Exclusive: China identifies the culprits behind cyberattack on Wuhan Earthquake Monitoring Center; a secretive US global reconnaissance system to be exposed

New progress has been made on an investigation into a cyberattack incident targeting the Wuhan Earthquake Monitoring Center affiliated to the city's Emergency Management Bureau, after a joint investigation team formed by the National Computer Virus Emergency Response Center (CVERC) and Chinese cybersecurity company 360 discovered malicious backdoor software that exhibits characteristics of US intelligence agencies, the Global Times learned on Monday. Chinese authorities will publicly disclose a highly secretive global reconnaissance system of the US government, which poses a serious security threat to China's national security and world peace.

On July 26, the Wuhan Earthquake Monitoring Center reported that some front-end station collection points of the earthquake reporting data had been implanted with backdoor programs, attracting widespread attention. The CVERC and the company 360 immediately formed a joint investigation team to go to Wuhan for investigation and evidence collection.

Du Zhenhua, a senior engineer from the CVERC, told the Global Times that the team has found very complex backdoor malware in the victim's network, fitting the characteristics of US intelligence agencies, highly concealed, and aiming to steal earthquake monitoring-related data, with a clear military reconnaissance purpose.
Why target earthquake monitoring system?

Du explained that China is a country seriously affected by earthquake disasters, with multiple occurrences causing severe loss of life and property. "Therefore, China attaches great importance to earthquake monitoring and early warning. In order to improve the monitoring and early warning capability of geological disasters, earthquake monitoring data includes not only basic information like magnitude and epicenter but also rich geographical and geological data such as surface deformation and hydrological monitoring," Du said.

These data also hold high value as military intelligence. Hence, the cyberattack on the earthquake monitoring center by US intelligence agencies was a planned and premeditated cyber military reconnaissance action, the expert noted.

Xiao Xinguang, a member of the National Committee of the Chinese People's Political Consultative Conference (CPPCC) and also the chief software architect of leading anti-virus company Antiy Labs, further explained to the Global Times that although the location, magnitude, and depth are publicly released information, they are based on the calculations from multiple sensors.

"The comprehensive vibration and sound wave data collected by these sensors, especially infrasound data, have significant intelligence value for judging geological terrain, analyzing weapons system tests, and nuclear tests," Xiao said.

Furthermore, this is just one of the reasons the US targets earthquake monitoring and other systems with cyberattacks. Xiao also analyzed that the current information gathering is only one type of behaviors that have been exposed.

There are still many information theft instances targeting other fields that have not yet come to the surface. By leveraging its global comprehensive reconnaissance ability, along with various means of intrusion, theft, and other comprehensive measures to obtain all kinds of telemetry data, and combining other multi-source auxiliary data, it forms the ability to analyze, judge, attribute, and locate China's economic, social operations, and even military actions.

Causing social panic

Experts believe that cyberattacks on civil infrastructure, including earthquake monitoring systems, can lead to serious consequences.

Du underlined that if the attackers maliciously damaged earthquake monitoring system, it would become ineffective in providing accurate data during an earthquake. This would impact earthquake early warnings and disaster assessment work, leading to more severe loss of life and property.

"Even more dangerous is that if the attackers tamper with the earthquake monitoring data, triggering false alarms, it could lead to social panic and disorder, resulting in casualties among innocent people," Du said.

The remote sensing and telemetry systems and data are national strategic resources that must be given priority protection, Xiao said. "These data can display the basic operation of our country's economy and society from macro to micro levels and provide comprehensive support for integrated decision-making and emergency response. They are the supporting resources for territorial safety and national security."

"US intelligence agencies not only actively collect various signal intelligence but have also long obtained other countries' comprehensive earth system science remote sensing and telemetry data as strategic intelligence through various means. This includes sharing through allied intelligence mechanisms, coercing high-tech companies to provide it, and using academic and scientific research activities," Xiao said.

He also explained that the discovery of the cyberattack on Wuhan earthquake monitoring center was not accidental, indicating that cyberattack intrusion and theft have become the lowest-cost way for the US to obtain other countries' remote sensing and telemetry data.

The US has developed a series of signal intelligence collection, analysis, and processing systems, such as the Echelon project for electromagnetic signal spying, the Main Core project for telecommunications operators, and the PRISM project's super access interface for large IT and internet manufacturers.

"After many years of continuous tracking with relevant departments, we will soon publicly disclose a global reconnaissance system of the US government, which poses serious security threats to China's national security and world peace. We must be highly vigilant and tightly guard against this," Xiao said.

Violating international law

In fact, a plethora of internal documents from the National Security Agency (NSA) and Central Intelligence Agency (CIA) exposed in events such as Prism, Shadow Brokers and WikiLeaks reveal that the US, as a real "hacker empire" and "spying empire," targets "indiscriminately" (including its allies) in its cyber intelligence collection activities. Civil institutions and individuals worldwide are its targets for cyberattacks, fully exposing the US' double standards and hypocrisy on human rights issues.

Du further stated that the US military intelligence agencies' use of their information technology advantage to launch cyberattacks on civilian infrastructure is a criminal act in clear violation of international law, seriously infringing on China's national security and public interest.

"In fact, for a long time, the US' cyberattacks on China's key information infrastructure have been all-encompassing, with government agencies, universities, research institutions, and large corporations all being targeted by its cyberespionage activities. The US is attempting to use these unfair means to comprehensively steal China's political, economic, military, and diplomatic sensitive information, to contain China's development and progress, and to maintain the US' world hegemony," he said.

As a veteran expert in computer virus prevention technology and emergency response, Du suggested that if China's key information infrastructure is attacked with state-backed hackers, relevant units must report the cyberattack to relevant authorities immediately; build cybersecurity capabilities; strengthen supply chain security management, increase autonomous control abilities; conduct regular cybersecurity drills to improve emergency handling and recovery abilities.

Xiao believed that although China's overall cybersecurity ecosystem is still relatively small in market size, overall, it's complete in technology categories without obvious weaknesses. "In continuous confrontation with threats, especially in identifying, analyzing, and exposing advanced persistent cyberattacks, including those from the US, many excellent Chinese cybersecurity companies have demonstrated their abilities, becoming the industry's supporting force in safeguarding national security and defending the security of the cyberspace community."

China does not need to underestimate itself in terms of cybersecurity capabilities, he noted. "We can establish more ambitious goals, become a competent force in the national governance system, create a capability advantage compared to main geopolitical competitors, and not become a significant constraint and risk vulnerability, even when facing comprehensive suppression by hegemonic states or in high-intensity security conflicts.

"We can achieve an overall risk controllable state by strengthening the construction of the public service attributes of cybersecurity , and enhancing the construction of common security capabilities, resilience mechanisms, and cybersecurity infrastructure," Xiao said.

Low levels of radiation from Fukushima persist in seafood

Radiation from the 2011 disaster at the Fukushima Daiichi nuclear power plant contaminates most Japanese seafood at low levels, researchers estimate February 29 in the Proceedings of the National Academy of Sciences.

For aquatic foods, data on lingering concentrations of cesium is limited in terms of the number of species sampled and the levels that surveys can even detect. To fill in the blanks, a team of researchers in Japan drew from survey measurements from April 2011 to September 2015 and devised a way to predict cesium contamination in different aquatic species across Japan.

The analysis provides mixed news: Overall, cesium contamination is pretty low. But, some species retain higher levels than others. Larger fish near the top of the food web tended to have the highest levels of contamination. The researchers predict that such factors put some wild freshwater species like the whitespotted char (Salvelinus leucomaenis leucomaenis) and the Japanese eel (Anguilla japonica) at higher risk for contamination.

Hippocampus makes maps of social space, too

NEW YORK — Cells in a brain structure known as the hippocampus are known to be cartographers, drawing mental maps of physical space. But new studies show that this seahorse-shaped hook of neural tissue can also keep track of social space, auditory space and even time, deftly mapping these various types of information into their proper places.

“The hippocampus is an organizer,” says neuroscientist Howard Eichenbaum of Boston University.

Neuroscientist Rita Tavares described details of one of these new maps April 2 at the annual meeting of the Cognitive Neuroscience Society. Brain scans had previously revealed that activity in the hippocampus was linked to movement through social space. In an experiment reported last year in Neuron, people went on a virtual quest to find a house and job by interacting with a cast of characters. Through these social interactions, the participants formed opinions about how much power each character held, and how kindly they felt toward him or her. These judgments put each character in a position on a “social space” map. Activity in the hippocampus was related to this social mapmaking, Tavares and colleagues found.
It turns out that this social map depends on the traits of the person who is drawing it, says Tavares, of Icahn School of Medicine at Mount Sinai in New York City. People with more social anxiety tended to give more power to characters they interacted with. What’s more, these people’s social space maps were smaller overall, suggesting that they explored social space less, Tavares says. Tying these behavioral traits to the hippocampus may lead to a greater understanding of social behavior — and how this social mapping may go awry in psychiatric conditions, Tavares said.

The work emphasizes that the hippocampus is not just a mapper of space, Tavares says. Instead, it is a mapper of relationships. “It’s relational learning,” she says. “It’s everything in perspective.”

Other research, discussed at a meeting in February, revealed a role for the hippocampus in building a very different sort of map — a map of sounds. Stationary rats were trained to “move” through a soundscape of different tones, pushing a joystick to change the sounds to reach the sweet spot — the target tone. As the rats navigated this auditory world, nerve cells in their hippocampus were active in a way that formed a map, Princeton University neuroscientist Dmitriy Aronov reported in Salt Lake City at the annual Computational and Systems Neuroscience meeting.

Cells in the hippocampus can also map time, keeping count as seconds tick by, Eichenbaum has found (SN: 12/12/15, p. 12). All of these types of information are quite different, but Eichenbaum argues that they can all be thought of as memories — another mental arena in which the hippocampus plays an important role. Organizing these memories into a sensible structure may be the big-picture job description of the hippocampus, he says. “What’s being tapped in all of these studies is that we are looking at a framework, whether it’s a physical spatial framework, a social space framework, a pitch framework, or a time framework,” Eichenbaum says.

Bear bone rewrites human history in Ireland

In a bit of Irish luck, archaeologists have found evidence of the Emerald Isle’s earliest known humans. A brown bear’s kneecap excavated in 1903, featuring stone tool incisions, pushes back the date that humans set foot in Ireland by as many as 2,500 years.

Radiocarbon dating at two independent labs places the bone’s age between about 12,800 and 12,600 years old, say Marion Dowd of the Institute of Technology, Sligo in Ireland and Ruth Carden of the National Museum of Ireland in Dublin. Melting glaciers and milder temperatures in northwestern Europe at that time made it easier for humans to reach Ireland by boat to hunt game, at least for several weeks at a time, the researchers propose in the May 1 Quaternary Science Reviews.
Until now, the oldest signs of people on Ireland came from a hunter-gatherer camp dating to about 10,290 years ago.

Carden discovered the brown bear’s kneecap while studying bones that had been packed away in boxes in the 1920s, after the bones’ 1903 discovery at Ireland’s Alice and Gwendoline Cave.