Experts at a private Taiwanese security company decided to pull out of a security conference in Las Vegas after coming under what was described as pressure from Chinese and Taiwanese agencies.
Wayne Huang, chief technology officer and founder of Taiwanese security vendor Armorize Technologies, and Jack Yu, a researcher at the company, were scheduled to give a talk on Chinese cyber warfare capabilities at the Black Hat USA 2010 security conference, which will be held in Las Vegas on Wednesday and Thursday next week.
They said they decided to pull out last week after coming under pressure from several Chinese and Taiwanese agencies.
“The Chinese Cyber Army: An Archaeological Study from 2001 to 2010,” derived from information gathered from intelligence groups across Asia, had been advertised as an in-depth analysis of government-backed Chinese cyber espionage.
“Using facts, we will reconstruct the face of the Cyber Army, including who they are, where they are, who they target, what they want, what they do, their funding, objectives, organization, processes, active hours, tools and techniques,” the Black Hat Web site quoted the presenters as saying.
On Wednesday last week, Armorize chief executive officer Caleb Sima wrote on Twitter that the talk had been pulled because the “Taiwanese [government] is prohibiting it due to sensitive materials.”
Black Hat conference organizers yesterday confirmed to the Taipei Times that the talk had been cancelled, but refused to discuss the reasons why. IDG News, an IT news service, broke the story last week.
During a telephone interview with the Taipei Times yesterday, Huang said the decision to drop out of the conference came after he sought to vet his talk with the intelligence agencies on whose information the report was based.
“It was our choice to pull out. We felt that Black Hat wasn’t the best way to share that information,” he said, adding that other, more official “windows” were more appropriate.
“We didn’t want to draw too much attention by disclosing that information at such a prestigious venue,” he said, adding that Armorize wanted to keep good relations with the agencies involved and continue to be part of the community, something that could have been jeopardized had the information been publicized at Black Hat.
On whether the apprehensions expressed by the various agencies stemmed from concerns over what the talk would reveal about the level of Chinese cyber espionage or the company’s sources and means of collection, Huang said “both.”
He said that from the perspective of the private sector, it was difficult to tell whether the Ma Ying-jeou (馬英九) administration’s efforts to foster closer ties with Beijing had resulted in more pressure to pull the talk.
Asked to confirm if the agencies were governmental, he said the report drew from “multiple sources,” including military, security, intelligence, law enforcement and the private sector.
“We can’t really say who owns the intelligence,” Huang said. “It’s not the raw data that matters, it’s how you spend time analyzing the raw data over 10 years to draw conclusions.”
Santa Clara, California-based Armorize was incorporated in 2006. The company’s R&D center is located in the Nangang Software Park in Taipei.
Although talks have been pulled from the Black Hat conference before, it usually resulted from pressure by the private sector threatening to sue the presenters.
Huang, who used to work as a senior consultant at the Taiwan Information Security Center and a research engineer at the Institute of Information Science at Academia Sinica, gave a version of the talk at a small conference in Taipei in 2007.
As the world’s top security conference, Black Hat would have brought the message to a far larger audience, especially as attendees would have been allowed to record it, something that was prohibited in Taiwan.
A former National Security Council official last week told the Taipei Times that Taiwan served as a “testing ground” for professional Chinese hackers, adding that only after an attack had successfully penetrated Taiwanese systems would China use the same techniques to try to infiltrate other targets.
Taiwan has developed a unique expertise in protecting against and identifying Chinese cyber attacks, skills that have been recognized by several countries, the official said.
The official said Taiwanese intelligence had established that China had about 300,000 professional hackers employed by the government, focusing on an estimated 10,000 “priority” targets in Taiwan, which include both government agencies and the private sector.
Commenting on Huang’s talk in 2007, White Hat Security chief technology officer Jeremiah Grossman said Taiwan’s cyber crime environment was “way more serious than anything I’ve ever been exposed to in the US or elsewhere,” IDG wrote.
NETWORK-MAPPING PROJECT: The database contains 170 detailed files of Taiwanese politicians and about 23 million records of household registration data in Taiwan China has developed a network-mapping project targeting political figures and parties in Taiwan to monitor public opinion during elections and to craft tailored influence campaigns aimed at dividing Taiwanese society, according to documents leaked by Chinese technology firm GoLaxy (中科天璣). The documents, collected by Taipei-based Doublethink Lab, showed a database was specifically created to gather detailed information on Taiwanese political figures, including their political affiliations, job histories, birthplaces, residences, education, religion and a brief biography about them. Several notable Taiwanese politicians are in the database, including President William Lai (賴清德), former president Tsai Ing-wen (蔡英文), Minister of Foreign Affairs Lin Chia-lung (林佳龍),
KEY INDUSTRY: The vice premier discussed a plan to create a non-red drone supply chain by next year, which has been allocated a budget of more than NT$7.2 billion The government has budgeted NT$44.2 billion (US$1.38 billion) to cultivate Taiwan’s uncrewed aerial vehicle (UAV) industry over the next five years, which would make the nation a major player in the industry’s democratic supply chain in the Asia-Pacific region, Premier Cho Jung-tai (卓榮泰) said yesterday. Cho made the remarks during a visit to the facilities of Cub Elecparts Inc (為升電裝). Democratic Progressive Party (DPP) Legislator Chen Su-yueh (陳素月) and Chinese Nationalist Party (KMT) Legislator Hsieh Yi-fong (謝依鳳) also participated in the trip. Cub Elecparts has transitioned from the automotive industry to the defense industry, which is the top priority among the nation’s
UPGRADED MISSILE: The Chungshan Institute of Science and Technology is reportedly to conduct a live-fire test of the Hsiung Feng III anti-ship missile on Thursday next week The US Army is planning to build new facilities to boost explosives production and strengthen its supply chain, a move aimed at addressing munitions shortages and supporting obligations to partners including Taiwan, Ukraine and Israel, Defense News reported. The army has issued a sources sought notice for a proposed Center of Excellence at the Blue Grass Army Depot in Kentucky, the report said. The facility would serve as a hub within the US industrial base for the production of key military explosives, including research department explosives (RDX) and high melting explosives (HMX), while also supporting research and development of next-generation materials. The proposed
SOUTH KOREA DISPUTE: If Seoul continues to ignore its request, Taiwan would change South Korea’s designation on its arrival cards, the foreign ministry said If South Korea does not reply appropriately to a request to correct Taiwan’s name on its e-Arrival card system before March 31, the government would take corresponding measures to change how South Korea is labeled on the online Taiwan Arrival Card system, the Ministry of Foreign Affairs said yesterday. South Korea’s e-Arrival card system lists Taiwan as “China (Taiwan)” in the “point of departure” and “next destination” fields. Taipei has asked Seoul to change the wording. Since March 1, South Koreans who hold government-issued Alien Resident Certificates (ARC) have been identified as from “South Korea” rather than the “Republic of Korea,” the