|
本帖最后由 vivicat 于 2009-10-28 12:42 编辑
China is becoming known for its global cyber espionage efforts. Indiabelieves that China's Cyber Warfare Doctrine is designed to achieveglobal "electronic dominance" by 2050. It believes that China’scapability would have the capability to disrupt the informationinfrastructure of China’s enemies. This doctrine includes strategiesthat would disrupt financial markets, military and civiliancommunications capabilities and other parts of an enemy's criticalinfrastructure prior to the initiation of traditional militaryoperations.
Recent attacks have resulted in deep access to resources and systemarchitectures. Most of the data that is reported to have been stolenhas been defense- and policy-related, suggesting a state actor, thereport says. The network intrusions are thought to be part of a broader"information warfare" strategy that China has been developing for thepast 10 years.
A new report released this week by The U.S.-China Economic and SecurityReview Commission noted that China’s cyber espionage operations in theUnited States are now targeting private companies. A time line in thereport also shows a series of previous attacks from within China onU.S. government computers, including those belonging to the Departmentof State, White House, NASA, and Department of Defense agencies. Thereport entitled "Capability of the People's Republic of China toConduct Cyber Warfare and Computer Network Exploitation," states that:"Technical assessments of operational tradecraft observed in intrusionsattributed to China are the result of extensive forensic analysis anddiscussions with information security professionals who follow theseissues closely."
The report further highlights an attack that was believed to beChina-based, where two groups of hackers worked in tandem on asophisticated operation to steal data from an unspecified "large" U.S.company. One group worked to crack the security systems while anothermoved specific files onto severs. The report goes on to note that: "Theproblem is characterized by disciplined, standardized operations,sophisticated techniques, access to high-end software developmentresources, a deep knowledge of the targeted networks, and an ability tosustain activities inside targeted networks, sometimes over a period ofmonths,"
The hackers stole specific files, for which they had gained filepermissions. However, they didn't open the files before downloadingthem, which suggests that they knew what they were looking for."Analysis of the operation suggests that the adversaries previouslyidentified specific directories, file shares, servers, user accounts,employee full names, password policies, and group memberships on thenetwork, likely during their detailed reconnaissance phase," the reportsays.
The Chinese Foreign Ministry responded that: “The commission has alwaysplayed up 'China threat,” "It has arisen out of a 'Cold War mindset’.The commission should stop releasing such kind of reports and insteaddo something that will benefit the China-U.S. relations."
These recent attacks have brought the cyber threat to the attention ofmany countries. Diplomatic efforts to address these attacks have seenno progress.
In June Defense Secretary Gates today approved the creation of aunified U.S. Cyber Command to oversee the protection of militarynetworks against cyber threats. Gates directed the commander of theU.S. Strategic Command to develop implementation plans for CYBERCOM, asthe new unified command will be called.
What do you think about the Chinese cyber threat? Is this an act of war?
地址:http://www.examiner.com/x-17537- ... yber-war-with-China |
China, cyber, EXAMINER, war, China, cyber, EXAMINER, war, China, cyber, EXAMINER, war
|