THE EVIL RED EMPIRE – RED CHINA – CYBERSPACE INVASION

THE EVIL RED EMPIRE – RED CHINA – CYBERSPACE INVASION

THE EVIL RED EMPIRE - RED CHINA - CYBERSPACE INVASION :The U.S. Office of Personnel Management building in Washington June 5, 2015. In the latest in a string of intrusions into U.S. agencies' high tech systems, the Office of Personnel Management (OPM) suffered what appeared to be one of the largest breaches of information ever on government workers. The office handles employee records and security clearances.  REUTERS/Gary Cameron
THE EVIL RED EMPIRE – RED CHINA – CYBERSPACE INVASION :The U.S. Office of Personnel Management building in Washington June 5, 2015. In the latest in a string of intrusions into U.S. agencies’ high tech systems, the Office of Personnel Management (OPM) suffered what appeared to be one of the largest breaches of information ever on government workers. The office handles employee records and security clearances. REUTERS/Gary Cameron

Red China has successfully launched a ‘Cyberspace Invasion’ and has stolen US assets without need for Land, Air, or Sea Invasion. Red China has to be recognized as “AGGRESSOR” and her aggressive actions and behavior demand a meaningful response and not diplomatic negotiations about cybersecurity. To describe ‘Cyberspace Invasion’ as “DATA BREACH” will compromise Homeland Security.

Rudranarasimham Rebbapragada
Ann Arbor, MI 48104-4162, USA
The Spirits of Special Frontier Force

 
  image          
The Spirits of Special Frontier ForceSpecial Frontier Force is a military organization of India, Tibet, United States to resist Red…
 
View on www.facebook.com Preview by Yahoo
 
 

 

Reuters

BY JOSEPH MENN

U.S. EMPLOYEE DATA BREACH TIED TO CHINESE INTELLIGENCE
U.S. Employee Data Breach Tied To Chinese Intelligence

By Joseph Menn

SAN FRANCISCO (Reuters) – The Chinese hacking group suspected of stealing sensitive information about millions of current and former U.S. government employees has a different mission and organizational structure than the military hackers who have been accused of other U.S. data breaches, according to people familiar with the matter.

While the Chinese People’s Liberation Army typically goes after defense and trade secrets, this hacking group has repeatedly accessed data that could be useful to Chinese counter-intelligence and internal stability, said two people close to the U.S. investigation.

Washington has not publicly accused Beijing of orchestrating the data breach at the U.S. Office of Personnel Management (OPM), and China has dismissed as “irresponsible and unscientific” any suggestion that it was behind the attack.

Sources told Reuters that the hackers employed a rare tool to take remote control of computers, dubbed Sakula, that was also used in the data breach at U.S. health insurer Anthem Inc last year.

The Anthem attack, in turn, has been tied to a group that security researchers said is affiliated with China’s Ministry of State Security, which is focused on government stability, counter-intelligence and dissidents. The ministry could not immediately be reached for comment.

THE EVIL RED EMPIRE - RED CHINA - CYBERSPACE INVASION :Employees of the U.S. Office of Personnel Management return to their building during the lunch hour in Washington June 5, 2015. In the latest in a string of intrusions into U.S. agencies' high tech systems, the Office of Personnel Management (OPM) suffered what appeared to be one of the largest breaches of information ever on government workers. The office handles employee records and security clearances.   REUTERS/Gary Cameron
THE EVIL RED EMPIRE – RED CHINA – CYBERSPACE INVASION :Employees of the U.S. Office of Personnel Management return to their building during the lunch hour in Washington June 5, 2015. In the latest in a string of intrusions into U.S. agencies’ high tech systems, the Office of Personnel Management (OPM) suffered what appeared to be one of the largest breaches of information ever on government workers. The office handles employee records and security clearances. REUTERS/Gary Cameron

Employees of the U.S. Office of Personnel Management return to their building during the lunch hour …

In addition, U.S. investigators believe the hackers registered the deceptively named OPM-Learning.org website to try to capture employee names and passwords, in the same way that Anthem, formerly known as Wellpoint, was subverted with spurious websites such as We11point.com, which used the number “1” instead of the letter “l”.

Both the Anthem and OPM breaches used malicious software electronically signed as safe with a certificate stolen from DTOPTOOLZ Co, a Korean software company, the people close to the inquiry said. DTOPTOOLZ said it had no involvement in the data breaches.

The FBI did not respond to requests for comment. People familiar with its investigation said Sakula had only been seen in use by a small number of Chinese hacking teams.

“Chinese law prohibits hacking attacks and other such behaviors which damage Internet security,” China’s Foreign Ministry said in a statement. “The Chinese government takes resolute strong measures against any kind of hacking attack. We oppose baseless insinuations against China.”

MANY UNKNOWNS

THE EVIL RED EMPIRE - RED CHINA - CYBERSPACE INVASION OF UNITED STATES OFFICE OF PERSONNEL MANAGEMENT .
THE EVIL RED EMPIRE – RED CHINA – CYBERSPACE INVASION OF UNITED STATES OFFICE OF PERSONNEL MANAGEMENT .


Most of the biggest U.S. cyber attacks blamed on China have been attributed, with varying degrees of certitude, to elements of the Chinese army. In the most dramatic case two years ago, the U.S. Justice Department indicted five PLA officers for alleged economic espionage.

Far less is known about the OPM hackers, and security researchers have differing views about the size of the group and what other attacks it is responsible for.

People close to the OPM investigation said the same group was behind Anthem and other insurance breaches. But they are not yet sure which part of the Chinese government is responsible.

“We are seeing a group that is only targeting personal information,” said Laura Gigante, manager of threat intelligence at FireEye Inc, which has worked on a number of the high-profile network intrusions.

CrowdStrike and other security companies, however, say the Anthem hackers also engaged in stealing defense and industry trade secrets. CrowdStrike calls the group “Deep Panda,” EMC Corp’s RSA security division dubs it “Shell Crew,” and other firms have picked different names.

THE EVIL RED EMPIRE - RED CHINA - CYBERSPACE INVASION :The Homeland Security Department headquarters in northwest Washington, Friday, June 5, 2015. China based hackers are suspected once again of breaking into U.S. government computer networks, and the entire federal workforce could be at risk this time. The Department of Homeland Security said in a statement that data from the Office of Personnel Management   the human resources department for the federal government   and the Interior Department had been compromised. (AP Photo/Susan Walsh)
THE EVIL RED EMPIRE – RED CHINA – CYBERSPACE INVASION :The Homeland Security Department headquarters in northwest Washington, Friday, June 5, 2015. China based hackers are suspected once again of breaking into U.S. government computer networks, and the entire federal workforce could be at risk this time. The Department of Homeland Security said in a statement that data from the Office of Personnel Management the human resources department for the federal government and the Interior Department had been compromised. (AP Photo/Susan Walsh)

The Homeland Security Department headquarters in northwest Washington, Friday, June 5, 2015. China-b …

The OPM breach gave hackers access to U.S. government job applicants’ security clearance forms detailing past drug use, love affairs, and foreign contacts that officials fear could be used for blackmail or recruiting.

In contrast to hacking outfits associated with the Chinese army, “Deep Panda” appears to be affiliated with the Ministry of State Security, said CrowdStrike co-founder Dmitri Alperovitch.

Information about U.S. spies in China would logically be a top priority for the ministry, Alperovitch said, adding that “Deep Panda’s” tools and techniques have also been used to monitor democracy protesters in Hong Kong.

An executive at one of the first companies to connect the Anthem and OPM compromises, ThreatConnect, said the disagreements about the boundaries of “Deep Panda” could reflect a different structure than that in top-down military units.

“We think it’s likely a cohort of Chinese actors, a bunch of mini-groups that are handled by one main benefactor,” said Rich Barger, co-founder of ThreatConnect, adding that the group could get software tools and other resources from a common supplier.

“We think this series of activity over time is a little more distributed, and that is why there is not a broad consensus as to the beginning and end of this group.”

(The story corrects third paragraph to remove erroneous reference to Department of Homeland Security)

(Reporting by Joseph Menn in San Francisco; Additional reporting by Jeremy Wagstaff in Singapore, and Ben Blanchard and Paul Carsten in Beijing; Editing by Tiffany Wu)

http://about.reuters.com/fulllegal.asp

(c) Copyright Thomson Reuters 2015. 

