The Hidden China’s Maxim – Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking

Hijacking Internet Traffic not covered by the anti-theft 2015 Xi-Obama Agreement Surprisingly, the voluntary 2015 Xi-Obama agreement stopping military forces from hacking commercial enterprises for economic gain did appear to dramatically reduce Chinese theft efforts against western targets. China’s technological development process, however, was still dependent on massive expropriation of foreign R&D.


cyberaffairs

Click the image above to go to the paper

This necessitated new ways to get information while still technically adhering to the agreement. Since the agreement only covered military activities, Chinese corporate state champions could be tasked with taking up the slack. But even Chinese multinationals, such as Huawei or ZTE, were already being viewed with suspicion. Instead data suggests the government opted to leverage a seemingly innocuous player – one that is normally viewed as a passive service provider – to target the foundational infrastructure of the internet to bypass the agreement, avoid detection, and provide the necessary access to information.

Enter China Telecom3 – a large state champion telecommunications company – as an option. While the 2015 agreement prohibited direct attacks on computer networks, it did nothing to prevent the hijacking of the vital internet backbone of western countries.

Conveniently, China Telecom has ten strategically placed, Chinese controlled internet ‘points of presence’4 (PoPs) across the internet backbone of North America. Vast rewards can be reaped from the hijacking, diverting, and then copying of information-rich traffic going into or crossing the United States and Canada – often unnoticed and then delivered with only small delays.

This essay will show how this hijacking works, and how China Telecom seems to employ its distributed points of presence (PoPs) in western democracies’ telecommunications systems to selectively redirect internet traffic through China. It will show the observed routing paths, give a summary of how one hijacks parts of the internet by inserting these nodes, and outline the major security implications.

These Chinese PoPs are found all over the world including Europe and Asia. The prevalence of – and demonstrated ease with which – one can simply redirect and copy data by controlling key transit nodes buried in a nation’s infrastructure requires an urgent policy response. To that end, we recommend an ‘Access Reciprocity’ strategy for vulnerable democracies – one that is

We at Adept Technologies recommend that all Cyber Professionals read this paper.

Contact us today toll free 1-888-392-9623 to find out more on how Adept Technologies can save you money by utilizing our services and technology.

Its just a matter of time

We are watching you. From us to you. Its just a matter of time.

ADEPT SECURE ® Reduced Cyberattacks by 96%. By implementing ADEPT SECURE ® on high target Power Company and Government systems they have reported to us a staggering 96% reduction in cyberattacks.

As we get more results, and more attack data, the overwhelming tasks of dealing with numerous cyberattacks have become more manageable with ADEPT SECURE ®.

Contact us today toll free 1-888-392-9623 to find out more on how Adept Technologies can save you money by utilizing our services and technology.

ADEPT SECURE ® Reduced Cyberattacks by 96%

Cyber Security – ADEPT SECURE ® sets a standard in providing high levels of protecting data and integrity of computing assets belonging to and connecting to an organization’s network. Its purpose is to defend those assets against all threat actors throughout the entire life cycles of numerous cyberattacks.

96 Percent

Adept’s Secure Security Solution – Data Breaches and attacks are an increasing threat to every computerized system which also faces the prospect of severe impact on their branding and reputation due to increased negative sentiment driven by media news of successful cyberattacks.

A majority of cyber security experts agree that mitigating reputational risk is crucial to any business and that managing IT Security plays a major role in these efforts, along with the obvious loss of Intellectual property, money, insurance, and other value.

ADEPT SECURE ® Reduced Cyberattacks by 96%. By implementing ADEPT SECURE ® on high target Power Company and Government systems they have reported to us a staggering 96% reduction in cyberattacks.

We believe that once the attacking systems realized they are being tracked, blocked, recorded, watched, they move on to easier targets. It is like parking your car and locking it in a very bad neighborhood at night.

You have billions of bad guys attempting to open the door, see its locked and move on to the next parked car. Then you get the millions that have dealer set keys that try every attempt to open the lock on the door, none of their keys work because the door lock disappears. Then you get the thousands that attempt to break the car windows, they move on because the whole car disappears.

All the attackers are on security cameras and photos of them all have been recorded are shared with other car owners and law enforcement.

