Thread Rating:
  • 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Generational Dynamics World View
*** 21-Dec-18 World View -- China hackers collect data on hundreds of millions of Americans and Westerners

This morning's key headlines from GenerationalDynamics.com
  • China hackers collect data on hundreds of millions of Americans and Westerners
  • China cracks down on Twitter
  • China extends its 'social credit score' system to Americans and Westerners
  • Steve Bannon: Chinese engineers working on American weapons systems
  • Huawei chairman challenges US to prove they're a security risk

****
**** China hackers collect data on hundreds of millions of Americans and Westerners
****


[Image: g181220b.jpg]
Poster showing Chinese hackers displayed at Justice Dept. press conference on Thursday

The Dept. of Justice on Thursday accused China of a massive
international hacking scheme that penetrated commercial and military
systems in at least 12 countries, including Brazil, Canada, Finland,
France, Germany, India, Japan, Sweden, Switzerland, the United Arab
Emirates, the United Kingdom, and the United States.

An indictment charged two Chinese nationals, Zhu Hua and Zhang
Shilong, with conspiracy to commit computer intrusions, conspiracy to
commit wire fraud, and aggravated identity theft.

According to the indictment:

<QUOTE>"Over the course of the Technology Theft Campaign,
which began in or about 2006, Zhu, Zhang, and their coconspirators
in the APT10 Group successfully obtained unauthorized access to
the computers of more than 45 technology companies and
U.S. Government agencies based in at least 12 states, including
Arizona, California, Connecticut, Florida, Maryland, New York,
Ohio, Pennsylvania, Texas, Utah, Virginia and Wisconsin. The
APT10 Group stole hundreds of gigabytes of sensitive data and
information from the victims’ computer systems, including from at
least the following victims: seven companies involved in aviation,
space and/or satellite technology; three companies involved in
communications technology; three companies involved in
manufacturing advanced electronic systems and/or laboratory
analytical instruments; a company involved in maritime technology;
a company involved in oil and gas drilling, production, and
processing; and the NASA Goddard Space Center and Jet Propulsion
Laboratory. In addition to those victims who had information
stolen, Zhu, Zhang, and their co-conspirators successfully
obtained unauthorized access to computers belonging to more than
25 other technology-related companies involved in, among other
things, industrial factory automation, radar technology, oil
exploration, information technology services, pharmaceutical
manufacturing, and computer processor technology, as well as the
U.S. Department of Energy’s Lawrence Berkeley National Laboratory.

Finally, the APT10 Group compromised more than 40 computers in
order to steal sensitive data belonging to the Navy, including the
names, Social Security numbers, dates of birth, salary
information, personal phone numbers, and email addresses of more
than 100,000 Navy personnel."<END QUOTE>


Most of the news coverage has focused on the theft of commercial and
military technology, and how that will be used by China's state-run
companies and military. These technologies will be useful to the
Chinese as they build weapons systems and prepare to launch a war on
the United States.

But for this article, I want to focus on the theft of personal data on
Americans (and citizens of other Western countries).

This indictment says that a hack of navy computers stole names, Social
Security numbers, dates of birth, salary information, personal phone
numbers, and email addresses of more than 100,000 Navy personnel.

I recently described the Marriott hotel data breach by China's spy agency, the Ministry of State Security (MSS)
which stole names, addresses, telephone numbers,
credit card numbers, passport numbers, birthdates, passport photos,
hotel arrival and departure dates, and information on where people
traveled and with whom on roughly 500 million guests.

Other data breaches attributed to China's MSS include a 2017 Equifax
hack that collected detailed credit information on 145 million people,
a 2013 Target breach that exposed payment card and contact information
for 60 million customers, and a 2015 hack of the Office of Personnel
Management (OPM) that collected detailed personal information on more
than 20 million government employees, family members and applicants.
There were other breaches of health-care institutions, including
Anthem and CareFirst, that provided health data.

China's military is creating a huge database of hundreds of millions
of Americans. Such a database would be illegal in the United States,
but it's being done by the Chinese. Dept of Justice and Dept of Justice and UK government and CNBC

****
**** China cracks down on Twitter
****


China's government has complete control over databases and servers in
China, and can delete messages at will on Chinese social media
platforms. But social media platforms outside of China, such as
Twitter and Facebook, should be out of reach of the Chinese, right?
In fact, since Twitter and Facebook are blocked in China, and only a
person with sophisticated software skills can get to them from China,
the Chinese can simply ignore then, right?

Starting in early November, China's government launched a large
campaign to remove from Twitter tweets that the government finds
offensive. Many of these tweets were written years ago. Apparently
this was done very rapidly, in order to maintain the element of
surprise before Twitter users had a chance to arrange for all their
tweets to be safely backed up.

If the owner of the Twitter account is in China, the government
security thugs simply arrested him, brought him into a police station,
and demanded that he access his Twitter account immediately and delete
all his tweets. This apparently happened to quite a few people.

In many cases, however, the Chinese government was able to delete
tweets from an account without the participation of the account owner,
or knowing his password. The methods by which they did this are a
sketchy in the reports, but I believe the following is how they
accomplished it.

In most online systems, you can change or reset your password
automatically, and then the system sends you an e-mail message where
you have to click on something to confirm the change. Only the owner
of that e-mail account should have access to it, so that should
provide a secure means of confirmation.

However, if your e-mail account is in China, then the Chinese
government can gain control of it, and then make the password change
on the Twitter account, and confirm it on the e-mail account,
without you even knowing.

However, many online services go further and also use the telephone.
Instead of (or in addition to) sending you an e-mail message. the
online service will ring your telephone, using a phone number for you
that it has on file, and then the recorded voice says, "press 1 to
confirm or 2 to cancel," or something like that.

In America, that should be secure means of confirmation, since only
you can answer that phone number. But if it's a Chinese phone number
then, as in the case of e-mail, the military can take control of your
phone number and then use it to confirm a password change.

There's one more method that China's military could be using. If you
have Chinese-manufactured phone from Huawei or ZTE, it's believed that
these phones have back doors that the Chinese military can use to
access data, or even to control the phone. This would provide another
method for confirming a password change.

The point is that China's military is willing to use any means it can
to steal information, and they're willing to try everything, no matter
how obscure, until something works. That's why they already have a
database containing personal information of hundreds of millions of
Americans.

Last week, I received a letter from Bowker Corp. saying that their
database had been hacked, and my data might have been compromised.
There are companies being hacked successfully every day, sometimes by
kids in basements, sometimes by the Russians, and sometimes by the
Chinese.

The Chinese in particular are using every technique available to them
to get as much data on ordinary Americans as they can, and merge it
into a database that they can access at any time they want to track
someone. Human Rights Watch and Radio Free Asia and Hong Kong Free Press and China Change

****
**** China extends its 'social credit score' system to Americans and Westerners
****


There has been a lot of news recently about China's "Social Credit
Score" system that has been rumored for a long time and was officially
announced in December. China is creating a large "big data" database
of all of its 1.3 billion people, accumulating data from a variety of
departments and agencies, combining the data in individual data agency
databases into a large database, and using it to crease a credit score
for every Chinese citizen.

The system will reward "pro-social behaviors," such as volunteer work
and blood donations. The system will penalize things like violating
traffic laws or charging under-the-table fees. Agencies like tourism
bodies, business regulators and transit authorities are supposed to
work together. These agencies will provide data on private citizens
to the central system, and will then use the credit score to reward or
punish citizens. In fact, the system is already partially in place,
in that people with unacceptable credit scores have already been
blocked from booking more than 11 million flights and 4 million
high-speed train trips. According to reports, other punishments
include slower internet speeds, reducing access to good schools for
individuals or their children, banning people from certain jobs,
preventing booking at certain hotels and losing the right to own pets.

Many Americans and Westerners view this system with little more than
curiosity, thinking that applies only to Chinese citizens in China, so
it doesn't matter to them.

Starting with Thursday's indictments against Chinese hackers, it's
becoming increasingly clear that the Chinese military is going a lot
farther, and creating databases of hundreds of millions of people in
other countries, whether American, or others. Of course, the data on
foreign citizens is not readily available to the military in the way
that domestic data is, but the Chinese are employing increasingly
sophisticated methods to collect this data on foreign citizens,
whether hacking Western commercial or government databases, or using
its vast population studying and working overseas to collect data and
information and pass it back to China. Bloomberg and Xinhua
and Independent (London) and Life Site News

****
**** Steve Bannon: Chinese engineers working on American weapons systems
****


China has a massive population of 1.3 billion people and, as I've
written several times in the past, China considers these people to be
"magic weapons" to be used in other countries to infiltrate
government, military and commercial organizations, and to influence
these organizations as well as to collect information about them to be
sent back to China's military.

Steve Bannon, formerly the chief strategist and advisor to president
Donal Trump, has researched the extent that Chinese engineers are
working on American weapons systems.

