from:
http://www.aci.net/kalliste/
Click Here: <A HREF="http://www.aci.net/kalliste/">The Home Page of J. Orlin
Grabbe</A>
-----
Spy vs. Spy


Chinese Hackers Pilfered Los Alamos


This is what happens when you put the government in charge of security.

Hackers suspected of working for a Chinese government institute in Beijing
broke into a computer system at Los Alamos National Laboratory and pilfered
large amounts of sensitive information, including documents containing the
word "nuclear," The Washington Times has learned.

The incident involving sensitive but unclassified data was uncovered by a
National Security Agency computer analyst early last year but kept secret
until now, said U.S. intelligence officials who spoke on the condition of
anonymity.

"They [the Chinese] obtained the equivalent of a stack of documents 3 feet
high," one official said.
Officials said the case highlights the fact that foreign governments continue
to seek U.S. nuclear weapons information. They said it is a clear example of
Chinese government-sponsored computer spying techniques, which Beijing's
military has cultivated for several years.
Disclosure of the incident is the latest example of Beijing's covert efforts t
o obtain U.S. nuclear secrets.

Fired Los Alamos scientist Wen Ho Lee is awaiting trial on charges he
mishandled sensitive nuclear weapons secrets. His arrest grew out of a major
investigation that revealed China had obtained secrets on every deployed
warhead in the U.S. nuclear arsenal.

Officials said the Chinese hackers disguised their attack by entering a Los
Alamos "file transfer protocol" site, or FTP, on the Internet through several
computer system gateways at U.S. universities. Such FTP sites often are used
to store information.

The incident took place in late 1998 or early last year, the officials said.

Using electronic tracing techniques developed by the National Security
Agency, the analyst tracked the intruder back to a research institute in
Beijing. Under China's communist system, all research institutes are part of
the government and have been used in the past for spying activities.

The officials did not provide further details or identify the Chinese
institute.

Sensitive, but not secret, data stored on Los Alamos computers until recently
included information dubbed "unclassified," "controlled nuclear information,"
"official use only," "naval nuclear propulsion information," "export
controlled information" and "corporate proprietary data."
A counterintelligence official said that, in general, computer-based
information lost to foreign spies from Department of Energy facilities,
including Los Alamos, has been extremely valuable to foreign weapons
programs.

The data helped foreign governments save time and money on their nuclear
weapons programs while undermining U.S. national security and economic
competitiveness, the official said.
China is one of the most aggressive foreign powers seeking to glean data on
nuclear weapons via computer from U.S. weapons laboratories, the official
said. The Chinese are known to use several forms of computer attacks to gain
access to the information.

Chinese spies also have targeted Los Alamos for documents related to
verifying compliance with arms control agreements, including the START arms
pact and a chemical weapons agreement.

Intelligence officials said Chinese research institutes made nearly 50
attempts to obtain two documents during the late 1990s.

In a 1996 case, Army Pvt. Eric Jenott passed information on Pentagon computer
systems to a Chinese national working at the Energy Department's Oak Ridge
facility. He was convicted of computer fraud.

In another case, a Chinese scientist working at the Brookhaven National
Laboratory on Long Island, N.Y., was caught sending technical notes to the
Chinese Academy of Sciences, a government entity in charge of weapons
development programs.

A recent report to Congress on Chinese spying, produced jointly by the FBI
and CIA, made no mention of the covert computer attack. The report said the
Chinese gather science and technology information through U.S. national
laboratories and acquire "highly valued, yet unclassified information."

National Security Agency spokesman Fred Lash declined to comment on the
agency's role in tracking the Chinese computer attack.

However, Los Alamos spokesman Jim Danneskiold said the laboratory was under
widespread computer attack during the time in question, although security
officials have no record of a specific incident involving Chinese downloading
information from an FTP site.

"Certainly there were massive attacks around that time as part of Moonlight
Maze," Mr. Danneskiold said, using the Pentagon code name for a series of
worldwide computer assaults, primarily against Defense Department computers.

Mr. Danneskiold suggested that the Chinese intrusion in question might not
have been detected because security officials at Los Alamos were in the
process of installing a security "fire wall" system designed to keep out
unauthorized computer intruders.

There is "an enormous amount of Chinese activity hitting our green, open
sites," Mr. Danneskiold said. "We're talking Web hits, and it happens
continuously."

The computer systems at the laboratory were partitioned during the period in
question by creating a "green" system for open access to all Internet users,
a limited-entry "yellow" site for remote access to sensitive but unclassified
information and a classified "red" system closed to unauthorized users.

"Yeah, sure, people have gotten into the unclassified system," Mr.
Danneskiold said. "Our unclassified site has been hacked."

During one 10-month period in the late 1990s, officials said, intelligence
agencies recorded 792 computer security incidents, including 324 attacks from
outside the United States.

The attacks included efforts to gain password files, probes of computer
defenses and scans of system vulnerabilities to intrusion.

Several computer systems have been compromised by intruders who gained "root"
access to Energy Department computer systems. Such access allows hackers to
gain complete access and total control over computer systems that permit them
to see all information on the systems, the officials said.

Many of the attacks are from foreign intelligence services seeking restricted
nuclear information or other sensitive material, particularly on science and
technology.

The Washington Times, August 3, 2000 @  )W20´Click Here: <A
HREF="http://www.aci.net/kalliste/">The Home Page of J. Orlin Grabbe</A>
-----

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to