Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

US probes whether laptop copied on China trip
AP ^ | May 29 | TED BRIDIS

Posted on 05/29/2008 3:30:48 PM PDT by Aristotelian

WASHINGTON - U.S. authorities are investigating whether Chinese officials secretly copied the contents of a government laptop computer during a visit to China by Commerce Secretary Carlos M. Gutierrez and used the information to try to hack into Commerce computers, officials and industry experts told The Associated Press.

Surreptitious copying is believed to have occurred when a laptop was left unattended during Gutierrez's trip to Beijing for trade talks in December, people familiar with the incident told the AP. These people spoke on condition of anonymity because the incident was under investigation.

Gutierrez told the AP on Thursday he could not discuss whether or how the laptop's contents might have been copied.

"Because there is an investigation going on, I would rather not comment on that," he said. "To the extent that there is an investigation going on, those are the things being looked at, those are the questions being asked. I don't think I should provide any speculative answers."

A Commerce Department spokesman, Rich Mills, said he could not confirm or deny such an incident in China. Asked whether the department has issued new rules for carrying computers overseas, Mills said: "The department is continuing to improve our security posture, and that includes providing updates, guidances and best practices to staff to maintain security."

It was not immediately clear what information on the laptop might have been compromised, but it would be highly unorthodox for any U.S. government official to carry classified data on a laptop overseas to China, especially one left unattended even briefly. Modern copying equipment can duplicate a laptop's storage drive in just minutes.

(Excerpt) Read more at news.yahoo.com ...


TOPICS: Foreign Affairs; Government; News/Current Events
KEYWORDS:
I guess when you can't bribe a U.S. administration, you steal.
1 posted on 05/29/2008 3:30:48 PM PDT by Aristotelian
[ Post Reply | Private Reply | View Replies]

To: Aristotelian
I smell a honey-trap.

/johnny

2 posted on 05/29/2008 3:32:51 PM PDT by JRandomFreeper (Bless us all, each, and every one.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Aristotelian

The dumbass who left the laptop unattended should be fired. I have a friend who does business in China. Rule #1 is don’t even bring your laptop if there is anything on it that you don’t want others to see.


3 posted on 05/29/2008 3:33:26 PM PDT by Ron Jeremy (sonic)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Aristotelian

The Chinese are known to do this sort of thing, here as well as in China. It sounds as if someone was pretty stupid if they had anything classified on a laptop in the first place, let alone leaving it unattended.


4 posted on 05/29/2008 3:34:18 PM PDT by Cicero (Marcus Tullius)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Aristotelian
Related:

Belgium Names China in Hacking Incidents
 
Whether hackers breached government network not known
 

 

One good spy is worth 10,000 men.

--Chinese Proverb


Over the last few weeks, hackers have repeatedly attempted to break inside the computer network of the Belgium Federal Government as well as other organizations located in Belgium.

On Friday, May 2, Jo Vandeurzen, the Belgian minister of justice, announced that his government believes the attacks were conducted from China, most likely at the request of Beijing. He admitted that he could not provide irrefutable evidence.

"The context of this affair and all the clues lead to China," Vandeurzen said. The Belgian Minister added that it was not known whether the hackers had succeeded in their attempt to hack the Belgian government network.

Although it is also unclear why Beijing would target the Belgium network, Vandeurzen suggested that China's interest likely results from the presence in the country of most of the European Union institutions as well as the Headquarters of the North Atlantic Treaty Organization (NATO).

Vandeurzen also suggested that the role played by Belgium in Central Africa might be relevant to this affair.

"There is an ongoing investigation, but I can tell you that we have more than mere suspicions," a spokesperson of the Foreign Affairs Ministry said.

The Surete de l' Etat, a Belgian Intelligence Agency equivalent to Britain's MI5, has confirmed a "clear and real threat" to the security of the state.

Karel De Gucht, the controversial Belgian minister of foreign affairs, had already told parliament that his ministry was the object of cyber-spying conducted by Chinese agents several weeks ago.
 

It is not clear at the moment why Belgian officials have decided to go public with these allegations. In the past, the Belgian government reacted with great discretion to this kind of affair.

In 2005, a Chinese defector revealed the magnitude of the Chinese spying effort against European governments and technology industry, alleging among other things that hundreds of students and scholars were involved in espionage in European countries.

"There is a large Chinese intelligence operation in northern Europe spanning communications, space, defense, chemicals and heavy industries," said Claude Monique, a Brussels-based intelligence analyst.

"The Chinese agent has given details of hundreds of experts and their activities. As a result national inquiries have been launched, certainly by the German, French, Netherlands and Belgian agencies and, I believe, in Britain too."

"The Chinese operate at many levels, from the pure intelligence agents based at embassies to researchers sent to Europe for training to individual citizens who work apparently independently for 5 or 10 years until they are in a position to prove their usefulness," an intelligence official said.

The phenomenon is by no mean limited to Europe. In the United States, the FBI has estimated that spying activity against technology companies conducted by Chinese agents is increasing at the annual rate of 20 to 30 percent. In the Los Angeles area, it is not entirely clear whether the FBI is infiltrating the Chinese Mafia, or if the opposite is taking place.

"I think you see it where something that would normally take 10 years to develop takes them two or three," said David Szady, the chief of FBI counterintelligence operations in 2005.

"What they are looking for are the systems or materials or the designs or the batteries or the air-conditioning or the things that make that thing tick," Szady said. "That's what they are very good at collecting, going after both the private sector, the industrial complexes, as well as the colleges and universities in collecting scientific developments that they need," Szady added.

Many experts believe that it is thanks to industrial espionage that Chinese scientists have managed to match the US, Japan and Europe technology in various areas such as supercomputing, communications, space and nano technologies.

Some military advances seem suspicious too, such as a new cruise missile extremely similar to the US Tomahawk or a sea-borne defense system that looks like the twin of the Aegis.

In their 2007 report to Congress, the US-China Economic and Security Review Commission (USCC) stated that "Chinese espionage activities in the United States are so extensive that they comprise the single greatest risk to the security of American technologies."


http://english.ohmynews.com/articleview/article_view.asp?at_code=434212

 

5 posted on 05/29/2008 3:35:56 PM PDT by CarrotAndStick (The articles posted by me needn't necessarily reflect my opinion.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Aristotelian
Surreptitious copying is believed to have occurred when a laptop was left unattended during Gutierrez's trip to Beijing for trade talks in December

If the laptop had any classified material on it, why was it ever 'left unattended'?

IIRC, wasn't there a misplaced/missing laptop on one of SoS Albright's trips?
6 posted on 05/29/2008 3:37:07 PM PDT by TomGuy
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cicero

I guess my question would be How did they know it was copied unless they have put something on the laptop as a marker in the information that echelon picked up.


7 posted on 05/29/2008 3:37:16 PM PDT by Walkingfeather
[ Post Reply | Private Reply | To 4 | View Replies]

To: Aristotelian

WHY are not our Government pukes held to the same level of security as private businesses??

We were not permitted to have ANYTHING of a Confidential nature on our notebooks — PERIOD, when traveling out of the country.

It was ONCE a Federal Requirement that carrying Industry “Confidential” material required DOCUMENTATION signed by a Legal representative of the Company authorizing the “carry” out of the country...

I wonder what controls are placed on our “civil service” pukes??

I’m sick and tired of our “Civil Servants” failures to live under the same “rules/laws/morals” as we lowly peasants must follow.


8 posted on 05/29/2008 3:50:43 PM PDT by river rat (Semper Fi - You may turn the other cheek, but I prefer to look into my enemy's vacant dead eyes.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Aristotelian

Didnt they try to steal some Blackberries also on this same trip?


9 posted on 05/29/2008 3:56:44 PM PDT by ßuddaßudd (7 days - 7 ways Guero >>> with a floating, shifting, ever changing persona....)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Aristotelian

People that do not know the first think on PC security should never be allowed to have one!


10 posted on 05/29/2008 4:02:35 PM PDT by Bommer (There's an (R) next to his name! I must trash my principles & beliefs and vote for the (R)!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ßuddaßudd
The West better realize, and the sooner the better, that People's "Republic" of China is the land of a billion hemorrhoids. In the not too distant future we will be looking back on the Cold War and the WoT as the Good Old Days.
11 posted on 05/29/2008 4:03:19 PM PDT by hinckley buzzard
[ Post Reply | Private Reply | To 9 | View Replies]

To: Aristotelian

Fire the retards.


12 posted on 05/29/2008 4:06:41 PM PDT by pissant (THE Conservative party: www.falconparty.com)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Walkingfeather
From the article I surmise that the Chinese tried to use system configuration and network client/server information stored on the laptop as clues on how to hack into the DoC network.

Probably got detected trying to do a remote entry spoofing the copied laptop's MAC and IP address. While the IP address can change, the MAC is like a fingerprint, unique to the machine. You can burn a stolen MAC onto a blank chip but a trace back on the hack probably identified the DoC user and debriefing him identified a recent trip to China and the moment(s) of IT insecurity.

I vote for not taking the laptop with you at all. An encrypted external hard drive might help. But unguarded laptops are also prime candidates for installation of keystroke logging and other spy software. Your otherwise "clean" laptop could be set to gather ID and password information and to connect back to them surreptitiously whenever an Internet connection is detected.

Unfortunately, government officials cannot be unconnected any more, so they will probably end up with two laptops: one for domestic use and travel and one they check out from the security office exclusively for foreign travel. Complete the package with an encrypted external hard drive that is really small; small enough that you have absolutely no reason at all not to have it with you at all times.

This is just the tip of the Chinese asymmetric warfare iceberg. I don't think anyone who thinks about the massive inflow of mainland Chinese as visitors, students, and immigrants in recent years would be surprised to learn that there is a substantial intelligence gathering capability buried among them. Unfortunately, there is probably also a substantial 5th column combat capability among them as well. If things get ugly with the PRC, expect damaging sabotage and commando actions here in the United States from the beginning.

13 posted on 05/29/2008 4:12:20 PM PDT by Captain Rhino ( If we have the WILL to do it, there is nothing built in China that we cannot do without.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: pissant
Fire the retards.

Then who's gonna run the Congress?

Then who's gonna run the government?


14 posted on 05/29/2008 4:13:24 PM PDT by TomGuy
[ Post Reply | Private Reply | To 12 | View Replies]

To: Aristotelian

When Bush visited China in 2002, his aides set up small meeting-tents in their hotel rooms, and played country music at loud levels when anyone was in the room - to foil suspected wire-taps and cameras. Such espionage is to be expected.


15 posted on 05/29/2008 4:16:16 PM PDT by PGR88
[ Post Reply | Private Reply | To 1 | View Replies]

To: Aristotelian
a laptop was left unattended during Gutierrez's trip to Beijing for trade talks in December

Sure. "unattended". I guess any government official can use this method of espionage from now on and always be let off the hook.

16 posted on 05/29/2008 4:23:12 PM PDT by Perchant
[ Post Reply | Private Reply | To 1 | View Replies]

To: river rat

The Chinese installed bootleg Cisco routers in the Pentagon (instant backdoor)....they are much more wiley than we give them credit for.


17 posted on 05/29/2008 5:26:07 PM PDT by BurbankKarl
[ Post Reply | Private Reply | To 8 | View Replies]

To: Aristotelian

chicom bump for later..............


18 posted on 05/29/2008 6:12:56 PM PDT by indthkr
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson