Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Vast Spy System Loots Computers in 103 Countries

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Latest Breaking News Donate to DU
 
remedy1 Donating Member (168 posts) Send PM | Profile | Ignore Sat Mar-28-09 12:31 PM
Original message
Vast Spy System Loots Computers in 103 Countries
Source: NYT

March 29, 2009

Vast Spy System Loots Computers in 103 Countries
By JOHN MARKOFF

TORONTO — A vast electronic spying operation has infiltrated computers and has stolen documents from hundreds of government and private offices around the world, including those of the Dalai Lama, Canadian researchers have concluded.

In a report to be issued this weekend, the researchers said that the system was being controlled from computers based almost exclusively in China, but that they could not say conclusively that the Chinese government was involved.

The researchers, who are based at the Munk Center for International Studies at the University of Toronto, had been asked by the office of the Dalai Lama, the exiled Tibetan leader whom China regularly denounces, to examine its computers for signs of malicious software, or malware.

Their sleuthing opened a window into a broader operation that, in less than two years, has infiltrated at least 1,295 computers in 103 countries, including many belonging to embassies, foreign ministries and other government offices, as well as the Dalai Lama’s Tibetan exile centers in India, Brussels, London and New York.






Read more: http://www.nytimes.com/2009/03/29/technology/29spy.html?hp
Printer Friendly | Permalink |  | Top
acmavm Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 12:42 PM
Response to Original message
1. Them pesky Chinese, what will they think of next?
And we think we're the most technologically advance nation in the world. Hells bells, the Chinese have been kicking ass and taking secrets for some time now.
Printer Friendly | Permalink |  | Top
 
ohio2007 Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 12:53 PM
Response to Reply #1
4. thank you bill gates . they couldn't have done it without you nt
Printer Friendly | Permalink |  | Top
 
JudyInTheHeartland Donating Member (130 posts) Send PM | Profile | Ignore Sun Mar-29-09 01:27 PM
Response to Reply #1
31. More corporate/industrial/war machine fear mongering
Just wait for next week's fabrications about Chinese human rights violations or Tonkin-esque provocations in China's economic zone.

The beast must be fed. Just because we have Democrats in charge doesn't mean the war monster has been satiated. Remember Vietnam?
Printer Friendly | Permalink |  | Top
 
drm604 Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 12:47 PM
Response to Original message
2. I read the whole article.
Very interesting, and disturbing.
Printer Friendly | Permalink |  | Top
 
hobbit709 Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 12:51 PM
Response to Original message
3. Always assume that nothing is secure.
Work backwards from that premise.
Printer Friendly | Permalink |  | Top
 
glinda Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 12:58 PM
Response to Original message
5. Would not be surprised if China's Government was very involved. Any Country that
persecutes the Tibetan people, stuffs melamine into [et food and baby formula, would attempt to get any info to bolster itself.
Printer Friendly | Permalink |  | Top
 
pretzel4gore Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 01:40 PM
Response to Reply #5
6. it's a vast entity, glinda
The PRC (Peoples' republic of China) is largest political entity on earth. In history. It deals with issues of scale and effect no one truly understands. It was born in blood only a few generations ago (1949) and the true story can never be known. The west has a relationship with China based upon exploitation, and China literally had to throw off foreign domination- Taiwan resulted from 'Nationalists' fleeing mainland and setting up separate country right off the cost; with American/western help. Taiwan's old regime claimed it had legal rights to rule- the revolution didn't really count, no matter how successful. Thus, technically, the PRC is an interim regime, and MUST eventually take over Taiwan somehow, in order for it to be legit in court of law. Why do you think the west has stepped carefully around China, including allowing Vietnamese to kick USA to the curb in mid 70's? Cuz we're nice people?
no.
It's because China is a nuclear power that is changing into a less oligarchial/communist type top down political entity, and if it ever came apart at the seams, which is possible, there'd be hell to pay...
Printer Friendly | Permalink |  | Top
 
notadmblnd Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 01:42 PM
Response to Original message
7. let me guess, the Promis software or a version thereof? It's been around a long time.
Edited on Sat Mar-28-09 01:43 PM by notadmblnd
It wasn't the Chinese that developed it.
Printer Friendly | Permalink |  | Top
 
vinylsolution Donating Member (807 posts) Send PM | Profile | Ignore Sat Mar-28-09 02:32 PM
Response to Original message
8. Could be a red herring....
.... always suspect the NSA's ECHELON system first, and then work down the food chain.





Printer Friendly | Permalink |  | Top
 
Prisoner_Number_Six Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 02:39 PM
Response to Original message
9. Raise your hand if you didn't see this coming.
Anyone? Anyone? Bueller? Bueller?

You people from the former *bush misadministration can put your hands down- we KNOW you're total fools...
Printer Friendly | Permalink |  | Top
 
benld74 Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 02:49 PM
Response to Original message
10. China is ALWAYS knocking on your door, trying to get in, believe me
Printer Friendly | Permalink |  | Top
 
originalpckelly Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 03:34 PM
Response to Original message
11. Why are the computers with sensitive information connected to the internet?
I know it used to be a government thing, but it's not anymore. They need to physically segregate the networks, and only allow people to use the internet on computers without sensitive information.
Printer Friendly | Permalink |  | Top
 
caseymoz Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 04:00 PM
Response to Reply #11
17. The only problem with that is . . . .

Most of the time the governments need the information that's found only on the Internet. Remember the internet was once DARPAnet. It would mean the government would have to abandon the system they built and recreated it from scratch.

It's damn difficult and expensive, too, to have separate redundant systems. It looks like that's what they're going to have to do.

Of course, that doesn't help the rest of us who are on a contaminated system.

Printer Friendly | Permalink |  | Top
 
No Elephants Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-29-09 02:28 AM
Response to Reply #17
27. In the scheme of government spending, redundant computer systems would be a blip.
Edited on Sun Mar-29-09 02:29 AM by No Elephants
Printer Friendly | Permalink |  | Top
 
caseymoz Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Mar-30-09 03:40 PM
Response to Reply #27
34. You'd think so, right? I don't think they're going to do it until there's a crisis.

Then we'll hear about how none of it could have been foreseen... We need to de-Reaganize our government.
Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 05:37 PM
Response to Reply #11
19. Because fear is good, and management likes cheap labor. nt
Printer Friendly | Permalink |  | Top
 
wroberts189 Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-29-09 02:20 AM
Response to Reply #11
26. Because the techies say no way but the big boss says yes. nt
Printer Friendly | Permalink |  | Top
 
bushmeister0 Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 03:36 PM
Response to Original message
12. This part is really scary.
"The malware is remarkable both for its sweep . . . It can, for example, turn on the camera and audio-recording functions of an infected computer, enabling monitors to see and hear what goes on in a room. The investigators say they do not know if this facet has been employed."

Umm . . . I thinking it's a pretty good bet it has been used.
Printer Friendly | Permalink |  | Top
 
rcrush Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 03:38 PM
Response to Original message
13. The Dalai Lama uses computers?
Well I guess if he does it would be a MAC. He seems like a MAC kind of guy.
Printer Friendly | Permalink |  | Top
 
FailureToCommunicate Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 10:12 PM
Response to Reply #13
20. Yah, wasn't he part of the "Think different" ads?
Printer Friendly | Permalink |  | Top
 
bluesmail Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 03:45 PM
Response to Original message
14. I've heard that if you have satellite tv it can reverse the view and audio
If they really want to know what's going on with a certain individual.
Printer Friendly | Permalink |  | Top
 
caseymoz Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 03:55 PM
Response to Reply #14
16. I know that they could remotely turn on a cellphone's microphone

Even if the cellphone is off.

:tinfoilhat:

Tinfoil doesn't do it these days.
Printer Friendly | Permalink |  | Top
 
KT2000 Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Mar-30-09 03:54 AM
Response to Reply #14
32. Good to know!
My tv has been acting funny lately so that must be it. I think I better make sure I am dressed well and sit like lady when watching tv now.
Printer Friendly | Permalink |  | Top
 
caseymoz Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 03:45 PM
Response to Original message
15. 80-90 percent of the hits I get on my firewall are from China. I like that!

It makes me feel important !!

