1. Welcome! Please take a few seconds to create your free account to post threads, make some friends, remove a few ads while surfing and much more. ClutchFans has been bringing fans together to talk Houston Sports since 1996. Join us!

China 'hacked into Pentagon computers'

Discussion in 'BBS Hangout: Debate & Discussion' started by hooroo, Sep 4, 2007.

  1. hooroo

    hooroo Member

    Joined:
    Oct 16, 2003
    Messages:
    19,295
    Likes Received:
    1,914
    http://www.ft.com/cms/s/0/a89c1c88-5a38-11dc-9bcd-0000779fd2ac.html
     
  2. jo mama

    jo mama Member

    Joined:
    Jul 9, 2002
    Messages:
    14,583
    Likes Received:
    9,097
    im sure china has done all kinds of stuff, but israel is still the worst country when it comes to hacking into our government systems and stealing sensitive information.
     
  3. rocketsinsider

    Joined:
    Apr 1, 2006
    Messages:
    640
    Likes Received:
    0
    pretty sure US does the same, so probably does all the other countries.
     
  4. NewYorker

    NewYorker Ghost of Clutch Fans

    Joined:
    Sep 14, 2002
    Messages:
    6,130
    Likes Received:
    41
    right, that makes it all ok.
     
  5. jo mama

    jo mama Member

    Joined:
    Jul 9, 2002
    Messages:
    14,583
    Likes Received:
    9,097
    us and israel are the best when it comes to this stuff.

    this is what my cousin does for a living. he likes his job!
     
  6. Oski2005

    Oski2005 Member

    Joined:
    Nov 14, 2001
    Messages:
    18,100
    Likes Received:
    447
    Are they sure it wasn't the Decepticons?
     
  7. rocketsinsider

    Joined:
    Apr 1, 2006
    Messages:
    640
    Likes Received:
    0
    just saying cant really point out one country when everyone else, including urself, but u would think the US would have better tech then china to prevent this stuff
     
  8. NewYorker

    NewYorker Ghost of Clutch Fans

    Joined:
    Sep 14, 2002
    Messages:
    6,130
    Likes Received:
    41

    Hacking is more preserverence then anything else. You put 1,000,000 hackers working every day to hack something, they will make some progress.

    And I think you can totally point out a country, especially when it gets caught red-handed (no pun intended). Just saying everyone does it doesn't make it ok.

    If you get caught for a speeding ticket - do you say everyone does it as a defense? Or if you hit someone, can't you say someone else has hit someone and gotten away it?

    No. China has done something very severe here, and there should be reprecussions.
     
  9. Northside Moss

    Joined:
    Mar 2, 2007
    Messages:
    1,206
    Likes Received:
    0
    Well, should be. Except for the fact that the United States probably IS doing the same thing and will act accordingly (i.e not at all). Yay politics!

    "France and Germany have imposed restrictions on senior officials using BlackBerries out of concerns that US intelligence agencies could intercept sensitive emails."

    Seriously, the only thing alarming about this is that US technology seems to have fallen behind the curb. I can understand the Japanese hacking American gouvernment offices...but the Chinese? Eh...eh.
     
  10. real_egal

    real_egal Member

    Joined:
    Nov 20, 2003
    Messages:
    4,430
    Likes Received:
    247
    Is this a way to get more defense budget? Oh, the Chinese upgraded their military to our levels in 70's or early 80's, we need some hundreds of billions of more dollars to protect our great way of life.

    I am just curious, how could they be sure it's PLA, not Chinese State Safty Office, not Chinese technology firms, or, simply some random Internet hackers, just like those Germans, Russians, Americans, and Indians, and Chinese, who represented the majority of the hacker world? I guess the hacker sent a message says "I am a Chinese military hacker, and I am hacking Pentagan's unclassified network, like janitor's blogs, under the direct order of President Hu."

    "Trojan Horse"? Gosh, those PLA hackers aren't very original, are they? Could it be some Pentagon guys are checking out porno sites at work and got infected? Or it's standard manoeuvre of brave American intelligence officers to fight the information war by leaving virus after they hack foreign countries?

    I know, when a German young man landed a small plane in Red Square, it was his own action, has nothing to do with his country. When several American soldiers raped students in Korea, those were rare crimes done by individuals, and it has nothing to do with that great nation. But when there is a hacker attacking Pentagon's unclassified network, whose IP is from China, it surely is a PLA official attempt to harm the great American way of life. I am eager to see when I catch cold next time, somehow got my co-workers sick, and I end up on top story - "Deep covered Chinese spy started biological warfare on American soil."

    Chinese learn their ways to read "news" after Culture Revolution. Americans have been getting lots of opportunities to exerice lately as well, especially during Bush's tenure.
     
  11. real_egal

    real_egal Member

    Joined:
    Nov 20, 2003
    Messages:
    4,430
    Likes Received:
    247
    That's pretty new to me. I didn't know that you are a hacker expert and made some breakthrough in that area. Are you saying that China and India will control the whole world, since they are having the most manpower in numbers? Of course, India will prevail on the end, due to its English language advantage and broader IT world?


    Sure, all outsourcing projects to China should be re-directed to India.
     
  12. NewYorker

    NewYorker Ghost of Clutch Fans

    Joined:
    Sep 14, 2002
    Messages:
    6,130
    Likes Received:
    41
    I don't think we're hacking into Chinese military instillations to steal Chinese technology. I'd bet a decent amount of money on that considering that Chinese military technology isn't considered more advanced, so your justification for this crime is illegitimate.

    Blackberries by the way are a Canadian technology, not American.
     
  13. Ottomaton

    Ottomaton Member
    Supporting Member

    Joined:
    Feb 14, 2000
    Messages:
    19,192
    Likes Received:
    15,350
    PRC is best at this based on everything I read specifically in terms of focused military directed hacking. More subtle things as you would see with the NSA and other general intelligence sources is probably different but they aren't really interested in discussing what they do. New Yorker actually is right about the value of persistance, despite what you may think of him. I actually do have some older professional interest in the subject. I am certanly not an expert, but I do know enough to say that he is correct.

    To me, ultimately, this is no different than flying spy planes just outside China's international borders. They shouldn't get upset at us if their communications leak into the public sphere, and we shouldn't get pissed if our network security isn't sufficent to prevent our data from spilling out into the public internet sphere.

    If you aren't able to protect your crap from spilling out, it isn't someone else's fault.
     
  14. maud'dib

    maud'dib Rookie

    Joined:
    Mar 27, 2006
    Messages:
    194
    Likes Received:
    0
    well at least they do in the open, unlike some countries who just stab you in the back once you share stuff.
     
  15. newplayer

    newplayer Member

    Joined:
    Nov 6, 2006
    Messages:
    488
    Likes Received:
    0
    Oh my god, the Pentagon networks get probed hund*reds of times a day?!!! :eek: That's like ... as many times as my linux box at uni gets probed everyday, and my linux box is still perfectly fine after being online for 5 years. You cannot seriously call these "probes" serious and dangerous hacking?

    Honestly, does anyone here actually have a clue on how hacking works? There are generally 3 ways someone can hack into your computer and take control of it:

    (1) Guess your username and password combo.
    (2) Exploiting an engineering flaw of your networking software
    (3) Tricking you into downloading a trojan horse software.

    Most OS have special fixed usernames such as "Administrator" on Windows and "root" on linux, and it's elementary safety procedure to disable remote logging-in using any of these usernames. So, as long as you do so and mandate 8-character or more passwords, there would be at least 94^8 possible passwords, and if you setup increasing delays after every single unsuccessful log-in attempt, it would be practically impossible for anyone to log into your computer system remotely. I doubt that the American government networks would be blameless if they had not even taken the most elementary safety precautions to guard their computer networks.

    To exploit engineering flaws of any software, the hacker needs to have the source code/assembly code of the software, otherwise he wouldn't even know where to begin other than the generic public interface ... but surely the American government wouldn't be so careless that they leave security holes in the public interfaces of their vital networks, would they?

    The Trojan horse attack works exactly like how its name suggests --- you have to download and run it on your computer in order for it to harm you. So, how exactly is the Chinese military making the US government employees download and run Chinese Trojan horse software?

    Seriously, the American government cannot be that stupid to not follow the basic network safety protocols and use badly designed networking software on their vital networks. You can get free linux distributions that by default prevent all of these elementary security risks, and the only source of attack would then be Trojan horses, and even Trojan horse software wouldn't be able to harm your entire system unless they are run by the administrator of the network under super user privileges.

