Page 1 of 2 12 LastLast
Results 1 to 20 of 21

Thread: FBI Fears Chinese Hackers Have Back Door Into US Government & Military Computers

  1. #1
    Creepy Ass Cracka & Site Owner Ryan Ruck's Avatar
    Join Date
    Jul 2005
    Location
    Cincinnati, OH
    Posts
    25,061
    Thanks
    52
    Thanked 78 Times in 76 Posts

    Exclamation FBI Fears Chinese Hackers Have Back Door Into US Government & Military Computers

    FBI Fears Chinese Hackers Have Back Door Into US Government & Military Computer Networks
    Some months ago, my contacts in the defense industry had alerted me to a startling development that has escalated to the point of near-panick in nearly all corners of Government security and IT. The very-real concern, being investigated by the FBI, is that either the Chinese government or Chinese hackers (or both) have had the benefit of undetectable back-doors into highly secure government and military computer networks for months, perhaps years. The cause: a high-number of counterfeit Cisco and switches installed in nearly all government networks that experienced upgrades and/or new units within the past 18 months.

    News of the counterfeit Cisco equipment has been in the mainstream for some time:

    Co llaborative Current Event: Counterfeit Cisco Network Hardware Imported From China Seized
    Chinese Counterfeit Cisco Network Routers Targeted In North America
    Counterfeit Cisco Gear Showing Up In US

    But the US government has been attempting to avoid these issues by only using higher-end Cisco partners/suppliers for the gear. However, the highly-competitive lowest-bid environment of government procurement has inspired several vendors to look for cheap alternatives for hardware... resulting in a catastrophic meltdown of security.

    A few weeks ago, my sources have been providing information on a scathing investigation summary by the FBI. They've indicated that a critical Powerpoint document has been quietly circulating after a few internal presentations. While the Powerpoint presentation has been labeled unclassified, it is an official FBI publication and has been hard to track down. Thanks to key clues provided last week by two sources (both of which do not have the presentation, but have seen it), specific searches on the content of the document have turned up an online source, and I've provided all pages of the document below, along with the link to the discovered source. (The ATS upload would not allow a PPT file)

    As you can see, the FBI is concerned about critical infrastructure damage, AND, the potential of access to secure government systems. Many online IT circles have been speculating that the counterfeit hardware will provide backdoor capabilities and access into compromised networks for the originators of the equipment. In fact, some areas of speculation regarding the counterfeit Cisco equipment has focused on the possibility that the hardware is being manufactured expressly to deploy exploitable systems far and wide into the wild. The rationale being that the likely "wholesale" price of the counterfeit routers and switches are so low and profit margins likely very thin, that the only real advantage may be gained from downstream system exploits in the future.

    The threat is real. Compromised hardware of potentially hostile foreign origin sits within secure networks of the US government, military, and intelligence services. And as you now see, the FBI has been concerned about it.


    Graphic file export of the FBI's Powerpoint document slides.

































































































    Google Search that found the FBI Powerpoint document:
    "FBI Criminal Investigation: Cisco Routers"
    Link to PPT file

  2. #2
    Creepy Ass Cracka & Site Owner Ryan Ruck's Avatar
    Join Date
    Jul 2005
    Location
    Cincinnati, OH
    Posts
    25,061
    Thanks
    52
    Thanked 78 Times in 76 Posts

    Default Re: FBI Fears Chinese Hackers Have Back Door Into US Government & Military Computers

    FBI Probe Nets Counterfeit Chinese Networking Parts
    The FBI announced Friday that an investigation into counterfeit network components made in China and sold to the U.S. government has recovered about 3,500 fake devices with a value of $3.5 million.

    The criminal probe, code-named Operation Cisco Raider, was prompted by concerns that counterfeit network components could give hackers access to government databases. But one U.S. official told Reuters that the components discovered by the FBI are not believed to have made government computer systems more vulnerable.

    The existence of the probe came to light after an unclassified FBI PowerPoint presentation in January on the agency's efforts to counter the production and distribution of counterfeit network hardware showed up on Abovetopsecret.com.

    "This unclassified briefing was never intended for broad distribution or posting to the Internet," James Finch, assistant director of the FBI's Cyber Division, said in a statement.

    Operation Cisco Raider involved 15 investigations at nine FBI field offices and the execution of 39 search warrants, the bureau said. The FBI release did not mention whether any arrests had been made.

    Components included pirated versions of Cisco Systems routers, as well as switches, interface converters, and wide area network interface cards, Reuters reported.

  3. #3
    Creepy Ass Cracka & Site Owner Ryan Ruck's Avatar
    Join Date
    Jul 2005
    Location
    Cincinnati, OH
    Posts
    25,061
    Thanks
    52
    Thanked 78 Times in 76 Posts

    Default Re: FBI Fears Chinese Hackers Have Back Door Into US Government & Military Computers

    FBI: China May Use Counterfeit Cisco Routers To Penetrate U.S. Networks
    An FBI presentation states that China has counterfeited Cisco Systems network routers and may be using the equipment to penetrate U.S. government and private sector computer networks.

    Federal authorities in February seized some 400 counterfeit Cisco Systems knockoffs worth $76 million. The equipment included routers, switches, gigabit interface converters and WAN interface cards.

    Among the purchasers of the fake equipment were the U.S. Naval Academy, U.S. Naval Air Warfare Center, U.S. Naval Undersea Warfare Center, U.S. Air Base at Spangdahelm, Germany, the Bonneville Power Administration, General Services Administration, and the defense contractor Raytheon, which makes key missile and weapons systems.

    The FBI briefing slides on the case stated that while there are "intelligence gaps" on why the Chinese made the counterfeit equipment it could have been for profit or as part of a state-sponsored operation.

    Additionally the scope of the Chinese counterfeit equipment may extend beyond routers to include fake IT equipment such as PCs and printers.

    Under a section titled "The Threat," the FBI described the effort as "IT subversion/supply chain attack" that could "cause immediate or premature system failure during usage."

    The counterfeit equipment also could be used to "gain access to otherwise secure systems" and to "weaken cryptographic systems."

    The briefing slide said the Chinese information warfare efforts require "intimate access to target systems."

  4. #4
    Creepy Ass Cracka & Site Owner Ryan Ruck's Avatar
    Join Date
    Jul 2005
    Location
    Cincinnati, OH
    Posts
    25,061
    Thanks
    52
    Thanked 78 Times in 76 Posts

    Default Re: FBI Fears Chinese Hackers Have Back Door Into US Government & Military Computers

    Pentagon Worries About Chinese Chips
    At a conference in Washington, D.C., this week, a Department of Defense official sounded a startling alarm.

    "The defense community is critically reliant on a technology that obsoletes itself every 18 months, is made in unsecure locations and over which we have absolutely no market share influence," said Ted J. Glum, director of the DoD's Defense Microelectronics Activity unit.

    "Other than that," he cracked, "we're good."

    Glum addressed his comments to a crowd of defense officials and industry execs gathered for the 2008 Common Defense Conference, or ComDef, an internationally focused event held annually in Washington.

    This year, threats to computer networks were front and center. But Glum underscored that the Pentagon has hardware headaches too, particularly when it comes to microprocessors. Ninety percent of the department's obsolescence problems, he said, are related to electronics.

    There's some irony at work here. In the 1950s, as we noted here, the Department of Defense helped get the semiconductor industry up and running by placing big orders for chips for missile guidance systems. In the 1980s, Glum explained, defense applications still accounted for 26% of semiconductor sales.

    The military uses more microelectronics now than ever, but with a cellphone or personal digital assistant in every pocket, it purchases just 0.1% of the world's semiconductors.

    So why is that a problem? Quality is one reason. For fighter jets and other weaponry, the military needs microelectronics, in relatively low volumes, that must function well in severe environments over a period of years (sometimes decades, for systems like the B-52 bomber).

    Phone and other consumer tech manufacturers, by contrast, work in huge volumes and, given rapid product turnover, don't make durability a high priority. Given the military's now tiny market position, microelectronics manufacturers are increasingly less inclined to meet military specifications

    Another issue: the geography of the semiconductor business. "Most of the new, largest, multibillion-dollar plants are now being built in mainland China," said Glum. By 2014, most chip foundries will be found in Asia.

    And that's just the legitimate stuff. Glum also pointed to the counterfeiting largely in China, of high-tech devices, such as routers from Cisco Systems (nasdaq: CSCO - news - people ) and others. In one Chinese village, he noted, Japanese tech giant NEC (nasdaq: NIPNY - news - people ) discovered that counterfeiters had brazenly duplicated an NEC assembly line, complete with fake NEC signage outside. Then there are parts simply harvested from the garbage and put back into tech distribution.

    "What kind of stress have [these parts] been under?" he asked. "Will they work?"

    Glum's warnings sounded all the more ominous when juxtaposed against the views of other ComDef panelists. Marshall Billingslea, the deputy under secretary of the Navy, kicked off the event by underscoring the military's interest in China as an emerging geopolitical power.

    "Many of the investments that we need to make for our Navy and our Marine Corps are going to be shaped by the security environment in the Pacific and in the Asia pacific region," he said.

    On the business side of things, China also came up in a panel discussion featuring executives from Boeing (nyse: BA - news - people ), Lockheed Martin (nyse: LMT - news - people ) and non-U.S. contractors such as BAE Systems (other-otc: BAESF.PK - news - people ) and Finmeccanica. Torkel Patterson, president of international operations at Raytheon (nyse: RTN - news - people ), cast the country not just as a geopolitical threat, but also as a looming business competitor.

    "Tomorrow, I'm really worried about the Russians and the Chinese," he said.

    One way the Pentagon is responding to all this is by getting more involved in chip manufacturing. Based near Sacramento, Calif., is the Defense Microelectronics Activity. That's a group of 100 engineers operating as part of the Pentagon's office of the Director of Defense Research and Engineering. DMEA has set up its own foundry, known as Advanced Reconfigurable Manufacturing for Semiconductors. The idea is to license intellectual property from chip makers, storing the processes used to produce a component (rather than the component itself). That way they can better test and monitor semiconductor quality, and if need be, make the chips themselves.

    "The commercial world won't do it," said Glum. "We will."

  5. #5
    Creepy Ass Cracka & Site Owner Ryan Ruck's Avatar
    Join Date
    Jul 2005
    Location
    Cincinnati, OH
    Posts
    25,061
    Thanks
    52
    Thanked 78 Times in 76 Posts

    Default Re: FBI Fears Chinese Hackers Have Back Door Into US Government & Military Computers

    Chinese Counterfeit Chips Causing Military Hardware Crashes
    Over the past year, US citizens have become increasingly aware of the substandard consumer-level goods flowing out of China, but new reports indicate that the counterfeit products and dubious quality controls are not confined to the consumer sector. An increasingly large number of supposedly military-grade electronic components are turning out to be counterfeit commercial-grade hardware that, in some cases, is decades older than the manufacturing label indicates.

    The problem, to be sure, is not entirely China's fault. Back in 1994 and 1996, the Clinton Administration passed two bills, the Federal Acquisition Streamlining Act (1994), and the Clinger-Cohen Act of 1996 (PDF, originally known as the Information Technology Management Reform Act). Collectively, these two bills were designed to streamline and simplify federal purchasing procedures, as well as allow for the use of commercial off-the-shelf hardware in certain areas. The concepts were sold to the public and Congress as a way to save a tremendous amount of money—rather than designing and implementing its own, custom products at tremendous manufacturing and R&D costs, the government would instead use (or modify) products that were readily available on today's market. That was the idea, anyway, but new reporting from BusinessWeek highlights how these two laws have had long-term unintended consequences.

    One of the unintended consequences of both cutting the Pentagon's budget and encouraging low-cost, off-the-shelf procurement, has been a dramatic decline in the use of authorized resellers and/or parts purchased directly from the manufacturer. Under the new rules, government contractors were explicitly discouraged from designing systems that required the use of expensive, proprietary electronics or processors that would never be widely produced. This left the Pentagon largely unable to fund inefficient, small-scale production runs, and gave electronics manufacturers little reason to produce them.

    Moving the acquisition and sourcing for these parts to China has opened security holes that haven't gone entirely unnoticed. As we covered earlier this year, the Department of Defense is aware that the processors it's acquiring are vulnerable to tampering, since some of them are complex enough to easily conceal trojan horses or backdoor circuitry installed by parties unknown. The DoD plans to launch a program designed to evaluate the best ways to detect circuit-level and chip-level tampering, but results are still years away.

    Keeping China from advancing too far, meanwhile, is still a major concern of the United States. Intel is building a fab plant in Shanghai, but the new facility won't come online with anything like the cutting-edge technology the chip giant deploys in its other facilities. Even allowing Intel to build a facility in Shanghai at all is something of a bend in historical US policy. Current Chinese fabrication technology lags the US by multiple generations, and it's not in our best interest to hand a potential enemy the tools with which we build our own leading-edge equipment.

    The bad parts flowing into the military's hands now aren't being modified in clean rooms; rather, they're being stripped off old boards in China's back alleys, doctored cosmetically, and passed off as new, military-grade components. The difference between true military-grade parts and the commercial-grade chips that are actually shipping out is non-trivial. In many cases, military-grade components are exposed to prolonged environmental stressors that commercial components are not designed to deal with, including extreme fluctuations in temperature and humidity. It's absolutely critical that components remain durable and functional under such conditions, as having the radar on one's F-15 suddenly fail is considered slightly more hazardous than, say, the failure of one's cellular phone.

    Component failure reports from defense contractors worldwide, including Boeing, Raytheon, BAE, Northrop Grumman, and Lockheed, however, suggest that sufficient verification of part authenticity is no longer taking place, and investigations have turned up a significant number of counterfeit parts, sometimes installed in mission-critical systems. The culprit, in this case, is price. In the name of cost-cutting, the federal government has stripped away many of the authorization and authentication procedures that once defined federal purchasing and replaced them with a system that rewards the penny-pincher who can find the cheapest products.

  6. #6
    Postman vector7's Avatar
    Join Date
    Feb 2007
    Location
    Where it's quiet, peaceful and everyone owns guns
    Posts
    21,663
    Thanks
    30
    Thanked 73 Times in 68 Posts

    Default Chinese microchips used to spy on domestic computers

    Chinese microchips used to spy on domestic computers



    22 October 2008
    QUANTICO, Virg. -- American intelligence agencies have discovered what one analyst is calling Manchurian microchips, manufactured in China, that are designed to allow PLA spies to gain access to government, commercial and personal computers.

    Although the accusation sounds almost too sensational to believe, several sources in U.S. intelligence agencies and corporate security consultants have confirmed the basic outlines of the published story. Countermeasures are being taken to diminish the treat to national security computers but the scope of the problem is nearly universal.

    Fortunately, for the rogue microchips to be useful to China, Microsoft source code would need to be pilfered on a regular basis, as it is updated by the corporation, an unlikely scenario. None the less, the discovery sent alarm bells ringing throughout government agencies and corporate boardrooms. As technology becomes pervasive, technology security will become increasingly important to government and commercial entities.

  7. #7
    Postman vector7's Avatar
    Join Date
    Feb 2007
    Location
    Where it's quiet, peaceful and everyone owns guns
    Posts
    21,663
    Thanks
    30
    Thanked 73 Times in 68 Posts

    Default Re: Chinese microchips used to spy on domestic computers

    FAULTY CHIPS COULD CRIPPLE U.S. ATTACK ON IRAN
    by
    William Thomas

    Have “designed-to-fail” microchips set up the United States naval, air and ground units in the Persian Gulf for a disastrous defeat in Bush's looming showdown with Iran? Has a Wal-Mart mentality, and corporate sleight-of-hand fatally undermined the U.S. war machine with microscopic flaws?
    Following this website's revelations of Israel's recent abortive nuclear air strike on Iran, agents of the United States military intelligence community have returned to visit my informant to disclose disturbing developments.
    During their longest and most cooperate briefing to date, the two agents-nicknamed “Bob” and “Dave”-said that they, their government, and major antagonists powers in the Middle East are being manipulated by elements as yet unknown, to the detriment of all involved.

    “Once they found this out, they started asking questions, hoping to defuse a larger issue before it turns into a catastrophe,” explained a trusted source I have come to call “Hank”. During our 15- year collaboration, this combat veteran with a high security clearance has shown himself to be impeccably measured and accurate in his timely revelations. Curious, conscious, careful, and well-connected-as well as technically savvy in computers, chemical warfare and physics, you can take his information to the proverbial bank. And charge interest.

    Throughout our long association, Hank's contacts within U.S. and international military, intelligence, political and religious circles have rarely ruffled his professional aplomb. This time, he was as shaken by his formerly adversarial visitors' plea for his assistance, as he was by their briefing.

    As Hank expressed it, Bob and Dave “felt that they were on the pointed end of a broken, splintered spear repaired with Elmer's glue and then reshaped again. It was a bad day. Bad day. They were not in really good humor. It seems they have had a couple of things crop up they decided to share. Nobody gets more worried about sharing with me than me.”

    When the agents departed 45 minutes later, Hank made a series of calls to check their information. He quickly verified that the United States military's war-fighting capability is undermined by an unfixable flaw.

    PLAYING POKER WITH CHINA'S CHIPS
    It is widely documented that since the secession of America's semiconductor supremacy to Asia, most computer chips supplied for civilian and military use in the United States by corporate giants like AMD, Microsoft, Intel and Motorola are now imported. As Hank was reminded by his visitors, “It's all outsourced”-by U.S. manufacturers to suppliers in Japan, Taiwan and China.

    Electronic components made to military specifications in Taiwan and Japan are good to go. But U.S. military microchip suppliers have in recent years been “sharing components from a single source manufactured over there in the Big C,” Hank learned. And chips manufactured in mainland China for use by the United States military are-surprise!-not OK.

    Regarding the marine assault force, three aircraft carriers and their escorts about to wage war on Iran, Hank was told, “We really don't know which components are installed in U.S. Navy weapons systems.”

    Elements in the U.S. military in touch with Bob and Dave have discovered that Beijing has rigged those decks to insure China's supremacy in any showdown with the United States. This has been accomplished by ensuring that its exported semiconductors used in many U.S. military computer and electronic components-from cellphones to missile warheads, fighter jets, frigates, radars, laptops and carriers-can be either accidentally or purposefully deactivated by a silent and invisible electromagnetic pulse delivered at the start of any future conflict.

    BETTING IN A RIGGED CASINO
    Bob and Dave had returned to Hank's house to ask this army tech with a flair for thinking outside the conventional military mindset how this could have happened.

    The answer is that electronic components made by companies in Taiwan, Japan and the U.S.A. for the U.S. military are often wired with chips made by their subsidiaries in China. By 2005, after nearly a decade of explosive electronics growth, China surpassed the United States to dominate the world IT (information technology) market with annual exports exceeding $180 billion. Foreign firms have driven much of China's growth, with “heavy investment” from U.S. giants like Intel, Motorola and Microsoft.” [International Herald Tribune Dec 12/05]

    Today, China's advanced computer chips run everything from civilian rice cookers to military communications, surveillance, and missile guidance systems. Companies like Semiconductor Manufacturing International and Grace Semiconductor can use lasers to etch circuitry as intricate as an interstate highway network onto nano-thin wafers less than one one-hundredth the width of a human hair. And that was five years ago. According to one online industry publication, Chinese circuitry is now used “in the smallest, fastest and most powerful computer chips in world.” [www.hpcwire.com May 10/02]

    Elecsound Electronics Company is another Chinese manufacturer specializing in semiconductors “widely used in communication, satellites, mobile phone and wireless telephones” assembled by U.S. military suppliers such as Intel and Motorola. Like many Chinese semiconductor firms, Elecsound also supplies Japanese companies such as NEC, Sanyo and Toshiba, which in turn make electronic components for the Pentagon's smartest weapons. [www.made-in-china.com]

    The outsourcing tangle also leads through Taiwan, where companies like ProMos Technologies, Powerchip Semiconductor and Taiwan Semiconductor Manufacturing are exporting “Made In Taiwan” DRAM chips and other components to U.S. firms from their newly built manufacturing plants on mainland China. [IDG News Service Nov 16/06]

    The world's second largest custom chip maker, United Microelectronics no longer sends genuine “Made In Taiwan” chips to the USA. UM was recently fined a wrist-slapping $155,000 by the government of Taiwan for helping to establish an advanced microchip company in China without first gaining Taipei's approval. [IDGNews Service Feb 16/06]

    Not all transfers of chip-making technology to China have been legal. According to the Center for Nonproliferation Studies in Monterey, California, the rapid rise of Shanghai-based Semiconductor Manufacturing International Corporation (SMIC) has involved repeated patent violations and “illegal transfers of technology allegedly originating in Taiwan.” [Asian Export Control Observer Feb- Mar /05]

    Launched in Shanghai in 2000, the Taiwan-invested $1.48 billion SMIC is actually controlled by Beijing, whose mandarins insist on 11 “public relations officers” to keep them informed. SMI has supplied third party Chinese chips to the U.S. military through such recognized suppliers as Motorola.

    Company chairman Yang Yuan Wang is a Chief Scientist of the Microelectronics Research Institute at Beijing University and a fellow of the Chinese Academy of Sciences and The Institute of Electrical and Electronics Engineers. He is also a Chinese government official.
    Motorola sold its $115 million stake in SMIC in February 2005. [US China Economic and Security Review Commission Hearing March 17/06]

    Even more troubling, documents declassified in 2003 show that after the Democratic Party received illegal cash campaign contributions from the Red Army, then-President Bill Clinton signed a November 1996 waiver authorizing the transfer to China of specialized chips needed to wage nuclear war. The high-tech “Chinagate” transfers not only allowed China “to more accurately target American cities with atomic weapons using advanced U.S technology,” as Charles Smith disclosed, but also allowed China to later sell advanced chips back to the U.S. military-rigged with a fatal flaw. [www.newsmax.com Feb 15/07 ]

    A STRATEGIC THREAT
    During the US China Economic and Security Review Commission Hearing held in Washington D.C. last year, John Tkacik, Jr., a Senior Research Fellow in Asian Studies at the Heritage Foundation, pointed to a Defense Science Board report on “High Performance Microchip Supply” issued 13 months before, which called “the strategic threat to the United States” in semiconductors “significant” in two ways:

    1) The globalization of the microchip supply chain is draining production capacity from the United States and in a crisis it would be difficult to ramp up domestic output.

    2) There is a real threat that microchip supplies from overseas-particularly from China-would be untrustworthy; that “opportunities for adversaries to clandestinely manipulate technology used in U.S. critical microelectronics applications are enormous and increasing.”

    Testifying on March 17, 2006 Tkacik went on to remark, “Not only is the Pentagon finding fewer and fewer sources for application specific integrated circuit microchips for highly classified defense applications (such as signals processing, encryption, guidance systems, etc.), but the U.S. military already relies heavily on China for… the bulk of the nervous system of our network-centric warfare doctrine.”

    Pointing to a “global supply-chain” delivering Chinese chips everywhere, Tkacik asked, “How can saying that the United States simply won't buy Chinese-made chips for its military be sufficient? “

    As microcircuitry architecture continues to shrink, becoming “orders of magnitude denser,” this expert warned, “it becomes ever easier to hide lines that serve as Trojan Horse circuit designs, radio-frequency receivers and other 'backdoors' to circumvent encryption, muddle signals, induce data failure”- leaving supposedly “hardened” circuits vulnerable to EMP.

    “Are Chinese semiconductor firms capable of such chicanery?” Tkacik asked the U.S. government panel. “There are already several hundred semiconductor design labs in China-sponsored and paid-for by foreign firms including America's top microchip corporations.” [US China Economic and Security Review Commission Hearing March 17/06]

    BLOWBACK
    Right now, no one serving onboard a U.S. warship, manning a tank, or flying a fighter in the Persian Gulf can know for certain where the microswitches conveying electrical impulses to their communications, surveillance and fire-control systems originate. Or whether they will turn into powder in an EMP.

    In order to harden military electronics against an electromagnetic pulse from a nuclear detonation or directed energy weapon, chips and circuit boards assembled to United States military specifications are not encased in a protective shell. Instead, they are etched with thicker wiring that Hank described as “the equivalent of a 30-amp fuse as thick as your thumb.”
    This thicker circuitry, “reduces reaction time to an electromagnetic pulse by shutting off the circuit faster.”

    Instead of adhering to “milspecs”, my source was informed and has since confirmed that Chinese chips inadvertently used in many U.S. military applications have been booby-trapped with EMP-sensitive circuitry equivalent of a civilian-size “3-amp fuse, the size of a wire in a light bulb.”
    Regardless of it's “dual use” in civilian and military applications, Hank emphasized, “a transistor is a transistor. The U.S. military for example is using essentially the same AMD 64X2 chip being manufactured for civilian use. They say it's shielded. It ain't.”

    While specially-made circuit boards for the helmet-mounted fire-control system in an Apache helicopter are robust enough to be stomped on, the millions upon millions of chips and motherboards permeating high-tech U.S. military equipment-from laptops purchased at the local Circuit City to Patriot missiles supplied by Raytheon-”can't all be tested.”

    The glitch was discovered during a routine rear-area inspection. Technicians working in a shielded “womb” room thought the component they were testing was hardened. But Hank learned from his visitors that when their readouts started blinking, and they were still wondering, “What the heck could have done this?”- monitoring equipment “used across the womb room also went bust.”

    Since those remote monitors were not part of the test, this should not have happened.

    When the alarmed techs ran further experiments, “they found that the A----- brands had that fatal flaw in it,” he related (brand name redacted by this reporter). “They started reverse engineering and breaking it down as best as they could, and they found a fatal flaw in each component.”
    As Hank put it, “Twice is coincidence. Three times is enemy action.”

    DON'T TRY IT
    “We had a 45 minute chat--the longest I've ever talked to either of them. They were forthright. Not exactly scared, but nervous,” Hank recounted.
    Until he frightened them.

    If this goes down, he told the two military agents, the systems you've come to be depend on will bite you in the ass. And then close its teeth. In each instance of sabotage, before the odor of fried electronics clears, “You no longer have an operating system. All the information you had is gone, and any recovery you might want to do is kaput.”

    And there will be no in-theater resupply, he stressed, Even if spare circuit boards are stored in a warehouse “and somebody does this nearby, it's kaput.”

    Responding after further investigation to further queries from this reporter, Hank used slang to reveal his stress when he flatly declared, “The stuff that's 'hardened' ain't. The stuff that's 'safe' ain't.”

    This means that in the event of an attack launched by the United States against Iran, an electromagnetic pulse from a deliberate or accidental nuclear detonation-or from a directed energy weapon manned by Chinese technicians defending their country's interests ashore-will cause many or most American offensive and defensive missile systems to fail to fire, explode on launch, or not detonate on target. Some weapons may even emulate WWII torpedoes and Vietnam-era Sidewinders and boomerang back on the ship, plane or vehicle that launched them.

    “It's a 50-50 coin toss whether you have bad material,” Hank told two very unhappy agents. “There's no way to identify which ones are and which ones are not the problem children. You won't know until you roll.”

    IMPOSSIBLE TO FIX
    Any detonation of Bush's beloved “low yield” bunker-buster, an Iranian nuclear power plant, or shipboard reactor “could deactivate the U.S. Navy,” as Hank put it-along with all other command, control, communications and weapons circuits quietly humming in some forgotten but vital piece of equipment aloft, afloat or alongshore in the Persian Gulf.

    To rig the Trojan chips, “pick a frequency that isn't in nature above 23,000 hertz or below 2 hertz… at power levels only you can produce,” Hank invited. Jackie the sailor would not be able to misdial her sonar and shut down the entire fleet because “the pressure and wattage, as well as the frequency equivalent to an EMP” would be needed to do melt all those microchips. And that “could only come from a nuclear blast,” Hank added.

    Or a pulse weapon. Hank was also informed that if attacked, Chinese technicians in Iran could make every vulnerable circuit within range “melt when hit by a microwave” tuned to their vulnerable frequency.

    If that happens, this military tech added, “You would immobilize the entirety of any response we would have. No radars. No engines to mobilize troops; to supply electricity. We'd be on foot. That's it. Oops!

    Despite rigorous spot-testing of some batches of some Pentagon-purchased microelectronics, the only way to ensure that bad things will not happen to components that have not been microscopically checked is to remove every chip and motherboard in every computer in every ship, aircraft, truck, radio, radar, sonar, cellphone, satellite, toothbrush, laptop and warhead “that everything is soldered onto, and replace it with something else.”

    That cannot be done, Hank continued. “There is quite literally no way to break one of these things open on the nano level” and reverse engineer the millions of micro-traps the Chinese have set. “There's no way to tell if you got it all.”

    Whoever said that a 12,000 year-old civilization was dumb?

    SMOKED
    Is this all hypothetical? Supposedly built to “milspecs”, will much or most U.S. military electronics in the Persian Gulf Theater of Operations cease to function if hit with an electromagnetic pulse?

    The smoking transistor answer is that China has already dramatically demonstrated their capability to fry the best U.S. military microelectronics on-or off-the planet. Just before North Korea tested a nuclear weapon in a “tiny” underground blast on October 9, 2006, Hank confirmed from multiple sources that America's most advanced reconnaissance satellite was immobilized by Beijing.

    According to this well-informed source, “We had no warning” of the North Korean test because “the Chinese took down our look down capability” with a frequency-focused EMP. “And we were going, 'What the fuck just happened?' Nobody knew. Even after it happened nobody knew. Because it leaves no signature.”

    Since “an electromagnetic pulse goes on through and it's gone,” such egregious aggression could not be proven, and was not an act of war.
    It was a wake up call. Because the advanced NSA spy bird-”a little higher than Keyhole 14”-was supposedly “hardened against everything from solar flares to enemy action,” Hank was told.

    “This ain't GE,” he underlined. “The Chinese “have the ability to do this to our equipment. We don't know which equipment. We don't know what frequencies it will fail. It could be frequency A in this component, frequency B in that one, frequency I in that one.”

    In a confrontation in the Persian Gulf or off Taiwan, where another U.S. task force has also been deployed, it will not matter if some “Made In Colorado” hardened chips shut down in time to dodge aimed or accidental pulses. Because complex electronic circuitry is assembled in a cascade-inviting daisy chain, if one microchip fails, even if the other dozen chips connected to that circuit come back online, the device they're directing won't.

    Did someone say, “eject”?

    MÉNAGE A TROIS
    This was not all that was bothering Bob and Dave. “Somebody is behind the scenes. Someone is fomenting this,” they informed Hank. And the highest echelons in the United States government, military and intelligence circles have no idea who they are.

    That hidden agency is not Beijing rulers, who unlike their Washington counterparts, are safeguarding their country's interests by not selling high-tech arms components to a powerful potential enemy. “There is no 'them'. There is no one brand name,” Hank said. “Other people have built the casino and we're showing up to pull the lever.”

