Walker’s trade delegation<\/a> was in China between May 19 and May 26.<\/p>\nComputers belonging to Alaska Communications, the Alaska Department of Natural Resources, Alaska Power and Telephone, TelAlaska, and the governor’s office were all scanned for vulnerabilities.<\/p>\n
Alaska Communications spokeswoman Heather Cavanaugh said by email that the company is not willing to discuss the incident but is “serious about cyber security.”<\/p>\n
“We do not, however, respond with information that could be used by malicious actors to gauge the efficacy of reconnaissance and exploitation attempts,” she wrote.<\/p>\n
In a subsequent email, she said the company would “absolutely let customers know if their data was compromised.”<\/p>\n
Alaska Communications focuses on telecoms support for business and government services. Its Alaska competitor, GCI, was not mentioned in the Thursday report, and a spokeswoman said the company didn’t see anything unusual.<\/p>\n
Jesse Carlstrom, a spokesman for the Alaska Gasline Development Corporation, said the state-owned corporation developing the gas pipeline was not named as a target and doesn’t discuss its specific security measures.<\/p>\n
“I can say that AGDC does utilize top-of-the line security systems,” he said by phone, and added that the company performs regular “penetration testing” to judge its vulnerability to hacking.<\/p>\n
There is no indication that information was accessed or taken from any Alaska computers; it appears to be the electronic equivalent of rattling doorknobs and examining closed windows.<\/p>\n
In a prepared statement, Walker press secretary Austin Baird said the scan wasn’t anything out of the ordinary.<\/p>\n
“In this day and age, it is critical for any business or government to take cyber security seriously, whether conducting business online, close to home, or overseas. The State of Alaska, like most state governments, routinely has anonymous activity on the perimeter of our networks that amounts to someone checking if the door is locked,” he wrote by email. “That is the sort of activity referenced in a recent blog post from Recorded Future. It is not unique, nor would we draw conclusions about its timing or source. There is no way to tell if the activity is related to the recent trade mission to China, and a review by the Office of Information Technology has found no evidence that no state networks were hacked in this instance.”<\/p>\n
According to a timeline of the Chinese activity, the scans began soon after Walker announced on March 5 that he would lead the delegation to China. Activity subsided for a time, picked up before Walker arrived, declined while the delegation was in the country, then surged after the delegation left the country.<\/p>\n
“The spike in scanning activity at the conclusion of trade discussions on related topics indicates that the activity was likely an attempt to gain insight into the Alaskan perspective on the trip and strategic advantage in the post-visit negotiations,” the report states.<\/p>\n
Alaska was not the only target of scans: according to the report, Tsinghua computers also examined organizations in Kenya, Brazil, Mongolia, Germany and Tibet.<\/p>\n
\n\u2022 Contact reporter James Brooks at jbrooks@juneauempire.com or 523-2258.<\/b><\/p>\n
\n","protected":false},"excerpt":{"rendered":"
An East Coast cybersecurity firm say that Alaska computers were the target of reconnaissance by Chinese hackers before, during and after an Alaska trade mission to the country. <\/p>\n","protected":false},"author":426,"featured_media":10907,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_stopmodifiedupdate":false,"_modified_date":"","wds_primary_category":9,"footnotes":""},"categories":[9,4],"tags":[269,270],"yst_prominent_words":[],"class_list":["post-10475","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-home","category-news","tag-china","tag-cybersecurity"],"_links":{"self":[{"href":"https:\/\/www.juneauempire.com\/wp-json\/wp\/v2\/posts\/10475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.juneauempire.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.juneauempire.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.juneauempire.com\/wp-json\/wp\/v2\/users\/426"}],"replies":[{"embeddable":true,"href":"https:\/\/www.juneauempire.com\/wp-json\/wp\/v2\/comments?post=10475"}],"version-history":[{"count":0,"href":"https:\/\/www.juneauempire.com\/wp-json\/wp\/v2\/posts\/10475\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.juneauempire.com\/wp-json\/wp\/v2\/media\/10907"}],"wp:attachment":[{"href":"https:\/\/www.juneauempire.com\/wp-json\/wp\/v2\/media?parent=10475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.juneauempire.com\/wp-json\/wp\/v2\/categories?post=10475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.juneauempire.com\/wp-json\/wp\/v2\/tags?post=10475"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/www.juneauempire.com\/wp-json\/wp\/v2\/yst_prominent_words?post=10475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}