Cyber Spies Target Washington Think Tanks and Law Firms
Their target: sensitive information on business and policy matters.
Think tanks and law firms in Washington, experts say, are targets of pervasive espionage by cyber spies who are stealing sensitive information on business and policy matters and are using their unwitting victims to better understand the intricacies of Washington decision-making. The FBI and computer security analysts have investigated intrusions aimed at dozens of organizations, including human rights groups, trade associations, and public relations firms, and the organizations share a common theme: They all work on issues of economic and political interest to the Chinese government.
One prominent organization that found itself an unwitting target of cyber spying is the Brookings Institution, which runs a policy center on China. Brookings’ computer systems were penetrated last summer by an intruder who tricked a still-unknown number of employees into installing back doors on Brookings’ networks, according to several people with knowledge of the incident.
“I can confirm that we did have an incident, and that we did take steps to address it,” says Laurie Boeder, a spokesperson for Brookings, who declined to discuss details of how the intrusion was discovered and whether federal authorities were alerted to the breach. She also wouldn’t comment on whether China was presumed to be responsible.
But the influential think tank isn’t unique. “Brookings is targeted often, as are all the think tanks in the Washington area,” says Adam Vincent, the CEO of Cyber Squared, a computer security company in Arlington. Vincent’s organization tracked a string of cyber break-ins last summer. At least 22 different organizations saw their networks penetrated, including two think tanks and two law firms in Washington. (Vincent declined to say whether Brookings was among them.)
The spies also tried to pilfer information from an array of other groups, including technology companies, Canadian immigration agencies, and groups with ties to mining, food safety, and environmental protection, among others. Cyber Squared dubbed the campaign Project Enlightenment.
“They did their homework,” Vincent says of the cyber spies. “They knew whom in the organizations to target. They kept control of their computers for months, without people knowing it.”
The common thread tying all the targets together is their work on areas of particular interest to China, including business deals and official policy disputes. Cyber Squared determined that the targets were compromised at the same time they were working on matters “uniquely and individually tied to Chinese strategic interests” that were in the news or the subject of ongoing debate.
For instance, an organization that was urging the United States to sell F-16 fighters to Taiwan, in order to create a military bulwark against China, received a spear-phishing e-mail shortly after legislation on the issue was brought up in Congress. Such e-mails are a key tool of cyber espionage; they appear to come from someone the target knows or is likely to know, and they contain malicious software code embedded in a link or attached document that, when opened, installs a hidden entryway into the target’s computer or network.
In the case of the Taiwan F-16 sales, the target didn’t open the attachment, and instead alerted Vincent’s group, which investigated and found dozens of other targets in a “Chinese state-sanctioned or sponsored exploitation campaign.”
Vincent says his company sent messages to every one of the victims it could identify, but none of them have responded. He says the company also notified federal law enforcement authorities. A spokesperson for the FBI declined to comment, citing a general rule of not discussing investigations.
Cyber spies aren’t so much interested in the articles and white papers that organizations like Brookings publish, which anyone can read on the Internet, as in their network of contacts among the influential circles of Washington policymakers and power brokers, according to security analysts.
A personal, presumably confidential e-mail exchange between, say, a China expert at a think tank and a State Department official could give a spy a rare window into how US officials will approach negotiations with China. And personal schedules noting when an employee met with a particular administration official might give telling signals into what policymakers are discussing behind closed doors.
For the same reason, advocacy groups in Washington have also found themselves threatened. “We’re a target pretty much every day,” says Lotta Danielsson, the vice-president of the US-Taiwan Business Council, which has pushed for the sale of the F-16s. (Danielsson declined to say whether her group was the one that initially contacted Cyber Squared after it received a phishing e-mail.)
“There’s really nothing you can do about it,” Danielsson says. “There’s only three of us in this office. We’re very careful, and extremely paranoid.” She says staffers disconnect their computers from the Internet when they don’t need to use the Web or send e-mail. And they never open an e-mail they’re not expecting without asking the sender if it’s authentic. “We can’t not use e-mail, but if we could get away without using it we probably would. It’s such a minefield,” she says.
Danielsson adds that spies also attempt to trick others into opening e-mails that appear to come from her group. “That happens quite a lot,” she says. The latest incident was a few weeks ago.
Experts say cyber espionage with suspected links to China is so widespread that it’s hard to know precisely what the spies are trying to understand at a given moment. DC-based policy outfits have become such rich sources that hacking and spear-phishing are just costs of doing business. “It’s really hard to find an organization in that space that hasn’t been targeted and compromised,” says Steven Adair, the director of cyber intelligence for Terremark, which helps companies and organizations deal with advanced espionage threats. Other experts speculate that as the federal government has gotten better at improving its own network security, spies are going after “soft targets” that do business with the government but don’t have as strong defenses.
Human rights lawyers are also in the crosshairs. Jared Genser, the founder of Freedom Now, which represents Chinese dissidents and activists, says one of his staffers received a spear-phishing e-mail two years ago. It contained an innocuous-looking link and appeared to come from a member of Freedom Now’s board of directors.
Genser says his group contacted the FBI, and that investigators found a “keystroke logger” implanted on the computer, which clandestinely recorded anything the user typed. “It was buried deep in the guts of the computer, where you just can’t get to it,” Genser says. “We were told [by the FBI] to trash the computer, which is what we did.”
Cyber Squared found that at least two law firms with offices in Washington were targeted as recently as last June. In those cases, it appears the spies were targeting the firm’s clients, which include companies involved in business negotiations in China as well as trade-secret disputes with Chinese organizations. Like think tanks, law firms have become a routine target, Vincent says, because “lawyers have lots of very juicy information.”