Chinese Military Show Accidentally Reveals Previously Denied Hacking Endeavors

Huang Xueping, spokesman for the Chinese Ministry of Defense, said back in February 2010:

“Linking Internet hacking activities to the Chinese government and military is totally unfounded and utterly irresponsible […] This is stirring up a fuss for ulterior motives.”

Hm…  Seems Xueping has a “rot of  ezprain’n” to do:

EXPOSED: A picture of the hacking software shown during the Chinese military program. The large writing at the top says "Select Attack Target." The IP Addres was selected from a drop-down list of Falun Gong websites, while the button on the left says "Attack."

Slip-Up in Chinese Military TV Show Reveals More Than Intended
Piece shows cyber warfare against US entities
By Matthew Robertson & Helena Zhu
Epoch Times 

A standard, even boring, piece of Chinese military propaganda screened in mid-July included what must have been an unintended but nevertheless damaging revelation: shots from a computer screen showing a Chinese military university is engaged in cyberwarfare against entities in the United States.

The documentary itself was otherwise meant as praise to the wisdom and judgment of Chinese military strategists, and a typical condemnation of the United States as an implacable aggressor in the cyber-realm. But the fleeting shots of an apparent China-based cyber-attack somehow made their way into the final cut.

The screenshots appear as B-roll footage in the documentary for six seconds—between 11:04 and 11:10 minutes [0:38 to 0:44 on the Youtube video]—showing custom-built Chinese software apparently launching a cyber-attack against the main website of the Falun Gong spiritual practice, by using a compromised IP address belonging to a United States university. As of Aug. 22 at 1:30pm EDT, in addition to Youtube, the whole documentary is available on the CCTV website.

The screenshots show the name of the software and the Chinese university that built it, the Electrical Engineering University of China’s People’s Liberation Army—direct evidence that the PLA is involved in coding cyber-attack software directed against a Chinese dissident group.

The software window says “Choose Attack Target.” The computer operator selects an IP address from a list—it happens to be 138.26.72.17—and then selects a target. Encoded in the software are the words “Falun Gong website list,” showing that attacking Falun Gong websites was built into the software.

A drop-down list of dozens of Falun Gong websites appears. The computer operator chooses Minghui.org, the main website of the Falun Gong spiritual practice.

The IP address 138.26.72.17 belongs to the University of Alabama in Birmingham (UAB), according to an online trace.

The shots then show a big “Attack” button on the bottom left being pushed, before the camera cuts away.

“The CCP has leaked its top secret here,” says Jason Ma, a commentator for New Tang Dynasty Television. “This is the first time we see clearly that one of the top Chinese military universities is doing this research and developing software for cyber-attacks. There’s solid proof of it in this video,” he said.

The Chinese Communist Party has consistently denied that it is involved in cyber-attacks, but experts have long suspected that the Chinese military engages in them.

“Now we’ve got proof,” Ma says. “They’re also extending their persecution of Falun Gong overseas, attacking a civil website in the U.S. These are the clear messages revealed in these six seconds of video.”

Network administrators at UAB contacted on Friday took a look at the IP address on their network and said it had not been used since 2010.

One of the technicians also recalled that there had been a Falun Gong practitioner at the university some years ago who held informal Falun Gong meetings on campus. They could not confirm whether that individual used that IP address.

A UAB network administrator assured The Epoch Times that they have safeguards against both network intrusions, and that their network is not compromised.

After the short interlude, the documentary continued with the themes it had started with for another nine minutes.

Last month McAfee network security company, said that an unprecedented campaign of cyber-espionage—affecting over 70 organizations or governments around the world and implicating billions of dollars in intellectual property—was being carried out by a “state actor.”

Later evidence traced IP addresses involved in the attack to China, and a growing mountain of other circumstantial evidence also suggests that the attacks originated from China.

Explore posts in the same categories: Chinese Connection, hacking, Military, security, Software, Technology

4 Comments on “Chinese Military Show Accidentally Reveals Previously Denied Hacking Endeavors”

  1. tgusa Says:

    The Chinese communists are a disgrace to their ancestors. there’s no way to save face at this point.

  2. Gonzo Says:

    This should clear everything up:

  3. Big Frank Says:

    No surprise here, the Chinese our ‘generous’ note holders are only out for themselves and will use any means at their disposal in warfare, economic, cyber and old fashioned political intrigue.

  4. Big Frank Says:

    BTW it has been said that we the fools are funding the Chinese ‘Peoples Liberation Army’ just with the interest on the billions borrowed from them. To paraphrase a biblical expression “the borrower is the slave to the lender”.


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


%d bloggers like this: