Five Serious Cases of Cyber Espionage


Five recent cases of cyberespionage upon crucial governmental, infrastructure or political systems:

On Tuesday, the Wall Street Journal reported that unknown cyber-intruders had over the past two years hacked into defense-contractor servers housing information about the F-35, or Joint Strike Fighter, the next-generation fighter/bomber for the U.S., Britain and seven other close allies.

The hackers, whom all signs indicated were based in China, weren't able to get the most sensitive information because it's kept offline, but they did copy "several terabytes" — several thousand gigabytes — of data about the F-35's systems, internal maintenance and electronics.

In early April, unnamed government officials told the Wall Street Journal that cyberspies from China and Russia had broken into computer systems used by companies maintaining the three North American electrical grids.

Even worse, the spies had left behind software that could be used to disrupt the grids or take control of nuclear power plants. Chinese and Russian officials denied their governments were involved.

— Canadian researchers revealed in late March that a cyber-spy network based in China had broken into diplomatic computer systems involving 103 different countries. Beijing denied any official involvement, but the investigation had begun when the Dalai Lama, Tibet's leader-in-exile, noticed that sensitive documents from his own PCs had turned up in Chinese hands.

In another incident related to the spy network, a reporter who'd been e-mailing Tibetan exiles was warned off the case only hours later by Chinese officials.

— Just after Barack Obama's election victory in November, Newsweek revealed that both the Illinois senator's campaign and that of his rival, Sen. John McCain, had been spied upon by a foreign power that had placed spyware on staffers' computers.

The FBI and Secret Service contacted both campaigns over the summer with the news that either the Chinese or Russians had copied substantial amounts of information related to foreign policy; the McCain and Obama organizations quickly implemented security measures.

— For more than a year in 2001 and 2002, British hacker Gary McKinnon broke into nearly 100 U.S. military and NASA computers, purportedly seeking information about UFOs. The U.S. eventually figured out who he was and referred the case to Britain, where local authorities arrested him in 2002 but decided not to charge him.

The U.S. indicted him later that year and began extradition proceedings in 2005, which McKinnon has been fighting ever since. U.S. officials say McKinnon caused $700,000 worth of damages and deserves up to 70 years in prison; in Britain, he's become a cause celebre, with a recent diagnosis of Asperger's syndrome further compounding his victim status.[1]



[1]http://www.foxnews.com/story/0,2933,517328,00.html

China’s expansion of economic espionage boils over


If you read Google's explanation about why it threatened to withdraw from China, you might think it's all about a recent Chinese cyber-attack and Google's anger over being made complicit in the persecution of human rights activists.

By cyber experts and China hands alike point to a much broader issue: The Chinese government has adapted the tactics it has used for military cyber espionage for corporate purposes and is now using them on a wide scale. Added to a fundamentally unfair business environment for foreign firms, the damaging effects of Chinese cyber spying may be scaring off firms like Google as they weigh the risks of operating there.

"The story is much bigger than the recent attack or concerns about human rights," said James Mulvenon, a preeminent expert and consultant on Chinese cyber activities, "It's becoming increasingly difficult for international companies to work and operate in China, particularly innovation firms."

As Google announced in its statement, many other firms are being targeted as well. The 34 firms discussed as part of Google's investigation into the attacks are mostly Silicon Valley technology firms who work with or in China, said Mulvenon. This is all part of the Chinese government's stated goal of aiding Chinese-owned firms using state power to cull information from that particular sector.

"The Chinese government has made it very clear they have a set of national champions and those champions should be promoted," he said.

Some China experts contend that Google, which has been operating in China since 2004, may be simply fed up with the Chinese government's pattern of allowing in foreign companies and then appropriating their technology for the benefit of Chinese competitors, in this case the rival search engine Baidu.

"They may be reaching a point where they realize their whole presence in China is being manipulated," said Larry Wortzel, vice-chairman of the U.S.-China Economic and Security Review Commission, which was established by Congress to monitor such issues, "They're losing code and technology. The Chinese government wants Baidu to succeed."

Wortzel said that China's regular practice is to allow firms into China for the express purpose of ripping off their propriety technology and feeding it to their Chinese competitors.

"They don't have any respect for international property rights," said Wortzel, "Once they gain a technology, they use it to reverse engineer it or copy it and then take it and use it to promote a Chinese-owned company."

A huge part of the problem is that there is a lack of policy and legal mechanisms to protect both government and corporate actors in cyberspace. The U.S. response to the increasing cyber threat from China has been improving but is mostly seen as too little, too late. Leaders such as Joint Chiefs Vice Chairman James Cartwright have often called the U.S. government cyber defense effort "dysfunctional," and military leaders have admitted that gargantuan amounts of information and intelligence have been lost.

The Obama administration came into office promising to fix that problem but has faced setbacks along the way. Shortly after publishing a cyber review in May, Bush holdover cyber chief Melissa Hathaway resigned. Homeland Security cyber head Rod Beckstrom also resigned last year over a turf battle with the National Security Agency. The new cyber czar Howard Schmidt was named in late December.

To be clear, Google is not accusing the Chinese government of anything, and a spokesman would only say that they've determined the latest string of attacks "originated from within China."

But cyber security expert Alan Paller, director of research at the SANS Institute, said that attacks like the one on Google can be judged to be government-sponsored, if not government-run outright, due to their sheer sophistication, their massive scale, and the military-like efficiency with which they are carried out.

Paller said his research supports the conclusion that every foreign firm operating in China has likely been penetrated and has software on it that enables outsiders to access it at will. And while attribution of attacks is difficult to prove outright, the string of similar attacks on U.S. government and military installations dating back years shows a pattern of behavior that points directly back to Beijing.

So how do we know the Chinese are shifting those tactics to the economic sphere? One piece of evidence came to light when it was revealed the UK's domestic intelligence service MI5 sent a letter to over 300 firms warning them of state-sponsored economic cyber espionage attacks coming from China.

"That was the proof to me that the same techniques had been moved over to the economic espionage area," said Paller. [1]


[1]http://thecable.foreignpolicy.com/posts/2010/01/13/china_s_expansion_of_economic_espionage_boils_over

Trade Secret Law and Economic Espionage Act of 1996(3)


Economic Espionage Act of 1996

The Economic Espionage Act of 1996 (the “EEA”, now codified in 18 U.S.C. §§1831-1839) has created an important change in the law relating to the protection of trade secrets; namely, it provides for trade secret protection at the federal level. Specifically, the EEA was enacted as a federal criminal statute and, as such, it is enforced by the U.S. Department of Justice and its U.S. Attorneys’ offices located in each federal district across the country. The EEA does not provide for a private civil right of action. Accordingly, a victim of trade secret theft seeking redress must persuade the federal prosecutor in its judicial district that their particular case is worthy of prosecution.

The EEA contains two operative sections describing the conduct that is prohibited by the law. Section 1831 applies to actors engaged in foreign economic espionage, and requires that the theft of trade secrets benefit a foreign government, instrumentality or agent. Section 1832 is a general criminal trade secrets statute; applicable to anyone engaged in the common misappropriation of trade secrets. Both sections punish one who knowingly: (1) steals or misappropriates trade secrets, (2) receives misappropriated trade secrets, or (3) participates in a conspiracy to misappropriate trade secrets. 18 U.S.C. §§ 1831(a) and 1832(a). The territorial scope of the EEA is essentially limitless: it criminalizes not only acts conducted within the United States, but also foreign acts, provided the actor is a United States resident, 18 U.S.C. § 1837(1), or any “act in furtherance of the offense was committed in the United States.” 18 U.S.C. § 1837(2).

Individuals who violate section 1832 (domestic misappropriation of trade secrets) face penalties of up to ten (10) years in prison and unspecified fines. 18 U.S.C. § 1832(a). (Under federal law, the general maximum fine for felonies is $250,000.) Corporations or other organizations that violate section 1832 may be fined up to $5 million. The penalties for engaging in foreign economic espionage in violation of section 1831 (foreign economic espionage) are even greater: the maximum organizational fine is increased to $10 million and the maximum prison term is raised to fifteen (15) years.[1]


[1]http://www.mccormacklegal.com/blog/trade-secret-law/trade-secret-law-and-economic-espionage-act-of-1996

Copyright © 2010 Amazing world All rights reserved.
Wp Theme by Templatesnext . Blogger Template by Anshul