Chinese breaking into classified network

By WND Staff

Editor’s Note: The following report is excerpted from Joseph Farah’s G2 Bulletin, the premium online newsletter published by the founder of WND. Subscriptions are $99 a year or, for monthly trials, just $9.95 per month for credit card users, and provide instant access for the complete reports.

The Chinese may have been able to develop computer algorithms that will penetrate military computers at the secret level, according to alerts about a “Spear Phishing attack” issued recently to users of a military system, says a report in Joseph Farah’s G2 Bulletin.

In one case, users of military computers at the secret, or collateral, level told of a false report of an outbreak of war in Asia beaming across military networks.

“So, it appears they’re into our systems at least at the collateral level,” one military computer user said of the Chinese.

He said such access is “relatively hard to get into.”

In earlier cases, Trojans and viruses also have been introduced that halted the use of flash drives on Defense Department computers.

While it remains unclear whether the Chinese have developed algorithms that would allow penetration systems that are Top Secret or beyond, it cannot be ruled out, since the Chinese have developed supercomputers capable of developing encryption and decrypting codes.

Most U.S. troops in the field use classified information at the collateral level. Collateral information includes reporting on combat arms and tactical operations.

If that is the case, then the enemy could be given access to codes capable of decrypting collateral traffic and could, in effect, be reading intelligence that may be going to U.S. war fighters in Afghanistan and Iraq.

For the full story on this report, and these other intelligence reports, please visit Joseph Farah’s G2 Bulletin:

Keep in touch with the most important breaking news stories about critical developments around the globe with Joseph Farah’s G2 Bulletin, the premium, online intelligence news source edited and published by the founder of WND.

For the complete report and full immediate access to Joseph Farah’s G2 Bulletin, subscribe now.