US ready to strike back against China cyberattacks

 Email this Story

Feb 19, 8:14 PM (ET)
By LOLITA C. BALDOR

(AP) The building housing “Unit 61398” of the People’s Liberation Army is seen in the outskirts of...
Full Image


WASHINGTON (AP) - As public evidence mounts that the Chinese military is responsible for stealing massive amounts of U.S. government data and corporate trade secrets, the Obama administration is eyeing fines and other trade actions it may take against Beijing or any other country guilty of cyberespionage.
According to officials familiar with the plans, the White House will lay out a new report Wednesday that suggests initial, more-aggressive steps the U.S. would take in response to what top authorities say has been an unrelenting campaign of cyberstealing linked to the Chinese government. The officials spoke on condition of anonymity because they were not authorized to speak publicly about the threatened action.
The White House plans come after a Virginia-based cybersecurity firm released a torrent of details Monday that tied a secret Chinese military unit in Shanghai to years of cyberattacks against U.S. companies. After analyzing breaches that compromised more than 140 companies, Mandiant has concluded that they can be linked to the People's Liberation Army's Unit 61398.
Military experts believe the unit is part of the People's Liberation Army's cyber-command, which is under the direct authority of the General Staff Department, China's version of the Joint Chiefs of Staff. As such, its activities would be likely to be authorized at the highest levels of China's military.
The release of Mandiant's report, complete with details on three of the alleged hackers and photographs of one of the military unit's buildings in Shanghai, makes public what U.S. authorities have said less publicly for years. But it also increases the pressure on the U.S. to take more forceful action against the Chinese for what experts say has been years of systematic espionage.
"If the Chinese government flew planes into our airspace, our planes would escort them away. If it happened two, three or four times, the president would be on the phone and there would be threats of retaliation," said former FBI executive assistant director Shawn Henry. "This is happening thousands of times a day. There needs to be some definition of where the red line is and what the repercussions would be."
Henry, now president of the security firm CrowdStrike, said that rather than tell companies to increase their cybersecurity the government needs to focus more on how to deter the hackers and the nations that are backing them.
James Lewis, a cybersecurity expert at the Center for Strategic and International Studies, said that in the past year the White House has been taking a serious look at responding to China, adding that "this will be the year they will put more pressure on, even while realizing it will be hard for the Chinese to change. There's not an on-off switch."
The Chinese government, meanwhile, has denied involvement in the cyber-attacks tracked by Mandiant. Instead, the Foreign Ministry said that China, too, is a victim of hacking, some of it traced to the U.S. Foreign Ministry spokesman Hong Lei cited a report by an agency under the Ministry of Information Technology and Industry that said in 2012 alone that foreign hackers used viruses and other malicious software to seize control of 1,400 computers in China and 38,000 websites.
"Among the above attacks, those from the U.S. numbered the most," Hong said at a daily media briefing, lodging the most specific allegations the Chinese government has made about foreign hacking.
Cybersecurity experts say U.S. authorities do not conduct similar attacks or steal data from Chinese companies, but acknowledge that intelligence agencies routinely spy on other countries.
China is clearly a target of interest, said Lewis, noting that the U.S. would be interested in Beijing's military policies, such as any plans for action against Taiwan or Japan.
In its report, Mandiant said it traced the hacking back to a neighborhood in the outskirts of Shanghai that includes a white 12-story office building run by the PLA's Unit 61398.
Mandiant said there are only two viable conclusions about the involvement of the Chinese military in the cyberattacks: Either Unit 61398 is responsible for the persistent attacks or they are being done by a secret organization of Chinese speakers with direct access to the Shanghai telecommunications infrastructure who are engaged in a multi-year espionage campaign being run right outside the military unit's gates.
"In a state that rigorously monitors Internet use, it is highly unlikely that the Chinese government is unaware of an attack group that operates from the Pudong New Area of Shanghai," the Mandiant report said, concluding that the only way the group could function is with the "full knowledge and cooperation" of the Beijing government.
The unit "has systematically stolen hundreds of terabytes of data from at least 141 organizations," Mandiant wrote. A terabyte is 1,000 gigabytes. The most popular version of the new iPhone 5, for example, has 16 gigabytes of space, while the more expensive iPads have as much as 64 gigabytes of space. The U.S. Library of Congress' 2006-2010 Twitter archive of about 170 billion tweets totals 133.2 terabytes.
"At some point we do have to call the Chinese out on this," said Michael Chertoff, Homeland Security secretary under President George W. Bush and now chairman of the Chertoff Group, a global security firm. "Simply rolling over and averting our eyes, I don't think is a long-term strategy."
Richard Bejtlich, the chief security officer at Mandiant, said the company decided to make its report public in part to help send a message to both the Chinese and U.S. governments.
"At the government level, I see this as a tool that they can use to have discussions with the Chinese, with allies, with others who are concerned about this problem and have an open dialogue without having to worry about sensitivities around disclosing classified information," Bejtlich said. "This problem is overclassified."
He said the release of an unclassified report that provides detailed evidence will allow authorities to have an open discussion about what to do.
Mandiant's report is filled with high-tech details and juicy nuggets that led to its conclusion, including the code names of some of the hackers, like Ugly Gorilla, Dota and SuperHard, and that Dota appears to be a fan of Harry Potter because references to the book and movie character appear as answers to his computer security questions.
The White House would not comment on the report expected Wednesday.
"We have repeatedly raised our concerns at the highest levels about cybertheft with senior Chinese officials, including in the military, and we will continue to do so," said Caitlin Hayden, spokeswoman for the National Security Council. "The United States and China are among the world's largest cyber actors, and it is vital that we continue a sustained, meaningful dialogue and work together to develop an understanding of acceptable behavior in cyberspace."
Sen. Dianne Feinstein, D-Calif., chairman of the Senate Intelligence Committee, said the report reinforces the need for international agreements that prohibit cybercrimes and have a workable enforcement mechanism.
---
Associated Press writers Christopher Bodeen, Gillian Wong, Charles Hutzler and Joe McDonald contributed to this report.

Nasa to turn ISS into coldest spot in the universe

Nasa to turn ISS into coldest spot in the universe
This hitherto unknown project, known as the Cold Atom Laboratory (CAL), is being led by an Indian woman, Anita Sengupta, who hails from West Bengal.
MUMBAI: Nasa's Jet Propulsion Laboratory (JPL) at Pasadena in California is developing an experiment which will make the International Space Station (ISS) the coldest spot in the universe, quite literally.


Interestingly, this hitherto unknown project, known as the Cold Atom Laboratory (CAL), is being led by an Indian woman, Anita Sengupta, who hails from West Bengal. Prior to this she led the supersonic parachute development for the highly successful Mars Science Laboratory (MSL) mission which landed the Curiosity rover on the Red Planet on August 6, 2012.

In an email interview to TOI, Anita, who is planning to visit India later this year, explained that the main role of the new laboratory, which will become a part of the ISS in 2016, will be to explore new quantum physics in an extremely cold temperature regime that cannot be explored in earth-based laboratories.

"It is a regime where matter ceases to behave like particles , but instead like a wave,'' she said, while pointing out that it may be representative of the way matter was at the formation of the universe. "This is a very exciting fundamental physics experiment that will make the ISS the coldest spot in the universe , quite literally. We will see new physics only enabled by the microgravity environment of the ISS,'' she said.

The 17-nation ISS operates in the low earth orbit at an altitude of about 370km.

"We started the development in October 2012 and will launch roughly in April 2016. We are in the design phase now. It will be installed by astronauts into the ISS and operated remotely by us at JPL,'' she stated. According to her, CAL is likely to be launched by the Dragon cargo vehicle.

Deadly new virus is well adapted to infect humans, study finds

Related Topics

A security force personnel takes pictures of a Naga Sadhu on the banks of the river Ganges at the ongoing Kumbh Mela in Allahabad February 15, 2013. REUTERS/Jitendra Prakash

Kumbh Mela

During the Maha Kumbh in Allahabad, thousands take part in a religious gathering at the Sangam.  Slideshow 
A woman walks past a sign on the street advertising a free flu shot clinic at Dorchester House, a health care clinic, in Boston, Massachusetts January 12, 2013. REUTERS/Brian Snyder/Files
LONDON | Tue Feb 19, 2013 10:45am IST
(Reuters) - A new virus that emerged in the Middle East last year and has killed five people is well adapted to infecting humans but could potentially be treated with drugs that boost the immune system, scientists said on Tuesday.
The virus, called novel coronavirus or NCoV, is from the same family as the common cold and as SARS, or Severe Acute Respiratory Syndrome. There have been 12 confirmed cases worldwide - including in Saudi Arabia, Jordan and Britain - and five patients have died.
In one of the first published studies about NCoV, which was unknown in humans until it was identified in September 2012, researchers said it could penetrate the lining of passageways in the lungs and evade the immune system as easily as a cold virus can.
This shows it "grows very efficiently" in human cells and suggests it is well-equipped for infecting humans, said Volker Thiel of the Institute of Immunobiology at Kantonal Hospital in Switzerland, who led the study.
NCoV was identified when the World Health Organisation issued an international alert in September saying a completely new virus had infected a Qatari man in Britain who had recently been in Saudi Arabia.
Coronaviruses are a family of viruses that includes those that cause the common cold as well as the one that caused SARS - which emerged in China in 2002 and killed about a 10th of the 8,000 people it infected worldwide.
Symptoms of both NCoV and SARS include severe respiratory illness, fever, coughing and breathing difficulties. Of the 12 cases confirmed so far, four were in Britain, one was a Qatari patient in Germany, two were in Jordan and five in Saudi Arabia.
POSSIBLE TREATMENT
Scientists are not sure where the virus comes from, but say one possibility is it came from animals. Experts at Britain's Health Protection Agency say preliminary scientific analysis suggests its closest relatives are bat coronaviruses.
What is also unclear is what the true prevalence of the virus is - since it is possible that the 12 cases seen so far are the most severe, and there may be more people who have contracted the virus with milder symptoms so are not picked up.
"We don't know whether the cases (so far) are the tip of the iceberg, or whether many more people are infected without showing severe symptoms," said Thiel, who worked with a team of scientists from the Netherlands, Switzerland, Germany and Denmark. "We don't have enough cases to have a full picture of the variety of symptoms."
Thiel said that although the virus may have jumped from animals to humans very recently, his research showed it was just as well adapted to infecting the human respiratory tract as other coronaviruses like SARS and the common cold viruses.
The study, published in mBio, an online journal of the American Society for Microbiology, also found that NCoV was susceptible to treatment with interferons, medicines that boost the immune system and which are also successfully used to treat other viral diseases like Hepatitis C.
This opens up a possible mode of treatment in the event of a large-scale outbreak, the scientists said.
Thiel said that with the future of the virus uncertain, it was vital for laboratories and specialists around the world to cooperate swiftly to find out more about where it came from, how widespread it was, and how infectious it might be.
"So far it looks like the virus is well contained, so in that sense I don't see any reason for increased fear," he said. (Editing by Pravin Char)