    The record of a computer getting probed after the first time it got brought online is like 2 minutes. I doubt the American government computers would still be functional had elementary safety procedures not been followed, and if such procedures had been followed, that would leave only Trojan horse attacks, and the victims of Trojan horse attacks only have themselves to blame.
     
  16. Panda

    Panda Member

    Joined:
    Jun 5, 2002
    Messages:
    4,130
    Likes Received:
    1
    Are they sure it's not that guy in "Live Free Die Hard", I mean it would be a piece of cake for him.
     
  17. demon77

    demon77 Member

    Joined:
    Mar 22, 2007
    Messages:
    5,074
    Likes Received:
    1
    Actually there a 4 standard ways of doing it, 4th one being........

    (4) Go to your nearest retail store, buy a $20 axe, find the physical location of the console, and start hacking away

    anyway.....I'm not surprise at all, since I recall china have like atleast 10K military hackers (Tho, I'm pretty sure its a hell lot more then that)
     
  18. newplayer

    newplayer Member

    Joined:
    Nov 6, 2006
    Messages:
    488
    Likes Received:
    0
    10k military hackers? Let's say you have 10 million hackers each on a separate IP trying to remotely log into a single computer protected by a 8-character password system, and suppose they can try a password every single second, it would take them more than 19 years to crack the password! Do you reckon this is likely?
     
  19. demon77

    demon77 Member

    Joined:
    Mar 22, 2007
    Messages:
    5,074
    Likes Received:
    1
    I have a xp3000 cpu (its like 5-6 years old?), and it can brute force at 70 millions pass per seconds for a DES encyption, offline (Des only take 8 digit max). Imagine if you have a super computer that run a thousand time faster

    There are countless way to exploit stuff (as there is no such things as 100% perfect/secure), and its a 100x easier to break something then to create it.
     
  20. Akhorahil

    Akhorahil Member

    Joined:
    Jul 29, 2007
    Messages:
    231
    Likes Received:
    0
    Some of you guys really don't know much about this topic. Others know quite a bit.

    This isn't the movies. Most of the work done buy the hacker in this case is done by the computer itself. This ain't some 14 year old, future computer programmer, messing around. These are coordinated attacks that are planned out months in advance. It's really as simple as their supercomputer running a series of programs. Some of you guys need to add a few more zeros to your numbers. Your out dated.

    To the guy who thinks this is a conspiracy theory to get more money... Read and research. The attack they are talking about happened in early June. The Chinese hacked into the Pentagon's email system. It is an unclassified network. The only reason we found out about it is because they shut down the entire network when they discovered the intruder, which was automated. This probably all took place in fractions of a nanosecond.

    How do they know it was the PLA? LOL Remember this if nothing else. You can't hide the signal. It's like the movies. You don't have to keep the signal active to trace it to it's source. Once you made the connection, it can be traced back to it's source. It only takes time. You don't believe me... Go hack a bank from your home and then log off immediately. The FBI will find you. And the FBI has nothing on the NSA.

    To those who are taking this lightly... Oh boy... China has stolen quite a bit of classified information from the US via hacking. It's paid off quite well for them. I've read a couple of the stories and I'm sure there is plenty I didn't read. The ones I read had the Chinese stealing information important to the minaturization process involved in making nuclear weapons... well... smaller. They also stole plans on a torpedo that rides in a bubble of air to increase speed and decrease the noise it creates. This was reported years ago. I'm sure they have stolen more than that, reported on or not.

    If you still think light of this, think of it in dollar value. Those two things alone is 100's of millions maybe... Even if it's less it's not less than 10's of millions. Think of it that way. China stole 50 million from US military. It's not such a minor threat if you think of it that way.

    I would like to add this one last thing to "New Player". The Chinese and their hundreds of port scans a day. That's not an attack. That's just a scan. If the Chinese decided to attack your Linux box you would see your box slow to 1 calculation per minute.
     

Share This Page

  • About ClutchFans

    Since 1996, ClutchFans has been loud and proud covering the Houston Rockets, helping set an industry standard for team fan sites. The forums have been a home for Houston sports fans as well as basketball fanatics around the globe.

  • Support ClutchFans!

    If you find that ClutchFans is a valuable resource for you, please consider becoming a Supporting Member. Supporting Members can upload photos and attachments directly to their posts, customize their user title and more. Gold Supporters see zero ads!


    Upgrade Now