Feeds

WikiLeaked US cables link China to Google hack

Clinton ordered surveillance of UN leadership

Providing a secure and efficient Helpdesk

A Chinese contact told the American Embassy in Beijing that China's Politburo "directed" last December's hack on Google's internal systems, according to the confidential US diplomatic cables released by WikiLeaks and various news organizations on Sunday.

As reported by The New York Times, an unnamed source told the American Embassy that the Google hack was "part of a coordinated campaign of computer sabotage carried out by government operatives, private security experts and Internet outlaws recruited by the Chinese government." The US State Department cables showed that since 2002, the campaign had also hacked machines belonging to the American government, its Western Allies, the Dalai Lama, and various American businesses.

In January, Google told the world that attacks originating from China had lifted unspecified intellectual property from the company. Microsoft later said that the attack had exploited a hole in its Internet Explorer 6 browser — which was soon patched — and according to security researchers, at least 33 other companies were targeted by similar attacks.

Google and US State Department implied that the Chinese government was involved, but the Chinese government denied any role in the attacks.

The New York Times later reported that the attacks had been traced to a pair of Chinese schools and that one of the schools had close ties to the Chinese military. But the schools denied involvement — and links to the military.

According to Google, "a primary goal" of the the attacks on its internal systems was to access the email accounts of Chinese human rights activists. In a blog post, the company said that attacks on two Gmail accounts were largely unsuccessful, but that an investigation showed that accounts belonging to dozens of activists in the US, China, and Europe "have been routinely accessed by third parties."

After obtaining 250,000 confidential US State Department cables, WikiLeaks released a few hundred to a handful of news organizations, which were under embargo until Sunday. After the embargo lifted, WikiLeaks published this first installment of cables to its own site. The New York Times said it did not obtain the cables from WikiLeaks, but it seemed to honor the same embargo.

WikiLeaks has promised to release the cables "in stages" over the next few months. The documents expose daily communication between the State Department and about 270 embassies and consulates. The White House condemned the release of the cables, calling them "stolen and classified documents."

"These cables could compromise private discussions with foreign governments and opposition leaders, and when the substance of private conversations is printed on the front pages of newspapers across the world, it can deeply impact not only US foreign policy interests, but those of our allies and friends around the world," read a statement from The White House. "To be clear — such disclosures put at risk our diplomats, intelligence professionals, and people around the world who come to the United States for assistance in promoting democracy and open government."

The first collection of cables reveals a wide range of confidential State Department dealings, including a 2009 directive from Secretary of State that ordered the surveillance of United Nations leaders. The directive orders the collection of "current technical specifications, physical layout, and planned upgrades to telecommunications infrastructure and information systems, networks, and technologies." This includes "details on commercial and private VIP networks used for official communications," such as "upgrades, security measures, passwords, personal encryption keys, and types of VPN versions used." ®

New hybrid storage solutions

More from The Register

next story
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
TorrentLocker unpicked: Crypto coding shocker defeats extortionists
Lousy XOR opens door into which victims can shove a foot
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.