The bad guys that have Harry Potter’s Cloak of Invisibility on, that is make believe, you think your IP address is spoofed, nothing is truly invisibility on the internet.

“As we get more results, and more attack data, the overwhelming tasks of dealing with numerous cyberattacks have become more manageable with ADEPT SECURE ®, and you sleep a lot better” says Nicholas Cordua, Chief Technology Officer of Adept Technologies Inc.

Contact us today toll free 1-888-392-9623 to find out more on how Adept Technologies can save you money by utilizing our services and technology.

Securing corporate networks 2019 Best Practices – Admin Accounts

In the age of constant attacks on your networks here are some good tips on how you can reduce the risk of having a security breach.

Administrator Accounts

Employees with administrative access should be using separate devices dedicated only for administrative operations. These devices like all the other devices within your domains should always be kept up to date with all the recent software and operating system updates.

All default administration accounts should be given zero rights on the device account and the domain account. Its best practices to require that they request just-in-time (JIT) privileges that gives them access for a finite amount of time and logs it in a system.

Secure Admin Accounts

Administrator accounts should also be created on a separate user namespace/forest that cannot access the internet, and should be different from the employee’s normal work identity. This way, any compromise of the company’s employee-force namespace/forest won’t grant the attackers easy access to an administrator account, since the employee with admin rights would not be using that account for daily tasks.

Employees with administrative accounts should avoid remotely logging into devices with administrator access to perform any administrative tasks, as attackers could be logging these events on compromised devices. The way to go is to have administrators use their separate devices for any administrative tasks as much as possible.

Contact us today toll free 1-888-392-9623 to find out more on how Adept Technologies can save you money by utilizing our services and technology.


Adept Enterprise and Deep A.I. Artificial Intelligence

To understand how deep A.I. Artificial Intelligence functions are developed, we first need to understand the technology that makes this possible. The term deep comes from deep learning, a branch of Machine Learning that focuses on deep neural networks.

Neural networks are computational systems that are inspired by the ways a human brain processes certain information. Special cells called neurons are connected to each other in a complex network allowing information to be processed and communicated.

In Computer Science, artificial neural networks are made out of thousands of nodes, connected in a specific manner. Nodes are arranged in layers; the way in which they are connected determines the type of the network and, ultimately, its ability to perform a certain computational task over another one. A traditional neural network might look like this:

Adept Enterprise Deep Artificial Intelligence

Each node from the input layer contains a numerical value that encodes the input we want to feed the network. If we are trying to predict the Dow Jones Industrial Average for tomorrow, the input nodes might contain the future and past price changes, stock splits, divisors, contracts, fear and greed index encoded as numbers in the range.

These values are broadcasted to the next layer; each result-curve dampens or amplifies the values it transmits. Each node sums all the values it receives, and outputs a new value based on its own function. The result of the computation can be retrieved from the output layer; in this case, only one value is produced, the probability of the Dow Jones Industrial Average.

When using Adept Enterprise we use multiple input nodes that are triggered by events, either by humans or by machine code. The Adept Enterprise software outputs the desired result based on the sum of all result-curves via the input layer values it receives. The output layer result is the most desired result. This allows for the software to give and assign unlimited desired results, without a human manually doing it. This allows one human with the software to accomplish the same work load as hundreds of humans without the software, and in some cases based on the job thousands of humans.

Training a neural network means finding a set of weights for all result-curves, so that the output layer produces the desired result. One of the most used technique to achieve this is called back-propagation, and it works by re-adjusting the weights every time the network makes a mistake. The mistake is determined by not accomplishing the desired result, or the desired result is not desired anymore.

The basic idea behind training a neural network is that each layer will represent progressively core complex features. In the case of a workflow task, for instance, the first layer might detect violations, the second layer detects date and time restrictions, which the third layer is able to use to approve or deny an application or task.

In experience, what each layer responds to is far from being that simple. This is based on humans and software creating a library of input layers, and the software producing the desired results for the output layers.

The desired result is a perfect result, eliminating imperfection. This saves money, time and frustration.

Contact us today toll free 1-888-392-9623 to find out more on how Adept Technologies can save you money by utilizing our technology.