Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

turbinetree

(24,745 posts)
Sun Jun 24, 2018, 11:34 PM Jun 2018

New fears over Chinese espionage grip Washington

Source: The Hill

BY MORGAN CHALFANT - 06/24/18 05:37 PM EDT

Fresh concerns over Chinese espionage are gripping Washington as lawmakers fear Beijing is gaining sensitive details on U.S. technologies.

Lawmakers are scrutinizing the Pentagon over its efforts to keep military secrets safe from hackers, after Chinese actors allegedly breached a Navy contractor’s computer and collected data on submarine technology.

U.S. officials stepped up warnings that China regularly steals American intellectual property and technology, through cyberattacks and other means — allegations Beijing denies.

The issue took center stage at a congressional hearing Thursday, as lawmakers on the House Armed Services Committee pressed Trump administration officials on their efforts to protect U.S. military assets from Chinese spies.

Read more: http://thehill.com/policy/cybersecurity/393741-new-fears-over-chinese-espionage-grip-washington



If you google Chinese hack contractors computers.............the first hit is this:

https://www.washingtonpost.com/world/national-security/china-hacked-a-navy-contractor-and-secured-a-trove-of-highly-sensitive-


And after you read this............."The data stolen was of a highly sensitive nature despite being housed on the contractor’s unclassified network. The officials said the material, when aggregated, could be considered classified, a fact that raises concerns about the Navy’s ability to oversee contractors tasked with developing ­cutting-edge weapons.'

I want to know why his computer was on a "unclassified network".......................this is bull shit

22 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
New fears over Chinese espionage grip Washington (Original Post) turbinetree Jun 2018 OP
Let me be the first to say ... BUT HER EMAILS!!! (nt) mr_lebowski Jun 2018 #1
Uh, Oh. Scarsdale Jun 2018 #8
"China regularly steals American intellectual property and technology." LuckyLib Jun 2018 #2
The Yellow Peril rears its ugly head dalton99a Jun 2018 #3
So, you're cool with the CCP taking the technical edge psychopomp Jun 2018 #22
The military needs to STOP outsourcing PERIOD. Crutchez_CuiBono Jun 2018 #4
Well, they have to Scarsdale Jun 2018 #10
So sick of this military first or you're not a Patriot bullshit. Crutchez_CuiBono Jun 2018 #19
The military doesn't build its own tanks, planes, ships, never has. JustABozoOnThisBus Jun 2018 #16
Maybe... Crutchez_CuiBono Jun 2018 #18
We need to replace or update old equipment, JustABozoOnThisBus Jun 2018 #20
ooooooh nooooo elmac Jun 2018 #5
Phillippines, other countries do give a shit. JustABozoOnThisBus Jun 2018 #21
I used to run internet traffic monitoring software... IthinkThereforeIAM Jun 2018 #6
The overwhelming majority of government contractor computers are on unclassified networks. When you 24601 Jun 2018 #7
K&R. Thanks for that overview. n/t KY_EnviroGuy Jun 2018 #11
So similar to Hillary's private server. KPN Jun 2018 #15
There are several big challenges with cybersecurity. One is whether the system/infrastructure has 24601 Jun 2018 #17
"We prefer Pooty Poot's russian spies." - Comrade Casino & KGOP republican cronies Achilleaze Jun 2018 #9
intelligence outsourcing Brewh Jun 2018 #12
China has been buying up high-tech companies Duppers Jun 2018 #13
Lock'em up! KPN Jun 2018 #14

Scarsdale

(9,426 posts)
8. Uh, Oh.
Mon Jun 25, 2018, 05:51 AM
Jun 2018

The Chinese had better donate lots of YEN to the gop, RNC. Then this will be glossed over. They should know by now that money is the only thing that motivates this government. All the millionaires in the gop need lots of cash in order to do their jobs.

LuckyLib

(6,822 posts)
2. "China regularly steals American intellectual property and technology."
Sun Jun 24, 2018, 11:45 PM
Jun 2018

This is a given. And even before the cyber world, China has appropriated ideas, technology, and the written word. The level of penetration into secure sites is astounding. And evidently the North Koreans are in the same league. Meanwhile, back at the ranch, Trump has the nation spinning in circles as he manages the daily news cycles by creating one announcement and one crisis after another.

psychopomp

(4,668 posts)
22. So, you're cool with the CCP taking the technical edge
Tue Jun 26, 2018, 11:29 AM
Jun 2018

by stealing US tech secrets? The CCP wants all the data on all of our most mission-critical weapons programs. The CCP navy just deployed "rail guns," though it remains to be seen whether they work. We're not talking about "Chinese," but rather the CCP.

Scarsdale

(9,426 posts)
10. Well, they have to
Mon Jun 25, 2018, 05:56 AM
Jun 2018

do SOMETHING with all that taxpayer money. The military budget increases practically on a yearly basis, in order for the US to have "the best trained military in the world" Buying obsolete planes and weapons can only waste so much. Outside contracts for friends of the gop are a steady source of "donations". Look how well Halliburton and all the subsidiaries did under the Cheney administration. Ol' Dickless did well for himself, too.

JustABozoOnThisBus

(23,384 posts)
16. The military doesn't build its own tanks, planes, ships, never has.
Mon Jun 25, 2018, 03:14 PM
Jun 2018

Should the contractors be stopped from using contractors?

