. Consequently, the trail typically leads through several different countries.

“We do see activity from different places in Africa, but those computers are being used as relay stations,” says Amichai Shulman, the CTO of security firm Imperva. Shulman says asymmetric warfare techniques often exploit systems that may be less secure in other countries.

“Usually, these guys use an anonymizing [Web] service in another country, like Thailand or Russia,” says Jacques Erasmus of security firm Prevx. Such services explicitly hide users’ identities and are not subject to the laws of the United States. It’s a real problem, because it then requires international, cross-border collaboration that doesn’t really exist,” Erasmus says.

Stealth Concerns

The real danger, however, is from computer attacks that remain invisible. In scenarios that read like a cyber version of The Manchurian Candidate,computer experts say that current asymmetric warfare is focused on clandestine operations that plant the equivalent of a mole inside an organization’s computer network.

“So much worse things can happen,” Sandhu says. A program designed to disrupt a financial institution or government department can sit undetected and dormant within a network for a decade. Then, when a conflict or war breaks out, the virus is triggered, disrupting communications and destroying an organization’s infrastructure.

“We may call it espionage, but it’s really warfare,” Paller says. “They’re planting logic bombs.” He says much of what is being discussed now in classified national security briefings revolves around these sorts of stealth attacks. He declined to answer questions as to whether such secret programs had been detected in any major governmental or infrastructure networks, but he emphasized that a major vulnerability  is the nation’s power grid.

How to Win the Cyberwar

Taking counter measures against such cyber attacks is problematic. Microsoft issued an emergency patch for its Internet Explorer browser this week that it said addressed a vulnerability exploited in the Google hack. The previous week, Google beefed up its own Gmail security by automatically encrypting its e-mail sessions. The Electronic Frontier Foundation said the move was a “significant step to safeguard user’s privacy and security.”

But scientists, security experts, and researchers say this is no longer enough.

No matter what happens in the standoff, we haven’t heard the end of these attacks, say experts. “We’re going to see these types of attacks again and again in 2010,” says Michael Sutton, vice president of security research at Zscaler. All the experts agree that more needs to be done in both the public and private sectors to protect against future cyberattacks.

“One thing is you’ve got to presume that there is a persistent, hostile, insider embedded in your network,” says Sandhu. Such threats cannot always be eliminated, so organizations have to learn how to deal with such eventualities. Defense experts refer to this as “working to ensure the mission, not the network.”

“You have to start running your systems as if they are contested territory,” says Paller. “Don’t assume you can control who’s on your system.” He believes the only way to do this is to use highly skilled teams whose sole focus is looking for computer attacks and ferreting them out. Paller estimates that the U.S. is woefully understaffed in this area, with only about a tenth of the needed experts available to conduct such security work. Sandhu agrees: “Our infrastructure is very fragile right now.”

“But finally, with Howard Schmidt, the new National Cybersecurity Coordinator, Obama’s got the right guy,” says Patterson. Schmidt has an extensive background in computer security in both the public and private sector (he was once a security director at Microsoft). The question remains, however, if Schmidt or anyone at the federal level will be able to commit the necessary funds. Patterson, for one, remains optimistic.

“We may get some proactive leadership on this front,” he said.

Leave a Reply

Your email address will not be published. Required fields are marked *

universo-virtual.com

buytrendz.net

thisforall.net

benchpressgains.com

qthzb.com

mindhunter9.com

dwjqp1.com

secure-signup.net

ahaayy.com

soxtry.com

tressesindia.com

puresybian.com

krpano-chs.com

cre8workshop.com

hdkino.org

peixun021.com

qz786.com

utahperformingartscenter.org

maw-pr.com

zaaksen.com

ypxsptbfd7.com

worldqrmconference.com

shangyuwh.com

eejssdfsdfdfjsd.com

playminecraftfreeonline.com

trekvietnamtour.com

your-business-articles.com

essaywritingservice10.com

hindusamaaj.com

joggingvideo.com

wandercoups.com

onlinenewsofindia.com

worldgraphic-team.com

bnsrz.com

wormblaster.net

tongchengchuyange0004.com

internetknowing.com

breachurch.com

peachesnginburlesque.com

dataarchitectoo.com

clientfunnelformula.com

30pps.com

cherylroll.com

ks2252.com

webmanicura.com

osostore.com

softsmob.com

sofietsshotel.com

facetorch.com

nylawyerreview.com

apapromotions.com

shareparelli.com

goeaglepointe.com

thegreenmanpubphuket.com

karotorossian.com

publicsensor.com

taiwandefence.com

epcsur.com

odskc.com

inzziln.info

leaiiln.info

cq-oa.com

dqtianshun.com

southstills.com

tvtv98.com

thewellington-hotel.com

bccaipiao.com

colectoresindustrialesgs.com

shenanddcg.com

capriartfilmfestival.com

replicabreitlingsale.com

thaiamarinnewtoncorner.com

gkmcww.com

mbnkbj.com

andrewbrennandesign.com

cod54.com

luobinzhang.com

bartoysdirect.com

taquerialoscompadresdc.com

aaoodln.info

amcckln.info

drvrnln.info

dwabmln.info

fcsjoln.info

hlonxln.info

kcmeiln.info

kplrrln.info

fatcatoons.com

91guoys.com

signupforfreehosting.com

faithfirst.net

zjyc28.com

tongchengjinyeyouyue0004.com

nhuan6.com

oldgardensflowers.com

lightupthefloor.com

bahamamamas-stjohns.com

ly2818.com

905onthebay.com

fonemenu.com

notanothermovie.com

ukrainehighclassescort.com

meincmagazine.com

av-5858.com

yallerdawg.com

donkeythemovie.com

corporatehospitalitygroup.com

boboyy88.com

miteinander-lernen.com

dannayconsulting.com

officialtomsshoesoutletstore.com

forsale-amoxil-amoxicillin.net

generictadalafil-canada.net

guitarlessonseastlondon.com

lesliesrestaurants.com

mattyno9.com

nri-homeloans.com

rtgvisas-qatar.com

salbutamolventolinonline.net

sportsinjuries.info

topsedu.xyz

xmxm7.com

x332.xyz

sportstrainingblog.com

autopartspares.com

readguy.net

soniasegreto.com

bobbygdavis.com

wedsna.com

rgkntk.com

bkkmarketplace.com

zxqcwx.com

breakupprogram.com

boxcardc.com

unblockyoutubeindonesia.com

fabulousbookmark.com

beat-the.com

guatemala-sailfishing-vacations-charters.com

magie-marketing.com

kingstonliteracy.com

guitaraffinity.com

eurelookinggoodapparel.com

howtolosecheekfat.net

marioncma.org

oliviadavismusic.com

shantelcampbellrealestate.com

shopleborn13.com

topindiafree.com

v-visitors.net

qazwsxedcokmijn.com

parabis.net

terriesandelin.com

luxuryhomme.com

studyexpanse.com

ronoom.com

djjky.com

053hh.com

originbluei.com

baucishotel.com

33kkn.com

intrinsiqresearch.com

mariaescort-kiev.com

mymaguk.com

sponsored4u.com

crimsonclass.com

bataillenavale.com

searchtile.com

ze-stribrnych-struh.com

zenithalhype.com

modalpkv.com

bouisset-lafforgue.com

useupload.com

37r.net

autoankauf-muenster.com

bantinbongda.net

bilgius.com

brabustermagazine.com

indigrow.org

miicrosofts.net

mysmiletravel.com

selinasims.com

spellcubesapp.com

usa-faction.com

snn01.com

hope-kelley.com

bancodeprofissionais.com

zjccp99.com

liturgycreator.com

weedsmj.com

majorelenco.com

colcollect.com

androidnews-jp.com

hypoallergenicdogsnames.com

dailyupdatez.com

