Underground Cyber Warfare

Underground Cyber Warfare

gAtO just got thru reading “War in the Shadows” by Dylan Welch an excellent piece of work. Dylan outlines what exactly is cyber warfare. The Internet morphed into cyberspace when governments realized that as more governments went online it would become easier to gather information to better understand our international relationships.  – intelligence gathering, political and strategic advantage, and also for defensive purposes,”  …. The Byzantine Hades  explains more of the workings of a Nation actor actions in cyberspace, but all governments do it not just China.

”Byzantine Hades … a cover term for a series of related computer network intrusions with a believed nexus to China, has affected US and foreign governments as well as [security] cleared [defence] contractors since at least 2003,” a cable on November 5, 2008, explains.

Anytime we go to the table into any international dialog with any country you bet your dollar that we have researched our position and the climate of the streets of the country.

The five officers, working in the Office of the Special Envoy for Climate Change, were involved in preparing for delicate bilateral climate change talks in Beijing in several days. The email appeared to be from a respected economics columnist at a well-known US journal and contained information designed to be of particular and direct relevance to the five staff. Attached to the email was a PDF file also titled ”China and Climate Change”. Unknown to the staff, lurking within the file was a piece of sophisticated malicious code (malware) known as Poison Ivy.

This is a well managed plan when the emails were sent they were ready to to start the “RAT” program and start enumerating the system, looking for office documents and looking for other networks to enter. gAto tHiNkInG if this government entity had a basic penetration test to see what access this role and department position had we could reduce the chance of this attack getting as little information as possible.

As internet use grows – it has soared from about 360 million people in 2000 to more than 2 billion last year – so does its usefulness to a whole range of countries and groups seeking to influence world events. You got to remember that he who controls “the message” wins today. Such reasons include political and strategic advantage, intelligence gathering and the need to control the internet which, as the Arab Spring has shown, can be a powerful tool of destabilization.

Electronic intelligence gathering is now a huge industry. Attacks are becoming increasingly more sophisticated and targeted. This ranges from your average email scam to full-blown cyber espionage and attacks on our systems.

Even experts are finding it difficult to keep up with the rate of change in the diversity and sophistication of cyber attacks. If I can’t hack you I’ll buy yougAtO aLwAyS sAy. Once again the Chinese have shown how easy it is to buy the technology.

Another facet of the Chinese use of cyber espionage is the way it has co-opted its private sector into such activity. He owns the digital security company Tianrongxin, commonly known as TOPSEC. The company is a big player in the Chinese market and has been given access to Microsoft’s source code through the Chinese digital security certification program. But the cable revealed that when TOPSEC was established in 1995 half of its seed money came from the government and it also undertook research and development work for the government.

Let me not get started on Hawei and 3Com deal and Mitt Romney and Rick Perry. Today 2 of our presidential front runners have some kind of history with Chinese companies that have been investigated but the state department and other government regulatory and business entities. Rick Perry and his people made more than a few trips to China to bring in campaigns like Huwei and other companies that have ties to the China’s People Liberation Army (PLA). And the main street media does not say a word.

If you get a chance read this article it great…gAtO oUt



Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: