Skip to comments.Hordes of Honkers Out To Raise Hell
Posted on 04/04/2010 9:16:46 PM PDT by myknowledge
Many nations are taking advantage of the Internet to encourage, or even organize, patriotic Internet users to obtain hacking skills. This enables the government to use (often informally) these thousands of hackers to attack enemies (foreign or domestic.) These organizations arrange training and mentoring to improve the skills of group members. Turkey has over 44,000 of these hackers, Saudi Arabia has over 100,000, Iraq has over 40,000, Russia over 100,000 and China, over 400,000. While many of these Cyber Warriors are rank amateurs, even the least skilled can be given simple tasks. And out of their ranks will emerge more skilled hackers, who can do some real damage.
It was China that really pioneered this activity. It all began in the late 1990s, when the Chinese Defense Ministry established the "NET Force." This was initially a research organization, which was to measure China's vulnerability to attacks via the Internet. Soon this led to examining the vulnerability of other countries, especially the United States, Japan and South Korea (all nations that were heavy Internet users). NET Force has continued to grow ever since.
NET Force was soon joined by an irregular civilian militia; the "Red Hackers Union" (RHU). These are nearly half a million patriotic Chinese programmers, Internet engineers and users who wished to assist the motherland, and put the hurt, via the Internet, on those who threaten or insult China. The RHU began spontaneously in 1999 (after the U.S. accidentally bombed the Chinese embassy in Serbia), but the government has assumed some control, without turning the voluntary organization into another bureaucracy. The literal name of the group is "Red Honkers Union," with Honker meaning "guest" in Chinese. But these were all Internet nerds out to avenge insults to the motherland.
Various ministries have liaison officers who basically keep in touch with what the RHU is up to (mostly the usual geek chatter), and intervene only to "suggest" that certain key RHU members back off from certain subjects or activities. Such "suggestions" carry great weight in China, where people who misbehave on the web are very publicly prosecuted and sent to jail. For those RHU opinion-leaders and ace hackers that cooperate, there are all manner of benefits for their careers, not to mention some leniency if they get into some trouble with the authorities. Many government officials fear the RHU, believing that it could easily turn into a "counter-revolutionary force." So far, the Defense Ministry and NET Force officials have assured the senior politicians that they have the RHU under control.
All nations with a large Internet user population have these informal groups, but not all nations have government guidance, and encouragement to make attacks. When there is international tensions between nations with large number of Internet users, it almost always results in the "hacker militias" of both nations going after each others.
The U.S. has one of the largest such informal militias, but there has been little government involvement. That is changing. The U.S. Department of Defense, increasingly under hacker attack, is now organizing to fight back, sort of. Taking a page from the corporate playbook, the Pentagon is sending off many of its programmers and Internet engineers to take classes in how to hack into the Pentagon. Not just the Pentagon, but any corporate, or private, network. It's long been common for Internet security personnel to test their defenses by attacking them. Some "white hat hackers" (as opposed to the evil "black hat hackers") made a very good living selling their attack skills, to reveal flaws, or confirm defenses. Seven years ago, this was standardized with the establishment of the EC (E Commerce Consultants) Council, which certified who were known and qualified white hat hackers. This made it easier for white hats to get work, and for companies to find qualified, and trustworthy, hackers to help with network security. Now the Department of Defense is paying to get members of its Internet security staff certified as white hats, or at least trained to be able to do what the black hats do, or recognize it. While many in the Department of Defense have been calling for a more attack-minded posture, when it comes to those who are constantly attacking Pentagon networks, the best that can be done right now is to train more insiders to think, and operate, like outsiders.
The U.S. Department of Defense is the largest user of computers, and networks, in the world. This includes 11 million Internet users, over six million PCs and over 15,000 networks. This has always attracted a lot of hacker attention. For over a decade, all the services have been scrambling to get their Cyber War defenses strengthened. But so many networks and PCs make an attractive target, and provide many potential weak areas that can be penetrated. The Department of Defense systems suffer thousands of serious attacks a day.
The 24th Air Force: America's Cyber Warfare Command.
I’m amazed the US is so far behind. I would have thought we already had teams of hackers competing with each other to explore our vulnerabilities. I still think that. Misinformation?
Thankfully, there’s only one of her.
I just figured there would be a Canada Goose comment lol. :D
I thought there was a typo in the title and the article would be about Tea Partiers.
I thought this was another thread about those topless protesters.
I’ve been in the IT biz for over 25 years and know how easy it can be to hack into a network. It just takes time and dedication. There is no such thing as a ‘uncrackable’ network. I know of guys who have hacked into such systems.
The Internet is the Internet. Anyone online is vulnerable.
“Hordes of honkers”
This should be another article about the topless march in Portland, ME.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.