TITAN RAIN: How Chinese Cybercriminals Infiltrated The United States Cyberspace

The TWS Channel
13 Oct 202212:09

Summary

TLDRThe script delves into cyberespionage, highlighting its evolution from physical infiltration to digital attacks, exemplified by the notorious 'Titan Rain' campaign targeting US military and tech firms. It tells the story of Shawn Carpenter, a network security analyst, who independently traced the cyberattacks back to China, facing legal and professional repercussions despite his efforts. The narrative underscores the complexities of cyber warfare, the challenges of attribution, and the implications of state-sponsored espionage on global security.

Takeaways

  • šŸ•µļø Cyberespionage is a modern form of spying that involves stealing sensitive data through cyberattacks, often conducted by nation-states against each other for intelligence purposes.
  • šŸ’„ The internet has replaced traditional espionage methods, offering a safer way to infiltrate enemy systems with 'plausible deniability'.
  • šŸŒ The 'Titan Rain' attack was a significant cyberespionage campaign against the U.S. government, which was considered one of the most pervasive threats to U.S. computer networks.
  • šŸ›” Internet vigilantes like Shawn Carpenter take matters into their own hands to counter cybercrime, acting without official permission but with the intent to protect.
  • šŸ” Shawn Carpenter's independent investigation led to the discovery of Rootkits in Lockheed Martin's systems, which were being used to steal sensitive data.
  • šŸ The use of 'Honeypots' by Carpenter successfully lured the cyber spies, allowing him to trace their activities back to servers in South Korea and China.
  • šŸ“š The stolen documents included sensitive blueprints of major U.S. military projects, highlighting the severity of the information theft.
  • šŸ¤ Despite initial reluctance, Carpenter's findings were eventually shared with the FBI, leading to a deeper investigation into the cyberespionage activities.
  • šŸšØ The unauthorized nature of Carpenter's investigation led to legal and professional repercussions, including losing his job and security clearance.
  • šŸ† Carpenter's lawsuit against Sandia National Laboratories for wrongful termination was successful, with a significant financial settlement awarded.
  • šŸ”— The U.S. government attributed the 'Titan Rain' attacks to China's People's Liberation Army, Unit 61398, though China denied these accusations.

Q & A

  • What is cyberespionage?

    -Cyberespionage is a form of cyberattack that involves spying and theft of sensitive data or information, often conducted by nation-states to gain intelligence on their targets.

  • How did espionage methods evolve with the advent of the internet?

    -With the existence of the internet, physical infiltration by spies has been largely replaced by cyberespionage, which is considered safer and provides 'plausible deniability'.

  • What is the significance of the Rosenberg Case in the context of espionage?

    -The Rosenberg Case is infamous because it involved American citizens spying for the Soviet Union during the Cold War, highlighting the serious threat posed by espionage activities.

  • What is 'Titan Rain'?

    -'Titan Rain' is a codename given by the U.S. government to a series of cyberespionage attacks that it faced between 2003 and 2006, which were considered highly pervasive threats to U.S. computer networks.

  • Who is Shawn Carpenter and what was his role in the 'Titan Rain' incident?

    -Shawn Carpenter is a navy veteran and network security analyst who independently investigated the 'Titan Rain' cyberespionage attacks, tracing the perpetrators back to a server in China.

  • What is a 'Honeypot' in cybersecurity?

    -A 'Honeypot' is a security mechanism set to detect, deflect, or study attempts at unauthorized use of information systems. It appears to be a part of the system but is actually a trap to lure cyber attackers.

  • What did Shawn Carpenter discover on the South Korean server?

    -Shawn Carpenter discovered that the South Korean server was loaded with sensitive, stolen documents including blueprints from the 'F-22 Raptor' and the 'Mars Reconnaissance Orbiter', and files belonging to the U.S. Army.

  • What legal issues did Shawn Carpenter face after his investigation?

    -Shawn Carpenter faced legal issues as his investigation was unauthorized. He was fired from his job at Sandia National Laboratories and had his security clearance revoked, but later won a lawsuit for defamation and wrongful termination.

  • How did the U.S. government respond to the 'Titan Rain' attacks?

    -The U.S. government attributed the 2004 attacks to the People's Liberation Army, Unit 61398, in China. However, China's State Council information office denied the accusations, calling them 'totally groundless, irresponsible, and unworthy of refute.'

  • What was the impact of the 'Titan Rain' incident on the perception of Chinese cyber capabilities?

    -The 'Titan Rain' incident marked a turning point in recognizing the sophistication of Chinese cybercriminals and state-sponsored cyberespionage, with reports attributing the theft of hundreds of terabytes of information from numerous organizations.

  • What is the concept of 'plausible deniability' in the context of cyberespionage?

    -'Pausible deniability' refers to the ability to avoid admitting responsibility for an action, especially in the context of cyberespionage, where it is difficult to trace the source of an attack back to its originator.

Outlines

00:00

šŸ•µļø Cyberespionage and the Evolution of Espionage Tactics

This paragraph delves into the concept of cyberespionage, a modern form of spying that involves stealing sensitive data through digital means. It contrasts traditional espionage with cyber methods, highlighting the shift from physical infiltration to digital attacks. The paragraph mentions the Rosenberg Case as a historical example of espionage during the Cold War and discusses the advantages of cyberespionage, such as 'plausible deniability'. It introduces the term 'Titan Rain', a codename for a significant cyberespionage attack on the U.S. government, and touches on the role of internet vigilantes like Shawn Carpenter, who played a pivotal role in uncovering the attack.

05:04

šŸ›” Shawn Carpenter's Independent Cyber Investigation

This section narrates Shawn Carpenter's journey as an internet vigilante and his independent investigation into the 'Titan Rain' cyberespionage attacks. After being denied permission to 'hack back' by his superiors due to legal concerns, Carpenter takes matters into his own hands by setting up a 'Honeypot' to attract and study the cybercriminals. His efforts lead him to trace the attackers back to a server in South Korea, which he discovers is a hop point to a final destination in Guangdong, China. Despite the risks of being unauthorized, Carpenter contacts the FBI with his findings, leading to an investigation that implicates Chinese cybercriminals in the theft of sensitive U.S. military and corporate data.

10:09

šŸ› Legal and Ethical Aftermath of the 'Titan Rain' Incident

The final paragraph discusses the legal and ethical implications of Shawn Carpenter's actions and the aftermath of the 'Titan Rain' incident. Carpenter faces professional repercussions, including the loss of his security clearance and employment, due to his unauthorized investigation. Despite this, he is later vindicated in a lawsuit against Sandia National Laboratories, receiving a substantial financial settlement. The paragraph also addresses the attribution of the 'Titan Rain' attacks to the Chinese People's Liberation Army, Unit 61398, and the Chinese government's denial of these accusations. It concludes by reflecting on the significance of the incident in highlighting the capabilities of Chinese cybercriminals and the challenges of attributing cyberattacks in a realm where 'plausible deniability' is a key advantage.

Mindmap

Keywords

šŸ’”Cyberespionage

Cyberespionage refers to the use of cyber attacks to spy and steal sensitive information, typically conducted by nation-states against each other for intelligence gathering. It is central to the video's theme as it discusses the evolution from physical spying to digital infiltration. The script mentions cyberespionage in the context of nations being victims and the shift from traditional espionage to internet-based attacks.

šŸ’”Plausibly Deniable

Plausibly deniable describes an action that can be publicly denied due to a lack of evidence, making it a key advantage of cyberespionage. The script explains that this term is significant because it allows nations to carry out covert operations without direct attribution, thus avoiding retaliation.

šŸ’”Rootkit

A rootkit is a type of malicious software designed to give the attacker unauthorized access to a computer system while actively hiding its presence from the user and security measures. In the video, rootkits are found in Lockheed Martin's systems, enabling the attackers to steal sensitive data without detection.

šŸ’”Titan Rain

Titan Rain is the codename given by the US government to a series of cyberespionage attacks that targeted its computer networks between 2003 and 2006. The script uses this term to illustrate a specific case of cyberespionage, highlighting its pervasiveness and the threat it posed to US interests.

šŸ’”Internet Vigilantism

Internet vigilantism is the act of individuals taking the law into their own hands to enact justice online without formal permission from legal authorities. The video presents Shawn Carpenter as an example of an internet vigilante, who independently investigated a cyberespionage attack after his official request was denied.

šŸ’”Honeypot

A honeypot in cybersecurity is a decoy system set up to attract and trap malicious users. The script describes how Shawn Carpenter used a honeypot to lure and study the attackers, demonstrating a proactive approach to cybersecurity defense.

šŸ’”VPN

A VPN, or Virtual Private Network, is a service that allows users to create a secure and encrypted connection over the internet. In the context of the video, attackers use VPNs to mask their identity and location, making it difficult to trace their origin.

šŸ’”FBI

The FBI, or Federal Bureau of Investigation, is the principal federal investigative agency in the United States. The script mentions the FBI's involvement in investigating the cyberespionage case after Shawn Carpenter provided them with evidence, highlighting the role of law enforcement in cyber threats.

šŸ’”APT-1

APT-1 is a designation given to a cyber espionage group, identified as being associated with the People's Liberation Army in China. The video discusses APT-1 in relation to the Titan Rain attacks, emphasizing the attribution of the cyberespionage to a specific state-sponsored group.

šŸ’”Mandiant

Mandiant is a cybersecurity company that conducts investigations and provides intelligence on cyber threats. The script cites a Mandiant report that attributed a significant amount of data theft to APT-1, illustrating the scale and impact of state-sponsored cyberespionage.

šŸ’”Defamation

Defamation is a false statement that harms the reputation of an individual. In the video, Shawn Carpenter sues Sandia National Laboratories for defamation and wrongful termination after being fired for his actions in investigating the cyberespionage attack, showcasing the personal consequences of such operations.

Highlights

Cyberespionage is a modern form of spying that involves the theft of sensitive data, posing a serious threat to nations.

Nations are often victims in cyberespionage, with intelligence used against them by rival nations.

The Rosenberg Case during the Cold War is an infamous example of espionage involving American citizens spying for the Soviet Union.

Cyberattacks have replaced physical infiltration as a safer method for extracting information with 'plausible deniability'.

Cyberespionage is often conducted by trained cyber criminals financially backed by governments and adept at evading detection.

Large nations like the U.S., Russia, China, and North Korea are common targets in cyberespionage due to their perceived threats.

The 'Titan Rain' attack faced by the U.S. government from 2003-2006 was one of the most pervasive cyberespionage threats.

Internet vigilantism refers to individuals enacting justice online, often without formal permission from the law.

Shawn Carpenter, a navy veteran and network security analyst, played a significant role in uncovering cyberespionage activities.

Rootkits are malicious software designed to hide and allow remote control of target systems for spying and data theft.

Shawn Carpenter's independent investigation led to the discovery of a honeypot and tracing of Chinese cyber spies.

Cybercriminals used encryption, VPNs, and multiple hop points to avoid being traced back to their origins.

The final destination of the network led to Guangdong, China, revealing the extent of Chinese cyberespionage capabilities.

Shawn Carpenter faced legal and professional repercussions for his unauthorized but patriotic actions.

Despite winning a lawsuit against Sandia National Laboratories, Carpenter's involvement with 'Titan Rain' ended.

The U.S. government attributed the 2004 attacks to the People's Liberation Army, Unit 61398, part of the Chinese Communist Party.

China's State Council information office denied the accusations, highlighting the issue of 'plausible deniability' in cyberespionage.

The 'Titan Rain' incident marked a turning point in recognizing Chinese cybercriminals' sophistication in cyber warfare.

Mandiant's report revealed that APT-1, associated with Unit 61398, stole terabytes of information from numerous organizations.

Transcripts

play00:14

Cyberespionage: A form of cyberattack thatĀ  involves spying and theft of sensitive data orĀ Ā 

play00:20

information. The kind of information that's keptĀ  from being publicized is it can pose a seriousĀ Ā 

play00:25

threat to the victim. In this case, nations areĀ  often victims of other nations -planning to stealĀ Ā 

play00:31

information in the hopes of gaining intelligenceĀ  that can be used against their targets.Ā Ā 

play00:38

Before cyber attacks were a method of extractingĀ  information, spies used to physically go onĀ Ā 

play00:42

dangerous missions into enemy territory,Ā  and were usually taken advantage of duringĀ Ā 

play00:47

large-scale wars. An Infamous case of espionageĀ  is the Rosenberg Case that took place during theĀ Ā 

play00:53

Cold War, when Julius and Ethel RosenbergĀ  - American citizens, were caught spying onĀ Ā 

play00:58

behalf of the Soviet Union. The existence of theĀ  internet and utilizing it as a method of entryĀ Ā 

play01:04

into the digital space of other countries hasĀ  since replaced such attempts at infiltration,Ā Ā 

play01:08

and generally this is considered safer thanĀ  sending in spies physically - who, if caught,Ā Ā 

play01:14

may be interrogated and extracted informationĀ  out of. "Plausible Deniability" and therebyĀ Ā 

play01:19

avoiding retaliation is by far one of the greatestĀ  advantages of using such a method - provided, it'sĀ Ā 

play01:24

not carried out in a sloppy manner. But, here'sĀ  the thing - cyberespionage generally isn't sloppy,Ā Ā 

