Generational Dynamics: Forecasting America's Destiny Generational
Dynamics
 Forecasting America's Destiny ... and the World's

 |  HOME  |  WEB LOG  |  COUNTRY STUDIES  |  COMMENT  |  FORUM  | 
 |  DOWNLOADS  |  FOURTH TURNING ARCHIVE  |  ABOUT  | 

Generational Dynamics Web Log for 21-Dec-2018
21-Dec-18 World View -- China hackers collect data on hundreds of millions of Americans and Westerners

Web Log - December, 2018

21-Dec-18 World View -- China hackers collect data on hundreds of millions of Americans and Westerners

Steve Bannon: Chinese engineers working on American weapons systems

by John J. Xenakis

This morning's key headlines from GenerationalDynamics.com

China hackers collect data on hundreds of millions of Americans and Westerners


Poster showing Chinese hackers displayed at Justice Dept. press conference on Thursday
Poster showing Chinese hackers displayed at Justice Dept. press conference on Thursday

The Dept. of Justice on Thursday accused China of a massive international hacking scheme that penetrated commercial and military systems in at least 12 countries, including Brazil, Canada, Finland, France, Germany, India, Japan, Sweden, Switzerland, the United Arab Emirates, the United Kingdom, and the United States.

An indictment charged two Chinese nationals, Zhu Hua and Zhang Shilong, with conspiracy to commit computer intrusions, conspiracy to commit wire fraud, and aggravated identity theft.

According to the indictment:

"Over the course of the Technology Theft Campaign, which began in or about 2006, Zhu, Zhang, and their coconspirators in the APT10 Group successfully obtained unauthorized access to the computers of more than 45 technology companies and U.S. Government agencies based in at least 12 states, including Arizona, California, Connecticut, Florida, Maryland, New York, Ohio, Pennsylvania, Texas, Utah, Virginia and Wisconsin. The APT10 Group stole hundreds of gigabytes of sensitive data and information from the victims’ computer systems, including from at least the following victims: seven companies involved in aviation, space and/or satellite technology; three companies involved in communications technology; three companies involved in manufacturing advanced electronic systems and/or laboratory analytical instruments; a company involved in maritime technology; a company involved in oil and gas drilling, production, and processing; and the NASA Goddard Space Center and Jet Propulsion Laboratory. In addition to those victims who had information stolen, Zhu, Zhang, and their co-conspirators successfully obtained unauthorized access to computers belonging to more than 25 other technology-related companies involved in, among other things, industrial factory automation, radar technology, oil exploration, information technology services, pharmaceutical manufacturing, and computer processor technology, as well as the U.S. Department of Energy’s Lawrence Berkeley National Laboratory.

Finally, the APT10 Group compromised more than 40 computers in order to steal sensitive data belonging to the Navy, including the names, Social Security numbers, dates of birth, salary information, personal phone numbers, and email addresses of more than 100,000 Navy personnel."

Most of the news coverage has focused on the theft of commercial and military technology, and how that will be used by China's state-run companies and military. These technologies will be useful to the Chinese as they build weapons systems and prepare to launch a war on the United States.

But for this article, I want to focus on the theft of personal data on Americans (and citizens of other Western countries).

This indictment says that a hack of navy computers stole names, Social Security numbers, dates of birth, salary information, personal phone numbers, and email addresses of more than 100,000 Navy personnel.

I recently described the Marriott hotel data breach by China's spy agency, the Ministry of State Security (MSS) which stole names, addresses, telephone numbers, credit card numbers, passport numbers, birthdates, passport photos, hotel arrival and departure dates, and information on where people traveled and with whom on roughly 500 million guests.

Other data breaches attributed to China's MSS include a 2017 Equifax hack that collected detailed credit information on 145 million people, a 2013 Target breach that exposed payment card and contact information for 60 million customers, and a 2015 hack of the Office of Personnel Management (OPM) that collected detailed personal information on more than 20 million government employees, family members and applicants. There were other breaches of health-care institutions, including Anthem and CareFirst, that provided health data.

China's military is creating a huge database of hundreds of millions of Americans. Such a database would be illegal in the United States, but it's being done by the Chinese. Dept of Justice and Dept of Justice and UK government and CNBC

China cracks down on Twitter

China's government has complete control over databases and servers in China, and can delete messages at will on Chinese social media platforms. But social media platforms outside of China, such as Twitter and Facebook, should be out of reach of the Chinese, right? In fact, since Twitter and Facebook are blocked in China, and only a person with sophisticated software skills can get to them from China, the Chinese can simply ignore then, right?

Starting in early November, China's government launched a large campaign to remove from Twitter tweets that the government finds offensive. Many of these tweets were written years ago. Apparently this was done very rapidly, in order to maintain the element of surprise before Twitter users had a chance to arrange for all their tweets to be safely backed up.

If the owner of the Twitter account is in China, the government security thugs simply arrested him, brought him into a police station, and demanded that he access his Twitter account immediately and delete all his tweets. This apparently happened to quite a few people.

In many cases, however, the Chinese government was able to delete tweets from an account without the participation of the account owner, or knowing his password. The methods by which they did this are a sketchy in the reports, but I believe the following is how they accomplished it.

In most online systems, you can change or reset your password automatically, and then the system sends you an e-mail message where you have to click on something to confirm the change. Only the owner of that e-mail account should have access to it, so that should provide a secure means of confirmation.

However, if your e-mail account is in China, then the Chinese government can gain control of it, and then make the password change on the Twitter account, and confirm it on the e-mail account, without you even knowing.

However, many online services go further and also use the telephone. Instead of (or in addition to) sending you an e-mail message. the online service will ring your telephone, using a phone number for you that it has on file, and then the recorded voice says, "press 1 to confirm or 2 to cancel," or something like that.

In America, that should be secure means of confirmation, since only you can answer that phone number. But if it's a Chinese phone number then, as in the case of e-mail, the military can take control of your phone number and then use it to confirm a password change.

There's one more method that China's military could be using. If you have Chinese-manufactured phone from Huawei or ZTE, it's believed that these phones have back doors that the Chinese military can use to access data, or even to control the phone. This would provide another method for confirming a password change.

The point is that China's military is willing to use any means it can to steal information, and they're willing to try everything, no matter how obscure, until something works. That's why they already have a database containing personal information of hundreds of millions of Americans.

Last week, I received a letter from Bowker Corp. saying that their database had been hacked, and my data might have been compromised. There are companies being hacked successfully every day, sometimes by kids in basements, sometimes by the Russians, and sometimes by the Chinese.

The Chinese in particular are using every technique available to them to get as much data on ordinary Americans as they can, and merge it into a database that they can access at any time they want to track someone. Human Rights Watch and Radio Free Asia and Hong Kong Free Press and China Change

China extends its 'social credit score' system to Americans and Westerners

There has been a lot of news recently about China's "Social Credit Score" system that has been rumored for a long time and was officially announced in December. China is creating a large "big data" database of all of its 1.3 billion people, accumulating data from a variety of departments and agencies, combining the data in individual data agency databases into a large database, and using it to crease a credit score for every Chinese citizen.

The system will reward "pro-social behaviors," such as volunteer work and blood donations. The system will penalize things like violating traffic laws or charging under-the-table fees. Agencies like tourism bodies, business regulators and transit authorities are supposed to work together. These agencies will provide data on private citizens to the central system, and will then use the credit score to reward or punish citizens. In fact, the system is already partially in place, in that people with unacceptable credit scores have already been blocked from booking more than 11 million flights and 4 million high-speed train trips. According to reports, other punishments include slower internet speeds, reducing access to good schools for individuals or their children, banning people from certain jobs, preventing booking at certain hotels and losing the right to own pets.

Many Americans and Westerners view this system with little more than curiosity, thinking that applies only to Chinese citizens in China, so it doesn't matter to them.

