|Emblem of the People's Liberation Army (Photo credit: thewamphyri)|
Occupy Corporatism Susanne Posel
Mandiant Corp. claims to be the “ONLY information security company” that can inform a corporation when they have been compromised and explain the nature of such a breach. Mandiant has released a report stating that they “have analyzed . . . hundreds of investigations” that convince the firm that “the groups conducting these activities are based primarily in China and that the Chinese Government is aware of them.”
The Chinese corporation APT1 was alleged as having syphoned data from 141 corporations with more than 110 of those companies being American based while Canadian and British corporations were also reported to have been affected. Mandiant maintains that hackers responsible for these attacks were sponsored by the People’s Liberation Army (PLA) of China, under the cyberware division “Unit 61398”.
The Unit 61398 was previously known as the 2nd Bureau of the People’s Liberation Army’s General Staff Department’s 3rd Department cannot be confirmed because there no references to them in documents; however intelligence operatives assert that this group is central to Chinese espionage. Project 2049 Institute, a non-governmental organization (NGO) claimed that they are the “premier entity targeting the United States and Canada, most likely focusing on political, economic, and military-related intelligence.”
The Unit 61398 is purported to be located in Shanghai’s Pudong district, which is the center of the financial and banking core in China.
The Project 2049 Institute was established in 2008 to influence “decision makers toward a more secure Asia by the century’s mid-point.” They also provide information for the formation of public policy through research and suggested policy solutions.
On their Board of Directors are members of the Heritage Foundation, DynCorp, BAE Systems and a former deputy assistant of the US Department of Defense (DoD).
The report states: “Our research found that People’s Liberation Army (PLA’s) Unit 61398 is similar to APT1 in its mission, capabilities, and resources. PLA Unit 61398 is also located in precisely the same area from which APT1 activity appears to originate.”
Spear-phishing techniques have been employed by hackers because it grants access to internal servers.
Kevin Mandia, founder and chief executive of Mandiant said: “Either they are coming from inside Unit 61398, or the people who run the most-controlled, most-monitored Internet networks in the world are clueless about thousands of people generating attacks from this one neighborhood.”
According to intelligence expert David Wise, China and the US have been engaged in a cyber-espionage war behind closed doors. The Chinese government, Wise explains, will send spies to targeted locations to syphon data by the way of hackers and surveillance; whereas the US government “would target . . . with satellites and produce reams of data.”
Kaspersky Lab has uncovered Operation Red October, (Rocra) a 5 year scheme by the Chinese and Russians to steal diplomatic, industrial and scientific data from Eastern Europe, North America and Asian organizations. Beginning in 2007, intelligence gathering operations were conducted in the form of attacks by cyber criminals toward Western nations. The thought is that this is in retribution on behalf of Iran for the damage caused to their country.
Kaspersky said: “The information we have collected so far does not appear to point toward any specific location; however, two important factors stand out: The exploits appear to have been created by Chinese hackers, (and) the Rocra malware modules have been created by Russian-speaking operatives.”
Although Kaspersky Lab admits that these attacks have not definitively been connected to China or Russia, it is assumed that the data collected would be yield a high price on the black market.
Kaspersky stated: “The information stolen by the attackers is obviously of the highest level and includes geopolitical data which can be used by nation states. Such information could be traded in the underground and sold to the highest bidder, which can be, of course, anywhere.”
The US House Intelligence Committee (USHIC) is warning American corporations in a new report against conducting business with 2 Chinese firms because of national security threats. Both Huawei Technologies and ZTE, two of the world’s largest telecommunications corporations and suppliers of cellular phones and technology are being highlighted by the US government and blamed for cyber-attacks. It is also claimed by the USHIC that they are involved in digital espionage.
According to the report, “China has the means, opportunity, and motive to use telecommunications companies for malicious purposes. . . . The investigation concludes that the risks associated with Huawei’s and ZTE’s provision of equipment to U.S. critical infrastructure could undermine core U.S. national-security interests.”
It is claimed that former industry insiders provided intelligence to the US concerning Huawei’s violations of US laws such as immigration, bribery and corruption as well as an alleged “pattern and practice” using pirated software in its US satellites.
It was cited in the report that the Chinese corporations were employing intelligence sources as well as private sector companies and other unnamed entities that could and assumedly did steal trade secrets, sensitive information and prehistory data while simultaneously shipped infected hard ware and software to the US with the intent to cause disruptions in national security during war time.
Involved in the block against Huawei and ZTE is Timothy Geithner, US Treasury Secretary and shill for the Technocrats. Geithner who sits on a multi-agency regulatory panel called the Committee on Foreign Investment in the United States (CFIUS) has flagged these two Chinese corporations for national security threats.
The USHIC stated that they were not satisfied with the explanation given by the 2 corporations as to their relationship with the Chinese government and possible covert operations. Huawei retorts that this latest attack on Chinese technological and digital infrastructure is a cover for the crimes being committed by the US in conjunction with the Zionist regime, a.k.a. the Israeli government, with regard to the cyber-attacks on Iran.