Feeds

Congressmen say Chinese hacked their PCs

Dissident locations, other sensitive data intercepted

Next gen security for virtualised datacentres

Lawmakes are urging everyone on Capitol Hill to have their computers checked for malware after discovering that people working from inside China hacked into multiple congressional machines and accessed locations of Chinese dissidents and other sensitive data.

Virginia Representative Frank Wolf said four of his PCs were compromised, beginning in August 2006. New Jersey Representative Chris Smith, said two of his machines were hacked in December 2006 and March 2007. Both congressmen, who are long-time critics of China's record on human rights, said the PCs of other lawmakers had also been breached but declined to give names.

Following the attacks on Wolf's computers, a car with license plates belonging to Chinese officials went to the home of a dissident near Washington and photographed it. The congressman said FBI investigators who looked into the breach traced the attacks to machines located in China. He said he's known about the attacks for a long time but that he had been discouraged from discussing them by people in the US government he declined to identify.

"The problem has been that no one wants to talk about this issue," he said. "Every time I've started to do something I've been told 'You can't do this.' A lot of people have made it very, very difficult."

Wolf suggested members of the Senate have also been victims of computer intrusion. He called for better education for members of Congress about the dangers of cyber attacks and urged members to have their machines checked. He said he was introducing a resolution that would tighten security of House computers and information systems. In the Senate, Senator Dick Durbin of Illinois asked the sergeant at arms to investigate whether Senate computers have been breached.

Smith said the attacks on his machines were "were very much an orchestrated effort." His office no longer stores the names of Chinese dissidents on computers, he said. ®

The essential guide to IT transformation

More from The Register

next story
GCHQ protesters stick it to British spooks ... by drinking urine
Activists told NOT to snap pics of staff at the concrete doughnut
Britain's housing crisis: What are we going to do about it?
Rent control: Better than bombs at destroying housing
What do you mean, I have to POST a PHYSICAL CHEQUE to get my gun licence?
Stop bitching about firearms fees - we need computerisation
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
Redmond resists order to hand over overseas email
Court wanted peek as related to US investigation
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?