Starting with Thursday's indictments against Chinese hackers, it's becoming increasingly clear that the Chinese military is going a lot farther, and creating databases of hundreds of millions of people in other countries, whether American, or others. Of course, the data on foreign citizens is not readily available to the military in the way that domestic data is, but the Chinese are employing increasingly sophisticated methods to collect this data on foreign citizens, whether hacking Western commercial or government databases, or using its vast population studying and working overseas to collect data and information and pass it back to China. Bloomberg and Xinhua and Independent (London) and Life Site News

Steve Bannon: Chinese engineers working on American weapons systems

China has a massive population of 1.3 billion people and, as I've written several times in the past, China considers these people to be "magic weapons" to be used in other countries to infiltrate government, military and commercial organizations, and to influence these organizations as well as to collect information about them to be sent back to China's military.

Steve Bannon, formerly the chief strategist and advisor to president Donal Trump, has researched the extent that Chinese engineers are working on American weapons systems.

According to Bannon, many Chinese workers start out as students in American colleges, through Confucius Institutes, controlled by the Chinese Communist Party (CCP) through Beijing's international coercive propaganda agency, the United Front Work Department (UFWD), and funded by China's military. Every aspect of the Confucian Institutes is tightly controlled by the CCP. Teachers and teaching materials are all supplied by China. Taiwan and Tibet are portrayed as undisputed territories of China, with no alternate views permitted. The 1989 Tiananmen Square massacre, the one million Uighurs in re-education camps, the human rights abuses in China are all forbidden subjects.

Bannon says that Chinese students study in colleges to get access to the latest scientific research to be passed back to the CCP. These students become contractors to get access to the latest American weapons systems, once again for the CCP. According to Bannon, Defense Department reports on the infiltration of China into our research universities and our weapons labs shows extensive infiltration:

"I don't think people understand these reports. These reports are essentially declassified reports that showed that the 300,000 students are here on student visas and the 10,000 contractors that we have the weapons labs -- I think that up to 2/3 of them could be intelligence assets, intelligence officers or agents.

This is political correctness and greed and avarice writ large. How did contractors-- and let's call them out-- Booz Allen and all these contractors-- how do these contractors and these big government programs get so many Chinese nationals working into our weapons labs? Our weapons labs are at the cutting edge of national security. How did it happen? ...

The political correctness of it all-- the Financial Times of London leaked the other day that my colleague, Stephen Miller, who's a terrific young man, actually had the plan in place to get all 300,000 Chinese students out of the country with a way to cut the visas off right away. Not that we we're going to execute on it, but it was even in thinking.

And obviously, it got leaked. In the Times, it goes around the State Department, et cetera. Look at all the appeasers. I am so glad. I take great pride that someone like Susan Thornton now owns a farm up in Maine because she was part of this kind of rational accommodationist, this softness in the Defense Department, in the State Department, in our intelligence services that basically went along with what China wanted to do and looked the other way."

A book titled "Silent Invasion: How China Is Turning Australia into a Puppet State," written by Clive Hamilton, documents the extent to which Chinese nationals have infiltrated Australia's government, and influences its policies. Several publishers withdrew offers to publish the book because of pressure from the Chinese Communist Party. As one Australian commenter pointed out, he could walk into any bookstore or library in Australia and find a dozen books that accused the CIA of controlling Australia's government and institutions, and no one would care. However, just one book about China caused a furious, threatening response from China. ( "26-Feb-18 World View -- New book documents extensive Chinese infiltration into Australia's organizations")

The book was finally published in February, thanks to pressure from alarmed members of the Australian parliament's national security committee. His research revealed evidence of CCP influence and infiltration in politics, culture, real estate, agriculture, universities, unions, and even primary schools. The book lists more than 40 former and sitting Australian politicians allegedly doing the work of China's totalitarian Government, if sometimes unwittingly.

Another book documented similar infiltration into New Zealand's government. ( "16-Feb-18 World View -- Concerns grow over China's covert infiltration into New Zealand's government")

There are some changes in the works. Some colleges have severed relations with Confucius Institutes, and the 2019 National Defense Authorization Act, signed in August, contains provisions barring any U.S. university from using Pentagon resources for any program involving Confucius Institutes. In many cases, this will force universities to choose between receiving funding the Pentagon and funding from China's military.

The information provided by China's "magic weapons," the Chinese nationals working and studing in the West, can provide a great deal more information to add to the data collected by hacks of hotel databases and other sources. ZeroHedge and RealVision

Related Articles:

Huawei chairman challenges US to prove they're a security risk

Several countries, including the United States, Britain, Canada, Australia, New Zealand, and Japan have banned or are considering banning routers and other equipment from Huawei Technologies Ltd., the world's largest global maker of network gear, because it's feared that these products contain "back doors" that allow them to be secretly accessed and controlled from China. The result is that Huawei is being shut out of supplying products for the latest 5G networks.

As I've said in the past, I've spent a part of my career as a senior software engineer developing chip-level operating system software for embedded systems, so I know exactly how any chip or any electronic device can be turned into a tool for espionage. Furthermore, I can tell you that not only is it doable, it's not even particularly difficult for someone with the right skills.

Now Ken Hu, the chairman of Huawei, is challenging America and other companies to provide evidence that Huawei products are in fact security risks. He complains that the accusations stem from “ideology and geopolitics.” He warned that excluding Huawei from fifth-generation networks in Australia and other markets would hurt consumers by raising prices and slowing innovation.

According to Hu:

"There has never been any evidence that our equipment poses a security threat. ...We have never accepted complaints from any government to damage the networks or business of any of our customers."

The problem is that Huawei could develop a chipset that works exactly as described in the public specifications. The chipset could be subjected to thousands of tests, and they would all work perfectly. But what Huawei could do is install a "backdoor" into the chipset. When the chip receives, say, a secret 1024-bit code, then it will execute commands sent to it by Chinese engineers. Thus, the Chinese are then in control of any devices with Huawei chips, and it cannot be detected until it's too late.

Now, as everyone knows, I'm a very helpful kind of guy, and I want to be helpful to Chairman Hu, and tell him how he can regain the confidence of the West that his chips and devices do not contain back doors. And I offer this advice in the spirit of peace, cooperation and friendship between America and China.

Hu has the burden of proof backwards. He's asking America to prove there's a security risk. Actually, the burden is on him to do the opposite -- prove affirmatively that there's no security risk. How does he do that? Here's how:

This will permit Ken Hu to prove that Huawei's products pose no security risks, and he can then ask that the bans to their use can be lifted.

I hope that Ken Hu will implement these suggestions, which have been offered in the spirit of peace, cooperation and friendship between the American and Chinese people, and because I would like to help him get the Huawei ban lifted. AP

Related Articles:

(Comments: For reader comments, questions and discussion, see the 21-Dec-18 World View -- China hackers collect data on hundreds of millions of Americans and Westerners thread of the Generational Dynamics forum. Comments may be posted anonymously.) (21-Dec-2018) Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal

Web Log Pages

Current Web Log

Web Log Summary - 2019
Web Log Summary - 2018
Web Log Summary - 2017
Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004

Web Log - December, 2019
Web Log - November, 2019
Web Log - October, 2019
Web Log - September, 2019
Web Log - August, 2019
Web Log - July, 2019
Web Log - June, 2019
Web Log - May, 2019
Web Log - April, 2019
Web Log - March, 2019
Web Log - February, 2019
Web Log - January, 2019
Web Log - December, 2018
Web Log - November, 2018
Web Log - October, 2018
Web Log - September, 2018
Web Log - August, 2018
Web Log - July, 2018
Web Log - June, 2018
Web Log - May, 2018
Web Log - April, 2018
Web Log - March, 2018
Web Log - February, 2018
Web Log - January, 2018
Web Log - December, 2017
Web Log - November, 2017
Web Log - October, 2017
Web Log - September, 2017
Web Log - August, 2017
Web Log - July, 2017
Web Log - June, 2017
Web Log - May, 2017
Web Log - April, 2017
Web Log - March, 2017
Web Log - February, 2017
Web Log - January, 2017
Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004


Copyright © 2002-2018 by John J. Xenakis.