JustABozoOnThisBus

(23,384 posts)
20. We need to replace or update old equipment,
Tue Jun 26, 2018, 06:48 AM
Jun 2018

and get parts to maintain the current equipment.

All of which the military buys from suppliers, contractors. It's difficult to keep designs secret when so many are involved.

JustABozoOnThisBus

(23,384 posts)
21. Phillippines, other countries do give a shit.
Tue Jun 26, 2018, 06:55 AM
Jun 2018

China is appropriating the South China Sea, by building military bases on little atolls. Their expansion is affecting fishing, mineral rights in the area.

https://en.wikipedia.org/wiki/Territorial_disputes_in_the_South_China_Sea

IthinkThereforeIAM

(3,078 posts)
6. I used to run internet traffic monitoring software...
Mon Jun 25, 2018, 01:14 AM
Jun 2018

... on my home computers. It would tell me who is pinging my computer, hoping to get a response (See Gibson Research [link:https://www.grc.com/x/ne.dll?bh0bkyd2| ).

The software would list which ISP's were pinging me; using a trace route program I found that on any given evening, 75% of the pings originated in China.

As I recall, that contractor mentioned above, did NOT have the proper security software running on their system/network, no firewall was operating.

24601

(3,967 posts)
7. The overwhelming majority of government contractor computers are on unclassified networks. When you
Mon Jun 25, 2018, 02:32 AM
Jun 2018

think of a power company, they will normally have a Supervisory Control and Data Acquisition (SCADA) network for running the power generating equipment. Then they will have a separate administrative/business network for supporting functions like personnel management, payroll, logistics, etc. While the admin network will connect to the internet, the ops network should be isolated.

The military is mostly on three networks. The primary command and control network goes up to SECRET. There are TOP SECRET networks, usually accredited for compartmented intelligence or Special Access Programs. Their largest network is unclassified and connects to the internet.

Most defense contractors are building stuff. They don't exercise command and control or conduct operations. That a compilation could be classified doesn't mean that an original or derivative classifier has evaluated it and applied classification. That also is an inherently governmental function and contractors can't just classify information. The terms of each contract specify what clearance and accesses are required. Contractors can't just decide to have clearances, classified work spaces or classified networks. It has to be authorized and accredited by a government sponsor.

If a compilation of unclassified information would be classified, it need to be documented in the program's security classification guide. Sometimes there are bonehead cross domain violations - for example someone connecting a classified computer to the internet to download software updates. The far bigger problem is people putting classified information onto an unclassified computer.

24601

(3,967 posts)
17. There are several big challenges with cybersecurity. One is whether the system/infrastructure has
Mon Jun 25, 2018, 06:04 PM
Jun 2018

adequate safeguards built in. Are there firewalls, does it require strong passwords, if someone is coming in from an unknown IP, is there two-factor authentication? Does the email disable embedded URLs? Are patches and OS updates current, especially anti-virus signatures.

But the second thing is all about people making it a priority and reducing human error. Most of the time, those come from users as opposed to the IT staff.

As an outlier, The Clinton campaign hack included two human errors. The anomaly was that one of those mistakes was from IT. John Podesta received an email saying he needed to change his password. He asked IT if it was legitimate and the tech said it was. JP clicked on the link provided and changed his password. It was really a spearphishing email and the link took him to a fake site where thought he was changing his password. When is input his current password, the hackers had it, immediately logged into his real account and copied everything.

Human Error #1: IT misspoke - a mistake, not a lie, that it was legitimate. #2 was that JP just clicked on the included link rather than either putting it in manually or following the email application.

Other common user mistakes include uploading (or typing) information not authorized on the system (e.g. any classified on an UNCLASSIFIED system, TOP SECRET on a SECRET system, US only info on a coalition system). People plug in a USB devices or load disks without first scanning them. Users open attachments (that have fro unknown senders. It's also a poor practice to send stuff to people that just don't need it. Are users trained to safeguard classified or sensitive unclassified information & does the organization's culture reinforce following the rules?

Not everything is bad news. I'm kind of nerdy and a year ago I was watching C-Span where Commander of the US Cyber Command was speaking to a cybersecurity conference. He said something like the most progress he had seen was that (finally), senior leaders wouldn't spend the first half of meetings arguing that cybersecurity was the IT guys problem. A culture that accepts cybersecurity as somebody else's job invites failure.

That's some of the the bigger stuff but doesn't come close to covering everything.

 

Brewh

(13 posts)
12. intelligence outsourcing
Mon Jun 25, 2018, 10:25 AM
Jun 2018

''Spies for Hire: The Secret World of Intelligence Outsourcing''

book came out about 10 years ago, apparently nothing has changed for the better since then.
=

Duppers

(28,134 posts)
13. China has been buying up high-tech companies
Mon Jun 25, 2018, 11:08 AM
Jun 2018

As much as they can. When they can't steal it, they've been buying it.
Calling for a moratorium is the only good thing the treasonous idiot-in-chief has done.

"Treasury is crafting rules that would block firms with at least 25% Chinese ownership from buying companies involved in ‘industrially significant technology’"

https://www.wsj.com/articles/trump-plans-new-curbs-on-chinese-investment-tech-exports-to-china-1529883988

Latest Discussions»Latest Breaking News»New fears over Chinese es...