Russia says wants Putin-Obama talks on Syria | Disconcerting U.S. Cyber Deterrence Troubles Continueby Jack Goldsmith Tuesday September 15th, 2015 at 9:03 AM |

Russia says wants Putin-Obama talks on Syria

1 Share
MOSCOW (Reuters) - Kremlin spokesman Dmitry Peskov said on Tuesday that dialogue between Moscow and Washington on solving the Syria crisis was indispensable.
  

Tatar Activist Get Three Years In Jail For Stance On Crimea

1 Share
A court in Russia's republic of Tatarstan has sentenced the chairman of the Tatar Public Center to three years in jail.

Refugees Stranded After Hungary Border Closed

1 Share
Hundreds of refugees spent the night sleeping rough next to the Hungarian border fence after the main crossing from Serbia was closed at midnight. It comes as Hungary imposed tough new laws to stop the tide of people trying to enter the country illegally. (Reuters)

Algerian President Removes Feared Intelligence Chief

1 Share
The ousted official, Mohamed Mediene, better known as Toufik, was a powerful figure who headed the intelligence service for 25 years.

Russian Moves in Syria Widen Role in Mideast

1 Share
American officials said the movement of modern battle tanks into Syria was part of an escalating buildup that could give Moscow its most significant military foothold in the Middle East in decades.

World Briefing: Syria: Suicide Attacks by Islamic State Target Cadets and a Militia in the North 

1 Share
Two car bombings half an hour apart killed 26 people on Monday in a predominantly Kurdish city.
Next Page of Stories
Loading...
Page 10

News Analysis: Cyberthreat Posed by China and Iran Confounds White House 

1 Share
President Obama has vowed to deter computer attacks on the United States, but he is struggling to muster the leverage to do so ahead of a state visit from China’s leader.

For Those Who Remain in Syria, Daily Life Is a Nightmare

1 Share
In cities like Douma, a suburb of Damascus, routine strikes have forced residents to flee and severely disrupted life for those who are unable to.

Special Report: Democracy in 21st Century: Views About Internet Turn Negative 

1 Share
Increasing numbers of privacy-conscious Europeans are seeing the Internet as a threat to freedom and democracy.

Special Report: Democracy in 21st Century: Why Do Terrorists Target Democracies? 

1 Share
A woman displayed the French word for "freedom" at a protest in Berlin after two deadly attacks in Paris — one at Charlie Hebdo newsroom and another at a kosher market.

Turkey on the verge of civil war, says Kurdish leader

1 Share
Head of Peoples’ Democratic party raises fears after spate of clashes near Syrian border between Turkish nationalists and Kurds
The leader of Turkey’s main pro-Kurdish political party has warned that the country is on the verge of civil war between state forces and militant Kurdish separatists. The remarks made by Selahattin Demirtas, co-chairman of the Peoples’ Democratic party, followed scenes of violence and firebombing in Turkey last week, with hundreds of reported attacks by nationalist mobs on offices belonging to Demirtas’s party, known by the Turkish abbreviation HDP, as well as on ordinary Kurds.
The incidents were partially a reflection of simmering anti-Kurdish sentiment in a week that saw 29 Turkish security personnel killed in three days at the hands of suspected Kurdish PKK guerrillas. Since the resumption of hostilities earlier this summer between the state and the PKK, considered a terror organisation by Washington and Ankara, more than 100 soldiers have reportedly died. Turkishairstrikes have pounded PKK positions in the south east and across the border in the Kurdish areas of northern Iraq.
Continue reading...

Australia PM Tony Abbott ousted by Malcolm Turnbull

1 Share
From: itnnews
Duration: 01:03

Australia has a new prime minister after Tony Abbott was ousted as leader of the Liberal Party by Malcolm Turnbull. Report by Cara Legg.
Current affairs, amazing footage and incredible stories. Welcome to ODN - On Demand News. Formerly the ITN YouTube channel, ODN is your home for the top visual stories happening across the globe.

Like us on Facebook: http://bit.ly/ODNface
Follow us on Twitter: http://bit.ly/ODNTweets
Add us on Google+: http://bit.ly/ODNplus

More stories from ODN:
Female powerlifter pulls 17 ton tram - http://bit.ly/PullATram
NASA mission reaches halfway point - http://bit.ly/NASAMission
Australian PM Abbott ousted by Turnbull - http://bit.ly/TurnbullIn
World black pudding throwing contest held - http://bit.ly/BlackPud
Mount Aso erupts unexpectedly in Japan - http://bit.ly/AsoErupts
12 dead in Egyptian security shooting mistake - http://bit.ly/EgyptMexico
California wildfires continue to spread - http://bit.ly/CalIFires
Spectacular dives wow at the Red Bull World Series - http://bit.ly/RedBullDives
Migrants stranded as Germany re-imposes border controls - http://bit.ly/GermanyRefugees139
Rescued sea lions returned to the ocean in Peru - http://bit.ly/PeruSeaLions
Migrants endure wretched conditions on Greek island - http://bit.ly/MigrantsToGreece
Refugees break through newly built border fence in Hungary - http://bit.ly/HungaryRefugees
Rare baby rhinos filmed in Indonesian park - http://bit.ly/IndoRhinos
James Blake attacked by police - http://bit.ly/JamesBlakePolice
Gas blast kills 44 in India - http://bit.ly/IndiaBlast
Ceres' bizarre bright spots up close - http://bit.ly/CeresSpots
Drones used to protect sea turtles - http://bit.ly/DronesHelpTurtles
6 year old boy becomes police officer - http://bit.ly/6yoPoliceman
Images show the aftermath of deadly Colorado cinema shooting - http://bit.ly/AurorAShooting
Wheelchair dogs in wheelchairs play on the beach in Peru - http://bit.ly/WheelchairDogs
Influx of refugees sparks EU debate over sharing quotas - http://bit.ly/RefugeeQuotas
The most BMX time machines performed in one minute - http://bit.ly/BMXTimeMachines
World's tallest cowboy boots - http://bit.ly/BigBoots
Fossils of human-like species discovered in South Africa - http://bit.ly/HomoNaledI
Ducklings get to safety with police escort - http://bit.ly/DuckCrossing
House floats away amid heavy flooding in Japan - http://bit.ly/JapanFloods109
Giant Lenin statue head unearthed - http://bit.ly/GiantLenin
Skateboarder rides at 112kmph - http://bit.ly/112kmphSkateboarder
New Apple releases! - http://bit.ly/NewAppleStuff
Baby giraffe makes her debut at Houston Zoo - http://bit.ly/GiGiGiraffe
World record breaking fast tortoise - http://bit.ly/FastTortiose
Goalkeeping dog sets record - http://bit.ly/DogGoalie
Read the whole story
 
· · ·
Next Page of Stories
Loading...
Page 11

Female powerlifter pulls 17 ton tram 

1 Share
From: itnnews
Duration: 00:54

Russian female powerlifter pulls 17 ton retro-tram in an attempt to set a national record. Report by Cara Legg.
Current affairs, amazing footage and incredible stories. Welcome to ODN - On Demand News. Formerly the ITN YouTube channel, ODN is your home for the top visual stories happening across the globe.

Like us on Facebook: http://bit.ly/ODNface
Follow us on Twitter: http://bit.ly/ODNTweets
Add us on Google+: http://bit.ly/ODNplus

More stories from ODN:
Female powerlifter pulls 17 ton tram - http://bit.ly/PullATram
NASA mission reaches halfway point - http://bit.ly/NASAMission
Australian PM Abbott ousted by Turnbull - http://bit.ly/TurnbullIn
World black pudding throwing contest held - http://bit.ly/BlackPud
Mount Aso erupts unexpectedly in Japan - http://bit.ly/AsoErupts
12 dead in Egyptian security shooting mistake - http://bit.ly/EgyptMexico
California wildfires continue to spread - http://bit.ly/CalIFires
Spectacular dives wow at the Red Bull World Series - http://bit.ly/RedBullDives
Migrants stranded as Germany re-imposes border controls - http://bit.ly/GermanyRefugees139
Rescued sea lions returned to the ocean in Peru - http://bit.ly/PeruSeaLions
Migrants endure wretched conditions on Greek island - http://bit.ly/MigrantsToGreece
Refugees break through newly built border fence in Hungary - http://bit.ly/HungaryRefugees
Rare baby rhinos filmed in Indonesian park - http://bit.ly/IndoRhinos
James Blake attacked by police - http://bit.ly/JamesBlakePolice
Gas blast kills 44 in India - http://bit.ly/IndiaBlast
Ceres' bizarre bright spots up close - http://bit.ly/CeresSpots
Drones used to protect sea turtles - http://bit.ly/DronesHelpTurtles
6 year old boy becomes police officer - http://bit.ly/6yoPoliceman
Images show the aftermath of deadly Colorado cinema shooting - http://bit.ly/AurorAShooting
Wheelchair dogs in wheelchairs play on the beach in Peru - http://bit.ly/WheelchairDogs
Influx of refugees sparks EU debate over sharing quotas - http://bit.ly/RefugeeQuotas
The most BMX time machines performed in one minute - http://bit.ly/BMXTimeMachines
World's tallest cowboy boots - http://bit.ly/BigBoots
Fossils of human-like species discovered in South Africa - http://bit.ly/HomoNaledI
Ducklings get to safety with police escort - http://bit.ly/DuckCrossing
House floats away amid heavy flooding in Japan - http://bit.ly/JapanFloods109
Giant Lenin statue head unearthed - http://bit.ly/GiantLenin
Skateboarder rides at 112kmph - http://bit.ly/112kmphSkateboarder
New Apple releases! - http://bit.ly/NewAppleStuff
Baby giraffe makes her debut at Houston Zoo - http://bit.ly/GiGiGiraffe
World record breaking fast tortoise - http://bit.ly/FastTortiose
Goalkeeping dog sets record - http://bit.ly/DogGoalie
Read the whole story
 
· · ·

Police: Kentucky trooper killed, suspect shot dead

1 Share
Following hours-long chase, suspect is fired upon by officers after refusing to drop his weapon

Historic wildfires rip through California

1 Share
Valley Fire in California has claimed the life of its first victim; In just two days 61,000 acres and 400 homes have burned

Can Black Lives Matter advance an agenda?

1 Share
Advocates for civil rights reforms battle over legislating versus demonstrating

Russia makes military pledge to Syria

1 Share
Russia's Vladimir Putin pledges to continue military support for the Syrian government, despite Western concerns over Moscow's role.

Analysis: Russia gambles in Syria, ramping up involvement

1 Share
BEIRUT (AP) -- In ramping up its military involvement in Syria's civil war, Russia appears to be betting that the West, horrified by the Islamic State group's spread and an escalating migrants crisis, may be willing to quietly tolerate President Bashar Assad for a while, perhaps as part of a transition....
Next Page of Stories
Loading...
Page 12

The Latest: Same man suspected in 2 Mississippi killings

1 Share
CLEVELAND, Miss. (AP) -- The latest on a shooting at Delta State University that left a professor dead (all times local):...

Woman who died in California fire had no way to get out

1 Share
MIDDLETOWN, Calif. (AP) -- The caretaker of a woman found dead in the ruins of her home that was destroyed by a wildfire said Monday the woman had advanced multiple sclerosis and had no way to get out....

Feds drop charges against Xi Xiaoxing, professor accused of passing secrets to China 

1 Share
Xi Xiaoxing, a Temple University professor who had been accused of spying for China, will no longer face federal charges.
The Justice Department said Friday that it was dropping its case against the 57-year-old physicist upon becoming aware of "additional information."
Prosecutors charged Mr. Xi with four counts of wire ...

Joe Biden offers support for NATO expansion in Balkans as Montenegro is considered 

1 Share
In a move likely to raise tensions with Russia, the Obama administration Monday gave qualified support for the small eastern European nation of Montenegro to join NATO.
Vice President Joseph R. Biden told Prime Minister Milo Djukanovic in a phone call Monday that the U.S. supports the country's membership in ...

Analysis: Russia gambles in Syria, ramping up involvement

1 Share
BEIRUT (AP) - In ramping up its military involvement in Syria's civil war, Russia appears to be betting that the West, horrified by the Islamic State group's spread and an escalating migrants crisis, may be willing to quietly tolerate President Bashar Assad for a while, perhaps as part of a ...

KIM HOLMES: Obama's 'the worse, the better' Syria strategy

1 Share
ANALYSIS/OPINION: 
What a mess. President Obama says he wants to take in at least 10,000 refugees from the Middle East. Meanwhile Russia's Vladimir Putin is sending fighter aircraft and troops to prop up a Syrian leader that Mr. Obama has said over and over again must go. The 50 or ...
Next Page of Stories
Loading...
Page 13

NY National Guard helicopter crew headed to Mexican border

1 Share
ALBANY, N.Y. (AP) - A New York Army National Guard helicopter crew will be heading to the U.S.-Mexico border to conduct aerial reconnaissance missions.
Officials at National Guard headquarters in suburban Albany say four crew members will fly a UH-72 Lakota light utility helicopter to the Mexican border in Arizona. ...

PHOTO: Hornet Lightning

1 Share

MARINES: Preparing For A Baltic War

1 Share

Russia gambles in Syria, ramping up involvement

1 Share
In ramping up its military involvement in Syria's civil war, Russia appears to be betting that the West, horrified by the Islamic State group's spread and an escalating migrants crisis, may be willing to quietly tolerate President Bashar Assad for a while, perhaps as part of a transition.
     

Why do friends Dylann Roof stayed with before Charleston shootings shrug about their inaction?

1 Share
The trailer where Dylann Roof found refuge is faded yellow with a thousand tiny dents. It is on the western edge of Columbia, along an unpaved road strewn with damp garbage, and it is where Roof briefly lived until the day he allegedly killed nine black church members at Emanuel AME Church in Charleston.
     

Militants shell Syria's Aleppo, killing 7 and wounding 52

1 Share
Syria's state TV says insurgents have shelled government-held neighborhoods in the northern city of Aleppo, killing seven and wounding 52.
     
Next Page of Stories
Loading...
Page 14

Suicide attack in northeastern Syrian city kills 7

1 Share
A car bomb exploded Tuesday in the northeastern Syrian city of Hassakeh, killing seven people, a day after two blasts in the predominantly Kurdish city killed dozens, state media and an activist group said.
     

Remember Jade Helm 15, the controversial military exercise? It's over

1 Share
The military exercise Jade Helm 15 generated enough conspiracy theories this year that it garnered mockery on late-night television, commentary from presidential candidates and reaction from the Texas governor. The exercise will end quietly Tuesday, however.
     

Turkey deploying more soldiers, police, prosecutors to break Kurdish foes

1 Share
President Recep Tayyip Erdogan is deploying more soldiers, police and prosecutors in an attempt to put down an escalating separatist Kurdish rebellion with an iron fist.
     

No US sanctions on Chinese companies before Xi Jinping state visit

1 Share
The United States will not impose economic sanctions on Chinese businesses and individuals before the visit of China President Xi Jinping next week, a senior administration official said on Monday.
     

US to begin training Ukraine’s active-duty military

1 Share
Troops with the Vicenza, Italy-based 173rd Airborne Brigade will train up to five battalions of Ukrainian soldiers as operation Fearless Guardian enters a second phase in November, U.S. Army Europe said.
     

'Syria is emptying'

1 Share
A new exodus of Syrians is fueling the extraordinary flow of migrants and refugees to Europe as Syria's four-year-old war becomes the driving force behind the greatest migration of people to the continent since World War II.
     
Next Page of Stories
Loading...
Page 15

Syria: Suicide Attacks by Islamic State Target Cadets and a Militia in the North 

1 Share
Two car bombings half an hour apart killed 26 people on Monday in a predominantly Kurdish city.

The Rush to Find China’s Moles 

1 Share
The bungled prosecutions of two Chinese-American professionals suggest the United States is being rash in its effort to fight economic espionage.

Pakistani spies fear up to 100 million citizen records may have been stolen 

1 Share
A report by Pakistan’s main intelligence agency warns that the personal records of up to 100 million Pakistanis may have been stolen by foreign intelligence agencies due to the alleged links of a software vendor with Israel. 

Refugee Crisis Engulfs Europe 

1 Share
By John Ubaldi
Contributor, In Homeland Security
The mass migration of refugees streaming from the Middle East, Afghanistan and North Africa have put a wedge into the European Union as what to do with this mass influx of migrants seeking a better a life.
The vast majority of these asylum seekers are coming from Syria and Iraq, with around seven million coming from both countries, fleeing the ongoing civil war and attacks by ISIS.
The post Refugee Crisis Engulfs Europe appeared first on In Homeland Security.

Egyptian Military Said to Fire on Mexican Tourists During Picnic - New York Times

1 Share

New York Times

Egyptian Military Said to Fire on Mexican Tourists During Picnic 
New York Times
CAIRO — The mistaken airstrike by the Egyptian military that killed a dozen people on a Mexican tourist trip in the Western Desert hit at a picnic in the middle of the day, witnesses said Monday, raising new questions about both the extent of the ...
Mexican tourists killed by Egypt's military were victims of aerial attack ...CBC.ca 
Egyptian authorities claim tourist convoy was in area 'illegally' – rolling reportThe Guardian

all 1,150 news articles »

Iran says wants China's help to resolve Middle East tensions - Reuters

1 Share

Reuters

Iran says wants China's help to resolve Middle East tensions
Reuters
China and Iran have close diplomatic, economic, trade and energy ties, and China has been active in pushing both the United states and Iran to reach agreement on Iran's nuclear program. Under the multilateral deal, agreed in July, sanctions imposed by ... 
China, Iran see closer ties after nuclear dealChannel News Asia

Iran's Foreign Minister to Visit ChinaThe Diplomat

all 367 news articles »
Next Page of Stories
Loading...
Page 16

Cyberthreat Posed by China and Iran Confounds White House - New York Times

1 Share

New York Times

Cyberthreat Posed by China and Iran Confounds White House
New York Times
“Offense is moving a lot faster than defense,” Mr. Obama told troops on Friday at Fort Meade, Md., home of the National Security Agency and the United States Cyber Command. “The Russians are good. The Chinese are good. The Iranians .... Admiral Rogers ...

and more »

Obama Keeps CIA in Control of "Secret" Drone War in Syria - The New American

1 Share

Obama Keeps CIA in Control of "Secret" Drone War in Syria
The New American
On September 1, the Washington Post published an article citing information provided by a U.S. official that the Central Intelligence Agency (CIA) and the U.S. Special Operations forces “launched a secret campaign to hunt terrorism suspects in Syria as ... 

and more »

It's Agreed: Former CIA Chief Michael Hayden Didn't Kill Jesus - Huffington Post

1 Share

Huffington Post

It's Agreed: Former CIA Chief Michael Hayden Didn't Kill Jesus
Huffington Post
WASHINGTON -- Former CIA Director Michael Hayden still isn't pumped about last year's Senate report on the agency's torture program. It's slanted, it's one-sided, and it cherry-picks information, Hayden wrote in a new attack last week. The way the ...
US Intel Vets Decry CIA's Use of TortureConsortium News
John Brennan Fast FactsKRTV Great Falls News

all 13 news articles »

It's Agreed: Former CIA Chief Michael Hayden Didn't Kill Jesus

1 Share
WASHINGTON -- Former CIA Director Michael Hayden still isn't pumped about last year's Senate report on the agency's torture program. It's slanted, it's one-sided, and it cherry-picks information, Hayden wrote in a new attack ...

Disconcerting U.S. Cyber Deterrence Troubles Continue

1 Share
Two weeks ago the newspapers were filled with leaked threats that the U.S. government was “developing a package of unprecedented economic sanctions against Chinese companies and individuals who have benefited from their government’s cyber theft of valuable U.S. trade secrets.”  At the time I wrote that I was “skeptical that we will see anything more than symbolic or nominal sanctions, if that,” and showed that for years “the administration has consideredand threatened sanctions against China for its cybertheft,” but “little if anything ever happens.”
This morning several sources report that the U.S. government has once again decided not to impose sanctions on China or its companies for their massive public and private cyber thefts.  The excuse this time is Xi Jinping’s upcoming visit, plus some supposed progress between the countries on unnamed cybersecurity issues.  But the real problem, quite obviously, is that the government still cannot figure out how to impose sanctions against identified perpetrators without causing more pain to U.S. interests than to our adversaries.  Our adversaries are well aware of this.  They are well aware because the U.S. government has been publicly flailing in its inability to respond to dozens and dozens of very harmful episodes in recent years.  As DNI Clapper acknowledged just last week, the United States in cyber lacks “both the substance and the psychology of deterrence.”
David Sanger reports that President Obama recently had this to say about the matter:
“There comes a point at which we consider this a core national security threat.” If China and other nations cannot figure out the boundaries of what is acceptable, “we can choose to make this an area of competition, which I guarantee you we’ll win if we have to.”
We haven’t yet reached the point where this is a core national security threat?  I keep using the word “embarrassing” to describe the U.S. position on these issues.  But this statement takes the cake.  Six and a half years ago, the President claimed that digital theft was a “matter of public safety and national security,” stated that the “cyber threat is one of the most serious economic and national security challenges we face as a nation,” and claimed that protecting the digital infrastructure “will be a national security priority.”  Three and a half years ago the government claimed to be “considering a raft of options to more aggressively confront China over cyberspying.” 
I don’t know what more China needs to do to the United States to make its digital activities in the United States a core national security threat to the United States.  Listed below in Appendix A are some (only some) of the more significant reported episodes of China’s related cyber intrusions into public and private U.S. networks since the President’s speech in 2009.   Look at all the digital episodes for which China has been deemed responsible or probably responsible, and imagine all of the dozens, probably hundreds, of major digital intrusions by China that are undiscovered or unreported.  Listed in Appendix B are a few selected quotations, only since 2013, from U.S. officials complaining, in one form or another, about China’s extensive cyberintrusions.   
In light of these episodes and statements, and in light of the government’s failure once again to impose any meaningful sanctions on China, ask yourself:  Why is the U.S. government not treating the China digital threat as a core national security interest?  Why has it not yet chosen to make this (in the President’s words) “an area of competition” with China?  And why can’t it come up with a credible deterrence strategy?  The answer to these questions can only be that despite the many, many losses the United States has suffered, the government thinks the nation would lose more – economically, politically, diplomatically, militarily, and/or in intelligence – if it fights back hard.  Our adversaries understand this.  And so we should expect the losses to continue until they become so bad that the calculus of retaliation and sanctions finally makes sense for the United States.  One wonders, one fears, what extreme event or events will have to occur for us to reach that point.
A.  Select China-Attributed Cyber Intrusions Since 2009
  • August 2015, American Airlines and Sabre (airline reservation system).  “A group of China-linked hackers that has mowed through the databanks of major American health insurers and stolen personnel records of U.S. military and intelligence agencies has struck at the heart of the nation’s air-travel system, say people familiar with investigations of the attacks.  Sabre Corp., which processes reservations for hundreds of airlines and thousands of hotels, confirmed that its systems were breached recently, while American Airlines Group Inc., the world’s biggest carrier, said it is investigating whether hackers had entered its computers.”

  • July 2015:  United Airlines.  “United, the world’s second-largest airline, detected an incursion into its computer systems in May or early June, said several people familiar with the probe. According to three of these people, investigators working with the carrier have linked the attack to a group of China-backed hackers . . . . Among the cache of data stolen from United are manifests -- which include information on flights’ passengers, origins and destinations.”

  • June 2015, Office of Personnel Management.  “U.S. officials suspect that hackers in China stole the personal records of as many as four million people in one of the most far-reaching breaches of government computers.  The Federal Bureau of Investigation is probing the breach, detected in April at the Office of Personnel Management. The agency essentially functions as the federal government’s human resources department, managing background checks, pension payments and job training across dozens of federal agencies.  Investigators suspect that hackers based in China are responsible for the attack, though the probe is continuing, according to people familiar with the matter. On Thursday, several U.S. officials described the breach as among the largest known thefts of government data in history.”

  • May 2015, Penn State.  “Penn State University, which develops sensitive technology for the U.S. Navy, disclosed Friday that Chinese hackers have been sifting through the computers of its engineering school for more than two years.  One of the country’s largest and most productive research universities, Penn State offers a potential treasure trove of technology that’s already being developed with partners for commercial applications. The breach suggests that foreign spies could be using universities as a backdoor to U.S. commercial and defense secrets. . . . The investigation and remediation efforts have already cost Penn State millions of dollars, said Nicholas Jones, the university provost.”

  • March 2015, Premera Blue Cross.  “Premera Blue Cross, a major provider of health care services, disclosed today that an intrusion into its network may have resulted in the breach of financial and medical records of 11 million customers. Although Premera isn’t saying so just yet, there are indicators that this intrusion is once again the work of state-sponsored espionage groups based in China.  In a statement posted on a Web site set up to share information about the breach — premeraupdate.com — the company said that it learned about the attack on January 29, 2015.”

  • February 2015, Anthem (health insurance).  “Investigators of Anthem Inc.’s data breach are pursuing evidence that points to Chinese state-sponsored hackers who are stealing personal information from health-care companies for purposes other than pure profit, according to three people familiar with the probe.  The breach, which exposed Social Security numbers and other sensitive details of 80 million customers, is one of the biggest thefts of medical-related customer data in U.S. history. The attack appears to follow a pattern of thefts of medical data by foreigners seeking a pathway into the personal lives and computers of a select group -- defense contractors, government workers and others . . . .”

  • January 2015, DoD and Defense Industrial Base.  “A NSA briefing slide labeled ‘Top Secret’ and headlined ‘Chinese Exfiltrate Sensitive Military Data,’ states that the Chinese have stolen a massive amount of data from U.S. government and private contractors.  . . . For the F-35, according to NSA the Chinese were able to obtain digital design information on several different types of radar modules used by the fighter.Northrop Grumman, the jet’s manufacturer, built the AN/APG-81 active, electronically scanned array radar for the F-35. The high-tech radar uses small, solid-state transmitter and receiver modules that allow the jet to avoid detection by enemy radar, a key stealth feature. . . . By learning the secrets, the Chinese were able to include the design and technology in Beijing’s new stealth jet, the J-20.  The secret also could allow Chinese air defenses to target the F-35 in a future conflict. . . . China also stole data on the U.S. Transportation Command’s Single Mobility System. The network system is used by Transcom to plan missions for sending military troops and equipment by aircraft, ship, road, and rail in military operations. . . . In all, the NSA concluded that the Chinese compromised key weapons systems including the F-35, the B-2 bomber, the F-22 fighter-bomber, the Space Based Laser, and other systems.”

  • November 2014, Forbes.com.  “Back in late November, Forbes.com was hacked. If cyber security firms are right, Chinese hackers are to blame, but there’s not enough evidence to guarantee attribution just yet.  The hackers tinkered with the Adobe Flash widget that delivers the Thought of the Day page that visitors to Forbes.com are taken to when they visit the site. The attackers did this to send specially-chosen visitors to a hacker-controlled site that would serve up an exploit against a zero-day vulnerability in Flash and, if it was needed, another flaw in Microsoft MSFT -2.38%’s Internet Explorer.”

  • August 2014, Community Health Systems.  “Hackers might have stolen the personal data of approximately 4.5 million people, hospital group Community Health Systems disclosed Monday. . . . Data included patient names, addresses, Social Security numbers, birth dates, and telephone numbers, but did not include patient credit or health information, CHS said.”

  • July 2014, Office of Personnel Management.  “Chinese hackers in March broke into the computer networks of the United States government agency that houses the personal information of all federal employees, according to senior American officials. They appeared to be targeting the files on tens of thousands of employees who have applied for top-secret security clearances.  The hackers gained access to some of the databases of the Office of Personnel Management before the federal authorities detected the threat and blocked them from the network, according to the officials. It is not yet clear how far the hackers penetrated the agency’s systems, in which applicants for security clearances list their foreign contacts, previous jobs and personal information like past drug use. . . .   One senior American official said that the attack was traced to China, though it was not clear if the hackers were part of the government.”


  • January 2013, The New York Times. “For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees.  . . .   The timing of the attacks coincided with the reporting for a Times investigation, published online on Oct. 25, that found that the relatives of Wen Jiabao, China’s prime minister, had accumulated a fortune worth several billion dollars through business dealings.  Security experts hired by The Times to detect and block the computer attacks gathered digital evidence that Chinese hackers, using methods that some consultants have associated with the Chinese military in the past, breached The Times’s network.”

  • September 2012, Telvent.Canada Ltd.  “A company whose software and services are used to remotely administer and monitor large sections of the energy industry began warning customers last week that it is investigating a sophisticated hacker attack spanning its operations in the United States, Canada and Spain. Experts say digital fingerprints left behind by attackers point to a Chinese hacking group tied to repeated cyber-espionage campaigns against key Western interests. . . . In letters sent to customers last week, Telvent Canada Ltd. said that on Sept. 10, 2012 it learned of a breach of its internal firewall and security systems. Telvent said the attacker(s) installed malicious software and stole project files related to one of its core offerings — OASyS SCADA — a product that helps energy firms mesh older IT assets with more advanced ‘smart grid’ technologies.”

  • July 2012, Pacific Gas & Electric and Wiley Rein (law firm).  “Working together in secret, some 30 North American private security . . . . [T]he group succeeded in breaking into the computer network of at least one facility, Diablo Canyon nuclear plant, next to the Hosgri fault north of Santa Barbara, . . . .  Last August, the plant’s incident management team saw an anonymous Internet post that had been making the rounds among cybersecurity professionals. It purported to identify web domains being used by a Chinese hacking group, including one that suggested a possible connection to Diablo plant operator Pacific Gas & Electric Co . . . . Around the time the hackers were sending malware-laden e-mails to U.S. nuclear facilities, six people at the Wiley Rein law firm were ushered into hastily called meetings. In the room were an ethics compliance officer and a person from the firm’s information technology team, according to a person familiar with the investigation. The firm had been hacked, each of the six were told, and they were the targets.”

  • April 2012, Boxun.com (news website reporting on Bo Xilai scandal).  “A cyber-attack has crippled a US-based website that has reported extensively on China's biggest political turmoil in years.Boxun.com was forced to move to a another hosting service on Friday after its previous host said the attacks were threatening its entire business, said the website's manager, Watson Meng.  He added that he believed the attacks were ordered by China's security services, but that it was unclear where they were launched from.  The assaults on Boxun's server followed days of reporting on Bo Xilai, . . . .”

  • March 2012, NASA.  “NASA said hackers stole employee credentials and gained access to mission-critical projects last year in 13 major network breaches that could compromise U.S. national security. . . . The space agency discovered in November that hackers working through an Internet Protocol address in China broke into the -network of NASA's Jet Propulsion Laboratory,  . . . . He said the hackers gained full system access, which allowed them to modify, copy, or delete sensitive files, create new user accounts and upload hacking tools to steal user credentials and compromise other NASA systems.”

  • April 2011, RSA (computer security).  “The hack last month at RSA Security has been shrouded in mystery.  . . . [C]ould the data that was stolen be used to impair its SecurID products, which are used by 40 million businesses that are trying to keep their own networks safe from intruders? . . . [A]n unclassified document from the United States Computer Emergency Readiness Team (US-CERT) obtained by the blogger Brian Krebs revealed three Web addresses used in the intrusion, one of which includes the letters ‘PRC,’ which could refer to the People’s Republic of China — or it could be a ruse.”

  • January 2010, Operation Aurora.  “Computer attacks on Google that the search giant said originated in China were part of a concerted political and corporate espionage effort that exploited security flaws in e-mail attachments to sneak into the networks of major financial, defense and technology companies and research institutions in the United States, security experts said. At least 34 companies -- including Yahoo, Symantec, Adobe, Northrop Grumman and Dow Chemical -- were attacked . . . .”

  • April 2009, F-35 Joint Strike Fighter.  “Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project -- the Defense Department's costliest weapons program ever . . . . [W]hile the spies were able to download sizable amounts of data related to the jet-fighter, they weren't able to access the most sensitive material, which is stored on computers not connected to the Internet.  Former U.S. officials say the attacks appear to have originated in China.”

B.  USG Officials’ Statements on Cyber Intrusions Since 2013

  • Tom Donilon, March 11, 2013: “It is in this last category that our concerns have moved to the forefront of our agenda. I am not talking about ordinary cybercrime or hacking.  And, this is not solely a national security concern or a concern of the U.S. government.  Increasingly, U.S. businesses are speaking out about their serious concerns about sophisticated, targeted theft of confidential business information and proprietary technologies through cyber intrusions emanating from China on an unprecedented scale.  The international community cannot afford to tolerate such activity from any country.  As the President said in the State of the Union, we will take action to protect our economy against cyber-threats.  From the President on down, this has become a key point of concern and discussion with China at all levels of our governments.  And it will continue to be.  The United States will do all it must to protect our national networks, critical infrastructure, and our valuable public and private sector property.  But, specifically with respect to the issue of cyber-enabled theft, we seek three things from the Chinese side.  First, we need a recognition of the urgency and scope of this problem and the risk it poses—to international trade, to the reputation of Chinese industry and to our overall relations.  Second, Beijing should take serious steps to investigate and put a stop to these activities.  Finally, we need China to engage with us in a constructive direct dialogue to establish acceptable norms of behavior in cyberspace.”

  • Chuck Hagel, June 1, 2013: “We are also clear-eyed about the challenges in cyber.  The United States has expressed our concerns about the growing threat of cyber intrusions, some of which appear to be tied to the Chinese government and military.  As the world’s two largest economies, the U.S. and China have many areas of common interest and concern, and the establishment of a cyber working group is a positive step in fostering U.S.-China dialogue on cyber.  We are determined to work more vigorously with China and other partners to establish international norms of responsible behavior in cyberspace.

  • DNI 2014 Worldwide Threat Assessment: “China’s cyber operations reflect its leadership’s priorities of economic growth, domestic political stability, and military preparedness. Chinese leaders continue to pursue dual tracks of facilitating Internet access for economic development and commerce and policing online behaviors deemed threatening to social order and regime survival. Internationally, China also seeks to revise the multi-stakeholder model Internet governance while continuing its expansive worldwide program of network exploitation and intellectual property theft.”



  • Barack Obama, February 13, 2015: “The same information technologies that help make our military the most advanced in the world are targeted by hackers from China and Russia who go after our defense contractors and systems that are built for our troops.”

  • 2015 DNI Worldwide Threat Assessment: “China. Chinese economic espionage against US companies remains a significant issue. The “advanced persistent threat” activities continue despite detailed private sector reports, public indictments, and US demarches, according to a computer security study. China is an advanced cyber actor; however, Chinese hackers often use less sophisticated cyber tools to access targets. Improved cyber defenses would require hackers to use more sophisticated skills and make China’s economic espionage more costly and difficult to conduct.”

  • Ash Carter, April 23, 2015: “Just as Russia and China have advanced cyber capabilities and strategies ranging from stealthy network penetration to intellectual property theft, criminal and terrorist networks are also increasing their cyber operations.”

  • Jack Lew at June 23, 2015 Strategic and Economic Dialogue: “On cyberspace, in particular, we remain deeply concerned about Chinese government-sponsored cyber-enabled theft of confidential business information and proprietary technology from U.S. companies.  Such activity falls outside of the bounds of acceptable state behavior in cyberspace.  A more open, secure, interoperable and reliable cyberspace is critical to free and fair commerce and we look forward to discussing these matters further.”
Read the whole story
 
· · · · · · · · · · · · · · ·

News Roundup and Notes: September 15, 2015 

Comments

Popular posts from this blog

New questions arise about House Democratic caucus’s loyalty to Obama | » Democrats Stymie Obama on Trade 12/06/15 22:13 from WSJ.com: World News - World News Review

Немецкий историк: Запад был наивен, надеясь, что Россия станет партнёром - Военное обозрение

8:45 AM 11/9/2017 - Putin Is Hoping He And Trump Can Patch Things Up At Meeting In Vietnam

Review: ‘The Great War of Our Time’ by Michael Morell with Bill Harlow | FBI File Shows Whitney Houston Blackmailed Over Lesbian Affair | Schiff, King call on Obama to be aggressive in cyberwar, after purported China hacking | The Iraqi Army No Longer Exists | Hacking Linked to China Exposes Millions of U.S. Workers | Was China Behind the Latest Hack Attack? I Don’t Think So - U.S. National Security and Military News Review - Cyberwarfare, Cybercrimes and Cybersecurity - News Review

10:37 AM 11/2/2017 - RECENT POSTS: Russian propagandists sought to influence LGBT voters with a "Buff Bernie" ad

3:49 AM 11/7/2017 - Recent Posts

» Suddenly, Russia Is Confident No Longer - NPR 20/12/14 11:55 from Mike Nova's Shared Newslinks | Russia invites North Korean leader to Moscow for May visit - Reuters | Belarus Refuses to Trade With Russia in Roubles - Newsweek | F.B.I. Evidence Is Often Mishandled, an Internal Inquiry Finds - NYT | Ukraine crisis: Russia defies fresh Western sanctions - BBC News | Website Critical Of Uzbek Government Ceases Operation | North Korea calls for joint inquiry into Sony Pictures hacking case | Turkey's Erdogan 'closely following' legal case against rival cleric | Dozens arrested in Milwaukee police violence protest