It’s not just China –many nations are working on cyberattacks. There is probably hidden malware embedded in key infrastructure in the USA and other nations that hasn’t been activated yet. It’s a bit like the standoff in “The Good, The Bad, and The Ugly”. The triggers will be pulled when the struggle to commandeer the last oil reserves in the Middle East begins.
China’s extensive cyber research activities and allegations over cyber espionage have put the United States on high alert.
XI’AN, CHINA—The leaflet posted in the school of information engineering here at Xi’an Jiaotong University was brief but enticing, offering computer-savvy graduates a hefty stipend and the chance to serve their motherland. “I was curious,” says Liu, who asked that only his surname be used in this article. It was the spring of 2007, and Liu, then 24 years old, was wrapping up a master’s degree in computer algorithms. Encouraged by his supervisor, Liu called the number on the leaflet; that summer, he joined an elite corps of the People’s Liberation Army (PLA) that writes code designed to cripple command-and-control systems of enemy naval vessels.
PLA writings call the electromagnetic spectrum “the fifth domain of battle space,” putting cyberspace on an equal footing with ground, air, sea, and space. Cyber conflicts “threaten national security and the very existence of the state,” two scholars with the Academy of Military Sciences wrote in China Youth Daily in 2011. State media regularly tout PLA activities in cyber defense, a catchall term encompassing everything from surveillance and espionage to weapons such as electromagnetic pulse generators that disable computer networks and malware designed to take down power grids or contaminate water supplies. Augmenting PLA efforts is a legion of civilian researchers and hackers whose efforts ostensibly are directed at repelling electronic intruders. In 2011, more than 8.5 million computers in China “were attacked by rogue programs every day,” a 48% increase over the previous year, says Li Yuxiao, a cyber law expert at Beijing University of Posts and Telecommunications.
But evidence is accumulating that China can dish it out, too. In a report issued last week, the U.S. computer security firm Mandiant tracked one especially adept group of hackers, sometimes called the Comment Crew or Comment Group, to a neighborhood in Shanghai housing Unit 61398, a bureau of the PLA General Staff Department’s Third Department. According to Mandiant, other computer security analysts, and U.S. State Department sources, hackers in China have gathered gigabytes of data on industrial secrets, military hardware, and government strategy for political negotiations.
This is not a unilateral arms buildup. Another heavyweight in the cyber arena is Russia; hackers took down Georgian government servers in advance of Russia’s invasion of that former Soviet republic in August 2008. The United States, too, has gone all-in on cyber warfare. In 2009, it established the U.S. Cyber Command in Fort Meade, Maryland, to conduct “full-spectrum military cyberspace operations.” The Defense Department’s operational needs “will require the integration of cyber and electronic warfare at unprecedented levels,” said Regina Dugan, then-director of the U.S. Defense Advanced Research Projects Agency, in a statement released by DARPA before the Senate took up the 2013 defense authorization. According to U.S. Defense Secretary Leon Panetta, the Pentagon spends about $3 billion a year on cyber security.
Now that Pandora’s box is open, the United States fears that it, too, may someday be on the receiving end of an effective attack. In his State of the Union speech on 12 February, U.S. President Barack Obama declared that unidentified enemies are “seeking the ability to sabotage our power grid, our financial institutions, [and] our air traffic control systems.” That day, he signed an executive order to strengthen cyber defenses and called on Congress to pass legislation that would “give our government a greater capacity to secure our networks and deter attacks.” Last week, the U.S. Department of Energy announced $20 million in funding for the development of technologies to strengthen the cyber security of delivery systems for electricity, oil, and gas.
A one-two punch featuring a cyber attack on critical infrastructure and a physical strike against U.S. targets could leave the country reeling from a “cyber Pearl Harbor,” Panetta warned in a speech last October. “It would paralyze and shock the nation and create a new, profound sense of vulnerability,” he said.
Raising an army
In a conflict in the Pacific, the USS Blue Ridge, the U.S. Navy’s command ship in the region, would be a ripe target for a cyber strike.
At Dalian University of Technology in northeast China, a pair of researchers funded by the science ministry and the National Natural Science Foundation of China published a report in Safety Science in July 2011 on vulnerabilities in the western U.S. power grid.
China so far has shown only some of its cards. Chinese hackers have allegedly used computer network exploitation techniques such as spearphishing, in which malware is embedded in target computers, to harvest data from a long list of Fortune 500 companies, think tanks, and government agencies. Since 2006, the Mandiant report documents, the Shanghai-based hacking group it tracked has pilfered hundreds of terabytes of data from 141 organizations, including 115 in the United States. Information technology and aerospace firms were targeted most frequently. Mandiant said it believes the activity it observed “represents only a small fraction of the cyber espionage” committed by the Shanghai outfit.
Delays and cost overruns in the U.S. F-35 fighter jet program “may be the result of cyber espionage, as could the rapid development of China’s J-20 stealth fighter,” Lewis testified before the U.S. Congress last April. “Cyber espionage is the most pressing threat we face,” he asserted.