Author Topic: Hack Tibet  (Read 3784 times)

DharmaSpace

  • Hero Member
  • *****
  • Posts: 1470
Hack Tibet
« on: April 15, 2014, 04:29:29 AM »
Quote
•   DHARAMSALA, India — Lobsang Gyatso Sither sits at the front of a Tibetan school auditorium, the bright rectangle of his PowerPoint presentation dimly illuminating the first few rows of students before him. "Never open attachments unless you are expecting them," Sither says. The students nod. A portrait of the Dalai Lama hangs above the stage, framed by flickering electronic candles; a stray dog ambles behind the crowd. "Never give anyone else your passwords," Sither says, clicking to a new slide, which explains the dangers of using an unfamiliar thumb drive. "The Chinese government or others could take control of your computer."
•   
Welcome to Dharamsala, population 20,000 and one of the most hacked places in the world. This small city in India's lush Himalayan foothills is home to the Dalai Lama, the exiled Tibetan spiritual leader; the Central Tibetan Administration, or CTA (formerly called the Tibetan government in exile); and a host of Tibetan media outlets and nongovernmental organizations, some of which the Chinese government classifies as terrorist groups. The Dalai Lama fled here in 1959 after communist troops violently suppressed an uprising in Lhasa, now the capital of western China's Tibetan Autonomous Region. India embraced the Dalai Lama as a token of religious diversity, and tens of thousands of refugees followed suit. About 130,000 Tibetans live in exile, according to a 2009 census; Dharamsala is the closest thing they have to a political capital.
The city has an ancient feel. Homes cling to precipitous mountain roads that weave through dense cedar forests; macaque monkeys prance among the rooftops. Yet it is changing, moving cautiously into the future. Computers have become ubiquitous. Roadside cafes offer double espressos and wireless Internet (common passwords include "FreeTibet" and "Independence").1 Young Tibetans are snapping up iPhones, which, unlike competing devices, offer the option of a Tibetan-language keyboard.

Communication between the city's Tibetan community and Tibet itself is easier than it has ever been. Yet the risk of dialing home has never been greater. "If we don't use secure lines of communication, Tibetans in Tibet could be prosecuted" for sending sensitive information abroad, says Sither, a field coordinator for the Tibet Action Institute, a New York-based nonprofit that sponsors education initiatives and trains activists on secure communications systems.

The Chinese government is everywhere and nowhere in Dharamsala, planting malware and intercepting messages in ways that are nearly undetectable and difficult to trace.

The Chinese government is everywhere and nowhere in Dharamsala, planting malware and intercepting messages in ways that are nearly undetectable and difficult to trace. The CTA's Chinese-language website was hacked in August. Everyone within the Tibetan community is a target, from the Dalai Lama's advisors to any smartphone-wielding refugee.

In early November, Tibet's Communist Party chief, Chen Quanguo, proposed a raft of measures to stamp out the Dalai Lama's voice in Tibet, including clamping down on online communications. "Work hard to ensure … that the voice and image of the enemy forces and the Dalai clique are neither seen nor heard," he wrote in Qiushi, a leading party journal.

A brutal, centuries-old form of protest has caught fire in Tibet, and Beijing is resorting to tactics both heavy-handed and high-tech to quell the unrest. Since February 2009, at least 120 Tibetans in the Himalayan region have self-immolated to protest Chinese rule -- men and women, old and young, monks and lay people.2 Chinese authorities have responded violently, deploying troops, cutting phone lines, and forcing monks to undergo draconian "patriotic education" programs. They blame "hostile foreign forces" for inciting the immolations -- mainly from Dharamsala, where advocacy groups gather information about the fiery protests and distribute that information abroad. Experts say that the hacks may be part of an elaborate campaign to identify possible protests and preempt them.

Few cyberattacks on Dharamsala are strategically tailored to monitor or control the city's network infrastructure, say experts. The most common attacks are spearphishing attempts: Tibetans, especially those working for the CTA or pro-independence organizations, say they frequently receive strange emails purporting to be from friends or associates. They often contain attachments that, once downloaded, infect the user's computer with malware, allowing a hacker to operate the system remotely. The computer essentially becomes shared; keystrokes are recorded, passwords saved, contacts downloaded. 3Everything is compromised.

Kelsang Aukatsang, a former advisor to the Tibetan prime minister in exile, remembers the shock of realizing that he'd been hacked. In July 2012, Aukatsang sent an email to a U.S. senator to arrange a meeting for the prime minister, Lobsang Sangay. The following morning, the senator received a surprise call from the Chinese Embassy in Washington, urging her not to attend. The meeting ultimately proceeded as planned. "But the bigger point is that they knew -- that exchange got intercepted," Aukatsang said. "You wonder what more you can do to feel safe. There's a real sense of being at risk, of being watched."


MORE THAN HALF THE CTA'S COMPUTERS contain some sort of malware, estimates the government in exile's press officer, Tsering Wangchuk. "Most of the key computers in our city, in Dharamsala, are in some way compromised," he says. The administration's technical staff of 13 spends much of its time simply trawling through hard disks, finding and eliminating malicious code. "They go after us all the time, diligently," said another administration employee who requested anonymity. "If with every 100,000 attempts they have one success, they use that one success to exploit everything that they can."

Cybersecurity experts call this "advanced persistent threat" (APT) -- a constant onslaught of targeted attacks requiring resources that are normally unavailable to individual hackers. "Dharamsala is ground zero for advanced persistent threat, really," says Greg Walton, a doctoral candidate at Oxford University's Center for Doctoral Training in Cyber Security. Walton traveled to Dharamsala in 2008 to help the Dalai Lama's private office better understand what, and who, had been compromising its systems. His team discovered that the most likely culprit was a shadowy hacker group responsible for a series of network intrusions that American investigators had dubbed "Byzantine Hades." The group, according to U.S. State Department cables released by WikiLeaks, had ties to a unit of the People's Liberation Army, China's military, based in the southwestern Chinese city of Chengdu.

Many Dharamsala-based Tibetan NGOs, Walton says, have been attacked by groups that are better known for infiltrating Western corporations, military contractors, and government agencies. One, dubbed "APT1" by cybersecurity firm Mandiant, is an elite cyber-espionage outfit affiliated with the Chinese military.4 Another group is a corporate espionage unit that allegedly stole secret documents and formulas from major global chemical companies in 2011 in an attack campaign dubbed "Nitro" by computer security firm Symantec. "In the most pessimistic light, there's very little that the Tibetans can do in exile, because they're so underresourced," says Walton. "If you have a situation where the State Department or the Pentagon is being compromised by the same groups, what hope do refugees in the foothills of the Himalayas have to deal with that problem?" He describes China's APT strategy as gathering "a thousand grains of sand," hoping that some piece of information, no matter how small, will bear strategic value.

PERHAPS AN EVEN MORE PERNICIOUS THREAT to Tibetan cybersecurity is WeChat, a Chinese smartphone app that combines features from Instagram, Skype, and Facebook.5 The program has more than 500 million users, with 100 million of them outside China; its popularity has exploded in Dharamsala over the past few years as an easy way for refugees to contact relatives back home. "All of my friends here use WeChat," says Tashi Nangyal, a 22-year-old Tibetan refugee who fled to India on foot across the Himalayas. "Since Tibetans inside Tibet are all using WeChat, we don't think of using any alternatives."

The program was developed by Tencent, a Shenzhen-based Internet empire that, like all major Chinese Internet companies, is rumored to enjoy close ties to the country's leadership. "From Tibetan civil society's point of view, WeChat is itself malware -- it's malicious," says Walton. "All of the traffic is being channeled through Shanghai. It's presumably being piped into China's equivalent of PRISM," he adds, referring to the U.S. National Security Agency's top-secret surveillance program, which was exposed by leaker Edward Snowden. Advocacy groups reported this summer that two monks in Tibetan areas of China were arrested after posting pictures of self-immolation protests to WeChat. One received a six-year prison sentence; the other will likely spend the rest of his life in jail. Tencent did not reply to a request for comment.

In recent years, short stints in Dharamsala have become a popular way for security experts to analyze little-known cyberattacks, says Shishir Nagaraja, a computer scientist at the University of Birmingham who has also aided the Dalai Lama's private office. "You don't have to pay people for this stuff. Some of the brightest minds at Cambridge will be more than happy to contribute to securing the Tibetans' Internet freedom rights," he says. Many are young, left-leaning idealists who are attracted by the novelty of the job. Yet "it's a very temporary arrangement," he said. Most stay for only two or three years, while China's hacking never ends.
"We are very vulnerable," says Tenzin Paldon, the Dharamsala-based editor in chief of Voice of Tibet, a radio station that broadcasts Tibet news into China via shortwave radio. Paldon's personal email account has been hacked; the broadcaster's website has been crippled repeatedly. Yet Paldon refuses to be cowed. If Tibetans continue to self-immolate, she says, she will continue to report their stories. "I think it's our duty to spread the word about what these people did, and why they're doing it, to the outside world."

Meanwhile, Dharamsala's Tibetan community has formed an incipient defense. In March, cyberactivists launched a secure Tibetan-language messaging application called YakChat. And the Tibetan government in exile recently procured a grant to lay new cables, update its servers, and train new staff, sources say, though they're keeping the details under wraps.

"What we're trying to do now is provide more opportunities for Tibetans themselves to become experts in cybersecurity," says Walton, the Oxford researcher. Many students at the Tibetan Children's Village, the leafy school campus where Sither gave his presentation, will go on to work in advocacy NGOs; some will join the CTA. Most are learning about cybersecurity for the first time, and experts hope that the lessons will resonate. "It's a gradual process, teaching people to guard their privacy. The Internet is quite a new thing in their lives," said Phuntsok Dorje, the head of the school's computer program.

IT'S TWILIGHT BY THE TIME SITHER FINISHES his PowerPoint presentation, and the students file out of the auditorium and into the cool, damp air of the rainy season. Nangyal, the 22-year-old refugee, says that students are not allowed to keep phones on campus and that he can only contact his family on holidays. The assembly has made him reflective. "I used to talk about His Holiness the Dalai Lama on WeChat," he says, his brow furrowed. I ask him whether he now understands that the Chinese may be listening in. Maybe he'll download a Korean messaging app, he offers, to make his communications less traceable. Or maybe, from now on, he'll just be more careful about what he says.



http://www.foreignpolicy.com/articles/2013/12/04/hack_tibet_china_cyberwar

China has been hacking Dharamsala for many years now since the advent of the computer age. It is no wonder that the Chinese are able to side step and circumvent the CTA for every major event or happenings involving Tibet. Any site that has weathered a Chinese DDOS or any of those cyber attacks will know the attacks are truly in the nature of 'Advanced Persistent Threats'.

Inadvertently it has created many CTA internet soldiers capable of defending themselves and perhaps even launch attacks of their own, this skill is obviously put to good use to dissenting voices and not to forget Dorje Shugden Lamas and worshippers.

Ultimately when one practices the Buddha Dharma there are no outer enemies, the real enemy is within. Nonetheless on behalf of the Tibetan people and government in exile, CTA is a poor example to represent Tibet's greatest treasure, Tibet has preserved all the entire corpus of Buddha's teachings, sutra and tantra.
CTA of the past, Gaden Phodrang had suppressed the Jonangpas before, it is only recently that they have started to welcome the Jonangpas, so CTA is no stranger to oppression, their history is not something they can wash away so easily though.

The CTA is constantly under cyber attacks from the Chinese internet soldiers and not Dorje Shugden practitioners. Dorje Shugden practitioners and lama are busy and preoccupied to defend themselves from physical and mental violence all over the world. Not only that, we are busy doing our practices and learning hence unlike the Chinese Soldiers who have a purpose, we have better things to do than attacking CTA's Web1.0 websites and online assets.

Anyhow anyone and all organisations in relation to Dorje Shugden should be more aware of the CTA's strike capabilities on Dorje Shugden institutions and practitioners. 

DharmaDefender

  • Moderator
  • Hero Member
  • *****
  • Posts: 988
Re: Hack Tibet
« Reply #1 on: April 24, 2014, 10:15:29 PM »
Not surprised the CTAs computers have been hacked and riddled with malware. The CTA would do better to spend a greater part of their budget on cybersecurity, than on suppressing Shugden supporters by publishing irrelevant books that no one wants or reads. That would be a more pragmatic use of their financial resources if they really want a free and independent Tibet.

kris

  • Hero Member
  • *****
  • Posts: 919
Re: Hack Tibet
« Reply #2 on: April 26, 2014, 04:14:16 AM »
many of the older computers are running the older versions of Windows, and many of them do not have valid license to download the security patches. As such, many hackers like to plant virus into these computers and these virus don't do much usually but just sitting in the computer waiting for command. For example, the command center can schedule a cyber attack like DDOS (Distributed Denial Of Service), and the virus can activate the computer to be used as a tool attack.

Not just Tibet, from where I read, China has a lot of such computers with virus installed as well.

I agree with DharmaDefender, rather than spending money to defame Dorje Shugden and rewrite history about Dorje Shugden, CTA should spend money to upgrade their computer systems and educate their people about all these internet attack..

lotus1

  • Hero Member
  • *****
  • Posts: 557
Re: Hack Tibet
« Reply #3 on: April 26, 2014, 10:39:39 PM »
I would look at computer virus or malware attack is very common. For all established organizations, it is commonly known to have computers to be all installed with updated antivirus and anti-spyware security software. Employees of the organizations are all advised on ways and good habits such as do not open any unknown emails or links to prevent their computers from virus.

Whether the internet hacking or virus are deliberately organized by the China or just common malware, as a so-called government body, CTA should spend their time and money to upgrade their computer systems to have antivirus and anti-spyware and at the same time to educate their people on how to prevent internet attacks.

I fully agreed with DharmaDefender and kris, rather than spending money to defame Dorje Shugden or organizing anti-Dorje Shugden activities, CTA should spend their effort and resources into their computer systems and welfare of their people.