It looks like you're using an Ad Blocker.

Please white-list or disable AboveTopSecret.com in your ad-blocking tool.

Thank you.

 

Some features of ATS will be disabled while you continue to use an ad-blocker.

 

Chinese Military Hacked into Pentagon

page: 1
1
<<   2 >>

log in

join
share:

posted on Sep, 3 2007 @ 07:54 PM
link   

Chinese Military Hacked into Pentagon


www.ft.com

The Chinese military hacked into a Pentagon computer network in June in the most successful cyber attack on the US defence department, say American ­officials.

The Pentagon acknowledged shutting down part of a computer system serving the office of Robert Gates, defence secretary, but declined to say who it believed was behind the attack.
(visit the link for the full news article)




posted on Sep, 3 2007 @ 07:54 PM
link   
China is pushing it's luck with stunts like this, I wonder if they retrieved anything useful to their cause, whatever that cause may be, and for those who think that China is our friend this should be a wake up call.

www.ft.com
(visit the link for the full news article)



posted on Sep, 3 2007 @ 08:09 PM
link   
Whatever. It's not uncommon for the US to do the same to networks in other countries themselves. What gives the US the right to do it, and the Chinese not to?

Cyber warfare will continue to happen, and it's certainly no cause for war.

It can easily be rectified... just don't be dumb enough to place sensitive documents on internet networked computers. It's that simple.

Anyone who is dumb enough to place classified documents on an internet linked machine deserves to have them stolen.



posted on Sep, 3 2007 @ 09:56 PM
link   

Originally posted by the_sentinal
China is pushing it's luck with stunts like this, I wonder if they retrieved anything useful to their cause, whatever that cause may be, and for those who think that China is our friend this should be a wake up call.


This is not surprising. China has been accused of hacking the US for valuable economic information as to 'speed up the process' by taking shortcuts via stealing the info.

It also happens for military intel. It happens all the time, and the US does the same thing. Its not the chinese who are the only ones doing it. Everyones doing it.

As for this being the 'biggest' hack. Is this bigger then the hack Gary Mckinnon pulled off? for conspiracy sakes, Google that name and see what you get. Pretty interesting stuff.

[edit on 3-9-2007 by West Coast]


apc

posted on Sep, 3 2007 @ 10:26 PM
link   
There are a number of threads discussing McKinnon. I suppose "big hack" is in the eye of the beholder.

I never realized the acronym for China's army is PLA. That's actually really really funny. I wonder if our own PLA is batting against them. That's right kids... the Phone Losers of America.

Considering there's been a bit of a hacker war between the US and China for almost a decade, it would be interesting to find out how many of these PLA (People’s Liberation Army) cybersoldiers are civilian.



posted on Sep, 3 2007 @ 10:33 PM
link   
If they can prove that it was Chinas military according to U.S. law it is considered an act of war. The U.S. Government has warned nations that we would consider government sponsored attacks an act of war. China should be very careful with stuff like this, We could flip the switch and turn them off lol.



posted on Sep, 3 2007 @ 10:59 PM
link   

Originally posted by johnsky
Anyone who is dumb enough to place classified documents on an internet linked machine deserves to have them stolen.



remember, this is the American government.
As if any would be able to break into 'their' system!


Im thinking, attacks like these take time, and when youve caught onto previous attacks, you have a rough idea of what your keeping an eye out for.

It would be IDEAL, to put some 'false-info' out there for someone to hack in and grab, believing it to be authentic!



posted on Sep, 3 2007 @ 11:00 PM
link   
Actually by definition is this not now considered an act of terrorism? I am pretty sure I read that in either PD 51 or the Patriot Act when it defines "terrorist acts" or "terrorist"



posted on Sep, 3 2007 @ 11:04 PM
link   
This is the way it is going to be from now on.

Didn't SQL slammer come out of North Korean military labs?

That caused big problems with unpatched systems, cash machines stopped working


I dont think it is any big shakes, they just found the honeypot!

After McKinnon things got a lot tighter, that is if you beleive that he got past the guided tour of the fake network!

With all the networking between various diffrent contingents in a battle these days (more so in future) it makes sense for them to try and get into this stuff.

After all how good are those F22's without AWAKS support?



posted on Sep, 3 2007 @ 11:07 PM
link   
Skywatchwer and section 8, could you please provide any government sources that states these are declarations of war and terror?

I have no doubt as to their nature, but I sure would like to read the actual legal writings and what they say.



posted on Sep, 4 2007 @ 02:23 AM
link   
reply to post by DYepes
 


What difference does it make whether this is considered a terrorist act or not?? it's still China we are talking about here, the US lets them get away with all kinds of espionage, perhaps they have finally had enough



posted on Sep, 4 2007 @ 02:39 AM
link   
We let them hack it, so we can trace it. It's a strategy to reveal the position of the attacker.



posted on Sep, 4 2007 @ 02:43 AM
link   
mentioning mckinnon brings up an interesting point. will they go after these chinese hackers in the same way they have gone after mckinnon? after all, they probably got more useful info than he did.



posted on Sep, 4 2007 @ 02:55 AM
link   

Originally posted by 11 11
We let them hack it, so we can trace it. It's a strategy to reveal the position of the attacker.


You really think someone cannot cover their tracks if they are good enough to get into their servers?

Dont forget some spotty teenager hacked into all their stuff about UFOs.



posted on Sep, 4 2007 @ 05:26 AM
link   
I guess if a bunch of let's say taiwaneses hackers would use China as a proxy to launch cyberwarfare against the US to get tensions between China and the US higher so Taiwan could have more support to declare independance?

Or something like that? I'm not saying it's the case, but in the future, some group could start a war just by doing something like that... a kind of ``false-flag cyber attack``.



posted on Sep, 4 2007 @ 07:13 AM
link   
The same happened to Germany too..



Chinese premier Wen Jiabao described reports of Chinese hackers breaking into German computers as a matter of "grave concern" and said Monday that his country will cooperate with Germany to resolve the matter.

Please visit the link provided for the complete story.


www.networkworld.com...



posted on Sep, 4 2007 @ 07:34 AM
link   
Off topic but still...


Originally posted by DeepCoverUK
After all how good are those F22's without AWAKS support?


It's AWACS, and the answer is pretty damn good. The F-22A Raptor does not need any such support to carry out it's mission. It has even demonstrated the capacity to act as a "mini AWACS" for other systems in some cases offering capabilities even dedicated AEW platforms cannot.

[edit on 4-9-2007 by WestPoint23]



posted on Sep, 4 2007 @ 09:57 AM
link   
Ooops, my mistake, thank you for the correction.

But what about if they cant talk to each other and all their systems get jammed?

I know that some weapons can be disarmed whilst in flight, these are the secrets they are probably after.



posted on Sep, 4 2007 @ 09:59 AM
link   
The Chinese may have gotten into the DOD network I guess as someone stated if you are going to hack and spy then you should expect the same.

If you are working on electronic espionage then you should definitely secure your own dekstops, laptops, and servers.

I know the DOD made a change from some of the NIX based servers they were using a few years back and put in there place some windows boxes now I am not sure just how many or where but I am sure that there were some.

from personal experience I can say that trying to secure a Windows network
is like trying to hunt deer with a sling shot it can probably be done but is it really worth the time when you can throw any number of cheaper commercially supported nix systems on there and be done with it. I am not saying that any nix unix linux or otherwise is the end all be all and that you can just go take a nap but it has been around far longer and can easily be modified to create your own distribution for your own needs.

as far as China and the US goes I figure for the most part it is all in a days work for the hackers and administrators..

also if they had gotten something really important we probably would never have heard a word..

Later
GEO



[edit on 9/4/2007 by geocom]



posted on Sep, 5 2007 @ 02:49 PM
link   
reply to post by the_sentinal
 


Sorry sentinel, but there are claims that this is considered an act of war and terrorism, I wish only to see the legislation that declares it as such. I would not like to be mislead around here you know? The mckinnon fellow was not accused of any kind of terrorism, but they were able to specifially identify him as the individual involved. It still makes him a criminal.

I would hope if the individuals involved in this recent hack were identified, that we could also have them extradited here and tried for their crimes. It probably will not happen, but one could hope.

I would not appreciate if the cops let every burglar go just because the "house was unlocked, and therefore deserved to be broken into". That kind of thinking makes no sense IMO.




top topics



 
1
<<   2 >>

log in

join