A "cyber Cold War" is developing as international Web espionage and cyber-attacks become the biggest threats to Internet security, a new report says.
The computer security firm McAfee said governments and government-allied groups were engaging in increasingly sophisticated cyber spying, with many attacks originating from China.
Some 120 countries could be developing the capacity for such activities.
What started as probes to see what was possible have become well-funded and well-organized operations for political, military, economic and technical espionage, the report said, with perpetrators aiming to cause havoc by disrupting critical national infrastructure systems.
Targets include air traffic control, financial markets, government computer networks and utility providers. In September, the Guardian newspaper reported that Chinese hackers, including some believed to be from the state military, had been attacking the computer networks of British government departments, including the UK Foreign Office. China has spelled out in a white paper that "informationized armed forces" are part of its military strategy.
McAfee, whose report was compiled with input from NATO, the FBI and the UK's Serious Organized Crime Agency, said that according to NATO insiders, the wave of cyber attacks that hit Estonia earlier this year, disrupting government, news and bank servers for weeks, was the tip of the iceberg. In May, the Baltic state said that at least 1 million computers had been used in the cyber warfare, which saw hundreds of thousands of hits bombarding Estonian Web sites to jam them and make them unusable. The method used was known as distributed denial of service.
The attack coincided with the climax of a dispute between Moscow and Tallinn over a Soviet World War II memorial in the Estonian capital, but officials there backed away from accusing the Kremlin directly.
Russian officials have denied any state responsibility.
In the past 12 months there have been reports of cyber attacks against government targets in the US, Germany, India, New Zealand and Australia. China has denied any involvement.
"We have seen attempts by a variety of state and non-state-sponsored organizations to gain unauthorized access to, or otherwise degrade, department of defense information systems," a Pentagon spokesman said.
NATO experts said attackers were using trojan horse software to focus on specific government offices, and 99 percent of cases were probably still undetected.
"The complexity and coordination seen during the Estonia attacks was new," a NATO insider said. "There was a series of attacks with careful timing using different techniques and specific targets. The attackers stopped deliberately rather than being shut down."
James Mulvenon, an expert on China's military, who is also director of the Center for Intelligence and Research in Washington, said the Chinese were the first to jump "feet first" into 21st-century cyber-warfare technology.
Peter Sommer, a computer crime expert and visiting fellow at the London School of Economics, who contributed to the report, said: "There are signs that intelligence agencies around the world are constantly probing other governments' networks."
CROSS-STRAIT COLLABORATION: The new KMT chairwoman expressed interest in meeting the Chinese president from the start, but she’ll have to pay to get in Beijing allegedly agreed to let Chinese Nationalist Party (KMT) Chairwoman Cheng Li-wun (鄭麗文) meet with Chinese President Xi Jinping (習近平) around the Lunar New Year holiday next year on three conditions, including that the KMT block Taiwan’s arms purchases, a source said yesterday. Cheng has expressed interest in meeting Xi since she won the KMT’s chairmanship election in October. A source, speaking on condition of anonymity, said a consensus on a meeting was allegedly reached after two KMT vice chairmen visited China’s Taiwan Affairs Office Director Song Tao (宋濤) in China last month. Beijing allegedly gave the KMT three conditions it had to
STAYING ALERT: China this week deployed its largest maritime show of force to date in the region, prompting concern in Taipei and Tokyo, which Beijing has brushed off Deterring conflict over Taiwan is a priority, the White House said in its National Security Strategy published yesterday, which also called on Japan and South Korea to increase their defense spending to help protect the first island chain. Taiwan is strategically positioned between Northeast and Southeast Asia, and provides direct access to the second island chain, with one-third of global shipping passing through the South China Sea, the report said. Given the implications for the US economy, along with Taiwan’s dominance in semiconductors, “deterring a conflict over Taiwan, ideally by preserving military overmatch, is a priority,” it said. However, the strategy also reiterated
‘BALANCE OF POWER’: Hegseth said that the US did not want to ‘strangle’ China, but to ensure that none of Washington’s allies would be vulnerable to military aggression Washington has no intention of changing the “status quo” in the Taiwan Strait, US Secretary of Defense Pete Hegseth said on Saturday, adding that one of the US military’s main priorities is to deter China “through strength, not through confrontation.” Speaking at the annual Reagan National Defense Forum in Simi Valley, California, Hegseth outlined the US Department of Defense’s priorities under US President Donald Trump. “First, defending the US homeland and our hemisphere. Second, deterring China through strength, not confrontation. Third, increased burden sharing for us, allies and partners. And fourth, supercharging the US defense industrial base,” he said. US-China relations under
The Chien Feng IV (勁蜂, Mighty Hornet) loitering munition is on track to enter flight tests next month in connection with potential adoption by Taiwanese and US armed forces, a government source said yesterday. The kamikaze drone, which boasts a range of 1,000km, debuted at the Taipei Aerospace and Defense Technology Exhibition in September, the official said on condition of anonymity. The Chungshan Institute of Science and Technology and US-based Kratos Defense jointly developed the platform by leveraging the engine and airframe of the latter’s MQM-178 Firejet target drone, they said. The uncrewed aerial vehicle is designed to utilize an artificial intelligence computer