China rejects cyber-espionage allegations

 

 

 

File photo taken on February 1, 2011 shows Chinese Foreign Ministry spokesman Hong Lei inviting

a journalist to raise questions at a regular news briefing in Beijing.    Photo by Yuan Man

 

 

 

BEIJING  |  2015-01-19 19:14:07

 

China rejects

cyber-espionage allegations

 

By Bai Jie

 

China on Monday of January 19 described allegations that its spies stole key information on the F-35 Lightening II fighter jet as “groundless and unproven.”

Foreign Ministry spokesman Hong Lei made the remarks at a daily press briefing in response to a report in German magazine Der Spiegel, which cited documents disclosed by former U.S. intelligence contractor Edward Snowden, that Chinese cyber spies stole “huge volumes” of sensitive military information relating to the plane.

“The allegations are totally groundless and unproven,” said Hong.

China has been the victim of cyber attacks and cyber security is a common challenge of every country, Hong said.

He said it was extremely difficult to confirm the sources of cyber attacks as they usually involved several countries and were hard to backtrack.

“I don’t know what proof they hold to back up their accusations,” said Hong.

“We, on the other hand, do have documents that show a certain country has a dishonorable record on cyber security,” the spokesman said.

He called for an end to finger pointing and urged nations to fight cyber hacking together.

 

 

 

File Photo taken o July 12, 2013 shows a media worker viewing a photo by cellphone that shows

Former U.S. spy agency contractor Edward Snowden (center) attending a meeting with Russian

human rights activists and lawyers at Moscow’s Sheremetyevo International Airport, Russia.

Photo by Jiang Kehong

 

 

 

 

BEIJING  |  2015-01-19 12:44:39

 

Snowden files

unveil U.S. attempt

to control Internet

 

 

By Deng Yushan

 

 

The world-shocking global surveillance by the U.S. National Security Agency (NSA) is just the beginning of the spook organization’s sprawling efforts to control the Internet, show new revelations attributed to NSA whistleblower Edward Snowden.

The NSA is “planning for wars of the future in which the Internet will play a critical role” and seeking the ability to destroy enemy infrastructure remotely, German magazine Der Spiegel revealed in a recent report, citing “top-secret documents” from Snowden’s archive it has seen exclusively.

 

POLITERAIN, NOT SO POLITE

 

The Spiegel disclosure highlighted an NSA project code-named “Politerain,” which is operated by digital snipers with Tailored Access Operations, the department responsible for breaking into computers.

In its job posting, the program says it is “looking for interns who want to break things.”

On the basis of hacking into third-party computers, interns are also told to formulate plans to “remotely degrade or destroy opponent computers, routers, servers and network-enabled devices by attacking the hardware.”

Politerain spies, according to the leaked documents, have various programs for specific purposes. For example, Passionatepolka can be used to “remotely brick network cards,” Berserkr to implant “persistent backdoors” and “parasitic drivers,” and Barnfire to “erase the BIOS on a brand of servers that act as a backbone to many rival governments.”

Ultimately, the goal of the internship program was “developing an attacker’s mindset,” noted the German magazine.

 

SPYING IS JUST “PHASE 0″

 

Internal NSA documents, Der Spiegel said, indicate that surveillance of the Internet is merely “Phase 0″ in the U.S. digital war strategy.

The aim of the surveillance is to detect vulnerabilities in enemy systems, which is “the prerequisite for everything that follows,” the German magazine added, citing the files.

Once “stealthy implants” have been placed to infiltrate enemy systems, thus allowing “permanent accesses,” then Phase 3 has been achieved — a phase headed by the word “dominate” in the documents.

At that stage, according to the report, NSA spooks can control and destroy “at will through pre-positioned accesses” critical systems and networks, which include anything important in keeping a society running: energy, communications and transportation.

“The internal documents state that the ultimate goal is ‘real-time controlled escalation,’” said the Spiegel report.

 

D WEAPONS

 

Atomic, biological and chemical weapons are widely referred to as the ABC weapons. Now the list has been extended to D — digital weapons.

“The next major conflict will start in cyberspace,” Der Spiegel quoted one NSA presentation as saying. To that end, the U.S. government is currently undertaking a massive effort to digitally arm itself for network warfare.

“For the 2013 secret intelligence budget, the NSA projected it would need around 1 billion dollars in order to increase the strength of its computer network attack operations. The budget included an increase of some 32 million dollars for ‘unconventional solutions’ alone,” revealed the report.

The NSA aims “to use the Net to paralyze computer networks and, by doing so, potentially all the infrastructure they control, including power and water supplies, factories, airports or the flow of money,” according to the Spiegel disclosure.

Among the D weapons is malware, and several programs of that sort have emerged in recent years that a number of indicators show are attributable to the NSA and its Five Eyes alliance, which also includes Britain, Canada, Australia and New Zealand.

The Spiegel report referred to Stuxnet, which was used to attack the Iranian nuclear program, and Regin, “a powerful spyware trojan that created a furor in Germany after it infected the USB stick of a high-ranking staffer to Chancellor Angela Merkel.” The latter was also used in attacks against the European Commission.

 

PLAUSIBLE DENIABILITY

 

In what is called a guerilla war over data, the Snowden files show, little differentiation is made between soldiers and civilians, and any Internet user could suffer damage to his or her data or computer.

The potential damage D weapons can inflict goes well beyond the online world. For example, if U.S. spies use Barnfire to destroy or “brick” the control center of a hospital, “people who do not even own a mobile phone could be affected,” Der Spiegel noted.

While launching cyber-attacks, intelligence agencies like the NSA have adopted “plausible deniability” as their guiding principle, seeking to make it impossible to trace the sources of the attackers, the German magazine added.

“It’s a stunning approach with which the digital spies deliberately undermine the very foundations of the rule of law around the globe,” commented the magazine.

“This approach threatens to transform the Internet into a lawless zone in which superpowers and their secret services operate according to their own whims with very few ways to hold them accountable for their actions,” it added.

 

 

 

 

 

 

Share


236 Comments

  1. does insurance pay for is

    54a1 is soft tabs in uk

  2. effet is 10mg

    54a1 visit web site is femele

  3. ou puis je acheter du is

    6741 is in online

  4. wholesale is suppliers uk

    6741 at to get is

  5. is 20mg retail price

    df7f wow look it is be

  6. wow look it cheap is india

    37a0 is aus agypten kaufen

  7. is open

    0584 is nebenwirkungen forum

  8. wow is cheap

    cf9d only best offers womens is

  9. Have you ever considered publishing an ebook or guest authoring on other blogs?
    I have a blog centered on the same topics you discuss and would love to have
    you share some stories/information. I know my viewers would enjoy your work.
    If you’re even remotely interested, feel free to send me an e-mail.

  10. excellent issues altogether, you just gained a emblem new reader.
    What might you suggest about your post that you made a
    few days ago? Any certain?

  11. Woah! I’m really enjoying the template/theme of this website.
    It’s simple, yet effective. A lot of times it’s challenging to get that “perfect balance” between usability and visual appeal.
    I must say you have done a awesome job with this.
    Additionally, the blog loads very quick for me on Safari.
    Exceptional Blog!

  12. Have you ever considered about adding a little bit more than just your articles?
    I mean, what you say is fundamental and everything. However
    imagine if you added some great graphics or videos to give your
    posts more, “pop”! Your content is excellent but with pics and video clips, this site could certainly be
    one of the greatest in its niche. Fantastic blog!

  13. Great site. Plenty of useful info here. I am sending it to a few
    pals ans also sharing in delicious. And certainly, thanks in your sweat!

  14. I was wondering if you ever considered changing the structure of your blog?
    Its very well written; I love what youve got to say.
    But maybe you could a little more in the way of content so people could
    connect with it better. Youve got an awful lot
    of text for only having 1 or two pictures. Maybe you could space it out better?

  15. Very shortly this website will be famous amid all blog visitors, due to it’s good articles or reviews

  16. Spot on with this write-up, I absolutely believe
    this website needs much more attention. I’ll probably be back again to see more, thanks for the info!

Leave a Reply

*