Monday, May 27, 2013

How the U.S. government supposedly spies on the world disguised as Chinese hackers

     In March of this year, the U.S. Treasury official Jacob Lu's visit on network security issues put pressure on China.
     Recently, in the United States, "Business Week" published an article entitled "How The U.S. government spies on the world". The article said that the U.S. government is against Chinese hacking, and continues to put pressure on the Chinese. In fact, the United States itself is in on the network security issues.  He then formed a greater threat to the country. The U.S. gave the Chinese hackers the opportunity to hit back at the U.S. government. China announced that the United States can do some more unseemly things.
The following is the full text:
     "Hidden in the dense woods 15 miles north of the road is the U.S. National Security Agency (NSA) in congested Washington. The building covers an area of ​​6,000,000 square feet, full of satellite receivers.
     The U.S. National Security Agency was established in 1952, and is responsible for intercepting radio and other electronic transmissions. Today, a lot of resources are given to spies to steal information on "static electronic data."  This information comes from terrorist network computers and hard drives, rogue states, and even nominally friendly governments.
     Former U.S. Homeland Security Secretary Mike McConnell said that U.S. President Barack Obama receives daily intelligence briefings, the majority of the information from the government spy network. "This information is at least 75%, or even more." He said.
     U.S. National Security plays an important role in intelligence gathering and makes it difficult for the U.S. government to put pressure on other countries - particularly China - who could not stop them from stealing American company database product details and trade secrets. In recent months, the Obama administration has begun to publicly humiliate China, calling attention to the  Chinese cyber espionage program that has been eyeing a number of US companies, including Google, Yahoo and Intel, stealing their source code and other confidential information.
     This spring, the U.S. Treasury Secretary James Blue (Jacob Lew) and the U.S. Joint Chiefs of Staff Chairman Colonel Martin Dempsey visited China on the hacking events and put pressure on the Chinese officials. On the 26th of May the U.S. National Security Adviser Thomas Donilon is scheduled to visit China.
China's response: who's talking
     "You went in and sat across from hackers who said, 'You are spies, we are spies, but you should not steal from someone that stole something.' If this is the case, then the dialogue will be difficult to carry out."  Former U.S. National Security Secretary and CIA director Michael Hayden says, "between countries spy on each other and I have to see to understand." Hayden is now on the Washington security consulting firm Chertoff Group as a supervisor. He said: "But this is not a race, which country can spy on private companies.  It is not even a fair contest."
     In May, the Pentagon submitted to Congress the first official Chinese government report on direct snooping on U.S. defense contractors. The report shows that U.S. intelligence is being a massive theft of government agencies.  The agencies are very familiar with how to steal technology from U.S. companies. This makes the Sino-US relations even more tense. Chinese leaders have always denied manipulating hackers. Official media, "People's Daily" published an article about the Pentagon report, saying the U.S. is the "real Matrix."
The U.S. government does not deny having an espionage network.
     "You're not waiting for someone to decide to put the information into electronic photons, and then send them out." Hayden said, "The information is transmitted to the storage place from the opponent's network information, and in this regard is doing the best.  Then stop there."
     The U.S.'s position is that some hacking is more tolerable than others, and the U.S. National Security hacking during the Cold War was to follow the set of informal rules, and this is acceptable.
     Port Washington is a good security risk management company for the companies that were attacked by hackers advice. The person in charge, Jacob Olcott, said: "China is now doing exactly what you should not do."
Custom Entrance Organization
     The U.S. National Security Agency has a hacking team called "Custom Entrance Organization" (Tailored Access Operations, referred to as TAO). According to two anonymous former U.S. National Security Bureau officials, the agency collected a lot of information, including information on terrorist financial networks, international money laundering and the drug trade, as well as foreign military information and even domestic political opponents strategies about their own potential controversy.
     Over the years, the U.S. National Security Agency has not recognized the existence of TAO.Another anonymous Pentagon officials confirmed that, TAO engages in cyber espionage, or as the U.S. Department of Defense called it "computer network use," but he stressed that, TAO is not against technology, trade secrets or financial secrets. The official said the number of people working for the TAO is confidential. U.S. Homeland Security spokesman Vaneé Vines refused to answer any questions about TAO.
Intelligence fusion center resources
     Two former NSA officials agreed to introduce TAO and its activities, but declined to disclose it for the government and units. Mostly the U.S. spy network of military units have received special training. They sat in front of the stage to run the complex manipulation of hacking software, filtered from the world's computers to steal information, and then transferred to the "fusion center intelligence resources",  Then intelligence analysts process all information.  The NSB U.S. law prohibits the stealing from U.S. domestic residents or companies, including non-US citizens, and citizens not in the United States of America.
     According to one official the agency received a staggering two petabytes per hour from foreign computer systems.  That is almost 2.1 million gigabytes, or rather hundreds of millions of pages of text information.
     The U.S. National Security Agency has automated the process,  Like the real world, like a spy, the U.S. network of spies try to cover their tracks or to camouflage them on their own.  Even in such ways such as masquerading as Chinese hackers to protect themselves from the hacking  being found
Flourishing network-industrial complex
     Although the Pentagon and other agencies are having budget cuts the NSA hackers are still creating a thriving network of industrial complexes.  Defense contractors and small companies are hired to create a specific hacking tools, looking for security vulnerabilities in commonly used software, so that the government can use these tactics. KEYW CEO Leonard Moodispaw said the company has done very powerful business intelligence training for the United States once.  However, he said, will not disclose more information about it.
"We say that the federal government does not like us too give away much detail." He said.
     The Federation of American Scientists political confidential survey project leader Steven Aftergood says that all these hacking activities give China the opportunity to hit back at the U.S. government. China can reverse the U.S. protests against industrial espionage, and declare that the United States does some unseemly things.
The plan to steal a new car may be possible.  But you can not steal state secrets.
New focus
     Intelligence officials have put pressure on China.  One way to attack is to restrict the country from hacking into trade secrets.  Selling stolen technology manufactured products would cause the creation of import restrictions.  The manufacturers of these products staff Visas would not be approved.
     "We do not enter into the philosophical level, the controversy can be accepted on what espionage contains and does not contain." Hayden said.  Instead, the United States should pay attention to China, and it's economic areas that might benefit from such thefts."
     In February, the Obama administration said that it would consider sanctioning countries that  steal company information. Network security expert Christopher Finan said that such punishment is difficult to put into practice. Finanm until last yearm has worked in the Obama administration's National Security Council.
     "It is too hard to determine whether a product in the end is using stolen technology, or the country of manufacturer used the technology to progress itself." Finan said, "the existing intellectual property protection loss is a mess, and can not be defined."
     Finan said he believes the tough sanctions may bring more than just a trade war, but can also harm the same U.S. company and products, which is what they want.  To protect the object.
"China has been looking at measures to limit U.S. companies in China's domestic market." He said, "this will help them."

This article taken from: www.cnhacker.org/435.html‎ translated into English and edited for clarity.

No comments:

Post a Comment