Page 1 of 2 12 LastLast
Results 1 to 20 of 28

Thread: China Attacks, No One Notices

Hybrid View

Previous Post Previous Post   Next Post Next Post
  1. #1

    Default China Attacks, No One Notices

    Hello all.

    Before I begin, let me in introduce what the title means. For a long time, people within some circles have witnessed these attacks. They're not your typical military attack; instead it's something that with the growth of technology brought with it. And in my unholy position as a civilian in the US does not give me a great deal of details of these new attacks, nor am I able (as a History and International Relations student) able to really chronicle and present it in this place as anything special special besides your plain article from the internet. Another site that I frequent, which is a depository of military images from around the world, was subject to attacks where the runner of the site tracked down to a province in China and it has a reached a point where he has to block off most access from China. Anyhow, on with the show; the site has decidely pro-American, pro-Western slant, and the article on touches on the surface of what's really happening today. Anyhow, hopefully this topic generates some meaningful response.

    January 23, 2006: There’s a Cyber War going on between China and the rest of the world. The problem is, there’s enough proof to know that China is behind an increasing number of Internet based attacks, but not enough to call China out on it. It began about five years ago, with an increasing number of very well executed Internet attacks that appeared to be coming from China. At first, it was thought to be adventurous computer science students, or criminals out to steal something they could sell. Then, in 2003, came the “Titan Rain” incident. This was a massive and well organized attack on American military networks. The people carrying out the attack really knew what they were doing, and thousands of military and industrial documents were sent back to China. The attackers were not able to cover their trail completely, and some of the attackers were traced back to a Chinese government facility in southern China. The Chinese government denied all, and the vast amounts of technical data American researchers had as proof was not considered compelling enough for the event to be turned into a major media or diplomatic event.



    In the wake of Titan Rain, governments around the world began to improve their Internet security. But not enough. The attacks kept coming. Out of China. And the attackers were getting better. In 2005, a well organized attack was made on the networks of the British parliament. This time, the defense won the round. Mostly. The carefully prepared emails (with virus attached), would have fooled many recipients, because they were personalized, but not the network defenses detected the true nature of these messages.



    But many other attacks are only discovered when they are over, or nearly so. The attackers are very well prepared, and usually first make probes and trial run attacks on target systems. When the attackers come in force, they don’t want to be interrupted. And usually they aren’t. The Chinese attackers use techniques similar to those employed by criminal gangs trying to get into banks, brokerages and big businesses in general. Thus it is believed that the Chinese hackers try, as much as possible, to appear like just another gang of cyber criminals. But the Chinese have certain traits that appear more military than gangster.



    The Chinese cyber army keeps getting better, and that includes covering their tracks. It may take a defector or three to make it definite that China is waging a stealthy war over the Internet. Meanwhile, the Chinese reap enormous economic benefits from their raids on economic and technical secrets in the West.
    Source: http://www.strategypage.com/htmw/hte.../20060123.aspx

  2. #2
    Semisalis
    Join Date
    Mar 2005
    Location
    Dominican Republic
    Posts
    445

    Default

    Sounds rather interesting...........


    Is there any documentable proof of these attacks that you could show us, this sounds pretty interesting.
    In ethical theory, I should care. I know that I should care. However, emotionally, to be perfectly honest, I don't give a damn.
    --Darth Wong

  3. #3
    GeneralLee's Avatar Senator
    Join Date
    Dec 2005
    Location
    Kentucky
    Posts
    1,063

    Default

    Find some twelve year olds to sick on 'em and call it even.
    [SIGPIC][/SIGPIC]
    Tickity tickity tank.

    Political profile

  4. #4
    Arcarius's Avatar I Am Fable
    Join Date
    Aug 2005
    Location
    Sun Peaks British Columbia
    Posts
    601

    Default

    In the aritcle its says they are like crimnals who try to get into a bank system, well if they were like that wouldn't it mean that it would be easy to beat them back, unless these crimianls are masterminds.
    Formerly Heilige Legioen, and the original Fable

  5. #5

    Default

    what's new? I'm pretty sure every country is doing the same, it's just that china has to work on erasing it's tracks lol
    Quote Originally Posted by Honor&Glory inspired by Archer
    How much will I pay to sit in front of a TV and chase polygons?

  6. #6
    Arcarius's Avatar I Am Fable
    Join Date
    Aug 2005
    Location
    Sun Peaks British Columbia
    Posts
    601

    Default

    Quote Originally Posted by Gogoas
    what's new? I'm pretty sure every country is doing the same, it's just that china has to work on erasing it's tracks lol
    excatly, they do need to work on earseing tracks, look at U.S and that spying on people because they were looking for terrorist.
    Formerly Heilige Legioen, and the original Fable

  7. #7

    Default

    Somehow not the same as when a burgeoning superpower with an economy that really doesn't reflect its leadership is doing it....

    Somehow, that seems rather suspicious. But of course that's if this is true. Most likely it is, but a much much smaller scale.
    But mark me well; Religion is my name;
    An angel once: but now a fury grown,
    Too often talked of, but too little known.

    -Jonathan Swift

    "There's only a few things I'd actually kill for: revenge, jewelry, Father O'Malley's weedwacker..."
    -Bender (Futurama) awesome

    Universal truth is not measured in mass appeal.
    -Immortal Technique

  8. #8
    vizi's Avatar Vicarius Provinciae
    Join Date
    Dec 2005
    Location
    Misery's the River of the World
    Posts
    11,337

    Default

    Someday they will give a war and no one will come.

  9. #9

    Default

    Well, who the hell told those fools to keep confidential data in networks which are connected to Internet...


    Everyone is warhero, genius and millionaire in Internet, so don't be surprised that I'm not impressed.

  10. #10

    Default

    Hahah, these kinds of articles are always a hoot to read, whether you agree or not.

    Now get rid of the 'fluff,' the rhetoric that's dripping off every syllable, and you'll see this article for what it is. Empty. If this was to legitimize an actual battlefield people aren't aware of, it could do much better in its presentation (well, presentation was good, but it's argument is lacking).

    The first incident lacks any real documentation, and can only be seen logically from a skeptical point of view. Without proper evidenc and source referencing, opinions will fall under both paranoid or disbelief. The first incident is good in that it sets up an ominous situation, but the evidence for it seems a little weak.

    After the first incident, the argument starts to fall through. The next 'battle' focuses on a successful defense of a cyber-hack attack, but the only evidence to link it to the first attack is that the method is similar to the Chinese method (this also lacks any real information to say so. What does it mean to hack like the Chinese? It's a country, not a serial killer with an M.O.).

    The author puts out a thoughtful arguement to a serious problem, yes, but I wouldn't want him with me in a straight debate on the matter (maybe relegate him to making public speeches to summarize findings).

    China's waging a tech war as much as the U.S. and every other nation and single power is. It's nothing special. If the U.S. can't stay on track with its security, it shouldn't really complain so much if the Chinese or another nation get our secrets.

    This isn't a real war, it's tactical espionage and exploitation of security weaknesses. If we'd like, we could escalate this into a full out internet war (what a novel idea. Turning the net into some crazy battlefield).

  11. #11
    Civitate
    Join Date
    Mar 2005
    Location
    Australia
    Posts
    1,965

    Default

    Im sure every other country is doing the same thing, the only difference is that China has nothing of value for the US to steal.
    "In bourgeois society capital is independent and has individuality, while the living person is dependent and has no individuality." - Karl Marx on Capitalism
    Under the patronage of the venerable Marshal Qin. Proud member of the house of Sybian.

    Proud member of the Australian-New Zealand Beer Appreciation Society (ANZBAS)

  12. #12

    Default

    Quote Originally Posted by Guderian
    Im sure every other country is doing the same thing, the only difference is that China has nothing of value for the US to steal.
    You forget those delicious chinese recipees...

  13. #13

    Default

    Quote Originally Posted by Hellenic Hoplite
    You forget those delicious chinese recipees...
    General Tso will send a million men to their deaths before giving up his chicken recipe!!!

  14. #14
    sephodwyrm's Avatar Praefectus
    Join Date
    Jun 2005
    Location
    Taiwan
    Posts
    6,757

    Default

    Isn't the internet some form of a battlefield already? Comeon guys, we have Rome Total War multiplayer battles.

    And I agree with Guderian. From my POV, technologies should not be hoarded.
    Older guy on TWC.
    Done with National Service. NOT patriotic. MORE realist. Just gimme cash.
    Dishing out cheap shots since 2006.

  15. #15
    Darth Wong's Avatar Pit Bull
    Join Date
    Nov 2005
    Location
    Toronto, Ontario
    Posts
    4,020

    Default

    If American military networks carrying sensitive data can actually be reached from the Internet, shouldn't someone do something about that, instead of worrying about who might be trying to use that vulnerability?

    Yes, I have a life outside the Internet and Rome Total War
    "Oedipus ruined a great sex life by asking too many questions" - Stephen Colbert
    Under the kind patronage of Seleukos

  16. #16

    Default

    I care slightly less about this than I would someone from this forum launching a cyber attack.

  17. #17

    Default

    I agree with what many people are saying in this thread as well. It's a vulnerability that's been attacked and that is something to be expected in the international scene.

    I'm not saying that China's the next Satan in the world, or any other country is beneath's China's other closed handed actions, but my purpose of posting this was to lead to the discussion of China's international ambitions, and whether their pursuits of interests will in the future, be violent or non-violent. These cyber attacks are just one aspect of what's been done by the PRC, among many other ones.

  18. #18

    Default

    Actually China has been known to of infiltrated many US military contractors, that is far more of a problem than net hackers that want to DDOS attack the Microsoft site.
    Swear filters are for sites run by immature children.

  19. #19

    Default

    perhaps these hacker have already infiltrated twcenter *panics and jumps out window*

  20. #20

    Default

    Quote Originally Posted by Kanaric
    Actually China has been known to of infiltrated many US military contractors, that is far more of a problem than net hackers that want to DDOS attack the Microsoft site.
    Heck, they don't need to hack us to get vital national secrets. They can just make political contributions to presidential campaigns and some administrations will give them all the information they want.

    Another brilliant Clinton legacy.

    I agree with the sentiment already on this thread, though. Yes, the Chinese have nefarious intentions and yes we should be smart enough to know this and have already worked to protect against it.
    Faithfully under the patronage of the fallen yet rather amiable Octavian.

    Smile! The better the energy you put in, the better the energy you will get out.

Page 1 of 2 12 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •