Sunday, November 21, 2010

This Explain's How Red China Rerouted Our Military Internet Traffic Through Their Computers and Back to Ours While Recording Everything

                            Vernon Harris 32               Rodriguez McCain 29

By Nicholas Contompasis

In April of this year the Communist Chinese rerouted our military Internet traffic out of our network and into theirs for 18 minutes and sent it back again. In the meantime the Chinese had time to record and analyze some very top secret information and procedures.
On September 1st of this year, the home of Yaw Owusu (picture not included) a black American civilian computer technician for the military had his home raided by military criminal investigators. He was arrested along with stolen military property and computers. It appears that he had two other accomplices who are still at large. I have included their pictures at the top of this article.
What’s interesting about this case is that Mr. Owusu received $50,000-$60,000 for between 150 to 300 military laptop computers stolen from three secured military facilities.
One would wonder who would pay that much for a bunch of stolen, very hot military computers? Could it be that these computers found their way to Red China to help in their never ending attack on our Internet and technology stealing? What is also interesting about this is that after almost nine months we’ve heard very little about these two stories, which leads me to believe they are connected and have international implications. We all know that Red China has spies operating here in the U.S. and in the past they’ve been mostly involved in corporate espionage, but now it seems they’ve raised the stakes and got caught at it. It will be interesting to see how this all washes out, if we live that long.

The following two stories from the Associated Press and CNN back up the events I’ve discussed.

November 20, 2010

  • MEMPHIS, Tenn. (AP) — Naval investigators are searching for more suspects believed to be involved in the theft of as many as 300 laptop computers from Navy facilities in Tennessee, Louisiana and Pennsylvania. One suspect, 33-year-old Yaw Owusu, of Memphis, admitted receiving $50,000 for about 150 laptops he stole and was bound over to a grand jury after a preliminary hearing Friday on felony charges of theft of property. An affidavit obtained by The Commercial Appeal revealed the laptops were stolen from secure military installations in Millington, Tenn., New Orleans and Mechanicsburg, Pa. The records did not disclose when or how the computers were stolen. Investigators asked Shelby County Sheriff's Office for assistance in the search for two more suspects in the case, 29-year-old Rodriguez McCain and 32-year-old Vernon Harris.



November 17, 2010

  • Washington (CNN) -- Internet traffic from several U.S. government agency sites was briefly diverted through servers in China in April, congressional investigators reported Wednesday.For 18 minutes, about 15 percent of all web traffic was redirected through China, including traffic to and from the sites of the U.S. Army, Navy, Marine Corps, Air Force, the office of the Secretary of Defense, the Senate and NASA, according to a report delivered to Congress by the U.S.-China Economic and Security Review Commission.Investigators say the web traffic was diverted by China Telecom, a state-owned enterprise.They do not know whether the diversion was intentional, whether the government of China played any role, or whether any sensitive data was compromised.The report says that the irregular routing could have allowed the surveillance of users or sites, the disruption or diversion of communications and the compromising of supposedly secure encrypted sessions.Pentagon spokeswoman Lt. Col. April Cunningham said the Defense Department "is concerned about any Internet traffic being intentionally rerouted outside of the usual operations." But, she said, "the security of Department of Defense information is not affected by misdirection of Internet traffic." The Pentagon had no information to confirm whether the incident occurred, she said.The Pentagon is in the process of establishing procedures "to address any potential current and future vulnerability," Cunningham told CNN.

No comments:

Post a Comment