Two reports issued this weekend provided a stunning glimpse into the extent of China’s espionage operations using the Internet. Tracking GhostNet: Investigating a Cyber Espionage Network and The Snooping Dragon: Social-Malware Surveillance of the Tibetan Movement, served as clear warnings — especially to the Tibetan movement — that Chinese authorities are watching, listening, collecting and acting on the information obtained.
The second report said that the malware is “well written” and has been “devastatingly effective,” targeting, among others, foreign ministries, NGOs, news organizations, NATO and the Tibetan government-in-exile. The first report says GhostNet infected at least 1,295 computers in 103 countries, “of which close to 30 percent can be considered as high-value diplomatic, political, economic, and military targets.”
Beyond collecting information, the software developed in China, known as gh0st RAT, allows attackers to gain full, real-time control of, send instructions to and retrieve information from the targeted computer.
In the private realm, the implications of cyber espionage as a tool of repression are devastating. In one instance, a woman working for Drewla, a group that uses online chatting forums to reach out to Chinese and educate them on the plight of Tibetans, was arrested at the Nepalese-Tibetan border as she was returning to her village in Tibet. She was interrogated by Chinese intelligence officers, held incommunicado and presented with the full transcripts of her Internet chat activity. She was then banned from Tibet.
While the Tracking GhostNet report is careful not to attribute all cyber attacks to intelligence-gathering operations by Beijing, it is active in that domain and has used actionable intelligence collected electronically to pursue its objectives.
Although the reports paid special attention to Chinese spying on Tibetans, in the process the authors determined that of 986 known infected IP hosts in 93 countries, Taiwan had the most — 148 — including its embassy in Swaziland, the Institute for Information Industry, Net Trade, the Taiwan External Trade Development Council and the Government Service Network.
Coupled with evidence that, despite President Ma Ying-jeou’s (馬英九) cross-strait peace initiative, China has not taken the military option off the table, revelations of China’s cyber espionage network raise questions about the wisdom of intensifying relations with China. If, as can be assumed, China remains committed to targeting Taiwan for intelligence collection, then the more electronic contact there is between the two sides, the greater the opportunities will be for the transmission of malware. The repercussions in the banking and high-tech sectors, not to mention defense and public safety, could be huge.
China could target individuals, especially in pro-independence groups and opponents of cross-strait agreements. As fear of, and opposition to, agreements with China that risk undermining the sovereignty of Taiwan increases, China can be expected to monitor dissidents in ways that recall its treatment of Tibetans, as outlined in the reports.
Chinese intelligence has a long history of such activity but until recently its espionage was done through human intelligence. Now that communication is mostly electronic, however, espionage can be carried out remotely and with greater efficiency. Given the stakes, Taiwan should conduct its own study on the matter.
On May 7, 1971, Henry Kissinger planned his first, ultra-secret mission to China and pondered whether it would be better to meet his Chinese interlocutors “in Pakistan where the Pakistanis would tape the meeting — or in China where the Chinese would do the taping.” After a flicker of thought, he decided to have the Chinese do all the tape recording, translating and transcribing. Fortuitously, historians have several thousand pages of verbatim texts of Dr. Kissinger’s negotiations with his Chinese counterparts. Paradoxically, behind the scenes, Chinese stenographers prepared verbatim English language typescripts faster than they could translate and type them
More than 30 years ago when I immigrated to the US, applied for citizenship and took the 100-question civics test, the one part of the naturalization process that left the deepest impression on me was one question on the N-400 form, which asked: “Have you ever been a member of, involved in or in any way associated with any communist or totalitarian party anywhere in the world?” Answering “yes” could lead to the rejection of your application. Some people might try their luck and lie, but if exposed, the consequences could be much worse — a person could be fined,
Xiaomi Corp founder Lei Jun (雷軍) on May 22 made a high-profile announcement, giving online viewers a sneak peek at the company’s first 3-nanometer mobile processor — the Xring O1 chip — and saying it is a breakthrough in China’s chip design history. Although Xiaomi might be capable of designing chips, it lacks the ability to manufacture them. No matter how beautifully planned the blueprints are, if they cannot be mass-produced, they are nothing more than drawings on paper. The truth is that China’s chipmaking efforts are still heavily reliant on the free world — particularly on Taiwan Semiconductor Manufacturing
Keelung Mayor George Hsieh (謝國樑) of the Chinese Nationalist Party (KMT) on Tuesday last week apologized over allegations that the former director of the city’s Civil Affairs Department had illegally accessed citizens’ data to assist the KMT in its campaign to recall Democratic Progressive Party (DPP) councilors. Given the public discontent with opposition lawmakers’ disruptive behavior in the legislature, passage of unconstitutional legislation and slashing of the central government’s budget, civic groups have launched a massive campaign to recall KMT lawmakers. The KMT has tried to fight back by initiating campaigns to recall DPP lawmakers, but the petition documents they