Generational Dynamics: Forecasting America's Destiny Generational
Dynamics
 Forecasting America's Destiny ... and the World's

 |  HOME  |  WEB LOG  |  COUNTRY WIKI  |  COMMENT  |  FORUM  |  DOWNLOADS  |  ABOUT  | 

Generational Dynamics Web Log for 20-Feb-2013
20-Feb-13 World View -- New report reveals massive cyber war attack by China's army

Web Log - February, 2013

20-Feb-13 World View -- New report reveals massive cyber war attack by China's army

China rejects Philippines arbitration application

This morning's key headlines from GenerationalDynamics.com

New report reveals massive cyber war attack by China's army


The building in Shanghai housing People's Liberation Army Unit 61398
The building in Shanghai housing People's Liberation Army Unit 61398

Mandiant, an American computer security company, has issued a lengthy report that shows, beyond a reasonable doubt, that China's People's Liberation Army (PLA) is directing its "Unit 61398" to conduct a stealth world wide cyber war, particularly targeting American government and corporate organizations. Unit 61398 has possibly thousands of people, specializing in hacking into American and Canadian networks. It works in a Shanghai building guarded by PLA soldiers. Mandiant refers to the unit as APT1, and according to the report:

"Our evidence indicates that APT1 has been stealing hundreds of terabytes of data from at least 141 organizations across a diverse set of industries beginning as early as 2006. Remarkably, we have witnessed APT1 target dozens of organizations simultaneously. Once the group establishes access to a victim’s network, they continue to access it periodically over several months or years to steal large volumes of valuable intellectual property, including technology blueprints, proprietary manufacturing processes, test results, business plans, pricing documents, partnership agreements, emails and contact lists from victim organizations’ leadership. We believe that the extensive activity we have directly observed represents only a small fraction of the cyber espionage that APT1 has committed. ... Since 2006 we have seen APT1 relentlessly expand its access to new victims."

Once APT1 gains control of someone's network, it retains control in stealth mode and downloads all the data in the network. In one case, APT1 accessed a network for four years and ten months. In another case, APT1 downloaded 6.5 terabytes of information in ten months. According to the report:

"Our research and observations indicate that the Communist Party of China is tasking the Chinese People’s Liberation Army to commit systematic cyber espionage and data theft against organizations around the world."

There have been dozens of publicly known Chinese hacker attacks on American companies, including recent ones on the New York Times and the Wall Street Journal, and probably tens of thousands more that are unknown or haven't been publicized. Whenever one is made public, the Chinese angrily deny it, and demand proof. Thanks to the Mandiant report, we now have proof.

The White House has responded by threatening to "strike back" through fines, penalties and other trade restrications, but this appears to be a fantasy to me. Telegraph (London) and AP and Mandiant

China continues war preparations

It's worth taking a moment to review previous statements and actions by China, as it prepares for war:

Now we have the Mandiant report that proves that China has been conducting cyber warfare against the United States for years.

Revisiting Huawei and ZTE

Last year, House Intelligence Committee warned American companies against doing business with Chinese companies Huawei (pronounced WAH way) and ZTE. (See "14-Oct-12 World View -- Huawei scandal exposes potential 'Cyberwar Pearl Harbor' from China") The reason is computer chips supplied by these vendors appear likely to contain "back door" capabilities that would permit the Chinese to take control of any computer or router in which their chips were installed.

Since then, I've seen a number of young people ridicule these concerns. One British politician said that all these chips have been thoroughly tested, and so a "back door" is impossible. Some Chinese officials have sworn that there are no back doors. So I'd like to respond to these comments.

In the past, I've developed software for embedded systems down to the bare hardware level. At that level, you're dealing with chips that are completely opaque, except for a set of specifications that say, "If you send the chip the command 'x', then it will do 'y'". So anyone who tests the chip will simply verify that it works correctly according to the specifications. You have no visibility into how the chip executes that command. In particular, if "x" is some 512-bit code, known only to the chip designers, that makes the chip do something that's not in the specifications, then no test can determine that fact. Those codes would be known only to the chip designers, and not to even other Chinese workers and managers working on related projects that use the chips. So if the PLA ordered a chip maker to add a backdoor to a chip, it could not be found by testing, and no one else would know about it.

Now, since the PLA COULD have done this, we can conclude that they MUST have done this, because they're preparing for war in every other way, and would not give up the opportunity to prepare for war in this way.

Huawei and ZTE are among the biggest chip producers in the world, with large shares of the market in almost every country. There's a good chance that your computer has one of these chips, and that my computer has one of these chips. The same is true of utilities and manufacturing organizations around the world.

China rejects Philippines arbitration application

Earlier this year, the Philippines applied to the United Nations International Tribunal on the Law of the Sea (ITLOS) to settle the dispute over the Scarborough Shoal, a Philippines island that China is claiming. (See "24-Jan-13 World View -- Furious Chinese spokesman blasts Philippines for seeking arbitration")

On Tuesday, China officially rejected arbitration:

"Chinese Ambassador to the Philippines Ma Keqing had an appointment with officials from the Philippines' Foreign Ministry on Tuesday and returned a note and related notice after expressing China's rejection. The note and related notice not only violate the consensus enshrined in the Declaration on the Conduct of Parties in the South China Sea, but are also factually flawed and contain false accusations."

The Philippines Department of Foreign Affairs responded as follows:

"This excessive claim is the core issue of the Philippines’ arbitration case against China. The Department stresses that China’s action will not interfere with the process of Arbitration initiated by the Philippines on 22 January 2013. The Arbitration will proceed under Annex VII of UNCLOS and the 5-member arbitration panel will be formed with or without China."

Xinhua and Mindanao Examiner

(Comments: For reader comments, questions and discussion, see the 20-Feb-13 World View -- New report reveals massive cyber war attack by China's army thread of the Generational Dynamics forum. Comments may be posted anonymously.) (20-Feb-2013) Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal

Web Log Pages

Current Web Log

Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004

Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004


Copyright © 2002-2016 by John J. Xenakis.