Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Australian Intelligence HQ Blueprints Hacked

Unknown Lamer posted about a year ago | from the found-the-exhaust-port dept.

Australia 180

SandmanWAIX writes "In an embarrassing revelation today it appears as though the blueprints to the new Australian federal intelligence agency ASIO headquarters have been stolen, reportedly by a cyber attack originating from China. Several other governmental departments have been reported as being breached also. The blueprints which have been compromised include the security system, comms network, floor plan and server locations of the new ASIO headquarters located in the Australian capital city, Canberra."

cancel ×

180 comments

Sorry! There are no comments related to the filter you selected.

already slashdotted.... mirror (-1)

Anonymous Coward | about a year ago | (#43836831)

SandmanWAIX writes

"In an embarrassing revelation today it appears as though the blueprints to the new Australian federal intelligence agency ASIO headquarters have been stolen, reportedly by a cyber attack originating from China. Several other governmental departments have been reported as being breached also. The blueprints which have been compromised include the security system, comms network, floor plan and server locations of the new ASIO headquarters located in the Australian capital city, Canberra."

Re:already slashdotted.... mirror (1)

crafty.munchkin (1220528) | about a year ago | (#43836865)

The original site is loading perfectly here... rendered in under 0.2 of a second.

Facepalm... (0)

Anonymous Coward | about a year ago | (#43836851)

Why not...

how long will this behavior be tolerated... (2, Interesting)

Covalent (1001277) | about a year ago | (#43836855)

Until China starts to face real responses?

Re:how long will this behavior be tolerated... (4, Insightful)

Anonymous Coward | about a year ago | (#43836877)

When every other country stops doing the same?

Re:how long will this behavior be tolerated... (1)

Etherwalk (681268) | about a year ago | (#43836881)

Until China starts to face real responses?

Why do you think they are not facing them now?

Re:how long will this behavior be tolerated... (3, Insightful)

pokoteng (2729771) | about a year ago | (#43836887)

It may not come easy to hear this for Americans, but fact is, China's owned the world for quite some time; the far far vast majority of everything you own and will use and own etc, comes from China. Everything depends on them. They're the ones with the power, not the US with their supposed big guns. Attacking China will just destroy everything about US, or just about any other first world nation.

They won't face any response at all. It just gets filtered out, like their firewall.

Re:how long will this behavior be tolerated... (4, Informative)

WWJohnBrowningDo (2792397) | about a year ago | (#43837015)

How doe the fact that only 2.7% of US consumer spending [frbsf.org] is spent on Chinese goods fit into your little narrative?

The average US consumer can't buy a "Made in China" home, nor a "Made in China" car, nor "Made in China" food, nor "Made in China" gas. As it turns out, housing, transportation, and food makes up the majority of a consumer's spending.

Re:how long will this behavior be tolerated... (-1, Troll)

Anonymous Coward | about a year ago | (#43837073)

>"Made in China" home
And all the tools to build that house, all the nails, all the little metal bits and wooden pieces come from where ... ?

>"Made in China" car
And all the metals and misc parts for the cars come from where ... ?

>"Made in China" food
I'm not even going to start with this one, considering only thing US has is corn and shitty beef

>"Made in China" gas
I'll give you this one, since it's mostly from middle east.

Considering though, sounds like it's all Chinese to me. You should also read the article on how it goes beyond "2.7%", as there's a huge difference between "Made in US" and "Product of US".

lol @ this (0)

Anonymous Coward | about a year ago | (#43837167)

half this shit is wrong (i.e. the part that supports your argument)

Re:how long will this behavior be tolerated... (3, Insightful)

Anonymous Coward | about a year ago | (#43837305)

You are just FOS and you know it. Even Petroleum is mostly produced in the USA. Only a small percentage is imported and of the oil imports, most come from immediate neighbours Canada and Mexico.

Maybe the cheap tools you use for your hobbies to drive two nails and one screw per year come from China, but professional tools and parts are produced in the USA.

Food, well, as i said, you are just FOS.

The 'Oh my Gawd China Rulez de Werld!' nonsense, is just that. China is still a poor and struggling country with a long road ahead.

Re:how long will this behavior be tolerated... (1)

sjwt (161428) | about a year ago | (#43837655)

>>"Made in China" home
>And all the tools to build that house, all the nails, all the little metal bits and wooden pieces come from where ... ?
>>"Made in China" car
>And all the metals and misc parts for the cars come from where ... ?
>>"Made in China" food
>I'm not even going to start with this one, considering only thing US has is corn and shitty beef

And China buys its metal and meat supplies from Australia!

Re:how long will this behavior be tolerated... (1)

Anonymous Coward | about a year ago | (#43837091)

>The average US consumer can't buy a "Made in China" home, nor a "Made in China" car, nor "Made in China" food,

This shows how inaccurate you are on the non-availability of "Made in China" food...

http://www.foodandwaterwatch.org/reports/a-decade-of-dangerous-food-imports-from-china/
>Although supermarket labels may not always indicate it, a growing portion of the American diet is now made in China. In 2009 alone, 70 percent of the apple juice, 43 percent of the processed mushrooms, 22 percent of the frozen spinach and 78 percent of the tilapia Americans consumed came from China.

Re:how long will this behavior be tolerated... (0)

Anonymous Coward | about a year ago | (#43837201)

You may want to do a simple search and discover who holds most of the USA debt.

Re: how long will this behavior be tolerated... (2, Insightful)

Anonymous Coward | about a year ago | (#43837227)

Americans.

China holds far less debt than mist people think.

Re: how long will this behavior be tolerated... (5, Funny)

Anonymous Coward | about a year ago | (#43837531)

Who cares about mist people? They're all smoke and mirrors anyway.

Re:how long will this behavior be tolerated... (0)

Anonymous Coward | about a year ago | (#43837353)

You may want to do a simple search and discover who holds most of the USA debt.

There's debt like cash withdrawal from a credit card, and there's debt like new car loan for 0.1% APY

It's their money on our terms, why the hell not take it? Our debt to income ratio is in a great position. You do understand the way it works right, their money now, our money later + dick interest. As long as the terms are favorable, you can't talk about debt like it's categorically a bad word.

Re:how long will this behavior be tolerated... (3, Interesting)

cheater512 (783349) | about a year ago | (#43837749)

Actually there are 2 'Made in China' car dealerships near me here in Australia. They are called Great Wall and Chery.

They looks quite good and cheap too.

Re:how long will this behavior be tolerated... (1)

Rob the Bold (788862) | about a year ago | (#43837191)

It may not come easy to hear this for Americans . . .

TFA is about alleged spying on Australia by China. OP to whom you were replying didn't mention his/her nationality.

Re:how long will this behavior be tolerated... (0)

Anonymous Coward | about a year ago | (#43837273)

Uhmm, the USA is still the world's largest producer of factory manufactured goods by a wide margin. I believe Germany is second, then the other large European states and Canada and only then the eastern countries.

Although Chinese stuff seems to be pervasive - these are mostly low value consumer goods.

Re:how long will this behavior be tolerated... (4, Insightful)

demachina (71715) | about a year ago | (#43836893)

U.S. and Britain have been doing it wholesale since at least World War II so that would set the bar to at least 70 years.

Re:how long will this behavior be tolerated... (0)

Anonymous Coward | about a year ago | (#43837233)

"Gentlemen do not read each other's mail."

Re:how long will this behavior be tolerated... (1)

Anonymous Coward | about a year ago | (#43837253)

"Gentlemen do not read each other's mail."

... they have staff for that!

Re:how long will this behavior be tolerated... (0)

Anonymous Coward | about a year ago | (#43837359)

I would also think this is some sort of tit-for-tat with how AISO and NSA bugged the Chinese embassy in Canberra ~1990.

Re:how long will this behavior be tolerated... (3)

c0lo (1497653) | about a year ago | (#43836913)

Until China starts to face real responses?

Pray tell: what exactly real responses would you suggest?

Re:how long will this behavior be tolerated... (-1, Troll)

Anonymous Coward | about a year ago | (#43836999)

DNA targeted bio-weapon specifically targeted at the common Chinese genotypes. Yes, there would be collateral damage.

Re:how long will this behavior be tolerated... (1)

Anonymous Coward | about a year ago | (#43837017)

DNA targeted bio-weapon specifically targeted at the common Chinese genotypes. Yes, there would be collateral damage.

What collateral damage ?

No more take out kung pao chicken ?

Re:how long will this behavior be tolerated... (0)

Anonymous Coward | about a year ago | (#43837081)

*balls of disapproval*

There's a special place in hell for people with such ideas.

Re:how long will this behavior be tolerated... (0)

Anonymous Coward | about a year ago | (#43837271)

I didn't say it was a good idea, just an answer to a specific question.

Re:how long will this behavior be tolerated... (2)

tlambert (566799) | about a year ago | (#43837325)

*balls of disapproval*

There's a special place in hell for people with such ideas.

Fredrick, Maryland is a place in hell?

Seriously, we've been war-gaming this scenario since at least 1958, if not earlier. The Biological Weapons Convention was signed in 1972, as an addendum to the Geneva Convention. See:

http://en.wikipedia.org/wiki/Biological_Weapons_Convention [wikipedia.org]

Re:how long will this behavior be tolerated... (1)

stillpixel (1575443) | about a year ago | (#43837715)

*balls of disapproval*

There's a special place in hell for people with such ideas.

Fredrick, Maryland is a place in hell?

Seriously, we've been war-gaming this scenario since at least 1958, if not earlier. The Biological Weapons Convention was signed in 1972, as an addendum to the Geneva Convention. See:

http://en.wikipedia.org/wiki/Biological_Weapons_Convention [wikipedia.org]

You have no idea..

They burn the used primates on Thursdays.

Re:how long will this behavior be tolerated... (3, Insightful)

symbolset (646467) | about a year ago | (#43837135)

The problem with DNA targeted bioweapons: evolution. When the organisms run out of targeted DNA they evolve to target other DNA patterns.

Re:how long will this behavior be tolerated... (3, Funny)

tlambert (566799) | about a year ago | (#43837307)

The problem with DNA targeted bioweapons: evolution. When the organisms run out of targeted DNA they evolve to target other DNA patterns.

We won't tell the bioweapons they're running out until it's too late. Pass it on.

Re:how long will this behavior be tolerated... (1)

ozmanjusri (601766) | about a year ago | (#43837563)

You won't need to tell them. By the time the real targets run out, there'll be a small percentage of those bioweapons that're happy munching on other DNA patterns.

Then after a few of their generations, we'll all be passing it on.

Re:how long will this behavior be tolerated... (1)

symbolset (646467) | about a year ago | (#43837671)

"Life finds a way."

Re:how long will this behavior be tolerated... (1)

jonwil (467024) | about a year ago | (#43837291)

Maybe the answer is to say "stop carrying out cyber attacks on western nations, stop stealing western intellectual property etc or we will enforce sanctions against Chinese products"
Plenty of other countries with low cost base for manufacturers to move to (countries that aren't stealing western IP and government/military secrets)

Re:how long will this behavior be tolerated... (5, Interesting)

c0lo (1497653) | about a year ago | (#43837405)

Maybe the answer is to say "stop carrying out cyber attacks on western nations, stop stealing western intellectual property etc or we will enforce sanctions against Chinese products" Plenty of other countries with low cost base for manufacturers to move to (countries that aren't stealing western IP and government/military secrets)

Maybe the correct answer would be "Let's secure our shit". Highly likely to be a lot cheaper.

Let's put the things in perspective:
- the cost of ASIO's new building between 2007-2012: $631 mils [smh.com.au] (after 37% budget blow-out - and it's not completed yet).
- the Australia-China bilateral trade value for a single FY (2011-2012): $121.1 billion [wikipedia.org] , Australia's exports to China of over $60 billion.

Re:how long will this behavior be tolerated... (1)

tlhIngan (30335) | about a year ago | (#43837529)

Maybe the correct answer would be "Let's secure our shit". Highly likely to be a lot cheaper.

Or is it a great test of disinformation? Draw up a set of plans for new building that's not the set of plans you plan to use. Just put it on some non-classified network. Then go and design the real plans on the classified side. Then just pretend it's an awful event when the fake plans get leaked.

Of course, the building plan is different. There'll be walls where there's supposed to be doors, dead ends where there's supposed to hallways, and false rooms where the servers are supposed to be.

Re:how long will this behavior be tolerated... (3, Interesting)

c0lo (1497653) | about a year ago | (#43837667)

Maybe the correct answer would be "Let's secure our shit". Highly likely to be a lot cheaper.

Or is it a great test of disinformation?

It may well be so. However, the target of disinformation may be the Australian tax payer... it really strikes me as unusual that this comes a short time after the Ozzie spooks cried for more money [abc.net.au] and in the conditions of serious budget blowouts for the ASIO's new building.
Maybe that's about another project budget overblow and this is an arranged cover-up? Nah, that's paranoia... the Ozzie spies are fairdinkum blokes and highly professional [abc.net.au] .

Re:how long will this behavior be tolerated... (0)

Anonymous Coward | about a year ago | (#43837515)

dosn't really work when your governement is hacking everybody they can at the same time. Your being pretty hypocritical. Oh no, but we only hack the evil countries right?

Re:how long will this behavior be tolerated... (-1)

Anonymous Coward | about a year ago | (#43836925)

s/China/United States/

Get real.

Re:how long will this behavior be tolerated... (2)

symbolset (646467) | about a year ago | (#43837089)

It's likely China has operatives working for the architect firm that designed the thing, and the construction sub and materials suppliers as well. It's certain that the American CIA did, and Israeli Mossad and whatever the KGB are calling themselves now as well. Other countries have spies too: South Korea and Argentina might give it a go, not with direct agents but secondary contacts that gather info from workers using the pillowtalk method. Hacking in remotely is just providing a plausible excuse for knowing the intel the Humint has already gathered. When such stuff is built it's almost comical how often the agents and double agents stumble over each other: it's a wonder they can get any actual design work done what with all the cloak and dagger shit going on. At this point they might as well do the design as a community collaboration wiki style.

Nobody's going to have a snit fit about this on the international incident level. If somebody puts to public bid a contract to build an intelligence HQ, network solution or datacenter then all the major powers are expected to try their best to get their spies and spy devices in. If they didn't try they wouldn't be doing their jobs. It's the responsibility of the main contractor to foil the attempts. Who was that this time? Bechtel again? I'm sure they're on it (wink, wink).

Let's not fault China specially for doing what we would do and did do as if that was some expression of dire intent making them evil. They're a global superpower and getting engaged in this activity is just a prerequisite of that role. Their activity here is evidence of nothing but that they fulfill their responsibility to be proactive in an uncertain world to the best of their ability, as we would do and actually do. And that's if we actually caught them doing it, which I find unlikely.

It's time to step down the tension. The Chinese agents didn't hurt anybody, kidnap or kill anybody - even if it was actually them. What with how global Internet works it's possible that the CIA or some other agent (even a commercial interest!) actually controls devices in the PRC from where such activity can be done, blaming China for acts committed by agents from elsewhere by their IP address - which we all know is faint cause. Certainly that's how I would do it. China has the biggest base of zombie computers there is what with their devotion to pirated Windows XP and sketchy pirated apps. These zombies are available for rent by the hour, day, week or month - or for sale outright. If you're a cyber spy what are you going to do: rent zombies from your own country, or one that causes a secondary benefit when discovered by IP address, shifting the blame to your adversary? What with all the malware going on there it's a wonder anyone in China can get their work done.

Re:how long will this behavior be tolerated... (2)

The1stImmortal (1990110) | about a year ago | (#43837139)

Fair point, however in this particular case it's unlikely to be US interests (eg, CIA) performing the intrusion. Given the Australian "relationship" with US security agencies, I wouldn't be surprised if we'd already volunteered all the conceivable data on the new ASIO HQ to the US, sent in triplicate. They probably use ASIO sensitive documents as scrap paper at CIA headquarters. There's little information AU doesn't willingly and happily hand over to the US (sadly)

Re:how long will this behavior be tolerated... (1)

symbolset (646467) | about a year ago | (#43837299)

"the intrusion" - as if this found one were the only one. That's funny. It's likely this leak of plans is a false flag. That's what I would do if the knowledge about the plans was known to be general of the major powers: everybody we know has the plans, so leak them publicly and paint the blame of the leak on somebody even though we've all drunk from that well.

Yes, AU does share. The CIA and others still put their assets in to ensure what they're told is true. That's their job. They're quite serious about it. AU could put Google Glass on all their operatives streaming to Langley the POV of every field agent, and the CIA and various other US agencies would still put humint in place to ensure AU weren't gaming them. If I was their boss I'd make sure they did. It's one thing to honestly believe a thing from assertions of a loyal partner given in good faith. It's quite another thing to know it from observations of your own humint.

Re:how long will this behavior be tolerated... (1)

Anonymous Coward | about a year ago | (#43837215)

Which is exactly why, when designing a secure building, you design the building such that it doesn't matter if your enemy knows the layout of the building.

Re:how long will this behavior be tolerated... (1)

symbolset (646467) | about a year ago | (#43837383)

I'm guessing you're engaged in building government buildings in the Antarctic interior. Even then you would be wrong because: satellites.

Re:how long will this behavior be tolerated... (0)

Anonymous Coward | about a year ago | (#43837259)

Here is a famous one (i.e. you know about it) from the cold war

http://articles.latimes.com/1991-07-29/news/mn-177_1_embassy-building [latimes.com]

The inevitable result, as a former member of the Senate Intelligence Committee later put it, was that the Soviet KGB secret police, in effect, was allowed to become the building's prime contractor.

Confident that they could detect and neutralize whatever Soviet spy masters threw at them, the Americans allowed Soviet workers to build precast concrete pieces for the embassy in their own factories, out of sight of U.S. security experts.

But in 1982, when a U.S. inspection team with experimental X-ray scanners arrived to check what was being built on the 10-acre compound about a mile from the Kremlin, they were flabbergasted by what they found.

Although the U.S. government has never displayed what the inspectors detected, it is widely known that among the spy devices dug out of concrete panels and beams were bugs that normal X-rays couldn't detect and steel reinforcing rods apparently designed to function as antennas.

Re:how long will this behavior be tolerated... (5, Informative)

symbolset (646467) | about a year ago | (#43837469)

It was quite amazing in the 1980's when we discovered that East Germany was beaming low powered microwaves at the American embassy in West Berlin. The thought was that they were attempting to slowly degrade the health of our diplomats. It turns out that there were cylinders buried in the walls that were passive under normal conditions but under microwave energy would sympathetically resonate with the microwave signal modulated by the ambient sound. Clever stuff that, 30 years ago.

This is nothing compared to Xerox providing copiers to the Soviet government that recorded on film a copy of every page to be retrieved only by an authorized Xerox technician called when the copier failed because the film was full. Ah, those were easy days of spy. We got a lot of good stuff out of that, and Xerox got some special privileges as well, including the ability to run their own experimental nuclear reactor.

If you think this isn't still going on, and has gotten more clever, you're in denial. That is part of the backlash about other countries driving tech. If Intel doesn't provide the chipsets for Iran's nuclear ambitions how are we going to know what they're up to? China's RockTech doesn't care to report that stuff. They just want to sell chips.

Re:how long will this behavior be tolerated... (0)

Anonymous Coward | about a year ago | (#43837239)

Until China starts to face real responses?

Re:how long will this behavior be tolerated... (1)

cameloid (120654) | about a year ago | (#43837317)

This is just normal spy stuff. The real problem is that the people being spied upon are obviously incompetent with regards to their anti-spying countermeasures.

Seriously, who puts their top secret stuff on the Internet anyway?

Of course, how do we know that they got the real plans? They may be saying this to make us *think* that they got the real plans, when in fact the real plans are elsewhere, or something. Anyway, the ability to hack people's servers is insignificant next to the power of the Force.

Re:how long will this behavior be tolerated... (1)

AHuxley (892839) | about a year ago | (#43837627)

Seriously, who puts their top secret stuff on the Internet anyway?
Australia has long had a love/hate understanding with IT, funding and tech.
The left saw it as a privileged plaything of private schools with 1st gen laptops and PC spending.
The right saw the power of the telecommunications unions as something to be totally smashed at any cost.
Our universities poured out 1000's of Ada, C Unix, Java graduates.
Between all this you had a rush to privatise, the buying in of anything that would solve a problem at any price with a fancy brand name.
The gov can only just look after its own codes and mil bases with its best trusted staff. Most other aspects are contracted out to cleared "local" firms.
Any project is just layers of private contracts and millions and billions of $ up for grabs.

Re:how long will this behavior be tolerated... (0)

niftydude (1745144) | about a year ago | (#43837339)

Until China starts to face real responses?

Why does an attack originating in China imply that it is a Chinese government sanctioned attack? I don't find that conclusion at all plausible.

IMHO, it is just as likely that there is a compromised computer somewhere in China which someone else from somewhere else is using to perform the attack. Especially given the millions of hacked and pirated versions of MS Windows in China.

Given how easy it is to hide behind a chain of proxies for this kind of thing (especially if you have access to even a medium sized botnet), the only reasons I'd expect the ip addresses to look like they came from China would either gross incompetence from Chinese hackers (I don't really expect that - Chinese hackers are pretty damn clever), or hackers from another country trying to make China look bad.

Re:how long will this behavior be tolerated... (0)

Anonymous Coward | about a year ago | (#43837733)

I tend to agree that China is probably not directly involved (but wouldn't rule out other possibilities). The people with the biggest axe to grind against the Australian government would probably be in North Korea, who were blocked by Australia from reopening their embassy due to the nuclear tests.

At least Asynchronous I/O is secure (1)

Anonymous Coward | about a year ago | (#43836857)

Always assume your advasaries have these things and plan accordingly. Anyone in charge of operational security who would bat an eye about posting this information on the Internet deserves to be fired.

Wifi? (1, Interesting)

pokoteng (2729771) | about a year ago | (#43836859)

TFA comments there are wifi access points installed in government systems. I think they deserve everything they get, if they're stupid enough to allow any form of wireless communications inside a secured government facility.

Re:Wifi? (0)

Anonymous Coward | about a year ago | (#43836953)

NO, the quote about wifi came form an idiot academic that doesn't seem to understand how these buildings are secure or how rated networks in Australia work (hint they won't have wifi access). While it is embarrassing, having the Blueprints for how the building is put together is something they would not be relying on for security.

Is it the same agency... ? (1)

c0lo (1497653) | about a year ago | (#43836879)

Is it the same agency that wants [abc.net.au] more money?

For a moment I thought you said Austrian (1)

GoodNewsJimDotCom (2244874) | about a year ago | (#43836915)

Which is the bigger threat:

China spying on Austrailia now that it knows the floor plan of the intelligence agency?

Or them using the blue prints to rebuild it in China [nbcnews.com]

Re:For a moment I thought you said Austrian (1)

mjwx (966435) | about a year ago | (#43837693)

Which is the bigger threat:

China spying on Austrailia now that it knows the floor plan of the intelligence agency?

Or them using the blue prints to rebuild it in China [nbcnews.com]

That would be a really silly idea, as enemy countries already have the plans they know where all the vents and shitters they can hide in are.

Nuke China NOW (-1, Flamebait)

Anonymous Coward | about a year ago | (#43836969)

The sooner those Godless slant eyed pieces of unethical amoral shit
are turned into dust, the better.

Kill them all.

Re:Nuke China NOW (-1)

Anonymous Coward | about a year ago | (#43836995)

And nuke the faggots who modded this down.

Or maybe they can die of HIV, that would be ok too.

The hack came from outer space (2, Interesting)

Anonymous Coward | about a year ago | (#43836997)

Anyone who says a "cyber attack" originates from China should be smacked in the head with an Ethernet cable. How would you know exactly where an attack originates?

Oh, and anyone who says "cyber attack" should be shot.

Re:The hack came from outer space (1)

symbolset (646467) | about a year ago | (#43837147)

I have mod points for once but unfortunately I've already posted in this thread. +1 insightful.

the closer that australia gets to china, .... (0)

WindBourne (631190) | about a year ago | (#43837011)

the more concerned that the rest of the west needs to become.
At this time, Australia is the weakest link in the western alliance and have loads more spies that are hitting their intelligence easily.

Re: the closer that australia gets to china, .... (2, Insightful)

Anonymous Coward | about a year ago | (#43837087)

As an Aussie I would like to remind you of a certain gentleman by the name of Bradley Manning -I seem to remember he was responsible for the largest recent security breach of the Western Alliance.

So who exactly is the weakest link?

Pot calling the silver spoons black (2)

dbIII (701233) | about a year ago | (#43837551)

Some of your clowns believe in the utter voodoo of polygraph tests so don't you dare pretend a small but professional agency is the weak link. Bay of Pigs is just the start of a long list of failures from a highly politicised bunch. Other places that keep politics out of their agencies are vastly more professional.

When there are no more secrets,,, (0)

3seas (184403) | about a year ago | (#43837023)

nobody will be able to get away with lies.
When was the last time China attacked another country?
I'm sure the Military Industrial Complex can use this to spend more taxpayer money without accountability for certainly China is due to attack someone.
So the real question is... where exactly is the threat if there is one at all?
Do you think China would make it known that they have a quantum computer in operation for hacking into computer systems around the world?

Re:When there are no more secrets,,, (0)

WindBourne (631190) | about a year ago | (#43837241)

Just 3 weeks ago, they invaded India.
Likewise, they have attacked vietnamese, phillipines, japanese, south korean, thais, etc.
It is obvious that you do not have a single clue of what you are talking about. The communists have no desire to allow democracy in. Even now, china is NOT capitalists as so many think.

Here, check out the tail end. [wikipedia.org]
Here is more. [wikipedia.org]

Re:When there are no more secrets,,, (0)

Anonymous Coward | about a year ago | (#43837561)

robocommunism is the future. your all going to be living off welfare in slums, once the corporations of your free land start buying a bunch robots.

Re:When there are no more secrets,,, (1)

dbIII (701233) | about a year ago | (#43837591)

As you are aware the word was "China" and not "Indian rebels that follow a cause that even China has given up on". Please stop pretending to be mentally retarded just to overwhelm the gullible. Deliberately stupid lies are not a sign of honour, and ends justifying the means are not a sign of honour.

Could be a decoy (5, Insightful)

readingaccount (2909349) | about a year ago | (#43837045)

There's always the possibility the attackers found a "fake" blueprint under a lighter level of security, put there to make them think they found something worthwhile and back out to avoid further detection. Then you make it public (like it now has) and make the enemy believe something that's actually a complete ruse.

Sure, it looks embarrassing for you, but one of the major elements of intelligence is counter-intelligence and misdirection. Let the enemy believe they now know something juicy, and they'll further base actions on incorrect intel.

Just a thought. Of could be as simple as the Aussie Government completely fucking up by running a poorly patched Windows XP infected with a compromised USB. Some idiot on the article's comments section (tonyy) did suggest Linux would have been more secure. As if the Chinese wouldn't know how to write Linux malware and infect via social engineering if it were the predominant OS used on Government machines (which it will never be - Windows is just too well designed for corporate use on the desktop).

Re:Could be a decoy (1)

crafty.munchkin (1220528) | about a year ago | (#43837113)

... and to think i commented in this thread instead of moderating, only to find this. Mod parent up!

Re:Could be a decoy (1)

Cimexus (1355033) | about a year ago | (#43837237)

The hacked system belonged to contractors/a construction company involved with the building, not a government system. Still highly embarrassing, but it wasn't an ASIO screw-up (this time, at least).

Re:Could be a decoy (1)

felixrising (1135205) | about a year ago | (#43837793)

It follows then that these blueprints where in fact the plans for a prison and the high value target (fully isolated server room containing all high value information) listed on the blueprint is in fact a nice padded sleep deprivation cell, with a one way door... muahahaha muahahaha

real question is... (0)

Anonymous Coward | about a year ago | (#43837049)

who cares?

I mean honestly, what use is this for anyone?

Australian Intelligence (-1, Flamebait)

linatux (63153) | about a year ago | (#43837063)

contradiction in terms?

Re:Australian Intelligence (0)

Anonymous Coward | about a year ago | (#43837763)

The really great thing about being Australian is that so many people under-estimate us... e.g. in the military sphere the Japanese at Kokoda received their first defeat at the hands of Aussie *reservists*, the Germans at Tobruk, the Viet Cong (one of whom told me they used to run away from Australian troops to find some easy-beat U.S. forces), the British (until they let us command our own forces under John Monash and we smashed through the Hindenburg Line and ended the stalemate in WWI)

Cheap Penetration Testing! (1)

mykro76 (1137341) | about a year ago | (#43837083)

Boss: Have you organised that world-class penetration testing of our new system yet?
Dazza: Yes, I'll need to expense $150,000 for the consultants though.
Boss: No worries.
Dazza: *clickety click ftp mss.cn files sent* Great. It should be done very soon.

Air gaps (1)

Quinn_Inuit (760445) | about a year ago | (#43837095)

At the risk of spilling top-secret intelligence procedures, I've heard about this thing called an "air gap" where, if you don't want anyone to be able to hack into a particular system, you don't plug it into the Internet. Seems like something they might want to consider.

(Yes, I know Stuxnet was designed to penetrate air gaps. But it wasn't designed to send packages home, either.)

Re:Air gaps (2)

AHuxley (892839) | about a year ago | (#43837391)

ASIO is like the security and counter-surveillance ~FBI wrt embassy staff in Australia, bad people/spies in the community.
Australian Secret Intelligence Service (ASIS) is ~CIA
Defence Signals Directorate is ~NSA
The Defence Signals Directorate would know all about air gaps given its close working relationship with the NSA file structures.
Australian Secret Intelligence Service would at least have some institutional knowledge of what the CIA can do with any network.
ASIO is growing and in very public ways, huge contracts, the press, budgets, court cases, vetting of staff, helping the attorney general department find evil authors book chapters...
Too many people, too much cash to spend, fancy new offices to ensure get fitted out just right - a lot of files are going to be in flux at any one time.
Private contractors, layers of subcontractors would all be fully vetted on site, but their office staff, cleaners... fancy new cloud storage, cheap phone IT support...
Also the term "breached" can be a strange in .au too- as in IT subcontractors setting up/hosting/maintaining the public face of any .gov backend/site can be "any" trusted multinational.
The "culture" is one of privatisation, expensive and foreign bespoke interfaces.
Local IT support loves the failing OS that need large staff teams at overtime rates once turn key is done, the love of cloud and getting what could not be connected in 20 years done this year.

Re:Air gaps (0)

Anonymous Coward | about a year ago | (#43837629)

ASIO = ~MI5 (SS)
ASIS = ~MI6 (SIS)
DSD = ~GCHQ
AFP = ~Scotland Yard

FBI mixes bits of MI5, with bits of Scotland Yard.
CIA is the rest of MI5, +MI6

Re:Air gaps (1)

sjwt (161428) | about a year ago | (#43837681)

FIB, CIA, NSA don't they all work for the MPAA and RIAA?

Kill all the Chinks NOW (-1)

Anonymous Coward | about a year ago | (#43837137)

This is the only realistic response.

Sure, some of you peace loving cock-gobbling retards will
object, but then when civilization collapses you will either
be food or fertilizer so your opinion doesn't fucking matter.

Saddle up the BUFFS, send in the SSBNs, and let's get the job
done once and for all.

Minutes ago I invented a solution (2)

EmperorOfCanada (1332175) | about a year ago | (#43837173)

Networked computers are great. I work with them all day every day. But if I had something even a 1/1000th as secret (say an embarrassing video) I would keep it offline, encrypted, and in a physically secure location. My assumption from a security standpoint is that networked cyber security is 99.9% to keep the script kiddies out. Keeping out the determined evildoer take some serious and continuous effort; or you just make it a physical effort for the bad guys.

Even the guys with the Rob Ford Crack video wouldn't let the reporter hold their phone.

Re:Minutes ago I invented a solution (1)

VortexCortex (1117377) | about a year ago | (#43837223)

Yeah, enjoy your sniper party. If you've got it encrypted heavily then just upload it via bittorrent for all the world to not see. That's the point of encryption. Once you've done that the offline copy in a physical safe is moot -- Only a risk to you if it's the only copy. Only you have the key to decode the video, right? Combine that with a deadman switch that releases the code unless you check in. Even better: Just delete the video and keep a small non-incriminating bit of it, to prove you still have it. Go through the motions with the "encrypted copy" but it's just white noise. That way, not even torture can get you to reveal the secret.

Re:Minutes ago I invented a solution (1)

LordLucless (582312) | about a year ago | (#43837279)

That's great for you, and your embarrassing video that you want nobody but you to see. That's not the usual use-case for security though. It's usually the case that you want people to see it - often geographically separated people. Sometimes you want geographically separated people to be able to change it, and receive the changes others have made, in near real-time. The issue is, you want only certain, select people to have those privileges.

So how would you adapt your under-the-mattress approach to such a use-case?

Getting ridiculous (0)

Anonymous Coward | about a year ago | (#43837179)

Time to Great Firewall China in the other direction. Simply block all Internet communications with China and any other country that refuses to do the same. Once China is effectively isolated on its own little internal Internet, these attacks will be few and far between.

US/NATO/Australian companies and companies that operate in those countries control the vast majority of the Internet's infrastructure. Blocking nearly all Chinese traffic wouldn't be that difficult.

And how could China respond? A strongly worded letter? (better snail-mail it) Their economy depends on the rest of the world every bit as much as the rest of the world currently relies on their cheap labor. If China actually tried to block any economic activity (throwing out foreign companies, trade barriers, etc), their economy would rapidly grind to a halt and the Party leaders would find their heads on the end of spikes mounted all around Beijing. Meanwhile, the rest of the world would just have to get by with all the cheap labor in India, Indonesia, and every other country in that part of the world. Heck, nobody's using all the nearly-free labor sitting in most of Africa.

hacked != stolen (1)

Osgeld (1900440) | about a year ago | (#43837183)

just saying, if they were hacked then they would biuld a gigantic MEC using the same parts just reconfigured, breaking into a computer system and stealing files does not mean those files were hacked, the system was

In Other News (-1)

Anonymous Coward | about a year ago | (#43837225)

Boston Mayor Thomas Menino will undergo Prostate Surgery this week.

Billions of peoples across the planet Earth are praying for the violent, painful through swift death of the Mayor of Boston Thomas Menino.

Bon Voyage Thomas Menino, enjoy your death, however quickly or slowly it comes.

Really? (1)

Anonymous Coward | about a year ago | (#43837265)

Canberra is the capital of Australia? Huh... I learned something new today.

Re:Really? (0)

Anonymous Coward | about a year ago | (#43837637)

a lot of people do think it's sydney, but they didn't want all the boring burecrats, so they made a new city just for them.

Wonder if they used Windows.... (1)

antifoidulus (807088) | about a year ago | (#43837267)

I wonder if they are as idiotic as a lot of US intelligence agencies and still insist on using Windows everywhere. The PLA really should send Microsoft a nice fruit basket thanking them for all the easily-gathered intelligence that Microsoft's combination of shitty coding and massive lobbying efforts have enabled.

Re:Wonder if they used Windows.... (1)

AHuxley (892839) | about a year ago | (#43837455)

Shitty coding and massive lobbying efforts have enabled any US embassy to look at most countries state and federal police systems.
The US goes to great efforts to train, fund and invite police officials from around the world with the gift of the latest tech and software.
They go home with an aid deal, new insights and later enjoying the new US software.
The real question is why was Australia, a country that has seen the USA/UK govs own the worlds communications systems is now so lax with its own internal networks....

Re:Wonder if they used Windows.... (1)

aphelion_rock (575206) | about a year ago | (#43837705)

They should have just contracted out the building of the establishment to the Chinese in the first place.
Would have been cheaper!

A FUNNY SITE TO SEE !! (0)

Anonymous Coward | about a year ago | (#43837303)

A million Chinese invading the shores of Australia, waving pitchforks and wearing pointed straw hats, each carrying the blueprints to the Canberra HQ in an Iphone clone running Android !!

The story is not this story !! Watch my hand !!

I miss the old internet (5, Insightful)

phantomfive (622387) | about a year ago | (#43837321)

Back when most people on the internet were still computer literate, a report like this would explain how the attack happened, how it was discovered, and other interesting/important details.

Now all we hear is a few buzzwords, a few propaganda works, and no more real information than what is in the headline. For all we know it never actually happened. Maybe they just found malware on a computer and overreacted.

How can we be certain? (1)

beefsack (1172479) | about a year ago | (#43837401)

Thanks to things like VPNs and Tor, it's trivial to fake your location to make people believe you're coming from somewhere else. Thanks to the political climate right now, it seems obvious to route traffic trough China when cracking as they are an easy scapegoat.

origin of hack (0)

Anonymous Coward | about a year ago | (#43837521)

So if these hackers are good enough to hack a federal system, what makes people think they didn't hack the chinese first? And are centralising the attack from Chinese servers?

You deserve it. (1)

Karmashock (2415832) | about a year ago | (#43837647)

You're not taking security seriously and you deserve to be embarrassed repeatedly until you do or fail so spectacularly that no one ever trusts you again with anything.

Its a big issue in the US as well. Old government agencies and shotty IT.

You're not paranoid enough. You're literally paid to be paranoid and you're not doing your job. Its disgusting. Wake up and realize if you don't assume worst case you'll always be playing catch up.

Wait a second (1)

Fjandr (66656) | about a year ago | (#43837677)

I think I've seen this episode of 24. Don't worry, the Australian Jack Bauer will keep everyone safe.

Load More Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>