Former Pentagon Analyst: China Has Backdoors To 80% of Telecoms 240
An anonymous reader writes "A former Pentagon analyst reports the Chinese government has 'pervasive access' to about 80 percent of the world's communications, and it is looking currently to nail down the remaining 20 percent. Chinese companies Huawei and ZTE Corporation are reportedly to blame for the industrial espionage. 'Not only do Huawei and ZTE power telecom infrastructure all around the world, but they're still growing. The two firms are the main beneficiaries for telecommunication projects taking place in Malaysia with DiGi, Globe in the Philippines, Megafon in Russia, Etisalat in the United Arab Emirates, America Movil in a number of countries, Tele Norte in Brazil, and Reliance in India.'"
Wait, what? (Score:5, Insightful)
This "former pentagon analyst"... Did he have access to intelligence reports of this nature? If so, and he's disclosing this now, I'm assuming the relevant documentation would be available via a Freedom of Information Act request? Since disclosing classified intelligence would be an act of treason, you know.
Just out of curiousity, this "former pentagon analyst" wouldn't happen to be employed with a defense firm now that would stand to profit from any products the company offers to combat this threat, would it? As many a scientist has uttered before, "Extraordinary claims require extraordinary proof." That doesn't change because we're discussing a matter of national security: You still have to put up, or shut up.
Re: (Score:2, Insightful)
I'm sure there is someone profiting off this. I'm also sure it's true. The problem is we don't require the source code to be free and readily available. THIS STUFF SHOULD BE PUBLIC INFORMATION!
It might not stop hackers although it would give us the opportunity to lock down infrastructure. The code should be reviewed by security experts.
Re:Wait, what? (Score:5, Insightful)
If the source code were free and publicly available.... still... how do you verify the code on the device was compiled from the source you were given, and there's not a hardware component that changes the code after it's in memory?
Re:Wait, what? (Score:5, Interesting)
Strange Loops: Ken Thompson and the Self-referencing C Compiler [scienceblogs.com]
Reflections on Trusting Trust - Ken Thompson [bell-labs.com]
Re:Wait, what? (Score:5, Interesting)
Basically, if you want to be 100% sure your code is clean, you have to write it (including any compilers you use) from scratch. [slashdot.org] Perhaps the most pertinent quote from that paper: "As the level of program gets lower, these [deliberately inserted] bugs will be harder and harder to detect. A well installed [hardware] microcode bug will be almost impossible to detect."
Re: (Score:3)
Re: (Score:3)
Right, and "everyone involved in computer security" knows that this is completely unrealistic because modern compilers do not share common origin.
This guy is right. (Score:5, Interesting)
Imagine a chip, made in China, that has a network connection (to China) and can DMA to/from your RAM.
Oh, hey, you have one: your Ethernet chip. Shit. We're fucked.
Also notice the chips in your wireless router, cable modem, cell phone, cell tower, USB stick, USB port, etc.
Re:Wait, what? (Score:5, Insightful)
Emphasis added on the word potential. Now where's the proof (preferably from a chip teardown by a reputable hardware hacker or hacking group)?
Re:Wait, what? (Score:5, Interesting)
Emphasis added on the word potential. Now where's the proof (preferably from a chip teardown by a reputable hardware hacker or hacking group)?
There won't be any. Anyone with the capability of analyzing and reverse-engineering thousands of ICs would need deep pockets -- Either a large corporation or a government. A hacking group won't have the resources, even a well-funded one. You're talking about several hundred highly trained engineers from a dozen different disciplines working for years on the project, with no return on investment. There's no reason for a large corporation to conduct such business domestically -- they already have comparable products, and the Chinese equipment doesn't have any capabilities that aren't commonly available elsewhere. That leaves governments with a GDP in excess of a hundred billion USD per year. Short list. Said governments wouldn't disclose the results of such a search either, as it's a legitimate intelligence asset that would need to remain classified -- you don't want your enemy to know what you know, especially not before you come up with a way to defend against the attack or co-opt the infrastructure for your own purposes.
Second, forensically analyzing tens of thousands of chips and microprocessors would be pointless anyway: There still has to be some method of communicating the information back, and they can't compromise the entire communications chain, which is what would be required. Telecommunications equipment is designed to be evesdropping-friendly; Complete with port mirroring, trace and audit logs, selective forwarding based on rules... it's all standard. We're not even talking about the law enforcement black boxes, this is just stuff used for legitimate business purposes. The moment any such 'bug' went active, it would set off alarms -- by necessity, the communications would have to occur over the provider's own network. Unless their network admins are idiots they should notice the abberant traffic.
China would have to be very stupid to leverage such an intelligence asset for peanuts; It's basically a one-shot, and it would cost them billions in telecommunications contracts domestically. So if they do have such a capability, they're not going to use it until the value of the intelligence they would gain from it equals or exceeds that amount.
So there's two arguments right there based just on the economics of the situation. I strongly suspect that this unnamed pentagon analyst is being paid to spread disinformation. Such disinformation would serve the purpose of keeping the american public sucking the tit of the Department of Homeland Security's fear juice, and exaggerating our actual intelligence capabilities -- rather than waste hundreds of millions on a reverse engineering project that could never be made public, we'll just insinuate that "We know. We're on to you," and rattle our sabre a little. Maybe it deters them, maybe it forces them to expend resources to find out whether we're telling the truth or not, but it costs us nothing to make such a statement.
Re: (Score:2)
Too many backdoors and the house is wide open to the public. So basically we shouldn't be terrified of backdoors being installed in off-the-shelf products but of backdoors being installed in some custom-built equipment that manages to sneak into the office. Security-wise, this makes it more important to do a background check on people installing and admi
Re:Wait, what? (Score:4, Informative)
There wouldn't necessarily be alarms. After all, the use of Cisco's IOS backdoors, last I saw, had the problem of being so quiet that surreptitious use by black hats could not be detected easily. If the people who actually constructed the backdoors were using them appropriately and designed them for completel transparency, I wouldn't make a bet against them being able to use them unnoticed. It's been done before, as recently as 2010 (the last time I read an updated report of IOS LEA intercept problems).
Re:Wait, what? (Score:5, Interesting)
No need to look at thousands of ICs. Looking at a few of the most interesting targets is still going to be valuable.
I know one person who using just off the shelf equipment was able to read the ROM from a microcontroller in his sparetime. All it took was a cheap microscope and a webcam.
Covert channels can be very hard to detect. You don't need to compromise the entire chain. You just need to piggyback on a legitimate communication for hops between compromised equipment. For example VPN hardware could piggyback on legitimate connections by using some encrypted data instead of random values for sending packets over the Internet. A compromised router anywhere on the path the VPN connection takes could pick out the data. Now the data is on a router on the public Internet. There are plenty of ways to get the data from there. First of all the attacker could very well have a legitimate connection going through that router, now it just needs a covert channel to send data from that router.
Sending data from the router without risk of being noticed is slightly more tricky. The question is, would you take the risk of modifying packets in the hope that nobody is actually comparing the packets going into the router and out of the router? If you modified the IPID field of every packet going through the router, that would produce a feasible covert channel. It would not be immediately detected, but would be visible if you carefully inspected the traffic. Notice that it would not be sufficient to look at the traffic through the router in a lab before deployment, because the router wouldn't be sending any covert data until instructed to do so.
A more stealth method would be to just use the IPID field of packets generated by the router. There is no incoming packet to compare against. But extracting data that way without being visible takes time. You can run a traceroute that happen to pass through the router, then it will need to send three response packets (with the common settings). Each time you run a traceroute passing through that router, you could extract 6 bytes of data.
Valid point, however even if it was noticed, it would be hard to prove who was behind.
Re:Wait, what? (Score:5, Insightful)
Re: (Score:2)
In security, you have to make assumptions based on what is possible or likely, not what is proven. You don't have to prove that your first layer of firewalls can be breached - you assume that they might be and you put another layer of security behind it.
With regard to security of information that China would like very much to have access to, such resource location information (oil, minerals, etc) and industrial designs, military and otherwise, you have to assume that they will do what they can to get at su
Re:Wait, what? (Score:5, Informative)
Apparently, he writes stuff for www.wnd.com...kind of hard to tell what they are but they seem to be a net media company. Anyhow, the fellow saying these things, Michael Maloof, seems to be saying a lot of things on WND. It is hard to believe that he'd be revealing secret information because he'd be arrested for that sort of thing. So maybe he's just running off at that mouth? It wouldn't surprise me that Huawei (I think's that's pronounced Way-Way) has back doors in their equipment given their relationships with the PLA.
So at least on the surface your knee-jerk reaction appears to be unsubstantiated, he's not overtly working for a defense contractor.
Re:Wait, what? (Score:5, Insightful)
This "former pentagon analyst" is a writer for WND, a rightwing web news site with all the credibility of the National Enquirer.
Not to say that China wouldn't build backdoors into telco gear, of course they would. The US requires telcos to provide access for it to spy on calls, it wouldn't particularly surprise me if the Chinese just built it in without talking publicly about it. After WWII, many countries purchased Swiss encryption gear, and many years later it was divulged that the US had inserted a backdoor into that gear. Why would China, or telco gear, be any different?
The fact is, around the world everyone should assume that anything done over a telephone is shared with unknown parties. Unless they've got trustworthy gear to encrypt calls end-to-end.
Re:Wait, what? (Score:4, Insightful)
If I were China, I would put spying devices into hardware we build for well known American Telecom companies. Everything is made in China these days, with all the CAD files, firmware binaries, hardware schematics etc. all handed over to the factories in China.
Why ruin your own brands when the American brands can get into more places.
Re:Wait, what? (Score:4, Informative)
National Enquirer, the "non-credible" news source that first ran the story on John Edward's affair and child out of his marriage while on the campaign trail. The same news source that broke the story on Jessie Jackson's illegitimate child that he was funnelling hundreds of thousands from his organization to keep the mother quiet.
While 10 years ago I would have agreed with that comment of yours, they are now more accurate and truthful than NBC has been over the last few years. NBC had both of those stories I listed, but decided to bury them leaving the Enquirer the only news outlet that would run them, and both turned out completely accurate.
Re: (Score:2)
NBC had both of those stories I listed, but decided to bury them leaving the Enquirer the only news outlet that would run them, and both turned out completely accurate.
I assume you mean NBC had the ability to break the story, not cover it because they certainly did. So they didn't break the story...do you have evidence for this? Do you have evidence NBC wasn't simply practicing journalistic integrity and was seeking a second source? In general, how much credulity do you posses on conspiracy theories? In your opinion, is a quality news organization one that breaks news first regardless of source?
Have you looked www.nationalenquirer.com recently? Can you give more a de
National Enquirer website (Score:2)
Have you looked www.nationalenquirer.com recently? Can you give more a detailed reasoning on why anyone should take your statements seriously?
"The content of this website is not available in your area."
I definitely can't take the National Enquirer seriously. In fact, I can't take it at all!
Re: (Score:2)
I would guess you live somewhere libel laws are quite strict. The kind of country who would rather have censorship than gossip.
Re: (Score:2)
I would guess you live somewhere libel laws are quite strict. The kind of country who would rather have censorship than gossip.
Not really. To be actionable in Finland [planetlaw.info], a libel or other form of defamation must be known to be false by the person making it in addition to being injurious to its target. Forget megabuck settlements also, as Finnish courts tend to award actual damages (without any wild-eyed interpretation of "actual") rather than exemplary or punitive amounts.
It's far more likely that either (i) some of the content at www.nationalenquirer.com is licensed by its providers only for the US and maybe Canada and some other
Re: (Score:2)
Re: (Score:2)
And on a Swedish one.
WND credibility (Score:2)
This "former pentagon analyst" is a writer for WND, a rightwing web news site with all the credibility of the National Enquirer.
Has WND told us the truth yet about the two-headed slime aliens anal-probing the kidnapped Elvis on the Moon (preferably with grainy photos)? Until then, WND has only a fraction of the credibility of the National Enquirer.
Re:Wait, what? (Score:5, Insightful)
Article read like FUD.
As a consequence, sources say that any information traversing "any" Huawei equipped network isn't safe unless it has military encryption.
Wow, military grade encryption? Would that be, like, AES, one of the most widely deployed, tested, and recognized encryption schemes out there? Wow man, that stuff is hard to come by.
I also like the implication that unless you have a VPN, it will still magically find its way out to Huawei regardless of what other network controls you have in place. Having backdoors is one thing, getting thru a firewall is something completely different.
Sources add that most corporate telecommunications networks use "pretty light encryption" on their virtual private networks, or VPNs.
Proprietary information could be not only spied upon but also could be altered and in some cases could be sabotaged.
Someone want to explain to me the difference between "altered in transit" and "sabotaged"?
Im sorry, when so many of the assertions in the article read like uninformed drivel, its kind of hard to take the headline seriously. I have a strong feeling that the person who wrote this doesnt understand any of the terms hes going on about.
Re:Wait, what? (Score:5, Insightful)
He's just ignoring the convenient fact that US has access to 100% by the same measuring stick.
Comment removed (Score:4, Insightful)
Re: (Score:2)
I know selling weapons via Iran to a terrorist group that has just killed 220 US marines doesn't count, North was still calling himself a patriot after that.
Re: (Score:2)
Re: (Score:2)
treason/trzn/
Noun:
1) The crime of betraying one's country, esp. by attempting to kill the sovereign or overthrow the government.
2) The action of betraying someone or something.
Disclosing classified intelligence can certainly fall under the definition of treason.
Re: (Score:3)
I wouldnt actually be surprised if there was some substance. A while back, when Australia was doing its tendering for constructing the national broadband network (fibre to the home + backbone upgrade), it excluded these companies on the grounds of "security concerns" but declined to state why. It was puzzling as australia is as close to china as we are to the united states, and perhaps more so economically.
Perhaps the US Pentagon had a word to Australian intelligence about the concerns, and this guy has hea
Re: (Score:3)
Penny wise, pound foolish.
Re:He's right. (Score:5, Interesting)
Pervasive espionage.
Chinese step up computer espionage against United States [nytimes.com]
FBI estimates there are currently more than 3,000 corporations operating in the United States that have ties to the PRC and its government technology collection program. [jamestown.org]
Chinese telecom firm tied to spy ministry [washingtontimes.com]
I'm sure you can figure out why this might be important. . . well, maybe not.
Re:He's right. (Score:5, Insightful)
No, THEY have. We keep getting the stuff they make, and they get US dollars.
They don't always get dollars - due to the trade imbalance, they get IOUs. Our debt to China increases every year, and China can't cash in on it, because that would crash our economy completely, and they would get even less.
We're like an old exiled royal who lives on debt - nobody dares to call him out on being insolvent and having a snowball's chance in hell of ever getting to his former riches, because that would make the chits and IOUs people hold (much of it from when he was solvent) worthless. So everyone continues to lend him money to keep the pretence of solvency and prevent him from defaulting, yet will quietly sell off the debt to new players if given a chance.
Re: (Score:2, Insightful)
What, according to this theory, accounts for the fact that everyone in the world, including China, continue to buy newly issued U.S. debt at historically low interest rates?
Re:He's right. (Score:4, Insightful)
What, according to this theory, accounts for the fact that everyone in the world, including China, continue to buy newly issued U.S. debt at historically low interest rates?
It's already answered in the very post you reply to.
But, in smaller spoonfuls, consider this:
You lend $100,000 to John, an upstanding fellow. Then John loses his job and starts drinking. He then comes to you and says "I fear I'm going to default on my loans and have to file for bankruptcy unless someone can lend me $5,000 at low interest". ... or
You now have the choice of:
(a) lending him the money and hope that either
(a1) you get to sell the debt at a smaller loss before he goes bankrupt, or that
(a2) John manages to get back in shape enough to pay his interest rates.
(b) refusing his plea, and watch him file for bankruptcy, making it
(b1) a certainty that you'll lose the entire $100,000, and
(b2) a distinct possibility that John gets so pissed that he carpet bombs your house.
Your best bet may be to lend him the money and try to convince others that he's solvent.
This isn't a new type of dilemma - it's happened quite a few times in history, often in the final time before bubbles burst.
Re: (Score:2)
Borrow a few thousand dollars, and the bank owns you.
Borrow a billion, and you own the bank.
Re: (Score:2)
Chine has been buying up hard assets [barrons.com].
China panic! (Score:2)
Now all we need is a "former sports analyst" to say that China has access to 80% of the world's athletes as they have implanted nano-technology in the clothing. :)
Well, they're already supplying the uniforms [bbc.co.uk] of the US team...
Re: (Score:3)
Bogus backdoor: http://erratasec.blogspot.no/2012/05/bogus-story-no-chinese-backdoor-in.html [blogspot.no]
New Legislation in the works (Score:2)
CISPA for telephony.
Australian govt bans huawei from national network (Score:5, Interesting)
There was a story a few months ago about how Australia banned Huawei from involvment in a big project, they didnt say why.
http://tech.slashdot.org/story/12/03/24/0424215/australian-govt-bans-huawei-from-national-network-bids [slashdot.org]
Re:Australian govt bans huawei from national netwo (Score:5, Interesting)
Seems to me that someone in The Australian Government has learned a few important life lessons from The X-Files. (ie trust No-One).
Either that (a) or (b) they're just playing The Obvious "Devil You Know / Devil You Don't" card; and/or decisions were influenced by vendor-$ and Huawei could-not/would-not/weren't-given-a-chance-to cough up enough.
Personally Option (b) sounds more typical of government.
I for one will be eternally surprised to see any government making a well researched, informed, well reasoned decision - they're almost always a pack of retarded monkeys interested in looking after themselves and their friends.
Go On Mr Government - PROVE ME WRONG - I Dares Ya!
Re: (Score:2)
Re: (Score:2)
Er. excuse me. 'Campaign contribution'. Yeah, that's the ticket...
Re: (Score:2)
Re: (Score:2)
Rivals? Hah, try exceeds by a significant margin. China as a whole is incredibly corrupt on a level beyond the western world.
The U.S. has like 99% listening coverage. (Score:4, Insightful)
We even have the power to shutdown foreign companies like Megaupload w/o needing to prove they did anything wrong. But we're the "good" guys. So that makes it okay. After all we only killed 300,000 people this last decade, versus China who killed..... ummm..... wait there's something wrong with my theorem.
Re: (Score:3, Insightful)
China has killed tens of millions of their own people under communism in the last 60-70 years. Huh? You think China's the nice or good guys??? Sarcasm doesn't bold well here.
Re: (Score:2)
>>>>China has killed tens of millions of their own people under communism in the last 60-70 years. Huh? You think China's the nice or good guys???
I very clearly said IN THE LAST DECADE. The American Empire has killed 300,000 innocent men, women, and children through its wars of aggression (and about 50,000 actual soldiers/combatants). The Chinese government has not killed anywhere near that number since 2002. As of the last ten years China is actually "nicer" than the hostile U.S.
Re: (Score:3)
OTOH, a civil war, is not the same thing as going after your citizens to make them support you 100% or die.
Re:The U.S. has like 99% listening coverage. (Score:4, Informative)
To try and compare this to slavery from over 250 years ago, or to a 4 year civil war, is ridiculous.
Re:The U.S. has like 99% listening coverage. (Score:4, Insightful)
Well said. To which I will add this reference:
The Black Book of Communism - translated by Jonathan Murphy and Mark Kramer [harvard.edu] - available at Barnes & Nobel [barnesandnoble.com] and Amazon [amazon.com].
Review by Daniel J. Mahoney, American Enterprise, of: The Black Book of Communism [harvard.edu]
The six contributors to this book are all French, and all hail from the Left. The book's original publication in France created a sensation, because its cumulative effect is to establish that Communism is the twentieth century's fiercest practitioner of state violence and "crimes against humanity." It forthrightly challenges the claim that Nazism has a monopoly on "absolute political evil" in our time.
The chapters on the Soviet Union and China are as powerful as they are in large part because their authors, Nicolas Werth and Jean-Louis Margolin, avoid excessive polemics and allow the evidence to simply speak for itself. If anything, Werth is excessively conservative in his estimates, drawing almost exclusively from not always reliable "official" party and state archival materials to verify politically--inspired deaths and incarcerations in the Soviet Union. Despite the limits of this method, Werth concludes that the Bolshevik regime was responsible, directly or indirectly, for the deaths of 20 million people between 1918 and 1956, and for the imprisonment in camps of millions more. He demolishes the notion of a good Lenin and a bad Stalin by showing that terror defined the Soviet regime from its inception. And he concludes that there is no basis for the claim that the terror of the 1930s was driven by overzealous Party and police officials acting independently of orders.
Likewise, Margolin's chapter on China shows that the crimes of Maoism are rooted in ideological hubris and a denial of the humanity of political or class "enemies." Margolin demonstrates that Mao committed crimes unprecedented in Chinese history, and damaged the nation in everything from economics to ethics. The devastating consequences of Mao's rule: 65 million lost lives. Perhaps the deepest reason The Black Book has sparked controversy is that it argues Communism is as intrinsically perverse as Nazism. Editor Stephane Courtois argues that Communist crimes, like Nazi ones, partake of the desire to eliminate groups of people on the basis of their origins, not because of any individual culpability or responsibility. He denies that Communism's crimes have any right to be excused or qualified because they were committed in the name of egalitarian principles. Courtois shows that Communism is an exterminationist ideology which selects its enemies on the basis of class. Aleksandr Solzhenitsyn suggested in The Gulag Archipelago that the USSR's war against the independent peasantry--the so-called "de-kulakization" campaign --was the first systematic effort to eliminate an entire class of people for ideological reasons. In this sense, Hitler was Lenin's and Stalin's faithful pupil.
Why Doesn't Communism Have as Bad a Name as Nazism? [dennisprager.com]
Re:The U.S. has like 99% listening coverage. (Score:5, Informative)
China executes roughly 5000-8000 [hrw.org] people each year for various crimes. The United States has been declining since 1999, and is currently somewhere around 40 [deathpenaltyinfo.org] per year. Accounting for (rather than ignoring) scale, China executes about 30 to 40 times as much of its own population as the United States. Of course, that's just one metric, but it's pretty illustrative.
China is big, but it's not big enough to dilute its atrocities.
Re: (Score:3, Interesting)
US may not be as bad as North Korea, but it is every bit as bad as China these days. Both are countries were justice is unreachable for common people, and where dominant groups do basically whatever they want. China censures information, US floods it in an ocean of propaganda and disinformation. In the end all is the same.
Re: (Score:2)
The problem is, once the guy is extradited to anywhere else within US he can end in Minnesota or Texas, or whatever place they decide to send him in.
That is nonsense - absolute rubbish. American states are sovereign, each with their own laws and legal system. If you commit a crime under Minnesota law you can't and won't be handed over to Texas for trial for the crime in Minnesota. If the prosecution is for a federal crime, then the location doesn't matter - the law is the same.
US may not be as bad as North Korea, but it is every bit as bad as China these days.
And yet, for some odd reason, Chinese people keep moving to the United States.
Both are countries were justice is unreachable for common people, and where dominant groups do basically whatever they want.
At a trivial level that is trite. At a more profound level it is nonsense.
China censures information, US floods it in an ocean of propaganda and disinformation. In the end all is the same
So, the Chinese governm
Re: (Score:2)
http://www.youtube.com/watch?v=6wXkI4t7nuc [youtube.com]
US law is made to allow the government to manipulate it to its own ends and it can easily ruin innocent people's lives if it really wants to.
Chinese people keep moving to US
Re: (Score:2)
Can You See The FNORDs? (Score:2)
And then proceeds to cite absolutely ZERO evidence to back up his claims.
In most circles this would be considered libel of the worst kind (libel because it was written, slander is the same thing when applied orally), he deserves to be sued out of existence.
NOT that I have any reason to disagree with the core of his argument "Don't trust them, they're backed by the government of someone we used to hate veheme
FUD ? (Score:3)
There's something of a cottage industry in spreading FUD about Huawei and ZTE. Why should anyone believe this stuff? (Or, for that matter, why should we believe much of anything in the news or on web sites?)
Re:FUD ? (Score:5, Informative)
So you buy Cisco and are subject to US backdoors.
Re: (Score:2)
I'd trust even the more bribable dark corners of US intelligence more than Cisco any day.
Re: (Score:2)
I'm not sure it matters whether we believe it or not. Cisco stuff is manufactured in China. Can you prove that every single component is manufactured to American specs, with no 'spurious unknown compromising parts' or hardware microcode patches burned in 'by accident' ?
almost as much as the US.... (Score:2)
... or does the US just use the front door?
Common Knowledge for Years! (Score:4, Insightful)
I'm surprised at all the surprise?!
I thought it was pretty common knowledge that Huawei and ZTE were run and funded by the Chinese Military.
They have been using their financial muscle to undercut and bribe their equipment into as many countries telecoms infrastructure as they possibly can for over five years now.
Re: (Score:2)
That settles it then. "Common knowledge" is always right. Especially when there's an exclamation point !
Re: (Score:2)
Exactly! [washingtontimes.com]
Re:Common Knowledge for Years! (Score:5, Informative)
Hopefully it will soon be common knowledge that a lot of industries in China are run and funded by the Chinese Military so this connection really means nothing in isolation. They are probably about as big and diversified in their holdings as coca-cola these days if not bigger, and 99% of the time they are in it for the money. Those childrens toys made by a company owned by the Chinese Military are not there so they can spy on our kids, they are there to help pay for a new aircraft carrier. The separation of state and private companies that we are used to seeing in democracies is instead a tangled web in China, with odd gaps such as entire huge open cut coal mines with thousands of miners that the government has zero involvement with (to the point where they are not even on a map, let alone taxed).
Re: (Score:3)
What day? The day the Chinese army will be so busy fighting their own people that they'll have to stop spying overseas? Because that's the war they are currently fighting.
Oh no, the yellow peril is upon us! (Score:4, Interesting)
The second link is to "World Net Daily", a site that has about as much credibility as the John Birch Society.
Re: (Score:2)
The second link is to "World Net Daily", a site that has about as much credibility as the John Birch Society.
Allow me -
Chinese step up computer espionage against United States [nytimes.com]
The Evolution of Espionage: Beijing’s Red Spider Web [jamestown.org]
Chinese telecom firm tied to spy ministry [washingtontimes.com]
It is a LIE (Score:3, Insightful)
So, relax. China will not try what they did to India. And the communists are heading towards being capitalists so there is no chance that they are working to kill off the west.
Re: (Score:2)
They already are quite extreme capitalists without many of the checks and balances on capitalism in the west, but that doesn't stop them from wanting to dominate the west in every way they can.
BTW, what do you mean by "China will not try what they did to India"? Do you mean the hacking of the computers owned by the group supporting the Dalai Lama in India or something a lot bigger I've missed or forgotten about?
To most of the world, China are not the
Re:It is a LIE (Score:4, Insightful)
China's action are a big part of why we are having a meltdown in the global economy 5 years ago and now again.
Re: (Score:2)
We really can't blame China for the silly Goldman Sachs games that they were not dumb, shortsighted and greedy enough to take part in. They could see the financial meltdown coming just like every finance column in every newspaper outside the USA was predicting, and t
Now imagine if the US had this (Score:2)
they'd be extraditing people for breaking US laws in their own countires left and right.
So? (Score:2, Troll)
And the US has used Echelon for industrial espionage against even its "allies" for 30 years.
U.S. government agencies pass wiretapped and intercepted information to American companies all the time. Trade secrets of non-U.S. energy companies have been passed to American companies, cell phone technology, labor negotiation strategies of non-U.S. companies with factories in the U.S. and intellectual property has been stolen and transferred for decades.
Re: (Score:3)
I may be oversimplifying but... (Score:2)
I don't understand how can this subject be brought up without talking about CALEA-compliant hardware [wikipedia.org]?
The compliance to this wiretapping law may be usually implemented at a much-higher and easier-to-circument level but in spirit it very much achieves the same.
All Network hardware *is* backdoored, regardless of the manufacturer's country and that's a FACT. The only thing we can do is improve awareness of this so we system engineers, developers, system integrators can design, code and implement around tha
Credibility (Score:2)
Bollocks (Score:5, Insightful)
The source article is on http://www.wnd.com/ [wnd.com], which is a pretty wacky looking right wing "news" site. Its top stories currently are :
Gun shop veto draws legal fight
Traveler says no to U.S. internal checkpoints
Blogger: Why don't blacks behave?
Cross-bearing Texas teen arrives In D.C.
Reviewer: It doesn't look like we're repenting
Poll: Majority favor extending all Bush tax rates
Detecting a trend?
Anyway the article in question simply says that 1) Chinese companies make most of the telecom switching gear. 2) Therefore, China's military has backdoored it all and is spying on every byte anyone transmits.
Of course, this is conceivable, but there isn't a shred of evidence. Spying on such a huge scale would require huge infrastructure and data transmission, basically duplicating the entire Internet. That might be detectable.
Re: (Score:2)
Detecting a trend?
Note to self, use this post as a reference the next time that someone uses huffpo as a story basis on /. again.
almost as many backdoors as the CIA..!?!? (Score:2)
The CIA owns everyone of any significance in the major media. (Former CIA Director, William Colby)
the chineese can build backdoors into the chips, because they do the manufacturing, but this sort of spying activity is not so much different than the american government / snoops requiring installation of their IP sniffers at google and every major ISP.. :-\\
they are both a form of censorship / control of communication — however, whereas the chineese govt tries to simply block dissenting traffic, the ame
Tinfoil Hat (Score:2)
But, wait. What if the tinfoil was made in China? Or made from metal that was recycled in China? What if all the world's tinfoil contains secret Chinese backdoors to stop the proper functioning of tinfoil hats?
Re:"Don't ever invade China" (Score:5, Funny)
Never fight a LAN war in Asia.
Re: (Score:2)
Do LAN even fly to Asia?
I know they fly all over South America, to Europe and AUS/NZ...
Re: (Score:2)
That's INCONCEIVABLE!!!
Re: (Score:2)
Reach me over my heroin, please. The Kardashians are coming on...
Re: (Score:2)
The 1.5B screaming Chinese charging at the lines will be a bit effective as well.
Re: (Score:2)
Re: (Score:2)
Why would you say this?
Re: (Score:2)
Re: (Score:3)
Re: (Score:2)
Re: (Score:3)
Personally, I would be more upset about the ability of China to shut down our infrastructure just prior to an attack, then their ability to listen. Listening is about 'Trust, but Verify'. Shutting down infrastructure is what you do to your enemies that are stupid enough to trust your word (esp. when you have been breaking it all along).
Re: (Score:3)
Yes, yours is server of highest security, without so-named rear entrance contained within network controller cards. Please continue use with utmost faithin separation between the wise and glorious Communist party and our approved manufacurers.
Yours sincerely,
Ministry of State Security, PRC.
Re: (Score:2)
Most likely. But the question is begged, where does this unnamed American company buy its gear? Highly unlikely they make their own in the US...
Re: (Score:2)
I've found your tinfoil hat.