Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
China United States

FBI Chief Warns China Poised To Wreak 'Real-World Harm' on US Infrastructure (cbsnews.com) 89

FBI Director Christopher Wray, in his final interview before stepping down, warned that China poses the greatest long-term threat to U.S. national security, calling it "the defining threat of our generation." China's cyber program has stolen more American personal and corporate data than all other nations combined, Wray told CBS News. He said Chinese government hackers have infiltrated U.S. civilian infrastructure, including water treatment facilities, transportation systems and telecommunications networks, positioning themselves to potentially cause widespread disruption.

"To lie in wait on those networks to be in a position to wreak havoc and can inflict real-world harm at a time and place of their choosing," Wray said. The FBI director, who is leaving his post nearly three years early after President-elect Donald Trump indicated he would make leadership changes, said China has likely accessed communications of some U.S. government personnel. He added that Beijing's pre-positioning on American civilian critical infrastructure has not received sufficient attention.

FBI Chief Warns China Poised To Wreak 'Real-World Harm' on US Infrastructure

Comments Filter:
  • surprised? (Score:4, Insightful)

    by wyHunter ( 4241347 ) on Monday January 13, 2025 @09:54AM (#65084947)
    Are we surprised? No. This has been true for close to twenty years now and the process is accelerating.
    • Re: (Score:2, Insightful)

      by cob666 ( 656740 )
      No surprise at all, critical infrastructure is safeguarded by politicians and bureaucrat that have no real knowledge about what their charged with protecting.
    • Re:surprised? (Score:5, Insightful)

      by dbialac ( 320955 ) on Monday January 13, 2025 @10:22AM (#65085063)
      The bigger question: why is this stuff even connected to the internet in the first place? The only way to ensure that a device is immune from an internet attack is to not have a connection.
      • by Anonymous Coward
        Monitoring, reporting, and remote control.
        • by dbialac ( 320955 )
          That's a poor excuse. Seriously. That's a really poor excuse. That's laziness and a hazard in the first place. Have people on staff 24 hours a day to monitor everything in the first place, You can have the monitoring equipment work internally without an external connection and without a computer connected to the internet. On the communications side, phone system should work via a physical line hooked up to nothing on the internet.
          • Re: surprised? (Score:4, Insightful)

            by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Monday January 13, 2025 @12:12PM (#65085381) Homepage Journal

            The telcos are trying to kill POTS right now. If your plan requires a non Internet phone connection, it's a bad plan, because it will be short lived at best.

            A better plan would be to use radio. I wonder if utilities get a break on that from the FCC?

          • Have people on staff 24 hours a day to monitor everything in the first place.

            What you're advocating is called return to office. Is that a thing?
          • That's a poor excuse. Seriously. That's a really poor excuse.

            Agreed.

            Have people on staff 24 hours a day to monitor everything in the first place, You can have the monitoring equipment work internally without an external connection and without a computer connected to the internet.

            Or have the communications be one-way.

            If there's some need for remote monitoring of something like the RPM of a turbine at a power plant then have a web cam pointed at a gauge, computer screen, or whatever. It would be trivial to prove that anyone that got in without proper authorization would at best be able to read the gauges rather than have full access to the computers that control anything.

            The need for 24 hour staffing should be considered on a case by case basis. I remember a YouTube video wh

            • At some point we need to admit that there's no stopping every attack on infrastructure. If China somehow rolled up to this dam with a self propelled howitzer then that's just game over for that dam.

              The whole point of artillery is that you can shoot people or stuff far away from where you are, you don't "roll up to" anything.

              • There are limits to how far artillery can fire, so outside of anything built in to a fortification there is a need for it to be moved into place. You would still have to "roll up to" the target even if that means being several miles away. However it's far more realistic that infrastructure would be attacked by bombers or some other long range missile platform as the effective attack range is far greater than artillery and doesn't require setting up and protecting that artillery. If you can get ground artill
                • There are limits to how far artillery can fire, so outside of anything built in to a fortification there is a need for it to be moved into place. You would still have to "roll up to" the target even if that means being several miles away.

                  Indeed. The maximum range on the M109 Paladin and similar self propelled howitzers is about 20 miles.

                  To do some real damage the M109 is equipped for direct fire, as in firing to line of sight than lobbing a shell over many miles. This turns an artillery piece into a tank destroyer.
                  https://www.youtube.com/watch?... [youtube.com]

                  Of course direct fire from a self propelled howitzer also comes in handy to take out large concrete structures, such as various fortifications or a hydroelectric dam. An armored vehicle built sp

          • by necro81 ( 917438 )

            Have people on staff 24 hours a day to monitor everything in the first place

            There are cases where it's tough to avoid.

            Say you have a substation 100 miles from your nearest service center. You want to monitor what's happening there, and be able to physically manipulate what it's doing (i.e., throw a breaker). You can:
            1) Have some poor schmuck camp out there and do nothing but stare at set of dials, and relay that not-realtime data back to the central office. And, occasionally, throw a switch when

            • by dbialac ( 320955 )
              5) You provide housing for the people on-site, so they're not driving 100 miles every day. A cousin of mine once worked on a cruise line. While food and basics were provided, things like medications required trips off the ship. This is somewhat analogous because they only had access to these things for a few hours in between voyages. Even in tourist stops, they were required to stay on board as not all of the guests were gone for the entire time the ship was in dock.
      • by Anonymous Coward

        Air gapping needs to be more common

      • Re:surprised? (Score:5, Insightful)

        by nightflameauto ( 6607976 ) on Monday January 13, 2025 @11:14AM (#65085185)

        The bigger question: why is this stuff even connected to the internet in the first place? The only way to ensure that a device is immune from an internet attack is to not have a connection.

        Hyperbolic salespeople selling convenience over security to folks that have zero security knowledge to start with and probably net negative technological knowledge to boot.

      • cost - puc's won't allow the cost to be given to the rate payers - hence we live with the risk...
      • Even if it has an internet connection, there's no excuse these days. The internet data should always be considered as potentially hostile, and as such any data that doesn't match expectations should be aggressively discarded (wrong port, wrong length, etc., plus no universal password).

  • by BubbaDave ( 1352535 ) on Monday January 13, 2025 @09:57AM (#65084957)

    Make sure they know we will treat a mass infrastructure attack same as any other WMD attack.

    • by dfghjk ( 711126 ) on Monday January 13, 2025 @10:10AM (#65085017)

      But we won't and we don't. We don't even respond to such attacks.

    • Or maybe just improve your security

    • Big business and the billionaires won't allow it. They will allow a little bit of saber rattling so that they can get big defense contracts and some government subsidies for local American manufacturing they wanted to do anyway. But no actual war is going to happen or even at any serious fighting.

      Maybe about a decade ago the Pakistan government was aware of a major terrorist attack about to happen in India.

      Pakistan didn't tell India about it. They let the attack happen. Lots of people died and it wa
    • by mysidia ( 191772 )

      The likely bad actors hide who launched the attack And even pretend to be a different one, so you won't actually know who the retaliation should be against.

    • So you're saying we should have started a global thermonuclear war several times last year?

  • To do what (Score:4, Interesting)

    by hdyoung ( 5182939 ) on Monday January 13, 2025 @09:58AM (#65084959)
    Exactly? Hackers have taken down water treatment plants. The result is a local boil advisory for a few days while they switch to manual operation. Nowadays, hospitals get taken down by malware on a weekly basis. They switch to paper temporarily. Ou interne, telecomsand even airport systems go down regularly. Sometimes we even do it to ourselves coughCLOUDFLAREcough. Is it disruptive? Yes. But life goes on. Certainly nothing happens that would render us suddenly vulnerable to some nefarious Chinese takeover. Maybe theres some special back-back-forward-punch attack that shuts literally everything down and makes our cities burn.but I definitely haven’t heard or read about anything plausible like that.
    • Re:To do what (Score:5, Interesting)

      by XXongo ( 3986865 ) on Monday January 13, 2025 @10:02AM (#65084977) Homepage

      Exactly? Hackers have taken down water treatment plants. The result is a local boil advisory for a few days while they switch to manual operation.

      Amateurs.

      We've never seen a concerted military attack on our infrastructure.

      • by dfghjk ( 711126 )

        How do you know? What you mean is that YOU have never seen it.

        • by Anonymous Coward

          You'd know it when tens of millions of people are without drinking water for weeks because the systems were irreparably damaged. You'd know it when air traffic can't be routed because adversaries bricked the entire national airspace system.

          I can go on.

          The stuff you've seen has mostly been script kiddies and ransomware operators inflicting what is relatively minor damage. A nation state military strike would be real, painful, obvious, and affect tens or hundreds of millions of people all at once.

          • Our air traffic system recently got bricked by Cloudflare. It definitely caused inconvenience but the country didn't exactly grind to a halt. And, the water systems would simply switch over to "boil advisory" mode while they fixed the problem.

            Inconvenient? yes. But not exactly the stuff that would distract a modern rich-world country much in a military situation.
      • Re: (Score:2, Insightful)

        by necro81 ( 917438 )

        We've never seen a concerted military attack on our infrastructure.

        Ukraine has. In the years before Putin launched his invasion, there was an ongoing effort to hack and sabotage all manner of public infrastructure. Wired wrote about [wired.com] it in 2016.

        The narrative has largely been supplanted by the ongoing efforts by Russia to just blow up Ukraine's infrastructure the ol' fashioned way, but the cyberattacks are definitely ongoing [google.com].

    • by dbialac ( 320955 )
      You should read the news more. Multiple schools in smaller communities were all given bomb threats more or less all at once in the eastern US in April of last year. Almost all emergency responders were on site within a few minutes. If you wanted to rob a bank, that was the time to do it as nobody was available to respond. This isn't hard to pull off.
      • There are different scales of disruption. What you described is definitely disruptive to some parents, children and a subset of first responders. Yeah, someone could use it to rob a bank. But, at the national level, it would barely register. Certainly wouldn't give some other other country enough of an advantage to stage an attack and make much of a difference.

        To have a real military-scale effect, it would need to be something that actually goes "boom" or at least lights a bunch of stuff on fire and caus
    • by DarkOx ( 621550 )

      The point of such attacks on infrastructure at least initially would not be cripple production etc. That might come latter if a protracted shooting war actually develops - see Russia and Ukraine, but as far as the US goes it would be make response and containment of an initial attack less effective.

      If you were going to deploy some bio-weapon, or strategic arms (ICBM) type attack you lead it by some hours with some infrastructure chaos. So everyone is running around like chickens with their heads off, tryi

  • Naaa (Score:2, Insightful)

    by gweihir ( 88907 )

    They will just watch it crumble all by itself....

  • lie in wait? (Score:4, Insightful)

    by dfghjk ( 711126 ) on Monday January 13, 2025 @10:09AM (#65085013)

    ""To lie in wait on those networks to be in a position to wreak havoc and can inflict real-world harm at a time and place of their choosing,"

    Just like the US does, and every nation does. That's what national defense involves. The US "lies in wait" to "wreak havoc" and "inflict real-world harm" too, that's what weapons are for.

    Don't forget that this guy is a Trump appointee and collaborator, and he's also a coward. I would fully expect China to have plans to attack the US, just as the US has to attack China. It's not news.

    • Jake Sullivan said the US has responded to the Volt or Salt Typhoon attacks. I guess we will never know what that means.

      https://www.reuters.com/techno... [reuters.com]
    • Re: (Score:2, Troll)

      by waspleg ( 316038 )

      Ah yes, whataboutism, the hammer for the nail of every wumao.

      Where are all the "But China good!" posts? No crime, no pollution, nothing but benevolence everywhere - according to the CCP politburo.

      • Ah yes, whataboutism, the hammer for the nail of every wumao.

        Where are all the "But China good!" posts? No crime, no pollution, nothing but benevolence everywhere - according to the CCP politburo.

        Gotta ask - what is a wumau?

    • In this case, "lie in wait" means "maintain a set of trojans on networks that control critical infrastructure, so we can take said infrastructure down when we want."

      In essence, the attack has already happened and they already have bases in our territory. Their trojans are on our networks NOW. They are just hard to detect because they have not been ordered to cause harm yet. That's news because it means we are, right now, extremely vulnerable to devastating attacks.

      And, there is something we can do about

  • by Anonymous Coward
    Do you ALLOW THEM to connect to the US Internet? CUT OFF THE NATION. BAN ALL CHINESE IPs...
    • by bn-7bc ( 909819 )
      No banning beeded just filter inbound bgp announcements from Chinese AS# way fewer filters to maintain
    • Won't fix it. They will hop on a plane and use the internet in their hotel.

  • If all these intrusions are known why weren't they prevented/currently being mitigated? How does this guy still have his job?
    • STFU noob (Score:5, Interesting)

      by drinkypoo ( 153816 ) <drink@hyperlogos.org> on Monday January 13, 2025 @10:24AM (#65085071) Homepage Journal

      If all these intrusions are known why weren't they prevented/currently being mitigated? How does this guy still have his job?

      First, that guy doesn't still have his job. He's on his way out the door.
      Second, the FBI are police. That's it. They can't force utilities to secure their systems. In fact there is no government agency whose job it is to go around and do that. There's just the NSA, whose ostensible mission is to secure government communications but apparently spends most of their time spying on citizens, and NIST, which creates recommendations which nobody listens to even when they are supposed to because they are handling federal data.

      • From the FBI's web site:

        https://www.fbi.gov/investigat... [fbi.gov]

        The FBI is the lead federal agency for investigating cyber attacks and intrusions. We collect and share intelligence and engage with victims while working to unmask those committing malicious cyber activities, wherever they are.

        This is part of what they are supposed to be doing now, as well as counter-terrorism, instead of pursuing white collar fraud. So this press release is essentially telling us the FBI has failed at that job and that it is

      • They can't force utilities to secure their systems. In fact there is no government agency whose job it is to go around and do that.

        While the FBI isn't equipped to enforce security on infrastructure there are federal government agencies that can at least lean hard on private corporations and state governments to ensure safety of electricity, water, fuel, roads, bridges, dams, etc.

        I can give some examples on this. The Department of Energy can set standards on security for any utility or power plant that is connected to an interstate electrical grid. Locks, dams, reservoirs, and other water works would be regulated by the Department of

      • If we can't enforce internet security by normal means, maybe we should have the NSA do ransomware attacks on all those cheap assholes (think of it as a fine for bad security).

        • Honestly I'm here for that. For public corporations you could also have the SEC team them for not reporting risks like their incompetent security. But for a municipal utility I'm not sure what you could really do besides what you said. Sue them? That's just going to cost everyone money... I like your idea.

  • Give it two weeks and his name will be mud.

    The number of ops against innocent Citizens he's responsible for is a horrent.

    One of their prostitutes is making the podcast rounds claiming that Al Qu'e'da, now ruling Syria with CIA's help, will unleash terror attacks simultaneous around the country. And if you question Building Seven you're one of them.

    Guess what THEY plan to do in eight days...

  • by groobly ( 6155920 ) on Monday January 13, 2025 @11:43AM (#65085287)

    "FBI Director Christopher Wray, in his final interview before stepping down, warned that China poses the greatest long-term threat to U.S. national security, calling it "the defining threat of our generation.""

    Wait, wasn't it domestic right wing terrorists just a little while ago? Oh, but then it was Hitler assuming power and ending Democracy. It's really hard for me to keep up.

  • Making COMSEC a cost center task, great value was provided to the shareholders for a short time.

    And the CEO just called, he says you better continue his children's access, or the whole department will be shut down. Gadammed Computer weirdos anyhow! 8^)

  • 2027 is the expected invasion of Taiwan.

    https://pjmedia.com/vodkapundi... [pjmedia.com]

    "Communist China's People's Liberation Army (PLA) celebrates its centenary in 2027, the same year the CCP has indicated it will be ready to take Taiwan by force — and new satellite photos show that it could be prepared to cross the straits in force before then.

    Before you accuse me of being a crazy person for somehow just knowing that Beijing — Xi Jinping, to be more exact — wants war in 2027, it isn't me. Two months a

  • As we transition over to AI and humans become more and more distanced from the products of their labour, the risk is not just that workers become dissatisfied but that we lose the institutional knowledge to do this stuff. We'll have machines we don't know how to fix should China ever decide to disrupt infrastructure. It might take years but the signs are already here - think offshoring but x100
  • For any kind of major attack to be successful, the attackers would have to do significant real-world testing. You can't just figure out how to take down an electric power station, and replicate it across the entire grid. Each uses differing technologies and would require different strategies and different software. In the process of testing the effectiveness of the digital weapon, they would have to perform smaller-scale tests. These would be noticed, and result in countermeasures.

    So I don't buy that attack

"There are some good people in it, but the orchestra as a whole is equivalent to a gang bent on destruction." -- John Cage, composer

Working...