    But whoever is operating behind some of this planet's biggest governments and corporations “are getting obvious enough that they're becoming noticed,” Hank went on. “Some elements in military and intelligence circles are starting to notice that there are flaky things happening around them.”

    These oddities involve the three “I's” to the “left, center and right” of the region in question, who appear to be acting in potentially calamitous concert. Hank's visitors and their friends are seeing “a ménage a trois,” he explained. They're seeing all three “I” countries “doing the same thing in the same way, with the same people at the same time-moving their pieces in on the chessboard the same way, procuring things on the market in the same way. But they don't talk to each other.”

    “They're going to butt heads over this,” I interjected.

    “All three are being directed to do this,” my informant confirmed. “We don't know who's doing the directing.”

    TIP TOP
    The twins were freaking out because they had always believed that they and their government were “at the top of the food chain,” Hank saw. “Bob and Dave, they thought they were autonomous-you know, the men in black kind of thing. They know who signs their check, and who signs their check, and who signs the checks above them.

    “Then they come to find out that there's somebody who doesn't need a fuckin' paycheck! When you think you're king shit of the hill, and then you find out, not so much-that's what unnerved them to the point that they came to me.”

    Which is “scarier than heck,” Hank stated. “You haven't seen that high yet. And you don't want to see that high. But you know that somebody else turns the knob, and it's not you. The twins don't have a clue of who they might be, which made them exceedingly nervous. This goes beyond borders, beyond any political system with an 'ism' after it; beyond religion,” added this former Jesuit novitiate who chose to take different orders.

    “These are the people who have ascended past that, a behind-the-scenes cabal bunch of people. Bilderberger doesn't come close to touching the folks I'm talking about. These are people the Masons don't know about. They thought up the idea to put out the Masons and the Knights Templar to go forth and fight other groups. These are the guys who are doing that.”
    And because they have “no building, no signs, no designator, no name tag, they are totally autonomous, outside the realm,” he said. “When you get to the point where you actually see the shadow of the person behind the curtain, it's should you run or not? How do you approach something like that? It's kind of like waking up one day and finding that you really are in the fuckin' matrix.”

    FREE FOR ALL
    “This will be the first time our military will be going up against an already established nuclear power,” Hank added, referring to a Persian country that received shipments of nuclear bomb-making software and material from Saddam's disaffected Shiite generals in 1991. These facts are presented in a U.S.-intelligence document that Hank had recently arranged to be put into the hands of his Commander-In-Chief.

    A twice unelected president who deserted the ranks when mandatory urine tests were instituted might also benefit from hearing Hank's expert assessment of his “Iraq The Sequel” plan to pulverize Persia:
    “They're going to cap our asses.”

    What is scaring Hank, his newfound allies, and many American admirals and generals is that when the chips are literally down in the Persian Gulf, “it's going to be a free for all. Once the fatal flaw is exploited, that may tip over the other hands that have to be played,” Hank warned.

    The momentum toward catastrophe is not just coming from Washington, he underlined. It's being instigated regionally, “in multiple positions and growing toward each other. That's worse. It's not just one idiot with a match. Here everyone is playing with their inner child. And their inner is plaything with matches… If one starts something, they're all going to get into it.”

    THE CHERNOBYL FACTOR
    Hank no longer talks about the U.S. Navy being ordered to provoke potshots from an Iranian patrol boat in another “Gulf of Tonkin kind of thing.” He is more worried about Teheran's “sacrificial” nuclear power plant tethered at an-Bushehr.

    “If something happened in our country-Three Mile Island, all these near-misses, and we supposedly know what we're doin'-if we can have something like that happen, what about them?” he asks. “They're running these things balls-to-the-wall, without adequate shielding. We run a pile at 60-70% capacity. They run theirs at 95% and above.

    “You will see some corners being cut. That can lead to a lot of wear and tear. Your crews are gonna be bone dead tired. The possibility of a mistake is going to be increased exponentially. The number of people cleared security-wise will be at a minimum… These guys don't run with dosimeters. 'You die-you had too much.' That's pretty much how they run it.”

    This is why the mullahs in Teheran built their biggest reactor on the other side of massive mountains, Hank points out. Unless they also want their enemies to take a shot at it.

    TRAINED SEALS
    In one scenario being actively considered by America's self-described “war president,” the U.S. military is prepared to “render assistance” after Navy SEALS swim ashore “and cause a light-water reactor accident” at an-Bushehr.
    In the ensuing uproar, American forces would enter Iran, insisting, “Oh, we're just here to help,” As Hank described it, taking over that reeling and radioactive country without firing a shot.

    “That scenario is one on the board,” Hank confirmed. “But that would fry all of our equipment, while we're thinking 'we're hardened, we're good to go.' Every ship out there out on the water, every boat bobbing around, every aircraft that we had up there at the time would be rendered suddenly inert. That could start alot of other things happening that weren't supposed to happen until the time is right.”

    BULLET STOPPERS

    Bush's looming attack on Iran also bothers Bob and Dave “greatly, for a specific reason,” Hank went on. “They're still in uniform. You've got the bullet stoppers in the first wave. And the nervous bullet stoppers in the second wave. And the 'I saw it on the news and I don't want to go' bullet stoppers in the third wave. That's Bob and Dave. We've got people who played X-box and Ghost Recon a couple of times, and they will be the tactical commanders. Because they will have lost that many people by that point.”

    With vaunted American firepower reduced to assault rifles and bayonets, Iran will employ human-wave attacks using barefoot teenage conscripts packed with as many IEDs as have not yet been exported to their Shiite brethren in Baghdad. “And they will win by attrition.”

    Hank agreed with me that after Putin's recent “America must be stopped” remarks, and Bush's humiliating and costly eviction of China from its major oil investments in Iraq into even heavier infrastructure capitalization in Iran-neither superpower is going to allow the United States to “put a stranglehold” on them by once again controlling Iran's oil.

    While crippling anti-U.S. sanctions could be one response to further White House aggression, Russia and China have recently held joint military maneuvers in a region jammed to its madrasa rafters with devout Muslims who consider Iran second in importance to their faith only to Mecca.

    SHOCKED AND AWED
    “If we do in any way, shape or form precipitate a movement, if the U.S. decides to carry on cranky and do this,” or “if by accident something happens and goes pfft… pretty much everything in the Persian Gulf would go lights down.

    “Picture unplugging everything in the region where we have deployed the majority of our capability. It's as if someone has rigged your home security to fail if subjected to a sudden noise, he instructed. “If it comes down to we get into a fight… you never knew that the entire system could be deactivated by someone clapping their hands twice-dark!”

    With so many chips being called, the biggest shock, Hank and his visitors foresaw, would come when all military players in the Gulf simultaneously lose “the illusion of control.” With almost all communications and surveillance systems suddenly blacked out, each side might panic.

    Operating under the most militarily basic “use it or lose it” imperative, rival powers would find that their most destructive weaponry located beyond the range of an EMP in the Gulf would remain devastatingly functional.

    Fearing that Iran had deployed a secret weapon, “that 'I' county far to the left might freak out and act independently,” Hank predicted. Israel's leaders could rush into launching nuclear air strikes on their Persian adversary. Or they might choose to detonate by remote command ex-Soviet MIRV missile warheads previously obtained on the black market and infiltrated into Iran via two-man submarines crossing the Caspian Sea.

    Back in the USA, panicked neocons who have never been near a battlefield might launch “an ICBM response.”

    COVER UP

    While the world wonders why the American people and their elected representatives are allowing one delusional individual to precipitate a war that in its very mildest outcome will derail life as we've known it, Hank protests that his brothers and sisters in arms “are being set-up.”
    Say again?

    “Nobody in the field knows this!”

    His composure slipping for the first time, Hank tersely explained that no one deployed to the Gulf has been informed that their communications, surveillance and weapons systems have been rigged to fail just when needed most.

    “The folks that tested this stuff… are really upset about this,” he told me. “But what do you do?”

    The brass never wants to hear news as bad as this. Look at the “dusty agent” report on the chemical agents sold by the U.S. government to Saddam Hussein to kill Iranian child conscripts. Those gory findings were written and disseminated in '88 and '89. Yet during Desert Shield in 1991, unsuspecting American troops massing at al-Jubayl got badly bitten by Iraqi Scuds and aircraft-delivering those same sarin, mustard and other dusty agents. More than 200,000 veterans are still sick, and so far more than 15,000 have died.

    “Depleted Uranium is the same thing,” Hank noted. Google the “Z Memo” and read about the U.S. Army's early cover-ups of a weapon that poses an extreme daily radiation hazard to U.S. troops-and to hundreds of thousands of unenlisted civilian wombs in places like Afghanistan, Kosovo, the USA, and Iraq.

    So forget the rear-echelon REMFS coming clean on the Chinese chips.
    “We are a military HMO, and we are being triaged,” Hank said, with the inflection of an incoming HEAT round. As people safely in the rear “are realizing the cost in PR, the cost in money, and the cost in time and embarrassment to fix what we won't even acknowledge is a problem.”

    NOW WHAT?
    As all GIs learn, and this former U.S. Navy Reservist once acted on, “one of the first things we were told is how to recognize an illegal order,” Hank hinted.

    “And I presume that Bush qualifies?”

    “Oh, dude…”

    Loyalty is commendable. But as Hank expressed it in typically blunt GI-speak, “A person's delusions will make them do some weird shit.” And blind obedience to someone shadow-boxing his shadow side reduces us to the same insanity.

    “What are we getting so bent out of shape about?” Hank demanded. With its young and modern population hungry for roles as women and men in the wider world, Iran is another bogus “threat” put forward by Bush and Co. to distract knee-jerk consumers of carefully managed “news” from far greater threats posed by their own government at home.

    “It's a construct for us to rally around. How stupid is that?” my uniformed informant asked on behalf of his colleagues. “We're so polarized-'You have to choose one team or the other.' No I don't. Choosing gives them power over me. And limits all my other options.”

    The good news is that high-ranking members of the U.S. military and intelligence community are coming to understand, that “our beating our heads against each other is working to somebody else's agenda. And that agenda doesn't take any one of us into account. So how about we stop cooperating with it?” Hank says. “Survival of the species, that is what is on the stick. It literally is.”

    http://www.willthomasonline.net/will...lty_Chips.html

  8. #8
    Expatriate American Patriot's Avatar
    Join Date
    Jul 2005
    Location
    A Banana Republic, Central America
    Posts
    48,612
    Thanks
    82
    Thanked 28 Times in 28 Posts

    Default Re: Chinese microchips used to spy on domestic computers

    I can't believe that this could POSSIBLY be true.... you know all the Liberals out there say how good th Chinese are.

    So this CAN't be true, right?
    Libertatem Prius!


    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.




  9. #9
    Creepy Ass Cracka & Site Owner Ryan Ruck's Avatar
    Join Date
    Jul 2005
    Location
    Cincinnati, OH
    Posts
    25,061
    Thanks
    52
    Thanked 78 Times in 76 Posts

    Default Re: FBI Fears Chinese Hackers Have Back Door Into US Government & Military Computers

    Dangerous Fakes
    How counterfeit, defective computer components from China are getting into U.S. warplanes and ships

    The American military faces a growing threat of potentially fatal equipment failure—and even foreign espionage—because of counterfeit computer components used in warplanes, ships, and communication networks. Fake microchips flow from unruly bazaars in rural China to dubious kitchen-table brokers in the U.S. and into complex weapons. Senior Pentagon officials publicly play down the danger, but government documents, as well as interviews with insiders, suggest possible connections between phony parts and breakdowns.

    In November 2005, a confidential Pentagon-industry program that tracks counterfeits issued an alert that "BAE Systems experienced field failures," meaning military equipment malfunctions, which the large defense contractor traced to fake microchips. Chips are the tiny electronic circuits found in computers and other gear.

    The alert from the Government-Industry Data Exchange Program (GIDEP), reviewed by BusinessWeek (MHP), said two batches of chips "were never shipped" by their supposed manufacturer, Maxim Integrated Products in Sunnyvale, Calif. "Maxim considers these parts to be counterfeit," the alert states. (In response to BusinessWeek's questions, BAE said the alert had referred erroneously to field failures. The company denied there were any malfunctions.)

    In a separate incident last January, a chip falsely identified as having been made by Xicor, now a unit of Intersil in Milpitas, Calif., was discovered in the flight computer of an F-15 fighter jet at Robins Air Force Base in Warner Robins, Ga. People familiar with the situation say technicians were repairing the F-15 at the time. Special Agent Terry Mosher of the Air Force Office of Special Investigations confirms that the 409th Supply Chain Management Squadron eventually found four counterfeit Xicor chips.

    Threat Of Espionage

    Potentially more alarming than either of the two aircraft episodes are hundreds of counterfeit routers made in China and sold to the Army, Navy, Air Force, and Marines over the past four years. These fakes could facilitate foreign espionage, as well as cause accidents. The U.S. Justice Dept. is prosecuting the operators of an electronics distributor in Texas—and last year obtained guilty pleas from the proprietors of a company in Washington State—for allegedly selling the military dozens of falsely labeled routers, devices that direct data through digital networks. The routers were marked as having been made by the San Jose technology giant Cisco Systems (CSCO).

    Referring to the seizure of more than 400 fake routers so far, Melissa E. Hathaway, head of cyber security in the Office of the Director of National Intelligence, says: "Counterfeit products have been linked to the crash of mission-critical networks, and may also contain hidden 'back doors' enabling network security to be bypassed and sensitive data accessed [by hackers, thieves, and spies]." She declines to elaborate. In a 50-page presentation for industry audiences, the FBI concurs that the routers could allow Chinese operatives to "gain access to otherwise secure systems" (page 38).

    It's very difficult to determine whether tiny fake parts have contributed to particular plane crashes or missile mishaps, says Robert P. Ernst, who heads research into counterfeit parts for the Naval Air Systems Command's Aging Aircraft Program in Patuxent River, Md. Ernst estimates that as many as 15% of all the spare and replacement microchips the Pentagon buys are counterfeit. As a result, he says, "we are having field failures regularly within our weapon systems—and in almost every weapon system." He declines to provide details but says that, in his opinion, fake parts almost certainly have contributed to serious accidents. When a helicopter goes down in Iraq or Afghanistan, he explains, "we don't always do the root-cause investigation of every component failure."

    While anxiety about fake computer components has begun to spread within the Pentagon, top officials have been slow to respond, says Ernst, 48, a civilian engineer for the military for the past 26 years. "I am very frustrated with the leadership's inability to react to this issue." Retired four-star General William G.T. Tuttle Jr., former chief of the Army Materiel Command and now a defense industry consultant, agrees: "What we have is a pollution of the military supply chain."

    Much of that pollution emanates from the Chinese hinterlands. BusinessWeek tracked counterfeit military components used in gear made by BAE Systems to traders in Shenzhen, China. The traders typically obtain supplies from recycled-chip emporiums such as the Guiyu Electronics Market outside the city of Shantou in southeastern China. The garbage-strewn streets of Guiyu reek of burning plastic as workers in back rooms and open yards strip chips from old PC circuit boards. The components, typically less than an inch long, are cleaned in the nearby Lianjiang River and then sold from the cramped premises of businesses such as Jinlong Electronics Trade Center.

    A sign for Jinlong Electronics advertises in Chinese that it sells "military" circuitry, meaning chips that are more durable than commercial components and able to function at extreme temperatures. But proprietor Lu Weilong admits that his wares are counterfeit. His employees sand off the markings on used commercial chips and relabel them as military. Everyone in Guiyu does this, he says: "The dates [on the chips] are 100% fake, because the products pulled off the computer boards are from the '80s and '90s, [while] customers demand products from after 2000."

    BusinessWeek traced the path of components from Guiyu to BAE Systems Electronics & Integrated Solutions in Nashua, N.H. The company's confidential reports to the Government-Industry Data Exchange Program were critical to this research. A unit of BAE's $15 billion U.S. division, the electronics operation makes a variety of sophisticated equipment, ranging from missile-warning systems for fighter jets to laser-targeting devices for snipers. It has reported far more counterfeiting incidents than its rivals: 45 over the past three years. Industry executives say that large figure may reflect BAE's candor or its aggressive pursuit of low-priced chips from China. The Justice Dept. is investigating BAE's military electronic-parts procurement, a company spokesman confirmed.

    In a statement, the company said that it "has attempted to pursue the origin of components provided through the supply chain, [but] has no further insight, nor certification to the origins of components that are provided by supply-chain distributors." Only a "small percentage" of its parts have turned out to be counterfeit, BAE said. It now has restricted its purchases to original chipmakers and their approved distributors "except in very limited circumstances," such as when it needs a hard-to-find component.

    BAE isn't unique. Other contractors that have reported counterfeit microchips to GIDEP include Boeing (BA) Satellite Systems, Raytheon (RTN) Missile Systems, Northrop Grumman (NOC) Navigation Systems, and Lockheed Martin Missiles & Fire Control. The companies all said they take the threat of counterfeits seriously but wouldn't comment on specific incidents.

    The flood of counterfeit military microelectronics results largely from the Pentagon's need for parts for aging equipment and its long efforts to save money. In the mid-1990s, after the collapse of the Soviet Union, the Clinton Administration launched an initiative, continued during the Bush years, of buying all sorts of components off the shelf. In addition to the traditional pattern of purchasing equipment from original manufacturers and their large, authorized distributors, the Pentagon began doing business with smaller U.S. parts brokers that sprang up to offer low-cost items, including microchips. Federal affirmative-action goals have further encouraged the military to favor suppliers that qualify as "disadvantaged." The chips wholesale for as little as 10 cents and as much as $2,000 each, depending on their complexity and quality. The Pentagon spends about $3.5 billion a year on spare chips, many of them for planes and ships that are 10 or 20 years old.

    Name-brand manufacturers and well-established distributors, some of which acquire the rights to make obsolete chips, say they mark up prices 10% to 30%. Smaller brokers settle for far less generous margins. The number of small brokers increased sharply after 1994, when Congress stopped requiring government contractors to certify that they were either original manufacturers or authorized distributors. The brokers have to obtain a contractor code but receive little or no oversight. Hundreds are now operating, some out of suburban basements and second bedrooms. A BusinessWeek analysis of a contracting database identified at least 24 active brokers that list residential homes as their place of business. Several have won chip contracts for "critical applications," which the Pentagon defines as "essential to weapon system performance...or the operating personnel." In many cases these entrepreneurs comb Web sites such as brokerforum.net and netcomponents.com, which connect them with traders in Shenzhen and Guiyu. The brokers sell either directly to Pentagon depots or via suppliers to defense contractors such as BAE.

    On A Quiet Street

    Mariya Hakimuddin owns IT Enterprise, a company she runs with her mother out of a modest one-story house in Bakersfield, Calif. Rosebushes line the street, and a basketball hoop hangs in the driveway. Hakimuddin, who is in her 40s, says she has no college education. She began brokering military chips four years ago, after friends told her about the expanding trade. Since 2004 she has won Pentagon contracts worth a total of $2.7 million, records show. The military has acquired microchips and other parts from IT Enterprise for use in radar on the aircraft carrier USS Ronald Reagan and the antisubmarine combat system of Spruance-class destroyers.

    Hakimuddin says she knows little about the parts she has bought and sold. She started her business by signing up on the Internet for a government supplier code. After the Defense Dept. approved her application, with no inspection, she began scanning online military procurement requests. She plugged part codes into Google (GOOG) and found Web sites offering low prices. Then she ordered parts and had them shipped directly to military depots. "I wouldn't know what [the parts] were before I'd order them," she says, standing near her front door. "I didn't even know what the parts were for."

    The Navy's Ernst became concerned about IT Enterprise in March 2007. His team found a suspicious transistor—a basic type of microchip—supplied by the firm for use in the AV-8B Harrier, a Marine Corps fighter jet. The transistor, which turned up during an inspection of a military depot in Cherry Point, N.C., was supposed to contain lead in its solder joints, but didn't. That defect could cause solders to crack and the flight control system to fail, Ernst explains. When a member of the team telephoned IT Enterprise in Bakersfield, he heard children chattering in the background, Ernst recalls. "It was the 'Aha!' moment for me on counterfeit parts," he says.

    Unknown to Ernst, a separate Defense inquiry later found that at least five shipments from IT Enterprise since 2004 had contained counterfeit microcircuits, including those intended for the USS Ronald Reagan, according to Pentagon records. During her interview with BusinessWeek, Hakimuddin denied any wrongdoing and blamed her suppliers, but she wouldn't name them. In January the Defense Dept. banned IT Enterprise, Hakimuddin, and her mother, Lubaina Nooruddin, from supplying the military for three years.

    The Hakimuddins weren't deterred. A month after Mariya was barred, her husband, Mukerram, received his own supplier code, using the same home address with a new company name, Mil Enterprise. This time the Pentagon caught on more quickly, banning Mukerram for three years as well. He couldn't be reached for comment. People familiar with the matter say the Defense Criminal Investigative Service is looking into IT Enterprise.

    In written responses to questions about kitchen-table brokers, officials at the Defense Supply Center in Columbus, Ohio—a major Pentagon electronic-parts buyer—said they don't inspect brokers or conduct background checks. "The law does not prohibit" work-at-home brokers or using the Internet to find parts, the officials said. "Is there risk? Yes, there is risk," Brigadier General Patricia E. McQuistion, the center's commander, says in an interview. She estimates that "less than one-quarter of 1% of what we buy is compromised."

    Rule Change

    Nevertheless, after BusinessWeek's inquiries, the center in August issued new contracting rules for microchips. Suppliers now must document the "conformance" and "traceability" of chips when they place bids. Previously such records didn't have to be filed at the bidding stage and were sometimes missing or faked, industry and government officials say.

    Even after the likes of IT Enterprise are identified, it can take time to clean up the mess. On Feb. 5, 2008, a manager at Tobyhanna Army Depot, the Pentagon's largest electronics maintenance facility, in Stroud Township, Pa., notified the supply center in Columbus that his unit had discovered counterfeit chips supplied by IT Enterprise for use in global positioning systems on F-15 fighters, according to internal Pentagon e-mails reviewed by BusinessWeek. The e-mails show that, as late as July, the Columbus center was still trying to locate parts purchased from IT Enterprise.

    In a July 24 e-mail, an F-15 engineer, whom BusinessWeek agreed not to identify, wrote: "Suppose that a part like that makes it onto a flight-critical piece of hardware or mission-essential piece of hardware. The[re] is a very good chance that the part may work...but what happens at 40[,000] ft and -50 degrees? Hardware failure. Not good."

    Ernst says the Hakimuddin episode helped him realize how blind the military has been: "We don't know how big the counterfeit problem is, and, to me, that is irresponsible." Now he's trying to get others in the bureaucracy to confront what he considers to be a crisis: "The risk of counterfeiting is so high, and the cost to our weapon systems is so great, that we need to take action." Glenn Benninger, a senior civilian engineer at the Naval Surface Warfare Center in Crane, Ind., concurs: "Counterfeiting has literally exploded over the last few years, but not a lot of people have been paying attention."

    The pending investigations could force the Defense Dept. to heed such warnings. In addition to the Justice Dept.'s probe of BAE, there is the Pentagon's in-house criminal inquiry. "The DoD takes this threat very seriously," John J. Young Jr., Defense Under Secretary for Acquisition, Technology, and Logistics, said in a statement. "This security threat will require great vigilance by DoD to defeat, but we will do everything within our power to do so."

    Policies aimed at promoting "disadvantaged" businesses have apparently encouraged dealings with brokers that otherwise might seem questionable. Federal affirmative-action goals require the Pentagon to seek to make 22% of its purchases from small contractors—as measured by staff and revenue—including those run by women, military veterans, or members of certain ethnic minority groups. A contracting database refers to IT Enterprise as a "Subcontinent Asian American Owned Business." Hakimuddin wouldn't discuss her ethnicity but says she was born in the U.S.

    Daniel Spencer designated his wife, Brenda, as the legal owner of his brokering business, BDS Supply. "I thought we'd get some kind of benefit [from being woman-owned]," says Spencer, 54, who acknowledges that he runs the company with his wife. Working from home in Great Falls, Mont., he says, he buys from legitimate suppliers and has parts shipped to him before sending them on to the Pentagon. But he admits that, despite a background in computers, he doesn't have the expertise to identify fake chips. Promod Dubey, who runs Phoenix Systems Engineering, a broker in Lake Mary, Fla., complains that military procurement offices "want the cheapest possible s--t they can get." Dubey, who lists Phoenix as a "small disadvantaged" business on Pentagon documents, says he acquires parts from China only as a "last resort" because "sometimes the quality is questionable." Neither he nor Spencer has been accused of impropriety in their military work.

    Contractor reports to the GIDEP counterfeits database show a total of 115 incidents over the past six years. But "everybody believes the [GIDEP] reports are just the tip of the iceberg," says Brian Hughitt, manager of quality assurance for NASA. Hughitt says that, during testing, NASA inspectors have identified two shipments of counterfeit chips in the past 18 months. One lot was installed in flight hardware. "That's something that is going to be launched into space," Hughitt says, declining to elaborate. "It could have been real bad." NASA, which helps launch military satellites and missiles, is investigating the shipments.

    Tracking The Connection

    To understand the counterfeiting phenomenon, BusinessWeek independently traced four incidents of phony parts that BAE Systems reported to GIDEP. The circuitous trails all led back to China, as did those of at least six other BAE incidents that BusinessWeek did not investigate in detail.

    In April 2007 BAE reported receiving fake military-grade chips purportedly made by Philips Semiconductor for undisclosed weapon systems. A production date stamped on the supposedly military-grade chips identified them as having been made in 1998. But NXP Semiconductors, a unit spun off from the Dutch company Philips two years ago, confirms that it stopped making military-grade chips in 1997.

    BAE bought the chips from Port Electronics, a Salem (N.H.) distributor. Robert W. Wentworth, a vice-president at Port, says in an interview that BAE asked his firm to find a series of older microchips to avoid a redesign of weapon systems "that would have cost [BAE] millions." He declines to specify the weapons but adds: "These people [at BAE] were desperate to find the parts."

    BAE said in a statement that, after discovering the counterfeits in 2007, it "immediately ceased" using all independent chip brokers, including Port. Following a careful review, BAE added, it again began buying certain products from Port, which it described as a "small disadvantaged and disabled veteran-owned business." Without commenting directly on Wentworth's account, BAE said that redesigning older weapon technology is expensive and that it sometimes makes more economic sense to seek "small quantities of the original parts."

    Port obtained the fake Philips chips from another distributor, Aapex International, in Salem, Mass. Aapex had purchased the components from Hong Kong Fair International Electronics in Shenzhen, according to BAE documents. A brochure provided by Hong Kong Fair at its office on the 15th floor of a well-kept commercial building says it enjoys "a good relationship and faithful partnership" with Aapex. Jiang Hongyan, 43, Hong Kong Fair's export manager, says in an interview that her company never tests the microchips it supplies and rarely knows anything about the companies from which it buys. "We are a trading company," says Jiang, who wears red-rimmed glasses and uses the English name "Snow." She adds: "We buy goods with one hand and sell them with the other hand. We do not have any capability to do research, production, or modifications."

    Supplier Warnings

    The owner of Aapex, Marie Gauthier, says her company purchased chips from Hong Kong Fair only once. She says she doesn't know anything about the brochure in which Hong Kong Fair boasts of its "faithful partnership" with Aapex. She says she made chip sales worth $2 million to Port Electronics between 1999 and 2007. "Ninety-nine percent of it was for BAE," she says. BAE engineers regularly contacted Aapex in their search for older, hard-to-find chips, Gauthier says. She told the defense contractor she was buying parts from China. "We notified BAE that this was high-risk," says Gauthier. "They begged us because they said they needed the product." E-mail exchanges, reviewed by BusinessWeek, confirm that Aapex repeatedly warned Port and BAE about parts from China.

    Gauthier says BAE and Port no longer buy from Aapex. "I got thrown under the bus by BAE," she says. "They did not want to take responsibility, so they pointed at us." BAE declined to comment on her assertion or on the e-mail exchanges.

    Hong Kong Fair bought the fake Philips chips from the Guiyu Electronics Market, according to the BAE documents. No specific vendor is listed in BAE's GIDEP report. At Jinlong Electronics Trade Center in Guiyu, proprietor Lu Weilong says he could easily supply many types of military-grade chips, including those acquired for BAE. As he speaks, he turns to a PC in the back of his cluttered store and types military part numbers into Google to see from which kinds of circuit boards they can be extracted. "I have the circuit boards at home," he says confidently.

    Some Chinese parts providers appear to have set up front companies in the U.S. and sell to brokers that supply the U.S. defense industry. JFBK of Fullerton, Calif., seems to be one such Chinese affiliate. The company is identified in GIDEP documents from this past June as having provided chips to North Shore Components, a distributor in Bellport, N.Y. The chips, typically used in the FA-18 fighter and E-2C Hawkeye surveillance plane, were supposed to have been made by National Semiconductor (NSM) in Santa Clara, Calif., but they turned out to be counterfeits of only commercial grade, according to North Shore's report to GIDEP. North Shore Vice-President Joseph Ruggiero says in an interview that his company found JFBK on the chip-trading Web site NetComponents.

    JFBK's office in a strip mall in Fullerton is a single small room that also houses two other companies: MeiXin Technologies and New World Tech, both chip brokers. JFBK's Web site describes a "knowledgeable and friendly staff" with "years of collective experience and professional support." One afternoon in mid-July, four women and a man, who all appeared to be in their 20s, sat at desks with small signs tacked above them bearing the names of the three companies. The employees answered the phone on each desk with the name of the company designated on the card. Asked about microchip sales, one young woman, who declined to give her name, said: "We're not allowed to talk about what we do."

    According to the California Department of Corporations, JFBK and New World have been "dissolved" as legal entities since 2000. MeiXin is still listed as active. Public records identify a woman named JianJu Cho as the agent for JFBK. Reached by phone while on vacation in Florida, Cho said neither she nor her staff knows much about microchips. "I don't have any knowledge about electronic components," said Cho. "All the things just depend on what our supplier tells us." Cho says the owners of JFBK and MeiXin are "a couple from China and a man from Taiwan. MeiXin and JFBK [are from] China; New World is from Taiwan."

    A company called Tongda MeiXin Electronics operates on the 15th floor of an office building in Shenzhen. Under the MeiXin nameplate is another sign that states, in Chinese, "JFBK Shenzhen office." Asked about the relationship between JFBK and Tongda MeiXin, Wang Tong, general manager of MeiXin, says: "We are their supplier." Wang, 27, says JFBK probably didn't appreciate that the purportedly military-grade chips supplied to North Shore were counterfeit because neither MeiXin nor JFBK knows where the product came from. "They don't understand the technology," says Tong. "They only do trade. None of us understand the technology."

    Wayne Chao, secretary general of the China Electronics Purchasing Assn., based in Shenzhen, admits that microchip counterfeiting is rife in China: "It's widespread, and we acknowledge that." Asked why Chinese officials don't shut down the blatant counterfeiting, he says: "Everyone wants to blame China. But it's difficult to differentiate between a legitimate product and a fake."

    U.S. chipmakers say it is not their job to police a disorderly global marketplace, although some companies are at least trying to assess the challenge. John Sullivan, vice-president for worldwide security at Dallas-based Texas Instruments (TXN), has traveled to chip markets in Shenzhen to photograph allegedly counterfeit stockpiles and label-printing machines.

    U.S. Customs & Border Protection officials at American ports have seized eight shipments of fake military-grade chips purportedly made by Texas Instruments in the past three years, according to GIDEP records. Sullivan says Pentagon representatives have met with TI and other chipmakers. "They're not seeing it as just an economic problem; they're seeing it as a problem that could affect national security and health and safety," he says.

    Major chipmakers blame the Pentagon and its practice of buying from small brokers for the spread of counterfeit military-grade chips. "We've been telling people [at Defense] for 10 years to buy only from us or our authorized distributor," says Chuck Mulloy, a spokesman for Intel (INTC). "The military is slavishly following the low-cost paradigm but not following the idea of checking the quality as well."

    Hong Kong Fair's Jiang, the alleged supplier of counterfeit chips to BAE, argues that if the U.S. military wants guaranteed high-quality chips, it should purchase them directly from the original manufacturers or their official franchisees. "Why do you come to China to buy it? You know that these things in China are cheap," Jiang says. "Why are they cheap? They have problems with quality."

    For a video tour of a microchip bazaar in China where counterfeits are sold, go to www.businessweek.com/go/tv/counterfeit

  10. #10
    Creepy Ass Cracka & Site Owner Ryan Ruck's Avatar
    Join Date
    Jul 2005
    Location
    Cincinnati, OH
    Posts
    25,061
    Thanks
    52
    Thanked 78 Times in 76 Posts

    Default Re: FBI Fears Chinese Hackers Have Back Door Into US Government & Military Computers

    Chinese Counterfeit Chips Causing Military Hardware Crashes
    Over the past year, US citizens have become increasingly aware of the substandard consumer-level goods flowing out of China, but new reports indicate that the counterfeit products and dubious quality controls are not confined to the consumer sector. An increasingly large number of supposedly military-grade electronic components are turning out to be counterfeit commercial-grade hardware that, in some cases, is decades older than the manufacturing label indicates.

    The problem, to be sure, is not entirely China's fault. Back in 1994 and 1996, the Clinton Administration passed two bills, the Federal Acquisition Streamlining Act (1994), and the Clinger-Cohen Act of 1996 (PDF, originally known as the Information Technology Management Reform Act). Collectively, these two bills were designed to streamline and simplify federal purchasing procedures, as well as allow for the use of commercial off-the-shelf hardware in certain areas. The concepts were sold to the public and Congress as a way to save a tremendous amount of money—rather than designing and implementing its own, custom products at tremendous manufacturing and R&D costs, the government would instead use (or modify) products that were readily available on today's market. That was the idea, anyway, but new reporting from BusinessWeek highlights how these two laws have had long-term unintended consequences.

    One of the unintended consequences of both cutting the Pentagon's budget and encouraging low-cost, off-the-shelf procurement, has been a dramatic decline in the use of authorized resellers and/or parts purchased directly from the manufacturer. Under the new rules, government contractors were explicitly discouraged from designing systems that required the use of expensive, proprietary electronics or processors that would never be widely produced. This left the Pentagon largely unable to fund inefficient, small-scale production runs, and gave electronics manufacturers little reason to produce them.

    Moving the acquisition and sourcing for these parts to China has opened security holes that haven't gone entirely unnoticed. As we covered earlier this year, the Department of Defense is aware that the processors it's acquiring are vulnerable to tampering, since some of them are complex enough to easily conceal trojan horses or backdoor circuitry installed by parties unknown. The DoD plans to launch a program designed to evaluate the best ways to detect circuit-level and chip-level tampering, but results are still years away.

    Keeping China from advancing too far, meanwhile, is still a major concern of the United States. Intel is building a fab plant in Shanghai, but the new facility won't come online with anything like the cutting-edge technology the chip giant deploys in its other facilities. Even allowing Intel to build a facility in Shanghai at all is something of a bend in historical US policy. Current Chinese fabrication technology lags the US by multiple generations, and it's not in our best interest to hand a potential enemy the tools with which we build our own leading-edge equipment.

    The bad parts flowing into the military's hands now aren't being modified in clean rooms; rather, they're being stripped off old boards in China's back alleys, doctored cosmetically, and passed off as new, military-grade components. The difference between true military-grade parts and the commercial-grade chips that are actually shipping out is non-trivial. In many cases, military-grade components are exposed to prolonged environmental stressors that commercial components are not designed to deal with, including extreme fluctuations in temperature and humidity. It's absolutely critical that components remain durable and functional under such conditions, as having the radar on one's F-15 suddenly fail is considered slightly more hazardous than, say, the failure of one's cellular phone.

    Component failure reports from defense contractors worldwide, including Boeing, Raytheon, BAE, Northrop Grumman, and Lockheed, however, suggest that sufficient verification of part authenticity is no longer taking place, and investigations have turned up a significant number of counterfeit parts, sometimes installed in mission-critical systems. The culprit, in this case, is price. In the name of cost-cutting, the federal government has stripped away many of the authorization and authentication procedures that once defined federal purchasing and replaced them with a system that rewards the penny-pincher who can find the cheapest products.

  11. #11
    Postman vector7's Avatar
    Join Date
    Feb 2007
    Location
    Where it's quiet, peaceful and everyone owns guns
    Posts
    21,663
    Thanks
    30
    Thanked 73 Times in 68 Posts

    Default Re: FBI Fears Chinese Hackers Have Back Door Into US Government & Military Computers

    Using computers from China could compromise military secrets: Taiwan lawmaker

    Taiwan News, Staff Writer
    2009-01-12 02:24 PM


    TAIPEI (Taiwan News) – The military could be leaking secrets if using computers made in China, an opposition lawmaker said Monday. The Ministry of National Defense recently bought notebook computers from China which could compromise state secrets if they had been infected by viruses and spy software programs, said Lawrence Kao, a legislator for the Democratic Progressive Party.

    The army headquarters had recently awarded bids for 51 computers to a supplier who did not buy the notebooks from Taiwanese manufacturers, but from suppliers in China, Kao said. At a news conference at the Legislative Yuan Monday, he also accused the supplier of contracting out repair work to China.
    Chinese intelligence services could plant software programs inside the computers which could then be used to collect military secrets from their Taiwanese users, Kao said.

    The DPP lawmaker accused the military of being too lax about supervising its key suppliers and the sources of its equipment. It was high time for the ministry to review its procurement procedures and the origin of the products it was using, Kao said.

    There has been concern for some time that in the event of a cross-straits conflict, China would not try for the long-feared tactic of a costly all-out invasion of the island, but would instead wage electronic warfare to try and paralyze the Taiwanese military’s communications and information systems.

    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.


    Nikita Khrushchev: "We will bury you"
    "Your grandchildren will live under communism."
    “You Americans are so gullible.
    No, you won’t accept
    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.
    outright, but we’ll keep feeding you small doses of
    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.
    until you’ll finally wake up and find you already have communism.

    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.
    ."
    We’ll so weaken your
    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.
    until you’ll
    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.
    like overripe fruit into our hands."



  12. #12
    Creepy Ass Cracka & Site Owner Ryan Ruck's Avatar
    Join Date
    Jul 2005
    Location
    Cincinnati, OH
    Posts
    25,061
    Thanks
    52
    Thanked 78 Times in 76 Posts

    Default Re: FBI Fears Chinese Hackers Have Back Door Into US Government & Military Computers

    Levin and McCain Warn of Counterfeit Electronic Defense Parts, Call on China to Assist Investigation
    June 14, 2011

    The bipartisan leadership of the Senate Armed Services Committee says it suspects counterfeit electronic parts are infiltrating U.S. military weapons systems and is calling on the Chinese government to allow committee staffers into the country to investigate. Sens. John McCain, R-Ariz., and Carl Levin, D-Mich., say it is vitally important to U.S. interests to rid American systems of the parts.

    "[C]ounterfeit electronic parts pose a risk to our national security, pose a risk to the reliability of our weapons systems and pose a risk to the safety of our military men and women," Levin said. He added that many at the Pentagon and within its contractors believe the threat comes from China.

    "In January of 2010, the commerce dept published the results of a survey of almost 400 companies and organizations in the Department of Defense's supply chain," Levin said. "Those surveyed overwhelmingly cited China as the country suspected of being the source of counterfeit electronic parts."

    The two say China is refusing to work with committee staff who are trying to enter the country to further investigate the issue. Their offices continue to ask for visas but China has thus far refused them.

    "The U.S. and China are note destined to be adversaries," McCain said. "We have overlapping interests, and this is one of them. It should be in Chinese interests not to have counterfeiting of these electronic parts going on because it would harm legitimate Chinese companies as well."

    But McCain added the faux parts are first and foremost a problem for the U.S. military.

    "If the electronic parts that go into our weapons systems are counterfeited, there is every possibility that those counterfeiters could cripple our ability to have those systems work in fashion for which they were designed," he said.

  13. #13
    Senior Member Toad's Avatar
    Join Date
    Dec 2007
    Location
    Minot, ND
    Posts
    1,409
    Thanks
    0
    Thanked 0 Times in 0 Posts

    Default Re: FBI Fears Chinese Hackers Have Back Door Into US Government & Military Computers

    "The U.S. and China are note destined to be adversaries," McCain said.
    Sadly, coming from McCain, I'm sure he believes his own words. Meanwhile in reality we are already adversaries sizing each other up every single day.

  14. #14
    Super Moderator and PHILanthropist Extraordinaire Phil Fiord's Avatar
    Join Date
    Dec 2005
    Posts
    3,496
    Thanks
    16
    Thanked 11 Times in 11 Posts

    Default Re: FBI Fears Chinese Hackers Have Back Door Into US Government & Military Computers

    One thing I always think of. Lenovo.

    Lenovo bought the IBM laptop segment.

