Chinese Cyberwar Attacks Canadian and Australian Governments
Chinese regime vacuums up intelligence, looks forward to dominance
Chinese hackers compromised the computer networks of both the Canadian and the Australian governments last February. The attacks are part of a long-term effort by the Chinese regime to dominate other nations through compromising or disrupting their computer networks.
The cyber attacks in Australia were revealed on March 28. The private e-mails of the Australian prime minister are believed to have been hacked, and thousands of e-mails from at least 10 federal ministries were exfiltrated.
In Canada, hackers penetrated computers of the Finance, Defense, and Treasury departments.
The Chinese regime’s use of cyberattacks to gain information from foreign governments is nothing new. Chinese hackers are known to have hit the government network of India in January 2010, campaign e-mails of Obama and McCain in 2008, and the German government’s computers and the computers of the U.S. Defense Department in 2007.
Reports on the cyberattacks have often emphasized the theft of technology, but the taking of e-mails is part of an overall strategy used by the Chinese regime to gain advantage over other countries.
The value of exfiltrated e-mails “would be priceless,” according to Terry Minarcin, retired Air Force cryptographer for the National Security Agency.
“You would not only get personal e-mails, but also the government e-mails,” he said. The information may reveal moral flaws in individuals, and “you could exploit that to your advantage,” Minarcin said.
The Chinese regime’s intelligence agency conducts thorough research on foreign officials in order to coerce or blackmail them. They identify four weak points in human nature: fame, profit, lust, and anger, which they exploit through tailored approaches, a Beijing insider told New Epoch Magazine.
Among the most common forms of blackmail are “honey traps.” Individuals often on invite to China may find a beautiful young girl waiting for them in a hotel room, while cameras record what happens between them.
In China, “Many of the prominent hotels that cater to foreigners are equipped for the technical surveillance of guests and visitors,” states Nicholas Eftimiades in his book “Chinese Intelligence Operations” printed by the Naval Institute Press.
“As simple as this ploy appears Chinese intelligence services have used it to achieve several notable successes,” states Eftimiades.
Having worked in intelligence, intercepting foreign communications, Minarcin notes, however, the value of e-mails goes beyond blackmail. Even without highly classified information, vague bits from numerous e-mails can piece together things of value.
Read the full story here.