Information Security News mailing list archives
Hack the hackers
From: InfoSec News <isn () C4I ORG>
Date: Tue, 19 Dec 2000 00:48:09 -0600
http://www.hindustantimes.com/nonfram/191200/detOPI01.asp [Interesting information warfare story until towards the bottom where the writer starts using (What reads more like fiction) information about the Hong Kong Blondes from Anthony LoBaido's stories about the Blondes & their links to former British intel agents. -WK] Ravi Visvesvaraya Prasad Tuesday, December 19, 2000 New Delhi Since the Pokhran blasts, Pakistani hackers have been regularly attacking websites of Indian organisations. The homepages of the Prime Ministers Office, the Bhabha Atomic Research Centre, the Ministry of Information Technology and Videsh Sanchar Nigam were hacked into and defaced with anti-India obscenities. Pakistani hacker groups like Death to India, Kill India and G-Force Pakistan openly circulate instructions for attacking Indian computers. The websites http://www.f**kindia.org, run by Nicholas Culshaw of Karachi, and http://www.f**kindia.com, run by Arshad Qureshi of Long Beach, California, contain malicious anti-Indian propaganda along with step-by-step instructions for hacking into thousands of Indian websites. Surprisingly, the Indian Government has not attempted to disable these websites. The Ministry of Information Technology has not even demanded an explanation from the Internet Corporation for Assigned Names and Numbers (ICANN) as to how domain names like http://www.f**kindia.org and http://www.f**kindia.com could be registered at all. Indian defence and intelligence officials dismissed these activities as the handiwork of Pakistani adolescents who did not have the backing of Pakistani military and intelligence forces. However, the former additional secretary, Cabinet Secretariat, B. Raman, cautioned that India should not underestimate the havoc that can be wrought even by unorganised teenage hackers. Indias security establishment has also ignored information warfare capabilities possessed by Islamic militant organisations. Rand Corporation recently warned that Osama bin Ladens Egyptian followers can immediately cripple the information infrastructures of Russia and India. Clark Staten, Executive Director, Emergency Response and Research Institute, Chicago, warned that Ikhwan-al-Muslimoon, Jamaat Islami, Hizb-ut-Tahrir, Khilafah, Izz al-Din Al-Kassam and Nidaul Islam had developed offensive capabilities in information warfare. More serious than Pakistan and Islamic militants is the threat posed by China. According to Timothy Thomas of the US Armys Foreign Military Studies Office in Fort Leavenworth, Kansas, Chinas leaders reckon that it can achieve hegemony in Asia only by integrating information warfare into its geopolitical strategies. Thomas stated that China is quickly integrating the latest information warfare techniques into its Peoples War concept. This development has been ignored by the West but will have far-reaching strategic and operational implications. In mid-1999, China established a special task force on information warfare composed of senior politicians, military officers and academics, headed by Xie Guang, Vice-Minister of the Commission of Science, Technology and Industry for National Defence. This task force has prepared detailed plans to cripple the civilian information infrastructures of Taiwan, the United States, India, Japan and South Korea. Two members, Qi Jianguo and Dai Qingmin, have formulated a comprehensive scheme. First, China will not attack military or political targets in these countries but would target their financial, banking, electrical supply, water, sewage and telecommunications networks. Second, Chinese companies will establish business links with private companies in these countries. After carrying on legitimate business for some time, they would insert malicious computer codes and viruses over commercial e-mail services. Third, the viruses and malicious codes would be sent through computers in universities in third countries so that they could not be traced back to China. Fourth, the attacks would be launched when the political leadership of the target countries is preoccupied with election campaigns. The Peoples Liberation Army (PLA) has conducted several field exercises recently. An Informaticised Peoples Warfare Network Simulation Exercise was conducted in Echeng district of Hubei province. Five hundred soldiers simulated cyberattacks on the telecommunications, electricity, finance and television sectors of Taiwan, India, Japan and South Korea. Ten functions were rehearsed in another exercise at Xian in Jinan Military Region: planting information mines, conducting information reconnaissance, changing network data, releasing information bombs, dumping garbage, disseminating propaganda, applying information deception, releasing clone information, organising info- defence and establishing network spy stations. In Datong, 40 PLA specialists are preparing methods of seizing control of networks of commercial internet service providers in Taiwan, India, Japan and South Korea. They held demonstrations for the Beijing Region Military Comm!, Central Military Commission and General Staff Directorate. In October, Chief of General Staff Fu Quanyou presided over an exercise in Lanzhou and Shenyang Military Regions which simulated electronic confrontation with countries south and west of Gobi Desert. This focused on electronic reconnaissance, counter-reconnaissance, electronic interference and counter-interference. It tested the battle readiness of PLAs command automation systems, command operations, situation maps, audio and graphics processes and controls, and data encryption systems. Smaller exercises were carried out in July in the Chengdu Military Region and in August in the Guangzhou Military Region. The PLA has also enlisted support from universities. It established the Communications Command Academy in Wuhan, capital of Hubei province, in collaboration with Hubeis engineering universities. The Navy Engineering College, headed by Shao Zijun, also in Wuhan, is collaborating on secret projects on information warfare with the Communications Command Academy. The PLA established the Information Engineering University, headed by Major General Zhou Rongting, in Zhengzhou, capital of Henan province. It did this by taking over and combining Henans civilian Institute of Information Engineering, Electronic Technology College and Survey and Mapping College. This will specialise in remote image information engineering, satellite-navigation and positioning engineering, and map data banks of the regions from India to Indo-China. The PLA also established the Science and Engineering University, headed by Major General Si Laiyi, by combining the civilian Institute of Communications Engineering, the Institute of the Engineering Corps, the Air Forces Meteorology Institute and the Research Institute of General Staff Headquarters. Si Laiyi attracted over 400 civilian professors from universities all over China. He also announced the establishment of a new Institute of Computer and Command Automation and persuaded 60 experts of Chinese origin settled in the West to return to work there. A fourth PLA institute is the National Defence Science and Technology University in Changsha, under direct supervision of the Central Military Commission, where the Yin He series of supercomputers has been developed. To counter cyberthreats from China, Pakistan and militant Islamic groups, the Indian Government should immediately establish a national centre for information systems security. It should tap the expertise of universities and private software and internet companies. In addition to the Government and defence sectors, it should cater to the banking sector, stock exchanges, telecom and internet networks, power and water supplies, and transportation. It should be structured on the lines of the American Presidents Commission on Critical Infrastructure Protection which was created by Bill Clinton in 1996 and in which several US corporations and universities are partners principally IBM, Dell, BellSouth, GTE and Carnegie Mellon University. India should also provide support to the numerous dissident Chinese hacker groups formed to avenge the Tiananmen Square massacre. One is headed by Lemon Li who operates from St Nazare, France. Another is headed by Michael Ming and functions out of College Station, Texas. The most successful hackers have been Yellow Pages and Blondes. Blondes was founded by Blondie Wong who operates from Toronto. Mao Zedongs men had killed his parents. But since he was a follower of Mahatma Gandhi and Martin Luther King, Wong decided to use only peaceful means to overthrow the Beijing regime. The Bangkok chapter of Blondes is headed by an Englishwoman, Tracey Kinchen, who was earlier an MI5 agent. Her team disabled a PLA spy satellite by sending spurious signals using cellular modems. Another Englishwoman, Ashton Tyler Baines, heads the Kowloon chapter of Blondes. Her team has launched over 72,000 cyberattacks against PLA. Baines claimed that Blondes and Yellow Pages have already placed over 40 computer operators as moles inside PLAs cyberspace divisions. We can infiltrate, alter and even crash their communications satellites, space program, supercomputers and networks. We are putting in backdoors and writing bad code into their servers. We have already infected off-site copies of their CD-ROMs, said Baines. Could that provide the Indian Government with some ideas of how to counter a Chinese infotech attack? ISN is hosted by SecurityFocus.com --- To unsubscribe email LISTSERV () SecurityFocus com with a message body of "SIGNOFF ISN".
Current thread:
- Hack the hackers InfoSec News (Dec 18)