But is it scary? In the video the tool is set to attack a university website that's been offline for a decade The clip shows up without explanation, lasting for about six seconds during a rather mundane documentary about hacking produced by the state-sponsored China Central Television The video appears to give a peek at a state-sponsored hacking tool used to disrupt the operations of a spiritual movement that the government of China considers a threat to its authority. The video does not explain where the tool comes from. With a few clicks, the on-screen computer fires up a custom-built attack program, apparently giving the user a way to knock out any one of a range of websites affiliated with the movement, Falun Gong.Computers affiliated with Falun Gong and Tibetan dissidents have been targeted in online attacks for years, in what many security experts considered to be an organized hacking campaign sponsored by the Chinese government. China has consistently denied these allegations, but the fact that a Falun Gong attack tool has popped up in a state-sponsored video raises new questions. The report, entitled “The Internet storm is coming!” focuses on the Pentagon’s cyberwarfare strategy, concluding that a cyber-attack against the U.S. could be construed as an act of war against a country that is prepared to fight back. The report then looks at how the Internet can affect national security and examines U.S. efforts to counter cyber-attacks. The attack tool shows up almost as an afterthought, in a collection of b-roll footage used to give viewers something to look at while the narration continues. During the six-second attack-tool segment (starting at 11:04 of the video), the narrator talks about how Trojans and back doors can infiltrate computers, and mentions that there are many ways to conduct online attacks.With a few clicks, the attacker selects a website hosted by the University of Birmingham at Alabama (UAB) from a list of Falun Gong websites. Buttons on the bottom of the screen say “attack” and “cancel.”As an attack tool, however, it isn’t exactly state of the art. It goes after a website that’s been offline for a decade.The University of Alabama website was a personal site that once hosted Falun Gong material. The site was created “by a former student and was decommissioned in 2001 as it violated our acceptable use policy,” according to Kevin Storr, a UAB spokesman.News of the video clip was first reported Sunday by the Epoch Times. China Central Television could not be reached for comment Tuesday.Robert McMillan covers computer security and general technology breaking news for The IDG News Service. Follow Robert on Twitter at @bobmcmillan. Robert’s e-mail address is robert_mcmillan@idg.com Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe