Some time ago, a question was posited here.
NDIA perhaps provides us with the answer. From National Defense Magazine:
For 18 minutes in April, China‚Äôs state-controlled telecommunications company hijacked 15 percent of the world‚Äôs Internet traffic, including data from U.S. military, civilian organizations and those of other U.S. allies.
This massive redirection of data has received scant attention in the mainstream media because the mechanics of how the hijacking was carried out and the implications of the incident are difficult for those outside the cybersecurity community to grasp, said a top security expert at McAfee, the world‚Äôs largest dedicated Internet security company.
In short, the Chinese could have carried out eavesdropping on unprotected communications ‚ÄĒ including emails and instant messaging ‚ÄĒ manipulated data passing through their country or decrypted messages, Dmitri Alperovitch, vice president of threat research at McAfee said.
Nobody outside of China can say, at least publicly, what happened to the terrabytes of data after it entered China.
The incident may receive more attention when the U.S.-China Economic and Security Review Commission, a congressional committee, releases its annual report on the bilateral relationship Nov. 17. A commission press release said the 2010 report will address ‚Äúthe increasingly sophisticated nature of malicious computer activity associated with China.‚ÄĚ
Perhaps the time has come to recognize China has more than begun turning its “Unrestricted Warfare” theories into practice. The next policy official or War College/NDU professor, the next GO/FO who reiterates the tired and naive refrain that the book “doesn’t represent official Chinese or PLA policy” needs to be shown the door. A decade of that silly and Panglossian answer is more than plenty. Those who still find that statement credible have missed the boat long ago. The NDIA article goes on:
‚ÄúIf China telecom intercepts that [encrypted message] and they are sitting on the middle of that, they can send you their public key with their public certificate and you will not know any better,‚ÄĚ he said. The holder of this certificate has the capability to decrypt encrypted communication links, whether it‚Äôs web traffic, emails or instant messaging, Alperovitch said. ‚ÄúIt is a flaw in the way the Internet operates,‚ÄĚ said Yoris Evers, director of worldwide public relations at McAfee.
No one outside of China can say whether any of these potentially nefarious events occurred, Alperovitch noted. ‚ÄúIt did not make mainstream news because it is so esoteric and hard to understand,‚ÄĚ he added. It is not defined as a cyberattack because no sites were hacked or shut down. ‚ÄúBut it is pretty disconcerting.‚ÄĚ
And the hijacking took advantage of the way the Internet operates. ‚ÄúIt can happen again. They can do it tomorrow or they can do it in an hour. And the same problem will occur again.‚ÄĚ
As various “Cyber Commands” design their service pins and declare themselves “ready” for a major cyber event, they ought to take heed. There were inklings of this occurrence in April/May, but this seems to be the first relatively comprehensive public acknowledgment of China’s actions.
The U.S. Defence Department estimates that over 100 foreign intelligence organizations have attempted to break into U.S. networks. Every year, hackers also steal enough data from U.S. government agencies, businesses and universities to fill the U.S. Library of Congress many times over, officials say.
The Pentagon’s biggest suppliers — including Lockheed Martin Corp, Boeing Co and Northrop Grumman Corp — are investing in the growing market for cyber technology, estimated at up to $140 billion a year worldwide.
Gates said the U.S. military had made considerable progress protecting its own sites and was working with its private-sector partners “to bring them under that umbrella.”
And everyone that touches Lockheed Martin and Boeing and Northrup Grumman, and everyone they touch, and everyone who touches them, and….
Good luck with that.
- The Virtue of Being a Generalist, Part 3: Viper and the Pitfalls of ‚ÄėGood Enough‚Äô
- Midrats 21 Sept 14 – Episode 246: “When the short snappy war goes long, with Chris Dougherty”
- The Virtue of Being a Generalist, Part 2: Are All Nuggets Created Equal?
- Back to Basics: Restoring the United States Merchant Marine
- On Midrats 14 Sep 14: Episode 245: “The Carrier as Capital Ship” with RADM Thomas Moore, USN, PEO CVN