play01:31

because these are carefully selected, trainedĀ  cyber criminals - financially backed by theirĀ Ā 

play01:36

governments, and know exactly how to fly under theĀ  radar. Large nations, such as the United States,Ā Ā 

play01:42

Russia, China and North Korea are commonly accusedĀ  and targeted in cases of cyberespionage. Mainly,Ā Ā 

play01:49

because these nations consider each otherĀ  major threats in warfare and/or cyberwarfare.Ā Ā 

play01:55

Between the years 2003-2006, the UnitedĀ  States government faced such an attack.Ā Ā 

play02:01

One that "ranked amongst the mostĀ  pervasive cyberespionage threats thatĀ Ā 

play02:05

U.S computer networks had ever faced". The USĀ  government codenamed this attack "Titan Rain".

play02:22

"Internet vigilantism" is the name given to thoseĀ  that enact justice on wrongdoers through the useĀ Ā 

play02:27

of the internet - generally, without expressĀ  permission from the law. Kind of like Batman,Ā Ā 

play02:32

but in the cyberspace instead. One suchĀ  internet vigilante in the early 2000s wasĀ Ā 

play02:37

"Shawn Carpenter", somewhat of the protagonistĀ  in the story. a navy veteran who - at the timeĀ Ā 

play02:43

was a network security analyst at "Sandia NationalĀ  Laboratories". A nuclear security administrationĀ Ā 

play02:49

R&D lab based in the U.S. His story began whenĀ  in 2003 "Lockheed Martin" - which was the parentĀ Ā 

play02:55

company of Sandia Labs at the time, and a majorĀ  defense contractor of the U.S military - startedĀ Ā 

play03:01

to realize that they may have suffered a breach asĀ  hundreds of their computers started to shut downĀ Ā 

play03:05

by themselves. Sandia Labs then dispatched Shawn,Ā  as well as a few colleagues of his to figure outĀ Ā 

play03:10

what was happening. And so, they set off on aĀ  flight out of Albuquerque, New Mexico - to aĀ Ā 

play03:15

branch of Lockheed Martin in Orlando, Florida.Ā  Before long, they discovered Rootkits plantedĀ Ā 

play03:20

in their computer systems. : "Rootkits" forĀ  those unaware are softwares that are generallyĀ Ā 

play03:24

designed for malicious purposes, and allowĀ  attackers to remotely control the target system,Ā Ā 

play03:29

allowing them to spy and steal data. and to makeĀ  matters worse, these Rootkits actively attempt toĀ Ā 

play03:35

hide themselves from detection, not just fromĀ  the user but even from antivirus softwares.Ā Ā 

play03:40

The Rootkits hidden in the Lockheed MartinĀ  systems evidently had amassed sensitive data.Ā Ā 

play03:45

and as Shawn and his team had come to gather -Ā  was ready to be sent out to a server in China.Ā Ā 

play03:51

Nevertheless, this wasn't investigated at theĀ  moment. Shawn and his team were congratulated onĀ Ā 

play03:56

a job well done and flown back to New Mexico.Ā  Back to Sandia Labs, at which point ShawnĀ Ā 

play04:01

requested to "hack back" the Intruders, and findĀ  out more about what they wanted. A request which,Ā Ā 

play04:07

to Shawn's dismay, would be rejected byĀ  his superiors. Citing a violation of theĀ Ā 

play04:12

Computer Fraud and Abuse Act, and unwillingĀ  to draw further attention from the attackers.Ā Ā 

play04:16

Later on, in an interview with "Computerworld",Ā  Sean stated that one of his supervisors wouldĀ Ā 

play04:20

hear his case and say: "we don't care about anyĀ  of this, we only care about Sandia computers".Ā Ā 

play04:26

Shawn was understandably crushed by this decision,Ā  but that didn't discourage him from probingĀ Ā 

play04:31

further. He began an independent investigationĀ  into the intrusion at the comfort of his home,Ā Ā 

play04:36

putting on his proverbial mask and investigatingĀ  the attackers. He did this by placing what'sĀ Ā 

play04:41

called a "Honeypot". Honeypots are essentiallyĀ  bait, generally used defensively by organizationsĀ Ā 

play04:47

to study cyber criminals by luring them toĀ  intentionally vulnerable systems. Shawn wouldĀ Ā 

play04:53

create a honeypot filled with bogus sensitive dataĀ  and fabricated search histories to attract theseĀ Ā 

play04:58

Chinese cyber spies, and it worked. A littleĀ  after he had set up the Honeypot, the targets,Ā Ā 

play05:03

those that match Shawn's profile of the attackersĀ  took the bait. It was 10 long months of tracingĀ Ā 

play05:09

the attackers, these were masters of theirĀ  craft and clearly wanted to avoid any riskĀ Ā 

play05:14

of being traced back - using encryptions, andĀ  VPNs and multiple hop points, but eventually,Ā Ā 

play05:19

Sean traced them back to a server in "SouthĀ  Korea". Brute forcing his way into the server,Ā Ā 

play05:23

he discovered that it was loaded with sensitive,Ā  stolen documents including blueprints from theĀ Ā 

play05:28

"F-22 Raptor" and the "Mars ReconnaissanceĀ  Orbiter", both major projects belonging to aĀ Ā 

play05:33

familiar name: "Lockheed Martin". Additionally,Ā  when further investigated, they had files thatĀ Ā 

play05:37

belonged to the U.S Army. Aviation MissionĀ  planning systems, and flight planning software.Ā Ā 

play05:42

However, Sean would come to find that this SouthĀ  Korean server was also nothing but a hop point,Ā Ā 

play05:47

and the final destination of the network,Ā  where it all led to, was in" Guangdong China.Ā Ā 

play05:52

Shawn silently left a bug on the router, whichĀ  would ping his anonymous email account. He'd getĀ Ā 

play05:57

a message each time a connection was made, andĀ  in just two weeks, he had over 20,000 messages.

play06:14

Now that he had finally found theĀ  perpetrators, Shawn had a new problem,Ā Ā 

play06:19

he was never authorized to do this. And he knewĀ  that he was involved in doing something illegal,Ā Ā 

play06:25

so where would he submit this information? TheĀ  files that he uncovered in the servers of theĀ Ā 

play06:30

cybercriminals were clearly dangerous in the wrongĀ  hands, but who could he inform them of without theĀ Ā 

play06:36

risk of ending up in prison and losing his job? orĀ  any future jobs in the field for that matter? butĀ Ā 

play06:42

if he didn't inform anyone, there was the chanceĀ  of putting his nation at a great deal of risk.Ā Ā 

play06:48

He eventually braved his fears and reached outĀ  to some of his contacts in the army, who wouldĀ Ā 

play06:52

then pass it on to the FBI , where an agentĀ  named "David Raymond" would take the case.Ā Ā 

play06:58

According to "The New Yorker", Raymond wasĀ  astounded by the findings and wasn't particularlyĀ Ā 

play07:03

troubled by how he had obtained them. This wasĀ  good news, and by October of 2004, Sean had begunĀ Ā 

play07:09

working with the FBI as a confidential informantĀ  to look further into the case. But only a fewĀ Ā 

play07:14

weeks later, he was told to stop digging till theyĀ  got more authorization, while in the next fourĀ Ā 

play07:19

months he provided an analysis of his previousĀ  findings to the FBI. According to Raymond,Ā Ā 

play07:24

Shawn's research reached the highest levelsĀ  of FBI counter-intelligence and was told thatĀ Ā 

play07:29

there were eight open cases throughout the UnitedĀ  States that his information was being provided to.Ā Ā 

play07:34

During this time, Shawn was given assurancesĀ  that they were going to take care of him,Ā Ā 

play07:38

and that he wouldn't be prosecuted. EvenĀ  going as far as to say that they had aĀ Ā 

play07:43

letter from the Justice Department promisingĀ  not to charge Shawn with hacking. However,Ā Ā 

play07:47

Shawn and his wife, Jennifer Jacobs, who wasĀ  working at Sandia Labs at the time as well,Ā Ā 

play07:51

was understandably skeptical and worriedĀ  about the verbal agreement. And so,Ā Ā 

play07:56

Shawn began to bug his house, recordingĀ  his interactions with the FBI. Turns out,Ā Ā 

play08:01

his doubts were warranted. As in March of 2005,Ā  the FBI would seize all communications with Shawn,Ā Ā 

play08:07

and report their secret meetings to the Head ofĀ  Counter Intelligence at Sandia Labs: Bruce held,Ā Ā 

play08:13

a retired CIA officer. Here's a disturbing excerptĀ  from the interview between Shawn and ComputerworldĀ Ā 

play08:18

that describes what happened next. "During myĀ  last meeting with Sandia management, a semicircleĀ Ā 

play08:23

of management was positioned in chairs around me,Ā  and Bruce Held. Mr.Held arrived about five minutesĀ Ā 

play08:28

late to the meeting and positioned his chair'sĀ  inches directly in front of mine. At one point,Ā Ā 

play08:33

Mr Held yelled: 'you're lucky you have suchĀ  understanding management and if you worked for me,Ā Ā 

play08:38

I would decapitate you, there would atĀ  least be blood all over the office'.Ā Ā 

play08:42

During the entire meeting, the other managersĀ  just sat there and watched. At the conclusionĀ Ā 

play08:47

of the meeting, Mr.Held said: 'your wife worksĀ  here doesn't she? I might need to talk to her'."Ā Ā 

play08:53

Shawn was stripped of his Q security clearance andĀ  fired from his job. Later, Shawn would even come toĀ Ā 

play08:59

find that while he was helping the FBI investigateĀ  the attackers, the FBI was investigating him

play09:13

Shawn Carpenter would go on to sue SandiaĀ  National Laboratories for defamation and wrongfulĀ Ā 

play09:18

termination, a lawsuit which he would go on to winĀ  - with $4.3 million awarded to him, as well as anĀ Ā 

play09:25

additional amount of almost $400,000 for costsĀ  incurred. This was more than twice the amountĀ Ā 

play09:31

that Shawn and his lawyer had asked for, andtheĀ  jury seemed to unequivocally side with Shawn inĀ Ā 

play09:36

this case, stating that he was a patriot and didĀ  what he did to protect the national interest.Ā Ā 

play09:41

Regardless of his courtroom victory,Ā  Shawn knew that this was the end ofĀ Ā 

play09:45

his journey with "Titan Rain". Despite notĀ  being entirely fulfilled with the result.Ā Ā 

play09:51

I'm not sleeping well, I know the "Titan Rain"Ā  group is out there working, now more than ever.Ā Ā 

play09:57

He knew that the attack originated from China,Ā  and maybe he knew more, but this was all that wasĀ Ā 

play10:02

revealed at the time. Later on, in August of 2005,Ā  the U.S government attributed the 2004 attacks toĀ Ā 

play10:08

the People's Liberation Army, Unit 61398. An armedĀ  wing of the Chinese Communist Party. China's StateĀ Ā 

play10:16

Council information office would however tell timeĀ  that the accusations were "totally groundless,Ā Ā 

play10:21

irresponsible, and unworthy of refute." It wasĀ  also revealed that no classified information wasĀ Ā 

play10:28

stolen in this espionage attempt, but that theĀ  unclassified information can prove to be harmfulĀ Ā 

play10:33

by revealing the strengths and weaknesses ofĀ  the United States. This turned out to be aĀ Ā 

play10:38

turning point for the level of sophistication thatĀ  Chinese cybercriminals were capable of showing.Ā Ā 

play10:43

At the time, China wasn't a major considerationĀ  or competitor when it came to cyber warfareĀ Ā 

play10:49

and "Titan Rain" turned out to be the firstĀ  publicly Chinese state-sponsored cyberespionageĀ Ā 

play10:53

event against the United States. UnitĀ  61398, also classified under "APT-1",Ā Ā 

play10:59

was called the Chinese equivalent of the AmericanĀ  NSA. According to a report by the "Mandiant",Ā Ā 

play11:05

they had evidence that attributed hundreds ofĀ  terabytes worth of information stolen since 2006,Ā Ā 

play11:10

from at least 141 organizations, ofĀ  which a 115 were from the United States.Ā Ā 

play11:17

Now, I want to be very clear when I say thatĀ  : just because the "Titan Rain" incident wasĀ Ā 

play11:21

attributed to the PLA, there's really nothing thatĀ  we the public can use to confirm this attribution.Ā Ā 

play11:27

In terms of whether it really did come from China,Ā  or the US government simply made a mistake. AsĀ Ā 

play11:32

I said earlier, one of the greatest benefitsĀ  of cyberespionage is "plausible deniability",Ā Ā 

play11:37

and no retaliation from the US governmentĀ  was ever specifically tied to this incident.Ā Ā 

play11:42

But, I would love to know what you guys thinkĀ  in the comments below, as well as any ideasĀ Ā 

play11:46

for the next story you'd like for me to cover.Ā  Thanks for watching "The TWS Channel", Cheers.

Rate This
ā˜…
ā˜…
ā˜…
ā˜…
ā˜…

5.0 / 5 (0 votes)

Related Tags
CyberespionageNational SecurityCyber AttacksData TheftInternet VigilantismShawn CarpenterTitan RainRootkitsHoneypotCyber WarfareChina-US Relations