foodphotographyreviews.com

cricutcom-setup.com

chprowebdesign.com

katyrealty-kanepa.com

tasramar.com

bilgipinari.org

four-am.com

indiarepublicday.com

inquick-enbooks.com

iracmpi.com

kakaschoenen.com

lsm99flash.com

nana1255.com

ngen-niagara.com

technwzs.com

virtualonlinecasino1345.com

wallpapertop.net

nova-click.com

abeautifulcrazylife.com

diggmobile.com

denochemexicana.com

eventhalfkg.com

medcon-taiwan.com

life-himawari.com

myriamshomes.com

nightmarevue.com

allstarsru.com

bestofthebuckeyestate.com

bestofthefirststate.com

bestwireless7.com

declarationintermittent.com

findhereall.com

jingyou888.com

lsm99deal.com

lsm99galaxy.com

moozatech.com

nuagh.com

patliyo.com

philomenamagikz.net

rckouba.net

saturnunipessoallda.com

tallahasseefrolics.com

thematurehardcore.net

totalenvironment-inthatquietearth.com

velislavakaymakanova.com

vermontenergetic.com

sizam-design.com

kakakpintar.com

begorgeouslady.com

1800birks4u.com

2wheelstogo.com

6strip4you.com

bigdata-world.net

emailandco.net

gacapal.com

jharpost.com

krishnaastro.com

lsm99credit.com

mascalzonicampani.com

sitemapxml.org

thecityslums.net

topagh.com

flairnetwebdesign.com

bangkaeair.com

beneventocoupon.com

noternet.org

oqtive.com

smilebrightrx.com

decollage-etiquette.com

1millionbestdownloads.com

7658.info

bidbass.com

devlopworldtech.com

digitalmarketingrajkot.com

fluginfo.net

naqlafshk.com

passion-decouverte.com

playsirius.com

spacceleratorintl.com

stikyballs.com

top10way.com

yokidsyogurt.com

zszyhl.com

16firthcrescent.com

abogadolaboralistamd.com

apk2wap.com

aromacremeria.com

banparacard.com

bosmanraws.com

businessproviderblog.com

caltonosa.com

calvaryrevivalchurch.org

chastenedsoulwithabrokenheart.com

cheminotsgardcevennes.com

cooksspot.com

cqxzpt.com

deesywig.com

deltacartoonmaps.com

despixelsetdeshommes.com

duocoracaobrasileiro.com

fareshopbd.com

goodpainspills.com

kobisitecdn.com

makaigoods.com

mgs1454.com

piccadillyresidences.com

radiolaondafresca.com

rubendorf.com

searchengineimprov.com

sellmyhrvahome.com

shugahouseessentials.com

sonihullquad.com

subtractkilos.com

valeriekelmansky.com

vipasdigitalmarketing.com

voolivrerj.com

zeelonggroup.com

1015southrockhill.com

10x10b.com

111-online-casinos.com

191cb.com

3665arpentunitd.com

aitesonics.com

bag-shokunin.com

brightotech.com

communication-digitale-services.com

covoakland.org

dariaprimapack.com

freefortniteaccountss.com

gatebizglobal.com

global1entertainmentnews.com

greatytene.com

hiroshiwakita.com

iktodaypk.com

jahatsakong.com

meadowbrookgolfgroup.com

newsbharati.net

platinumstudiosdesign.com

slotxogamesplay.com

strikestaruk.com

trucosdefortnite.com

ufabetrune.com

weddedtowhitmore.com

12940brycecanyonunitb.com

1311dietrichoaks.com

2monarchtraceunit303.com

601legendhill.com

850elaine.com

adieusolasomade.com

andora-ke.com

bestslotxogames.com

cannagomcallen.com

endlesslyhot.com

iestpjva.com

ouqprint.com

pwmaplefest.com

qtylmr.com

rb88betting.com

buscadogues.com

1007macfm.com

born-wild.com

growthinvests.com

promocode-casino.com

proyectogalgoargentina.com

wbthompson-art.com

whitemountainwheels.com

7thavehvl.com

developmethis.com

funkydogbowties.com

travelodgegrandjunction.com

gao-town.com

globalmarketsuite.com

blogshippo.com

hdbka.com

proboards67.com

outletonline-michaelkors.com

kalkis-research.com

thuthuatit.net

buckcash.com

hollistercanada.com

docterror.com

asadart.com

vmayke.org

erwincomputers.com

dirimart.org

okkii.com

loteriasdecehegin.com

mountanalog.com

healingtaobritain.com

ttxmonitor.com

bamthemes.com

nwordpress.com

11bolabonanza.com

avgo.top