:woohoo:
Printer Friendly | Permalink |  | Top
 
wroberts189 Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-29-09 02:16 AM
Response to Reply #15
24. I've seen the same thing for the past ten years. nt
Printer Friendly | Permalink |  | Top
 
sudopod Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Mar-28-09 05:00 PM
Response to Original message
18. The attack could have come from anywhere, though.
How hard would it be to set up or co-opt some systems in China to work though? It is intuitively obvious to the casual observer that anyone 1337 enough to break into so many different things would cover their tracks, and everyone is already willing to accept that the PRC has an army of cyber ninjas. They'd make the perfect scape goat.
Printer Friendly | Permalink |  | Top
 
caseymoz Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-29-09 12:23 AM
Response to Reply #18
21. It could be, but sometimes things are as simple as they look.

It seems to me that the PRC would put state security above everything: including feeding its people. It would put computer espionage and security at a very high priority. I don't think the "Great Firewall of China" only works one way, so spoofing its network is more difficult than it successfully spoofing other networks. When after security investigations are over and they've worked past the spoofs, if the arrows point to within China, than it's probably usually China. Especially when its identifiable enemies are involved.
Printer Friendly | Permalink |  | Top
 
christx30 Donating Member (774 posts) Send PM | Profile | Ignore Sun Mar-29-09 01:31 AM
Response to Reply #21
22. Well,
North Korea put building a nuke over feeding their people. So for China to do the same thing is not too much of a strain on the imagination.
Printer Friendly | Permalink |  | Top
 
sudopod Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-29-09 02:06 AM
Response to Reply #21
23. But then you'd figure they'd be sneaky and route it through Israel or Russia
or someone. It's not that hard to add an extra hop.
Printer Friendly | Permalink |  | Top
 
caseymoz Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-29-09 01:17 PM
Response to Reply #23
30. As far as I could tell, they did try.

But these snoops were able to catch it and continue to follow the trail into China. As its last line of defense, China could just deny, deny, deny. What is the world supposed to do even then?

I'm thinking, though, that China is not the only player in the game. The snoops only looked at who was cracking the Dali Lama's computer and then looked for similar cracks throughout the world. That was only one modus operandi. I'm certain if you look at other cracks, you'll follow the networks back to Israel and Russia, among others.
Printer Friendly | Permalink |  | Top
 
wroberts189 Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-29-09 02:18 AM
Response to Original message
25. I would proprose that it quite probable China has an Army of hackers working 24/7 nt
Printer Friendly | Permalink |  | Top
 
caseymoz Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Mar-30-09 03:38 PM
Response to Reply #25
33. I think their cadets practice on the rest of us.

I mean I get so many hits on my firewall from China. It is amazing. So, either they have hackers everywhere all in cafes around China, or they have some kind of government program to train.

I think we ought to put a major firewall around China till they absolutely stop this.
Printer Friendly | Permalink |  | Top
 
unc70 Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-29-09 03:24 AM
Response to Original message
28. Such attacks are everywhere, newsworthy because of high-value targets
Edited on Sun Mar-29-09 03:36 AM by unc70
I have many posts at DU warning of exactly these types of vulnerabilities, including risk of the malware enabling the microphone or camera. In June 2007, an attack of this type was spread hidden within ads at several sites, where they were then served to the visitors at sites like DU, and including DU itself. Months earlier, the Naval War College was hacked, forcing the NWC to replace all the systems.

I will add a couple more of my posts in this area to my journal.

The methods of attack require almost no special skills and are almost impossible to stop and they might not depend on any action by the user. The simplest attacks require that you open or display a SWF or PDF file that hides the malware.

Here is a link to a list of recent Flash (SWF) vulnerabilities. Do a quick Google and you find not only instructions but software products that allow you to spy on employees, spouses, or anyone -- capturing screen images, recording conversations, taking pictures -- all without being detected.

http://news.cnet.com/security/?keyword=Flash


Linux and OS X are vulnerable too.
Printer Friendly | Permalink |  | Top
 
RUMMYisFROSTED Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-29-09 10:57 AM
Response to Original message
29. I suspect that every "advanced" country in the world does this.
Furthermore, I'd bet that we're at, or near, the top of the list.

:shrug:
Printer Friendly | Permalink |  | Top
 
Blue_Tires Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Mar-30-09 03:44 PM
Response to Original message
35. i also posted it in editorial
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri Apr 26th 2024, 10:26 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Latest Breaking News Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC