U.S. expert blames Chinese government for recent cyberattacks
IDG News Service - The Chinese government is likely behind recent cyberattacks on U.S. government Web sites and on U.S. companies in an apparent effort to quash criticism of the government there, an expert on U.S. and Chinese relations said Wednesday.
There's no conclusive proof that recent attacks on Google and dozens of other U.S. companies are directed by the Chinese government, but logic would point to official Chinese involvement, said Larry Wortzel, a member of the U.S.-China Economic and Security Review Commission and a former U.S. Army counterintelligence officer.
Google complained in January that it and several other U.S. companies were victims of recent cyberattacks coming from inside China. It is "not clear" who ordered the attacks, but it appears the Chinese government was involved, said Wortzel, who has served in the U.S. embassy in China.
There is a group of skilled hackers in China that routinely attacks systems to spy on political dissidents, said Wortzel, speaking during a U.S. House of Representatives Foreign Affairs Committee hearing. Chinese government agencies and Communist Party organizations would be the likely recipients of information obtained by hackers, he said.
"I concede that I cannot prove this beyond a reasonable doubt in a court of law," Wortzel added. "There may be a group of patriotic hackers in China who just hate criticism of the Communist Party and would take such action. But I believe such persistent, systematic and sophisticated attacks, some of which have taken place in the United States, in China, in Germany and in the United Kingdom, most likely are state-directed."
Multiple efforts to reach the Chinese embassy in Washington, D.C., for comment by telephone Wednesday were met with busy signals. Information on the "contact us" page on the embassy's Web site has been deleted.
In addition to attacks on Google and other U.S. companies, attacks from inside China are targeting U.S. military, technical and scientific information, Wortzel said.
"Not all of this cyber-espionage may be government-controlled," he said. "There may be plenty of cyber-espionage entrepreneurs in China who operate outside government control that could be working on behalf of Chinese companies or the 54 state-run science and technology parks around the country."
But the U.S. Department of Justice is prosecuting several espionage cases involving defense and other U.S. technology being turned over to unidentified Chinese officials, Wortzel said. "Let us be candid," he said. "A logical person would conclude that some of this activity is directed by the Chinese government."
Several members of the House committee used the hearing to criticize the Chinese government's filtering of Web content or its tracking of online dissidents. Wednesday's hearing was the second in Congress this month on other countries' efforts to censor the Internet.
Web giants attacked
- White House orders security review in wake of WikiLeaks disclosure
- Leaked U.S. document links China to Google attack
- Update: Researchers track cyber-espionage ring to China
- Google, China now playing cat and mouse?
- McAfee: 'Amateur' malware not used in Google attacks
- Military warns of 'increasingly active' cyber-threat from China
- China: Google 'totally wrong' to stop censoring
- Update: Google stops censoring in China
- Google's China ad partners wait in 'incomparable pain'
- Google may soon leave China, reports say
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- OpenStack and Red Hat: IDC White paper Most OpenStack deployments are by public cloud providers that are early adopters of technology and use OpenStack in a do-it-yourself deployment and support...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Government Agency Webifies Outdated COBOL Applications Let this CTO tell you how his agency converted 1980s-era green screens into an e-filing portal for the 100,000 cases handled each year...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the... All Applications White Papers | Webcasts