According to Bannon, many Chinese workers start out as students in
American colleges, through Confucius Institutes, controlled by the
Chinese Communist Party (CCP) through Beijing's international coercive
propaganda agency, the United Front Work Department (UFWD),
and funded by China's military. Every
aspect of the Confucian Institutes is tightly controlled by the CCP.
Teachers and teaching materials are all supplied by China. Taiwan and
Tibet are portrayed as undisputed territories of China, with no
alternate views permitted. The 1989 Tiananmen Square massacre, the
one million Uighurs in re-education camps, the human rights abuses in
China are all forbidden subjects.

Bannon says that Chinese students study in colleges to get access to
the latest scientific research to be passed back to the CCP. These
students become contractors to get access to the latest American
weapons systems, once again for the CCP. According to Bannon, Defense
Department reports on the infiltration of China into our research
universities and our weapons labs shows extensive infiltration:

<QUOTE>"I don't think people understand these reports. These
reports are essentially declassified reports that showed that the
300,000 students are here on student visas and the 10,000
contractors that we have the weapons labs -- I think that up to
2/3 of them could be intelligence assets, intelligence officers or
agents.

This is political correctness and greed and avarice writ large.
How did contractors-- and let's call them out-- Booz Allen and all
these contractors-- how do these contractors and these big
government programs get so many Chinese nationals working into our
weapons labs? Our weapons labs are at the cutting edge of national
security. How did it happen? ...

The political correctness of it all-- the Financial Times of
London leaked the other day that my colleague, Stephen Miller,
who's a terrific young man, actually had the plan in place to get
all 300,000 Chinese students out of the country with a way to cut
the visas off right away. Not that we we're going to execute on
it, but it was even in thinking.

And obviously, it got leaked. In the Times, it goes around the
State Department, et cetera. Look at all the appeasers. I am so
glad. I take great pride that someone like Susan Thornton now owns
a farm up in Maine because she was part of this kind of rational
accommodationist, this softness in the Defense Department, in the
State Department, in our intelligence services that basically went
along with what China wanted to do and looked the other
way."<END QUOTE>


A book titled "Silent Invasion: How China Is Turning Australia into a
Puppet State," written by Clive Hamilton, documents the extent to
which Chinese nationals have infiltrated Australia's government, and
influences its policies. Several publishers withdrew offers to
publish the book because of pressure from the Chinese Communist Party.
As one Australian commenter pointed out, he could walk into any
bookstore or library in Australia and find a dozen books that accused
the CIA of controlling Australia's government and institutions, and no
one would care. However, just one book about China caused a furious,
threatening response from China. ( "26-Feb-18 World View -- New book documents extensive Chinese infiltration into Australia's organizations"
)

The book was finally published in February, thanks to pressure from
alarmed members of the Australian parliament's national security
committee. His research revealed evidence of CCP influence and
infiltration in politics, culture, real estate, agriculture,
universities, unions, and even primary schools. The book lists more
than 40 former and sitting Australian politicians allegedly doing the
work of China's totalitarian Government, if sometimes unwittingly.

Another book documented similar infiltration into New Zealand's
government. ( "16-Feb-18 World View -- Concerns grow over China's covert infiltration into New Zealand's government"
)

There are some changes in the works. Some colleges have severed
relations with Confucius Institutes, and the 2019 National Defense
Authorization Act, signed in August, contains provisions barring any
U.S. university from using Pentagon resources for any program
involving Confucius Institutes. In many cases, this will force
universities to choose between receiving funding the Pentagon and
funding from China's military.

The information provided by China's "magic weapons," the Chinese
nationals working and studing in the West, can provide a great deal
more information to add to the data collected by hacks of hotel
databases and other sources. ZeroHedge and RealVision

Related Articles:

****
**** Huawei chairman challenges US to prove they're a security risk
****


Several countries, including the United States, Britain, Canada,
Australia, New Zealand, and Japan have banned or are considering
banning routers and other equipment from Huawei Technologies Ltd., the
world's largest global maker of network gear, because it's feared that
these products contain "back doors" that allow them to be secretly
accessed and controlled from China. The result is that Huawei is
being shut out of supplying products for the latest 5G networks.

As I've said in the past, I've spent a part of my career as a senior
software engineer developing chip-level operating system software for
embedded systems, so I know exactly how any chip or any electronic
device can be turned into a tool for espionage. Furthermore, I can
tell you that not only is it doable, it's not even particularly
difficult for someone with the right skills.

Now Ken Hu, the chairman of Huawei, is challenging America and other
companies to provide evidence that Huawei products are in fact
security risks. He complains that the accusations stem from “ideology
and geopolitics.” He warned that excluding Huawei from
fifth-generation networks in Australia and other markets would hurt
consumers by raising prices and slowing innovation.

According to Hu:

<QUOTE>"There has never been any evidence that our equipment
poses a security threat. ...We have never accepted complaints from
any government to damage the networks or business of any of our
customers."<END QUOTE>


The problem is that Huawei could develop a chipset that works exactly
as described in the public specifications. The chipset could be
subjected to thousands of tests, and they would all work perfectly.
But what Huawei could do is install a "backdoor" into the chipset.
When the chip receives, say, a secret 1024-bit code, then it will
execute commands sent to it by Chinese engineers. Thus, the Chinese
are then in control of any devices with Huawei chips, and it cannot be
detected until it's too late.

Now, as everyone knows, I'm a very helpful kind of guy, and I want to
be helpful to Chairman Hu, and tell him how he can regain the
confidence of the West that his chips and devices do not contain back
doors. And I offer this advice in the spirit of peace, cooperation
and friendship between America and China.

Hu has the burden of proof backwards. He's asking America to prove
there's a security risk. Actually, the burden is on him to do the
opposite -- prove affirmatively that there's no security risk. How
does he do that? Here's how:
  • Hire teams of Western software and hardware engineers,
    selected by American, European, Australian, Japanese and other Western
    governments, to join the development teams in China developing Huawei
    products. These people will be hired to do real work, and participate
    fully in all aspects of Huawei's hardware and software development.

    This should not be a problem, since China already sends Chinese
    workers to do the same things in American companies. So Ken Hu should
    be quite comfortable doing this.

  • The Western engineers must have full 100% access to all software
    and firmware source code, so that they can verify that the code
    contains no back doors. In addition, they should have full access to
    the source code for all the Quality Assurance tests that are performed
    on all Huawei products. Once again, this is the same as for Chinese
    workers in America.

  • The Western engineers must have full access to the entire release
    cycle, so that they can reliably verify that all the executable code
    going into the devices is exactly the code that was compiled from the
    source code that they've already inspected.

  • Of course, while they're working in China, the Western engineers
    should have full access to the internet so that they can communicate
    with the American government, and let them know immediately if they
    find anything suspicious. Again, this is the same as the access that
    Chinese workers in the West have.

This will permit Ken Hu to prove that Huawei's products pose no
security risks, and he can then ask that the bans to their use can be
lifted.

I hope that Ken Hu will implement these suggestions, which have been
offered in the spirit of peace, cooperation and friendship between the
American and Chinese people, and because I would like to help him get
the Huawei ban lifted. AP

Related Articles:


KEYS: Generational Dynamics, China,
Marriot Hotel, Ministry of State Security, MSS,
Zhu Hua, Zhang Shilong, APT10, Twitter, Facebook,
Social Credit Score, Steve Bannon,
Clive Hamilton, Australia, Silent Invasion, New Zealand,
Huawei, Ken Hu

Permanent web link to this article
Receive daily World View columns by e-mail
Contribute to Generational Dynamics via PayPal

John J. Xenakis
100 Memorial Drive Apt 8-13A
Cambridge, MA 02142
Phone: 617-864-0010
E-mail: john@GenerationalDynamics.com
Web site: http://www.GenerationalDynamics.com
Forum: http://www.gdxforum.com/forum
Subscribe to World View: http://generationaldynamics.com/subscribe
Reply


Messages In This Thread
RE: Generational Dynamics World View - by radind - 05-14-2016, 03:21 PM
RE: Generational Dynamics World View - by radind - 05-23-2016, 10:31 PM
RE: Generational Dynamics World View - by radind - 08-11-2016, 08:59 PM
RE: Generational Dynamics World View - by SomeGuy - 01-18-2017, 09:23 PM
RE: Generational Dynamics World View - by tg63 - 02-04-2017, 10:08 AM
RE: Generational Dynamics World View - by Galen - 03-13-2017, 03:33 PM
RE: Generational Dynamics World View - by SomeGuy - 03-15-2017, 02:56 PM
RE: Generational Dynamics World View - by SomeGuy - 03-15-2017, 03:13 PM
RE: Generational Dynamics World View - by Galen - 05-30-2017, 01:04 AM
RE: Generational Dynamics World View - by Galen - 07-08-2017, 01:34 AM
RE: Generational Dynamics World View - by tg63 - 08-09-2017, 11:07 AM
RE: Generational Dynamics World View - by tg63 - 08-10-2017, 02:38 PM
RE: Generational Dynamics World View - by Galen - 10-25-2017, 03:07 PM
RE: Generational Dynamics World View - by rds - 10-31-2017, 03:35 PM
RE: Generational Dynamics World View - by rds - 10-31-2017, 06:33 PM
RE: Generational Dynamics World View - by noway2 - 11-20-2017, 04:31 PM
RE: Generational Dynamics World View - by Galen - 12-28-2017, 11:00 PM
RE: Generational Dynamics World View - by Galen - 12-31-2017, 11:14 PM
RE: Generational Dynamics World View - by JDG 66 - 06-22-2018, 02:54 PM
RE: Generational Dynamics World View - by JDG 66 - 07-11-2018, 01:42 PM
RE: Generational Dynamics World View - by JDG 66 - 07-11-2018, 01:54 PM
RE: Generational Dynamics World View - by JDG 66 - 07-19-2018, 12:43 PM
RE: Generational Dynamics World View - by JDG 66 - 07-25-2018, 02:18 PM
RE: Generational Dynamics World View - by JDG 66 - 07-11-2018, 01:58 PM
RE: Generational Dynamics World View - by Galen - 08-18-2018, 03:42 AM
RE: Generational Dynamics World View - by Galen - 08-19-2018, 04:39 AM
21-Dec-18 World View -- China hackers collect data on hundreds of millions of America - by John J. Xenakis - 12-20-2018, 11:24 PM
RE: Generational Dynamics World View - by tg63 - 09-25-2019, 11:12 AM
RE: Generational Dynamics World View - by JDG 66 - 03-09-2020, 02:11 PM
RE: Generational Dynamics World View - by Camz - 03-10-2020, 10:10 AM
RE: Generational Dynamics World View - by tg63 - 03-12-2020, 11:11 AM
RE: Generational Dynamics World View - by JDG 66 - 03-16-2020, 03:21 PM
RE: 58 year rule - by Tim Randal Walker - 04-01-2020, 11:17 AM
RE: 58 year rule - by John J. Xenakis - 04-02-2020, 12:25 PM
RE: Generational Dynamics World View - by Isoko - 05-04-2020, 02:51 PM
RE: Generational Dynamics World View - by tg63 - 01-04-2021, 12:13 PM
RE: Generational Dynamics World View - by CH86 - 01-05-2021, 11:17 PM
RE: Generational Dynamics World View - by mamabug - 01-10-2021, 06:16 PM
RE: Generational Dynamics World View - by mamabug - 01-11-2021, 09:06 PM
RE: Generational Dynamics World View - by mamabug - 01-12-2021, 02:53 AM
RE: Generational Dynamics World View - by mamabug - 01-13-2021, 03:58 PM
RE: Generational Dynamics World View - by mamabug - 01-13-2021, 04:16 PM
RE: Generational Dynamics World View - by mamabug - 01-15-2021, 03:36 PM
RE: Generational Dynamics World View - by galaxy - 08-19-2021, 03:03 AM
RE: Generational Dynamics World View - by galaxy - 08-21-2021, 01:41 PM
RE: Generational Dynamics World View - by galaxy - 02-27-2022, 06:06 PM
RE: Generational Dynamics World View - by galaxy - 02-27-2022, 10:42 PM
RE: Generational Dynamics World View - by galaxy - 02-28-2022, 12:26 AM
RE: Generational Dynamics World View - by galaxy - 02-28-2022, 04:08 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Why the social dynamics viewpoint to the Strauss-Howe generational theory is wrong Ldr 5 4,808 06-05-2020, 10:55 PM
Last Post: pbrower2a
  Theory: cyclical generational hormone levels behind the four turnings and archetypes Ldr 2 3,395 03-16-2020, 06:17 AM
Last Post: Ldr
  The Fall of Cities of the Ancient World (42 Years) The Sacred Name of God 42 Letters Mark40 5 4,677 01-08-2020, 08:37 PM
Last Post: Eric the Green
  Generational cycle research Mikebert 15 16,246 02-08-2018, 10:06 AM
Last Post: pbrower2a
Video Styxhexenhammer666 and his view of historical cycles. Kinser79 0 3,334 08-27-2017, 06:31 PM
Last Post: Kinser79

Forum Jump:


Users browsing this thread: 6 Guest(s)