{"id":17716,"date":"2020-02-12T10:45:02","date_gmt":"2020-02-12T18:45:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/02\/12\/news-11451\/"},"modified":"2020-02-12T10:45:02","modified_gmt":"2020-02-12T18:45:02","slug":"news-11451","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/02\/12\/news-11451\/","title":{"rendered":"China&#8217;s Hacking Spree Will Have a Decades-Long Fallout"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5e41f9e3e601630009b7e826\/master\/pass\/Security_equifax-171313676.jpg\"\/><\/p>\n<p><strong>Credit to Author: Garrett M. Graff| Date: Tue, 11 Feb 2020 19:58:27 +0000<\/strong><\/p>\n<p class=\"byline bylines__byline byline--author\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\"><span class=\"byline__name byline--with-bg\"><a class=\"byline__name-link\" href=\"\/contributor\/garrett-m-graff\">Garrett M. Graf<span class=\"link__last-letter-spacing\">f<\/span><\/a><\/span> <\/span><\/p>\n<p class=\"content-header__row content-header__dek\">Equifax. Anthem. Marriott. OPM. The data that China has amassed about US citizens will power its intelligence activities for a generation.<\/p>\n<p>At a press conference announcing the <a href=\"https:\/\/www.wired.com\/story\/equifax-hack-china\/\">indictment of four Chinese hackers<\/a> Monday, US Attorney General William Barr spoke out loud what had long been discussed only over drinks at security conferences: Some of the biggest hacks of Americans\u2019 private data in the past decade had been the work of the Chinese government, resulting in a massive, unparalleled espionage advantage.<\/p>\n<p>\u201cFor years, we have witnessed China\u2019s voracious appetite for the personal data of Americans, including the theft of personnel records from the US Office of Personnel Management, the intrusion into Marriott hotels, and Anthem health insurance company, and now the wholesale theft of credit and other information from Equifax,\u201d he <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.justice.gov\/opa\/speech\/attorney-general-william-p-barr-announces-indictment-four-members-china-s-military&quot;}\" href=\"https:\/\/www.justice.gov\/opa\/speech\/attorney-general-william-p-barr-announces-indictment-four-members-china-s-military\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">told<\/a> reporters, in what was almost certainly the first time the four attacks had been publicly linked by a government official. While the new indictments from Barr make clear the common perpetrator, the damage China is alleged to have done may take decades for the United States to undo.<\/p>\n<p>China\u2019s hoovering of Americans\u2019 private data has long been one of the biggest open secrets of modern intelligence. Gradually, over years, the Justice Department and the US government publicly pointed the finger at China for each breach in turn.<\/p>\n<p>Chinese intelligence has amassed in just five years a database more detailed than any nation has ever possessed about one of its adversaries.<\/p>\n<p>Public notice began with the <a href=\"https:\/\/www.wired.com\/2016\/10\/inside-cyberattack-shocked-us-government\/\">break-in at the Office of Personnel Management<\/a> in the spring of 2015, shortly after which then-director of national security James Clapper named the superpower as the \u201cleading suspect.\u201d \u201cYou have to kind of salute the Chinese for what they did,\u201d Clapper <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.wsj.com\/articles\/SB10007111583511843695404581069863170899504&quot;}\" href=\"https:\/\/www.wsj.com\/articles\/SB10007111583511843695404581069863170899504\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">said at the time<\/a>.  In 2017, the FBI <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cnn.com\/2017\/08\/24\/politics\/fbi-arrests-chinese-national-in-opm-data-breach\/index.html&quot;}\" href=\"https:\/\/www.cnn.com\/2017\/08\/24\/politics\/fbi-arrests-chinese-national-in-opm-data-breach\/index.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">arrested<\/a> a Chinese national, Yu Pingan, who it said worked on the malware used in the <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.nytimes.com\/2017\/08\/24\/technology\/chinese-national-arrested-cyberattacks.html&quot;}\" href=\"https:\/\/www.nytimes.com\/2017\/08\/24\/technology\/chinese-national-arrested-cyberattacks.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">OPM breach<\/a>. In 2018, Reuters reported that the Justice Department was zeroing in on Chinese hackers for the <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.reuters.com\/article\/us-marriott-intnl-cyber-china-exclusive\/exclusive-clues-in-marriott-hack-implicate-china-sources-idUSKBN1O504D&quot;}\" href=\"https:\/\/www.reuters.com\/article\/us-marriott-intnl-cyber-china-exclusive\/exclusive-clues-in-marriott-hack-implicate-china-sources-idUSKBN1O504D\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">Marriott breach<\/a>. Then, last year, the Justice Department <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.justice.gov\/opa\/pr\/member-sophisticated-china-based-hacking-group-indicted-series-computer-intrusions-including&quot;}\" href=\"https:\/\/www.justice.gov\/opa\/pr\/member-sophisticated-china-based-hacking-group-indicted-series-computer-intrusions-including\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">charged<\/a> Fujie Wang, as well as other members of a hacking group, with the intrusions that targeted Anthem.<\/p>\n<p>But if you read the public charges closely, the US stayed away from discussing the suspects\u2019 motives or affiliations, or trying to hint in any way about why so many big breaches seemed to have a Chinese nexus. That changed this week.<\/p>\n<p>Monday\u2019s <a href=\"https:\/\/www.wired.com\/story\/equifax-hack-china\/\">detail-heavy indictment<\/a> against Chinese military personnel marks the first time that the US has directly gone after Chinese government hackers since its groundbreaking <a href=\"https:\/\/www.wired.com\/2014\/05\/us-indictments-of-chinese-military-hackers-could-be-awkward-for-nsa\/\">May 2014 indictment against five People\u2019s Liberation Army members<\/a> for economic espionage\u2014a case that came down even as Chinese hackers were, unbeknownst to the US, already inside the OPM system. Barr\u2019s announcement and the accompanying charges also directly tied the Chinese Communist Party to the case, as part of a larger \u201cChina strategy\u201d that the Justice Department has been pushing to raise the costs of China\u2019s rampant intellectual property theft and economic espionage.<\/p>\n<p>The aggressiveness of the campaign has raised concerns that it could result in racial profiling\u2014a new book, <em><a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.axios.com\/fbi-spied-chinese-scientists-new-book-reveals-5065641d-569f-4ed9-a7f3-08a594725166.html&quot;}\" href=\"https:\/\/www.axios.com\/fbi-spied-chinese-scientists-new-book-reveals-5065641d-569f-4ed9-a7f3-08a594725166.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">The Scientist and the Spy<\/a><\/em>, alleges that profiling did occur during the FBI&#x27;s last major anti-China push\u2014and so FBI deputy director David Bowdich was quick to draw parameters around the Justice Department\u2019s work. \u201cI want to make one very important point,&quot; he <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.justice.gov\/opa\/video\/chinese-military-personnel-charged-computer-fraud-economic-espionage-and-wire-fraud&quot;}\" href=\"https:\/\/www.justice.gov\/opa\/video\/chinese-military-personnel-charged-computer-fraud-economic-espionage-and-wire-fraud\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">said<\/a> at Monday&#x27;s press conference. &quot;Our concern is not with the Chinese people or with the Chinese-American [community], it is with the Chinese government and Chinese Communist Party.\u201d<\/p>\n<p>China\u2019s alleged hacking efforts have borne fruit just as big data and artificial intelligence combine to make those massive databases useful, sortable, and studiable. As Barr said on Monday, \u201cThis data has economic value, and these thefts can feed China\u2019s development of artificial intelligence tools as well as the creation of intelligence targeting packages.\u201d<\/p>\n<p>Indeed, what has long worried intelligence professionals as the scope of China\u2019s data ambitions became clear is not the size of each individual theft\u2014even though all four rank among the largest and most serious data breaches ever\u2014it\u2019s the ways that the layers of the data build upon one another. The OPM breach exposed the personnel records of effectively every civilian employee of the US government, some 21 million people; they included not just key identifiers like names and Social Security numbers but also the comprehensive forms known as SF-86s, which are used in the process of granting employees security clearance and can contain all manner of sensitive information, from drug use and debts to foreign travel. Anthem reported that nearly 80 million people had their insurance information stolen. Marriott\u2019s final accounting of the intrusion into its Starwood subsidiary ended up just shy of 400 million individual records stolen, including as many as <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/techcrunch.com\/2019\/01\/04\/marriott-five-million-passport-numbers-stolen-starwood\/&quot;}\" href=\"https:\/\/techcrunch.com\/2019\/01\/04\/marriott-five-million-passport-numbers-stolen-starwood\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">5 million<\/a> passport numbers. Equifax saw the theft of personal identifiable information regarding 147 million people\u2014effectively the entire adult population of the United States\u2014including drivers\u2019 license numbers of at least 10 million of them.<\/p>\n<p>By combining personnel data with travel records, health records, and credit information, Chinese intelligence has amassed in just five years a database more detailed than any nation has ever possessed about one of its adversaries. The data and its layers work both to identify existing US intelligence officers through their personnel records and travel patterns as well as to identify potential weaknesses\u2014through background checks, credit scores, and health records\u2014of intelligence targets China may someday hope to recruit. Numerous cases in recent years have shown the creative ways China has <a href=\"https:\/\/www.wired.com\/story\/china-spy-recruitment-us\/\">identified and targeted potential spies<\/a>, even sometimes using LinkedIn to find employees at companies of interest. The wealth of combined data now in the hands of Chinese intelligence will only make such targeting easier in the future.<\/p>\n<p>China, whose own <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.theatlantic.com\/international\/archive\/2018\/02\/china-surveillance\/552203\/&quot;}\" href=\"https:\/\/www.theatlantic.com\/international\/archive\/2018\/02\/china-surveillance\/552203\/\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">domestic<\/a> <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.nytimes.com\/2019\/12\/17\/technology\/china-surveillance.html&quot;}\" href=\"https:\/\/www.nytimes.com\/2019\/12\/17\/technology\/china-surveillance.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">surveillance state<\/a> and <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.npr.org\/2019\/12\/16\/788597818\/how-china-is-using-facial-recognition-technology&quot;}\" href=\"https:\/\/www.npr.org\/2019\/12\/16\/788597818\/how-china-is-using-facial-recognition-technology\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">facial recognition<\/a> <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.nytimes.com\/2019\/04\/14\/technology\/china-surveillance-artificial-intelligence-racial-profiling.html&quot;}\" href=\"https:\/\/www.nytimes.com\/2019\/04\/14\/technology\/china-surveillance-artificial-intelligence-racial-profiling.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">advances<\/a> are as cutting-edge as they are Orwellian, appears to be sitting upon a database that it can use for decades to come. There is little to stop the country from turning the tools it has perfected at home against spies, would-be spies, intelligence officers, US government contractors, government officials, and people who simply work in any of the umpteen industries where it\u2019s eager to collect industrial secrets.<\/p>\n<p>China\u2019s distinct advantage and evolving technology has forced a reckoning for US intelligence personnel. As Yahoo News\u2019 Zach Dorfman and Jenna McLaughlin <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/news.yahoo.com\/shattered-inside-the-secret-battle-to-save-americas-undercover-spies-in-the-digital-age-100029026.html&quot;}\" href=\"https:\/\/news.yahoo.com\/shattered-inside-the-secret-battle-to-save-americas-undercover-spies-in-the-digital-age-100029026.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">reported<\/a> in December, US officials now worry whether they can work undercover overseas at all. The effort required to circumvent China\u2019s data trove, advances in biometric identifiers, and facial recognition at border crossings and on street corners seems increasingly Sisyphean. Countries with advanced espionage operations\u2014like Russia, China, and the US\u2014have begun meeting covert operatives in countries like Peru that offer little in the way of biometric data collection. The CIA is rethinking how\u2014and where\u2014it recruits personnel for overseas operations, based on the \u201cbig data\u201d implications and the potential \u201cdigital exhaust\u201d personnel may have.<\/p>\n<p>The challenge ahead was outlined in news Monday that made far fewer headlines than the Equifax charges: The National Counterintelligence and Security Center, a little-known part of the Office of the Director of National Intelligence, released its <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.dni.gov\/index.php\/ncsc-features\/2741&quot;}\" href=\"https:\/\/www.dni.gov\/index.php\/ncsc-features\/2741\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">new strategy<\/a> for countering espionage activities around the world.<\/p>\n<p>One could see echoes of the Equifax and related data breaches in one of the three main thrusts of the new report: \u201cThreats to the United States posed by foreign intelligence entities are becoming more complex, diverse, and harmful to U.S. interests,\u201d it <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.dni.gov\/files\/NCSC\/documents\/features\/20200205-National_CI_Strategy_2020_2022.pdf&quot;}\" href=\"https:\/\/www.dni.gov\/files\/NCSC\/documents\/features\/20200205-National_CI_Strategy_2020_2022.pdf\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">reported<\/a>. \u201cThreat actors have an increasingly sophisticated set of intelligence capabilities at their disposal and are employing them in new ways to target the United States. The global availability of technologies with intelligence applications\u2014such as biometric devices, unmanned systems, high resolution imagery, enhanced technical surveillance equipment, advanced encryption, and big data analytics\u2014and the unauthorized disclosures of US cyber tools have enabled a wider range of actors to obtain intelligence capabilities previously possessed only by well-financed intelligence services.\u201d<\/p>\n<p>The challenge spies and counter-spies have in front of them will only grow more daunting as biometric identifiers\u2014fingerprints, facial recognition scans, and DNA tests\u2014continue to become more common in daily life. It\u2019s clear that the US government is already thinking about preventing and limiting its exposure to rich data troves, like Equifax, in the future: The Pentagon recently asked military personnel to <a class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/news.yahoo.com\/pentagon-warns-military-members-dna-kits-pose-personal-and-operational-risks-173304318.html&quot;}\" href=\"https:\/\/news.yahoo.com\/pentagon-warns-military-members-dna-kits-pose-personal-and-operational-risks-173304318.html\" rel=\"nofollow noopener noreferrer\" target=\"_blank\">stop<\/a> using at-home DNA kits for health and ancestry purposes, fearful about where that unchangeable, unalterable genetic data may end up now or later.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/china-equifax-anthem-marriott-opm-hacks-data\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5e41f9e3e601630009b7e826\/master\/pass\/Security_equifax-171313676.jpg\"\/><\/p>\n<p><strong>Credit to Author: Garrett M. Graff| Date: Tue, 11 Feb 2020 19:58:27 +0000<\/strong><\/p>\n<p>Equifax. Anthem. Marriott. OPM. The data that China has amassed about US citizens will power its intelligence activities for a generation.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21465],"class_list":["post-17716","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-national-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17716","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17716"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17716\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17716"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}