Yahoo – ABC News Network

 

THE EVIL RED EMPIRE – RED CHINA – CYBER CRIMINAL

THE EVIL RED EMPIRE – RED CHINA – CYBER CRIMINAL

red china espionage sun tzu wisdom
red china espionage sun tzu wisdom

Espionage is described as ‘Intelligence’ gathering, securing of information about one nation for the benefit of another. Spying is a term used to describe clandestine intelligence gathering activity. Spying involves the use of spies or agents by a government to learn the secrets of other nations. Espionage involves obtaining information using spies, secret agents, and illegal monitoring devices.

red china espionage sun tzu the art of war
red china espionage sun tzu the art of war

In government operations, intelligence involves evaluated information concerning the strength, activities and probable course of action of its opponents. The concept of intelligence is not new. The military treatise “Ping-fa”(The Art of War) written c.400 B.C. by military philosopher Sun-tzu mentions the use of secret agents and importance of good intelligence. To obtain knowledge of enemy’s intentions, intelligence systems have been in use from ancient times. The Intelligence Service of Red China belongs to Ministry of State Security.

At Special Frontier Force, I am familiar with Red China’s espionage and her intelligence gathering operations which often target individuals serving in Special Frontier Force to identify them with specificity. Intelligence gathering in cyberspace or cyberespionage is manifestation of digital age. At Special Frontier Force, I am trained to recognize Red China as an adversary, an opponent, and an enemy. I would not expect Red China to extend her cooperation to apprehend those criminals who with a series of computer hacks have stolen vast amounts of data from a database maintained by the Office of Personnel Management in the United States. While nations may face the compulsion to gather intelligence, stealing private information of millions of civilian employees is unfair, unethical, and is totally unwarranted. As such, I would recognize Red China as a Cyber Criminal and Red China has to bear full responsibility for criminal actions of her employees or agents she hired.

Rudranarasimham Rebbapragada
Ann Arbor, MI 48104-4162, USA
SPECIALFRONTIERFORCE.ESTABLISHMENT22

The Washington Post

With a series of major hacks, China builds a database on Americans

 

 

 

 

AP7800370634461370635261-1616.jpg?uuid=uKJWxPmaEeShPBk7EkHVGg

American and Chinese flags are adjusted before a press conference in Beijing in 2012. (Feng Li/ASSOCIATED PRESS)

By ELLEN NAKASHIMA June 5 at 5:55 PM

China is building massive databases of Americans’ personal information by hacking government agencies and U.S. health-care companies, using a high-tech tactic to achieve an age-old goal of espionage: recruiting spies or gaining more information on an adversary, U.S. officials and analysts say.

Groups of hackers working for the Chinese government have compromised the networks of the Office of Personnel Management(OPM) which holds data on millions of current and former federal employees, as well as the health insurance giant Anthem, among other targets, the officials and researchers said.

“They’re definitely going after quite a bit of personnel information,” said Rich Barger, chief intelligence officer of ThreatConnect, a Northern Virginia cybersecurity firm. “We suspect they’re using it to understand more about who to target [for espionage], whether electronically or via human ­recruitment.”

The targeting of large-scale data­bases is a relatively new tactic and is used by the Chinese government to further its intelligence-gathering, the officials and analysts say. It is government espionage, not commercial espionage, they say.

China hacked into the federal government’s network, compromising four million current and former employees’ information. The Post’s Ellen Nakashima talks about what kind of national security risk this poses and why China wants this information. (Alice Li/The Washington Post)

“This is part of their strategic goal — to increase their intelligence collection via big data theft and big data aggregation,” said a U.S. government official, who, like others, spoke on condition of anonymity to discuss a sensitive topic. “It’s part of a strategic plan.”

One hack of the OPM, which was disclosed by the government Thursday, dates at least to December, officials said. Earlier last year, the OPM discovered a separate intrusion into a highly sensitive database that contains information on employees seeking or renewing security clearances and on their background investigations.

Once harvested, the data can be used to glean details about key government personnel and potential spy recruits, or to gain information useful for counter­intelligence. Records in OPM’s database of background investigations, for instance, could contain a complete history of where an individual has lived and all of his or her foreign contacts in, say, China. “So now the

Chinese counterintelligence authorities know which American officials are meeting with which Chinese,” a China cyber and intelligence expert said.
The data could help Chinese analysts do more effective targeting of individuals, said a former National Security Agency official. “They can find specific individuals they want to go after, family members,” he said.

The trend has emerged and accelerated over the past 12 to 18 months, the official said. An increase in Chinese capability has opened the way “for bigger data storage, for bigger data theft,” he said. “And when you can gain it in bulk, you take it in bulk.”

The Chinese government, he said, is making use of Chinese companies that specialize in aggregating large sets of data “to help them in sifting through” the information for useful details. “The analogy would be one of our intelligence organizations using Google, Yahoo, Accenture to aggregate data that we collected.”

China on Friday dismissed the allegation of hacking as “irresponsible and unscientific.”

Chinese Foreign Ministry spokesman Hong Lei said Beijing wanted to cooperate with other nations to build a peaceful and secure cyberspace.
“We wish the United States would not be full of suspicions, catching wind and shadows, but rather have a larger measure of trust and cooperation,” he told a regular news briefing,

The OPM disclosed that the latest hack of one of its systems exposed personal data of up to 4 million current and former employees — the largest hack of federal employee data in recent years.

U.S. officials privately said China was behind it. The stolen information included Social Security numbers and performance evaluations.

“This is an intelligence operation designed to help the Chinese government,” the China expert said. “It’s a new phase in an evolution of what they’re doing. It certainly requires greater sophistication on their part in terms of being able to take out this much data.”

Barger’s firm has turned up technical evidence that the same Chinese group is behind the hacks of Premera Blue Cross and Empire BlueCross, which were discovered at roughly the same time earlier this year.

The first OPM incident has been linked to the health-care hacks by Barger and another security researcher, John Hultquist, senior manager for cyberespionage threat intelligence at iSight Partners. Hultquist said the same group is responsible for all of them, and for other intrusions into commercial databases containing large sets of Americans’ personal information.
“They would leverage this data to get to diplomatic, political, military and economic intelligence that they typically target,” said Hultquist, who declined to comment on who was behind the attacks.

Though much Chinese cyber­espionage is attributed to the People’s Liberation Army, these hacks, Barger said, appeared to be linked to the Ministry of State Security, which is a spy agency responsible for foreign espionage and domestic counterintelligence.

Other Chinese entities, including the military, may also be involved in the campaign, analysts said.

Chinese government hackers “are like a vacuum cleaner” in sucking up information electronically, said Robert “Bear” Bryant, a former top counterespionage official in the government. “They’re becoming much more sophisticated in tying it all together. And they’re trying to harm us.”

Security researchers have pointed to a cyber tool or family of malicious software called Derusbi that has been linked exclusively to Chinese actors. One group that has used Dersubi is Deep Panda, a name coined by the firm CrowdStrike, which has linked that group to the Anthem hack.

Disclosed in February, that incident exposed the Social Security numbers, addresses, phone numbers, e-mail addresses and member IDs of tens of millions of customers. No medical data such as diagnosis or treatment information was compromised, the company said.

Researchers note that in contrast to the hacks of Home Depot and Target, personal data that might have been stolen from the OPM, Anthem and the other companies have not shown up on the black market, where it can be sold to identity thieves. That is another sign, they said, that the intrusions are not being made for commercial purposes.
“Usually if there’s a criminally or financially motivated breach like that, we see the data making its way into the black market soon after that,” Barger said.

The big data approach being taken by the Chinese might seem to mirror techniques used abroad by the NSA, which has come under scrutiny for its data-gathering practices under executive authority. But in China, the authorities do not tolerate public debate over the proper limits of large-scale spying in the digital age.

“This is what all intelligence services do if they’re good,” said the China cyber expert. “If you want to find a needle, first you have to gather a haystack of needles.”
The massive data harvesting “reflects a maturity in Chinese” electronic intelligence gathering, the expert said. “You have to put in place structured data repositories. You have to have big data management tools to be able to store and sift and analyze.”

Barger said that “with a large pool of data, they can prioritize who is the best to target electronically and who is the best to target via human recruitment.”
The U.S. official noted that the Chinese “would not take [the data] if they did not have the opportunity to aggregate it.” And, he added, “they are taking it.”

Simon Denyer in Beijing contributed to this report.

nakashimaem.jpg?ts=1432642558011&w=180&h=180

Ellen Nakashima is a national security reporter for The Washington Post. She focuses on issues relating to intelligence, technology and civil liberties.

AP7800370634461370635261-1612.jpgAP7800370634461370635261-1612.jpg

  • © 1996-2015 The Washington Post