Feeds

Congressmen say Chinese hacked their PCs

Dissident locations, other sensitive data intercepted

Choosing a cloud hosting partner with confidence

Lawmakes are urging everyone on Capitol Hill to have their computers checked for malware after discovering that people working from inside China hacked into multiple congressional machines and accessed locations of Chinese dissidents and other sensitive data.

Virginia Representative Frank Wolf said four of his PCs were compromised, beginning in August 2006. New Jersey Representative Chris Smith, said two of his machines were hacked in December 2006 and March 2007. Both congressmen, who are long-time critics of China's record on human rights, said the PCs of other lawmakers had also been breached but declined to give names.

Following the attacks on Wolf's computers, a car with license plates belonging to Chinese officials went to the home of a dissident near Washington and photographed it. The congressman said FBI investigators who looked into the breach traced the attacks to machines located in China. He said he's known about the attacks for a long time but that he had been discouraged from discussing them by people in the US government he declined to identify.

"The problem has been that no one wants to talk about this issue," he said. "Every time I've started to do something I've been told 'You can't do this.' A lot of people have made it very, very difficult."

Wolf suggested members of the Senate have also been victims of computer intrusion. He called for better education for members of Congress about the dangers of cyber attacks and urged members to have their machines checked. He said he was introducing a resolution that would tighten security of House computers and information systems. In the Senate, Senator Dick Durbin of Illinois asked the sergeant at arms to investigate whether Senate computers have been breached.

Smith said the attacks on his machines were "were very much an orchestrated effort." His office no longer stores the names of Chinese dissidents on computers, he said. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Bono apologises for iTunes album dump
Megalomania, generosity and FEAR of irrelevance drove group to Apple deal
HBO shocks US pay TV world: We're down with OTT. Netflix says, 'Gee'
This affects every broadcaster, every cable guy
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
French 'terror law' declares WAR on the INTERNET itself, say digi-rights folks
Liberté, Égalité, Fraternité: Two out of three ain't bad
SCREW YOU, EU: BBC rolls out Right To Remember as Google deletes links
Not even Google can withstand the power of Auntie
Arab States make play for greater government control of the internet
Nerds told to get lost in last-minute power grab bid at UN meeting
Zippy one-liners, broken promises: Doctor Who on the Orient Express
Series finally hits stride, but Clara's U-turn is baffling
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
America's super-secret X-37B plane returns to Earth after nearly TWO YEARS aloft
674 days in space for US Air Force's mystery orbital vehicle
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.