  15. #15
    Creepy Ass Cracka & Site Owner Ryan Ruck's Avatar
    Join Date
    Jul 2005
    Location
    Cincinnati, OH
    Posts
    25,061
    Thanks
    52
    Thanked 78 Times in 76 Posts

    Default Re: FBI Fears Chinese Hackers Have Back Door Into US Government & Military Computers

    U.S. Official Says Pre-Infected Computer Tech Entering Country
    July 8, 2011

    Confirming years of warnings from government and private security experts, a top Homeland Security official has acknowledged that computer hardware and software is already being imported to the United States preloaded with spyware and security-sabotaging components.

    The remarks by Greg Schaffer, the Department of Homeland Security's acting deputy undersecretary for national protection and programs, came Thursday during a tense exchange at a hearing of the House Oversight and Government Reform Committee. The panel is considering an Obama administration proposal to tighten monitoring and controls on computer equipment imported for critical government and communications infrastructure.

    Schaffer didn't say whether the equipment he was talking about included end-user consumer tech like retail laptops, DVDs and media players. If so, his comments, first reported Friday morning by Fast Company, would be the first time the United States has publicly confirmed that foreign consumer technology is arriving in the country already loaded with nasty bugs like key-logging software, botnet components and even software designed to defeat security programs installed on the same machine.

    DHS did not respond to requests to clarify Schaffer's remarks.

    Schaffer made the statement under questioning from Rep. Jason Chaffetz, R-Utah, who noted that "the issue of software infrastructure (and) hardware built overseas with items embedded in them already by the time they get to the United States ... poses, obviously, security and intellectual property risks."

    "A, is this happening, Mr. Schaffer? And, B, what are we going to do to fight back against this?" he asked.

    Schaffer began his answer by stating how important the issue is to President Barack Obama. But Chaffetz cut him off and, at Schaffer's request, broadly restated the question to extend it beyond government infrastructure:

    "Are you aware of any component software (or) hardware coming to the United States of America that already have security risks embedded into those components?"

    Schaffer paused for about 10 seconds before replying:

    "I am aware that there have been instances where that has happened."

    You can watch the exchange here, beginning at 51:47:

    "Cybersecurity: Assessing the Nation's Ability to Address the Growing Cyber Threat"

  16. #16
    Expatriate American Patriot's Avatar
    Join Date
    Jul 2005
    Location
    A Banana Republic, Central America
    Posts
    48,612
    Thanks
    82
    Thanked 28 Times in 28 Posts

    Default Re: FBI Fears Chinese Hackers Have Back Door Into US Government & Military Computers

    Ok... so like, anything new in your house, built in china, Apple, IBM, Dell, you name it...
    Libertatem Prius!


    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.




  17. #17
    Creepy Ass Cracka & Site Owner Ryan Ruck's Avatar
    Join Date
    Jul 2005
    Location
    Cincinnati, OH
    Posts
    25,061
    Thanks
    52
    Thanked 78 Times in 76 Posts

    Default Re: FBI Fears Chinese Hackers Have Back Door Into US Government & Military Computers

    Didn't see this coming...

    Former Pentagon Analyst Says China Can Shut Down All The Telecom Gear It Sold To The US
    June 8, 2012

    Chinese companies apparently have a covert capability to remotely access communications technology sold to the United States and other Western countries and could "disable a country's telecommunications infrastructure before a military engagement," according to former and current intelligence sources.

    The Chinese also have the ability to exploit networks "to enable China to continue to steal technology and trade secrets," according to the open source intelligence company Lignet, which is comprised of former U.S. intelligence analysts.

    The issue centers on the Chinese firm Huawei Technologies Co. Ltd., which U.S. intelligence sources say has direct links to the Chinese government and the People's Liberation Army, or PLA. These sources assert that Huawei and other Chinese telecommunications firms such as ZTE Corp. have "electronic backdoors" to telecommunications technology sold to the U.S. and other countries.

    Revelation of China's electronic backdoor capability into U.S. and Western telecommunications networks comes on the heels of recent WND/G2Bulletin revelations that China has been manufacturing counterfeit components that have made their way into sensitive U.S. weapons systems.

    The problem of fake Chinese electronic components, which were installed by defense contractors without prior testing and are operating in U.S. military systems, is far more widespread than originally thought.

    These parts don't just come directly from China but also from suppliers in Britain and Canada who redirect Chinese products to U.S. defense contractors.

    These counterfeit components have been found in sensitive U.S. missile systems meant to thwart the potential of a Chinese missile attack, in night vision devices and in various military aircraft.

    "We do not want a $12 million defense interceptor's reliability compromised by a $2 counterfeit part," Gen. Patrick O'Reilly, director of the U.S. Missile Defense Agency said.

    Huawei, suspected of exploiting electronic telecommunications backdoors, continues to sell communications technology in the U.S. and other countries despite a supposed ban on the company that was supposed to keep it from bidding on cellular networks and government contracts, a current intelligence source said.

    The electronic backdoor capability reportedly could allow the Chinese government through Huawei and ZTE to access information traveling through telecommunications networks or even sabotage electronic devices, Lignet said.

    With this capability, China would be in a position to sabotage critical U.S. weapons systems and sensitive cyber sites and could include intelligence or systems used by defense contractors doing work on behalf of the U.S. government.

    With cyber espionage on the rise and increasing attacks aimed at U.S. government computer systems, these sources contend that Huawei has achieved that capability on behalf of the Chinese government.

    Sources say that Huawei can use its backdoor access to reach into foreign telecommunications company systems without its knowledge or permission.

    In the case of the mobile phone maker ZTE, Lignet said that the company pursued a security vulnerability through an electronic backdoor on cell phones run on Google's Android system.

    "This backdoor reportedly could allow someone to remotely control the phone," Lignet said.

    In 2013 defense budget legislation, the House Armed Services Committee's Strategic Forces Subcommittee had introduced language to require a search of all U.S. nuclear weapons arsenals and infrastructure to remove products from Chinese companies such as Huawei and ZTE because of the possibility of "backdoors or code for espionage and/or sabotage purposes by the Chinese government," Lignet pointed out.

    These revelations follow a warning by the U.S. Department of Defense that Chinese hackers are aiming malware at U.S. government agencies and industries that could threaten the nation's economy.

    The indication is that these attacks are directed by the Chinese government itself.

    "Chinese actors are the world's most active and persistent perpetrators of economic espionage," according to a DOD in a recent report to Congress. "Chinese attempts to collect U.S. technological and economic information will continue at a high level and will represent a growing and persistent threat to U.S. economic security.

    "China is likely to remain an aggressive and capable collector of sensitive U.S. economic information and technologies, particularly in cyberspace," DOD added.

    Another concern raised by sources is that Huawei and the other Chinese telecommunications companies also provide technology to Iran and the Taliban.

    According to sources, Iran's security network relies on Huawei technology, raising the prospect, sources say, that the Iranians could gain the same backdoor access as the Chinese intelligence service does to U.S. defense and sensitive industries.

    This concern has been heightened by new Iranian threats to undertake a cyber war with the U.S. in response to recent revelations that the U.S. was a principal player in launching a sophisticated cyber attack on Iran's nuclear program.

    Code-named Olympic Games, the effort by the Obama administration was to initiate a cyber war against Iran along with Israel. Such a revelation left little doubt that the U.S. and Israel also were behind the Stuxnet virus which was inflicted on Iran's centrifuge machines used to enrich uranium.

    One source said that Washington already has declared that a cyber attack on U.S. computer systems would constitute an act of war and that would call for a military response. The Pentagon earlier this month said that there would be a U.S. military response if there is a cyber attack on government networks – in effect, equating hacking with an act of war.

    Yet, the U.S. already has initiated such an attack on Iran which now is threatening to do the same thing to U.S. computer systems.

    In attempting to uncover cyber attacks before too much damage has been done, sources say that there are millions of lines of software code that transmit data securely and to find a malicious code would be problematic and cost-prohibitive.

  18. #18
    Expatriate American Patriot's Avatar
    Join Date
    Jul 2005
    Location
    A Banana Republic, Central America
    Posts
    48,612
    Thanks
    82
    Thanked 28 Times in 28 Posts

    Default Re: FBI Fears Chinese Hackers Have Back Door Into US Government & Military Computers

    Quote Originally Posted by Ryan Ruck View Post
    Funny, neither did this author:

    http://www.amazon.com/INVASION-USA-B...606011_a1_11_p

    Book Description

    Publication Date: February 8, 2012
    ...continuation of INVASION USA I The End of Modern Civilization...

    Strap yourself in for a sweaty ride!

    At exactly midnight on December 31, every electronic device made in China for the last 30 years stops working. The shutdown of the United States of America, and 97% of the entire world, is accomplished by 12:30 am U.S. Eastern time on the first day of the New Year. It takes only 30 minutes to completely dismantle the whole of modern Western civilization as we know it!

    ****

    INVASION USA III The Battle for Survival will be out by midnight May 31/June 1...check it out on Amazon Kindle Books.

    In Book 3, the story continues, the development in the USA for human survival is slow but progress is being made, unfortunately a new development in China could erase the whole East Coast !

    (INVASION USA IV The Battle for Houston - The Aftermath - will be out August 1st. The beginning of a new and very modern United States of America).
    Libertatem Prius!


    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.




  19. #19
    Super Moderator Malsua's Avatar
    Join Date
    Jul 2005
    Posts
    8,020
    Thanks
    2
    Thanked 19 Times in 18 Posts

    Default Re: FBI Fears Chinese Hackers Have Back Door Into US Government & Military Computers

    Imagine you wake up one day and the only thing on the internet is Chinese Communist propaganda.
    "Far better it is to dare mighty things, to win glorious triumphs even though checkered by failure, than to rank with those poor spirits who neither enjoy nor suffer much because they live in the gray twilight that knows neither victory nor defeat."
    -- Theodore Roosevelt


  20. #20
    Expatriate American Patriot's Avatar
    Join Date
    Jul 2005
    Location
    A Banana Republic, Central America
    Posts
    48,612
    Thanks
    82
    Thanked 28 Times in 28 Posts

    Default Re: FBI Fears Chinese Hackers Have Back Door Into US Government & Military Computers

    What? Wait a minute, this is a trick imagination isn't it? Because there's the Lame Stream Media ALREADY!
    Libertatem Prius!


    To view links or images in signatures your post count must be 15 or greater. You currently have 0 posts.




Thread Information

Users Browsing this Thread

There are currently 2 users browsing this thread. (0 members and 2 guests)

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •