Huawei is a major
Chinese electronics company, specialising in
telecommunications; a world leader getting rapidly bigger. Their research
funding is huge;
US$13.8 billion in 2017, with 76,000 researchers. It is paying off. It is the
world leader in #5G , the latest
mobile phone system, one offering what is said to be dramatically improved
performance. Huawei is the leading developer because
#Bell Labs has fallen behind. Americans
chose to sell it off to
Nokia, a
Finnish company; more fool them. The American government is complaining because
Her Majesty's Government is
considering whether to use Huawei machinery in our phone system.
Would the Chinese use
Espionage to steal information? Yes, of course. More
to the point perhaps; do they need to try this approach? Stealing technology is
one way forward but they have their own high grade, scientific and technical
research capabilities. The pay off is big and getting bigger; billions anyway,
trillions quite possibly.
Huawei has deployed its products and services in more than 170 countries,
and as of 2011 it served 45 of the 50 largest
telecom operators. Huawei overtook
Ericsson
in 2012 as the largest telecommunications-equipment manufacturer in the
world,[16]
and overtook
Apple
in 2018 as the second-largest manufacturer of
smartphones in the world, behind
Samsung Electronics.[17]
It ranks 72nd on the
Fortune Global 500 list.[18]
In December 2018, Huawei reported that its annual revenue had risen to
US$108.5 billion in 2018 (a 21% increase over 2017), surpassing $100 billion
for the first time in company history.[19]
Although successful internationally, Huawei has faced difficulties in
some markets, due to allegations — particularly from the United States
government — that its telecom infrastructure equipment may contain
backdoors that could enable unauthorised
surveillance by the Chinese government and the People's Liberation Army
(citing, in particular, its founder having previously worked for the Army).
Cybersecurity concerns over Huawei intensified with the development of
5G wireless
networks, with calls to prevent the company from providing equipment for
them, and to prevent use of products by Huawei, or fellow Chinese telecom
ZTE, by
government entities. While the company has argued that its products posed
"no greater cybersecurity risk" than those of any other vendors, several
major U.S. wireless carriers, as well as retailer
Best Buy,
began to drop Huawei's products in early-2018. In April, Huawei stated that
it would pull out of the U.S. consumer market, as the government scrutiny
had impacted its marketability there.
In December 2018, Huawei's
vice-chairperson and
CFO
Meng Wanzhou was arrested in Canada on December 1, 2018, at the request
of the United States, which accuses her of violating
US sanctions against Iran.[20]
The U.S. Department of Justice filed formal charges of fraud, obstruction of
justice, and theft of trade secrets against Huawei in January 2019.
5G ex Wiki In
telecommunications, 5G is the fifth generation technology
standard for cellular networks, which
cellular phone companies began deploying worldwide in 2019, the planned
successor to the 4G
networks which provide connectivity to most current
cellphones.[1]
Like its predecessors, 5G networks are
cellular networks, in which the service area is divided into small
geographical areas called cells. All 5G wireless devices in a cell
are connected to the
Internet
and
telephone network by
radio
waves through a local
antenna in the cell. The main advantage of the new networks is that they
will have greater
bandwidth, giving higher
download speeds,[1]
eventually up to 10 gigabits
per second (Gbit/s).[2]
Due to the increased bandwidth, it is expected that the new networks will
not just serve cellphones like existing cellular networks, but also be used
as general
internet service providers for laptops and desktop computers, competing
with existing ISPs such as
cable internet, and also will make possible new applications in
internet of things (IoT) and
machine to machine areas. Current 4G cellphones will not be able to use
the new networks, which will require new 5G enabled wireless devices.
The increased speed is achieved partly by using higher-frequency
radio waves than current cellular networks.[1]
However, higher-frequency radio waves have a shorter range than the
frequencies used by previous cell phone towers, requiring smaller cells. So
to ensure wide service, 5G networks operate on up to three frequency bands,
low, medium, and high.[3][1]
A 5G network will be composed of networks of up to 3 different types of
cells, each requiring different antennas, each type giving a different
tradeoff of download speed vs. distance and service area. 5G cellphones and
wireless devices will connect to the network through the highest speed
antenna within range at their location:
Low-band 5G uses a similar frequency range to current 4G cellphones,
600-700 MHz,
giving download speeds a little higher than 4G: 30-250 megabits
per second (Mbit/s).[3]
Low-band
cell towers will have a range and coverage area similar to current 4G
towers. Mid-band 5G uses microwaves of 2.5-3.7 GHz,
currently allowing speeds of 100-900 Mbit/s, with each cell tower providing
service up to several miles in radius. This level of service is the most
widely deployed, and should be available in most metropolitan areas in 2020.
Some countries are not implementing low-band, making this the minimum
service level. High-band 5G currently uses frequencies of 25-39 GHz, near
the bottom of the millimeter wave band, although higher frequencies may be
used in the future. It often achieves download speeds of a gigabit
per second (Gbit/s), comparable to cable internet. However,
millimeter waves (mmWave or mmW) have a more limited range, requiring
many small cells. They have trouble passing through some types of walls and
windows. Due to their higher costs, current plans are to deploy these cells
only in dense urban environments and areas where crowds of people congregate
such as sports stadiums and convention centers. The above speeds are those
achieved in actual tests in 2020, and speeds are expected to increase during
rollout.[3]
The industry consortium setting standards for 5G is the
3rd Generation Partnership Project (3GPP).[1]
It defines any system using
5G NR (5G
New Radio) software as "5G", a definition that came into general use by late
2018. Minimum standards are set by the
International Telecommunications Union (ITU). Previously, some reserved
the term 5G for systems that deliver download speeds of 20 Gbit/s as
specified in the ITU's
IMT-2020
document.
US-headquartered
Super Micro sent a note to its customers late last
week denying all claims in a recent Bloomberg BusinessWeek article that
the Chinese government had slipped tiny surveillance chips into selected
Super Micro server motherboards during their manufacture in the Middle
Kingdom.
These bugged boards were supposedly shipped to some 30 organizations
– from a major bank and US government contractors to Apple and Amazon –
and the chips were allegedly designed to open backdoors, allowing data
to be extracted by Chinese state spies. Apple and Amazon, like Super
Micro, state none of this ever happened.
Crucially, Super Micro also forwarded a copy of its customer advisory
to the America's financial watchdog, the Securities and Exchange
Commission, which has published it online.
In the
letter to customers, Super Micro CEO Charles Liang, and two senior
veeps, say they are confident Bloomberg's tale of
surveillance chips inserted into its products was wrong.
"From everything we know and have seen, no malicious hardware chip
has been implanted during the manufacturing of our motherboards," they
wrote.
They also complain about the difficulty of dealing with a false
negative: "We trust you appreciate the difficulty of proving that
something did not happen, even though the reporters have produced no
affected motherboard or any such malicious hardware chip. As we have
said firmly, no one has shown us a motherboard containing any
unauthorized hardware chip, we are not aware of any such unauthorized
chip, and no government agency has alerted us to the existence of any
unauthorized chip."
Regardless, the biz is "undertaking a complicated and time-consuming
review" of its supply chain "despite the lack of any proof that a
malicious hardware chip exists.".............
Super Micro stresses that no one has come to the support of
Bloomberg's article, and that numerous officials, including FBI director
Christopher Wray, NSA Senior Cybersecurity Advisor Rob Joyce, Director
of National Intelligence Dan Coats, the US Department of Homeland
Security, and the UK’s GCHQ have all
questioned the story.............
That said, the denials have been unusually specific and categorical.
As time has passed, the
growing consensus appears to be that Bloomberg got the story wrong.
Although a better explanation may be that it accurately reported a
misinformation campaign put together by some part of the intelligence
services.
UNQUOTE
El Rego is in the business. It understands these things. It is very
likely to be right.
Wireless carriers around
the world are sprinting to adopt
5G networks to
power self-driving cars, virtual reality and smart
cities. We’re talking about billions of devices on
the same network, not just millions. First-adopter
countries embracing 5G could sustain more than a
decade of competitive advantage. Countries that
adopt 5G first are expected to experience
disproportionate gains in macroeconomic impact
compared to those that lag. China’s Five-Year
Plan calls for investing a further $400 billion in
5G and consequently, China may be creating a 5G
tsunami, making it near impossible to catch up. Deloitte.
5G is a national productivity
tool whose benefits, like those we derive from our
railways, are less noticeable to end users yet critical
to industry and commerce. 5G is 20 times faster than 4G,
serves as the fast backbone of the “#Internet
Of Things”(IoT),
handles a million connected devices/km2 simultaneously
with millisecond latency and uses power and radio
frequencies more effectively with downloads of 20 Gb/second,
enabling smart factories and smart cities.
Gear based on the 5G stand-alone
specifications, the standard China is pushing, is
designed to run independently of 4G networks so
operators will need to rebuild their core networks and
buy new 5G base stations to provide higher data speeds
and greater capacity, as well as ultra-reliable,
low-latency services to support machine-to-machine
connection and autonomous driving. Today, many new
technologies like IoT and AI are ready for broad
application and 5G technology itself is remarkably well
developed. Once implemented, a 5G system provides an
almost unimaginable increase in the capabilities of all
internet-connected devices. Instead of new devices being
standalone, they will create an internet-connected web
of things to integrate their activities into an
almost-living machine-machine and machine-human
environment.
Imagine thousands of apps,
billions of printable RF identifiers, millions of
machine controls, automobiles and many processes that
5G’s low latency alone makes possible. 5G’s one
millisecond reaction time is ten times faster than the
human experience, which gives the man-machine interface a
reactive ‘living’ feel. After a surgeon in China
conducted the world’s first remote operation via a 5G
network, Dr Michael Kranzfelder told the German Surgical
College, “5G networks constitute a trend-setting
technology which will play an important role in surgery
and open many new applications for which the previous
mobile data transmission standard was simply not fast
enough.”
The 5G infrastructure market,
$528 million in 2018, will grow at a 118 percent CAGR,
reaching $26 billion in 2022. Direct and indirect
outputs will reach $6.3 trillion and $10.6 trillion by
2030, according to IDC.
In return for millisecond
latency, 10cm locational accuracy, blinding speed and
wide bandwidth, 5G requires five times more cell sites
than 4G. This is how installations stood at the end of
2018:
A crucial element of 5G
deployment is the installation of new wireless sites,
many of which must be placed on lamp posts and utility
poles in densely populated areas. China dominates on
that front. During 2017, China Tower, the state-owned
cell phone tower operator, added 500 cell sites daily
and now has two million wireless sites, compared to
approximately 200,000 in the United States. “This
disparity between the speed at which China and the
United States can add network infrastructure and
capacity bodes well for China’s prospects in the race to
5G,” Deloitte said.
Remarkably, only one company owns
significant 5G intellectual property, controls its own
silicon from end to end, produces all the elements of 5G
networks–including proprietary chips–assembles and
installs them affordably on a national scale: Huawei.
Non-Huawei customers must
integrate more costly, less functional, less compatible
and less upgradeable elements, pay twice as much, take
twice as long to implement 5G and experience inferior
service because
Huawei produces every element of 5G systems and
assembles turnkey networks–from antennas to the power
stations needed to operate them to chips, servers and
handsets–at scale and cost. It is literally unrivalled
in enhanced mobile broadband.
Huawei employs 700
mathematicians, 800 physicists, 120 chemists and 6,000
fundamental researchers. Among its 87,805 patents,
11,152 core patents were granted in the US and the
company has cross-licensing agreements for patents with
many Western companies. Your Huawei phone is assembled
with just 28.5 seconds of human labor in a high-end
automated plant spread over 1.4 square km. Automation
and technology upgrades have reduced the staff to 17 yet
its more than 30 production lines produce 2 million
smartphones every month:
In 2018 Huawei unveiled the
world’s first 5G Base Station Chipset, Tiangang,
which enables simplified 5G networks and large-scale
network deployment. It makes breakthroughs in
integration, computing capability and spectral bandwidth
and supports the 200 MHz high spectral bandwidth
required for future networks while running 2.5 times
faster than existing products. Tiangang improves active
antenna units (AAU) in a revolutionary way and cuts the
weight of 5G base stations by half. Huawei has shipped
over 25,000 5G base stations worldwide, deployed 5G
networks in more than 10 countries and will deploy 5G in
20 countries in 2019.
Tiangang is not the company’s
only trick.
Andrei Frumusanu says Huawei’s semiconductor
division, HiSilicon, is the only company to provide
high-end competition with Qualcomm and, in some areas,
is comfortably ahead. Its 7 nm Ascend 910 chipset for data centers is twice as powerful as Nvidia’s v100
and the first AI IP chip series to natively provide
optimal TeraOPS per watt in all scenarios. Its 7nm
ARM-based CPU, the Kunpeng 920 boosts the
development of computing in big data, distributed
storage, and ARM-native application scenarios by 20%.
Its Kirin 980 CPU is the world’s first commercial
7nm system-on-chip (SoC) and the first to use Cortex-A76
cores, dual neural processing units, Mali G76 GPU, a 1.4
Gbps LTE modem and supports faster RAM. With 20 percent
faster performance and 40 percent less power consumption
compared to 10nm systems, it has
twice the performance of Qualcomm’s Snapdragon 845
and Apple’s A11 while consuming 40% less power. The
Kirin 980 fits 6.9 billion transistors on a chip no
larger than a thumbnail. Huawei’s patented modem
has the world’s fastest WiFi and its GPS receiver
taps L5 frequency to deliver 10cm positioning and
supports speeds up to 1.4Gbps and 2,133MHz LPDDR4X RAM.
Huawei’s 5G phone will launch in
June this year. Apple will release its first 5G handset
in September, 2020.
Beijing’s four telcos are
spending 30 billion yuan (US$5.4 billion) on a 5G
network in the city by 2022 and applying the technology
to infrastructure like the new airport, the new
satellite city and the 2022 Winter Olympics. The city,
home to many of the country’s top tech companies, plans
to achieve 200 billion yuan of 5G related revenue by
2022. Beijing has set up product innovation centers,
special projects and manufacturing bases for developing
the key components, including radio frequency parts and
chips. The city aims to have its tech companies reach a
10 percent share in the global 5G component market.
“Obtaining breakthroughs on developing core components
for the 5G network and putting them into industrial use
is the primary task for developing the 5G industry in
the city,” says the mayor’s plan.
Xiongan New Area, a brand new
city of six million located sixty miles from Beijing,
which will welcome its first residents in 2020, is being
wired for 5G. Residents will find no traffic lights,
many autonomous vehicles, face recognition providing
seamless access and be able to reach the capital via a
driverless maglev train costing the same to build and
operate as regular subways but traveling silently at 120
mph, with no moving parts. A literal city of the future,
courtesy of 5G, Xiongan is designed to deliver the same
relative productivity gains for its residents that the
Industrial Revolution gave England’s in the 19th
century.
The US labels Huawei a ‘security
risk’ because Huawei gear protects the confidentiality
of users’ communications: “Most of the personal data you
store on your Huawei device (such as your photos, call
logs, mailing list, messages, frequently visited
websites, and so on) will be strictly protected. In
addition, you will be clearly notified of any personal
information being collected, and have complete control
over the collection, processing, and sharing of your
personal data. Without your authorization, your personal
data will not be disclosed with any third parties.”
Snowden's revelations suggest
Huawei is more sinned against than sinning. The NSA’s
‘Tailored Access Operations’ unit
broke into Huawei’s corporate servers and by 2010
was reading corporate emails and examining the source
code in Huawei’s products.“We currently have good access
and so much data that we don’t know what to do with it,”
boasted one NSA briefing. Slides also disclosed that the
NSA intended to plant its own backdoors in Huawei
firmware. In 2014 the New York Times, Time and Reuters
revealed that the NSA had infiltrated Huawei
headquarters, monitored all of its executives and gone
through the company’s entire data infrastructure.
One goal was to find links
between Huawei and the PLA and the other was to find
vulnerabilities so that the
NSA could spy on nations through computer and
telephone networks Huawei sold, as it did through
Cisco’s, which had installed ‘back doors’ for the CIA.
The Times said its story of operation Shotgiant was
based on NSA documents provided by Edward Snowden. The
NSA planned to unleash offensive cyber attacks through
Huawei if ordered by the President, “Many of our targets
communicate over Huawei-produced products. We want to
make sure that we know how to exploit these products,”
the
Times quoted an NSA document as saying, to “gain
access to networks of interest” around the world.
Bien Perez and Li Tao say, “The Chinese government
wants every industry to use the most advanced
infrastructure to upgrade productivity. This is a
strategic agenda, and they think that 5G will help.
China has very ambitious plans to promote the industrial
internet of things, cloud computing and artificial
intelligence (AI), the capabilities of which require the
support of brand-new 5G networks. For example,
self-driving cars require sensors, AI and roadside base
stations for fast and reliable connectivity to allow
vehicles to talk to each other to avoid collisions and
avoid pedestrians. Today’s 4G networks cannot meet those
quick response times.
China’s plan for an aggressive 5G
roll-out is in line with the Made In China2025 road map.
Initially, this focused on the domestic telecoms
sector’s ability to increase broadband penetration
nationwide to 82 per cent by 2025 as part of a push for
industrial modernisation. Another objective was to see
local suppliers making 40 percent of all mobile phone
chips used in the domestic market. Under an updated
version published in January, Beijing now wants China to
become the world’s leading maker of telecoms equipment.
Smart factories will integrate
the entire factory production process, arranging the
smooth transfer from minimal energy, raw materials and
water inputs and the just-in-time delivery of
subcomponents to the optimised assembly line production
of custom-designed-and-ordered by customers to the
effective delivery of these products to the user and the
continual (and maybe continuous) product reporting of
its use, effectiveness and location. Smart cities will
have driverless cars, buses and delivery trucks and
ports and airports. The smart economy will have very
fast HST intercity services, along with transparent data
on the operation of mines, energy generation, transport,
communications and government. Medical monitoring and
the rise of the extended healthspan technology will free
China from the dependency trap because people are likely
to remain healthy all their lives using continuous
medical assessment through an internet bangle.
President Trump has attacked the
Made In China 2025 policy because the US, stuck in
neoclassical macroeconomics, is committed to a system
which not only does not produce the goods but also can’t
afford the essential infrastructure required for the
next major advance in the ongoing industrial revolution.
The decision will put the Five Eyes countries ten years
behind China in 5G and its associated technologies. The
Germans correctly describe their version of China2025,
Industrie04 as “the fourth industrial revolution.” The
5G stakes are so big that, if Germany rejects Huawei it
risks committing economic suicide.
Founded by Charles Liang, Wally Liaw and Sara Liu on November 1,
1993, Supermicro specializes in
servers, storage, blades, rack solutions, networking devices, server
management software and high-end workstations for
data center,
cloud computing, enterprise IT,
big
data, high performance computing (HPC), and embedded markets.[1][2][3]
In 2016, the company deployed thousands of servers into a single data
center[4]
and was ranked the 18th fastest growing company on
Fortune Magazine’s Top 100 list of the world’s largest US publicly
traded companies in 2016 and the fastest growing IT infrastructure
company.
China Hoax QUOTE
Propaganda is to a democracy what the bludgeon is
to a totalitarian state. Noam Chomsky.
I was researching Chinese
censorship when–irony of ironies–I fell afoul of American censorship,
providing an opportunity to update you on the state of the art under both
regimes, starting at home, with the recent attempt to frame the President
[ That is dear old Don ] for crimes he did not commit.
Like many attempts to frame
people, events and nations–Vietnam, Iraq, 9/11, JFK, Bin Laden–it was a
State hoax, a falsehood deliberately fabricated to masquerade as truth .
An atrocity story sustained by artful censorship and loud, proud, bold
and brassy propaganda. An expensive, in-your-face, preposterous conspiracy,
sustained for two years at great financial and reputational cost to the
nation. Wildly ambitious, batshit crazy and so self-destructive as to boggle
the mind, it was one of many propaganda-driven frame-ups, another of which
in progress as you read these lines.
It checks all the boxes: big,
bold, loud and proud, expensive, in-your-face, a preposterous hoax, daringly
ambitious and utterly self-destructive.
The China Hoax frames China’s
Confucian politics and economics as if they were–or should be–Roman. It
explains why thousands of predictions of China’s collapse have been one
hundred percent wrong for seventy years and why we keep repeating
them, and why we think of China’s government as oppressively authoritarian
when ninety-five percent of
Chinese think it’s super
[ NB It is only 83% in fact but that is not at all bad - Editor ]. It also helps us see how the narrative is
sustained by an almost totalitarian censorship regime [ the American
one? - Editor ]. UNQUOTE Would the American
Deep State do that? Believe
it.
While there is ample evidence in the public domain that Huawei is doing badly
on the basics of secure software development, so far there has been little that
tends to show it deliberately implements hidden espionage backdoors. Rhetoric
from the US alleging Huawei is a threat to national security seems to be having
the opposite effect around the world.
With Bloomberg, an American company, characterising Vodafone's use of Huawei
equipment as "defiance" showing "that countries across Europe are willing to
risk rankling the US in the name of 5G preparedness," it appears that the
US-Euro-China divide on 5G technology suppliers isn't closing up any time soon.
®
This isn't shaping up to be a good week for Bloomberg.
Only yesterday High Court judge Mr Justice Nicklin ordered the company to pay up £25k
for the way it reported a live and ongoing criminal investigation. UNQUOTE El Rego is in the business. It understands these
things unlike Bloomberg.
The Big Hack How China Used a Tiny Chip to Infiltrate U.S. Companies
ex Bloomberg
The attack by Chinese spies reached almost 30 U.S. companies,
including Amazon and Apple, by compromising America’s technology
supply chain, according to extensive interviews with government
and corporate sources.
In 2015,
Amazon.com Inc. began quietly evaluating a startup called
Elemental Technologies, a potential acquisition to help with a major
expansion of its streaming video service, known today as Amazon Prime
Video. Based in Portland, Ore., Elemental made software for compressing
massive video files and formatting them for different devices. Its
technology had helped stream the Olympic Games online, communicate with
the International Space Station, and funnel drone footage to the Central
Intelligence Agency. Elemental’s national security contracts weren’t the
main reason for the proposed acquisition, but they fit nicely with
Amazon’s government businesses, such as the highly secure cloud that
Amazon Web Services (AWS) was building for the CIA.
To help with due diligence, AWS, which was overseeing the prospective
acquisition, hired a third-party company to scrutinize Elemental’s
security, according to one person familiar with the process. The first
pass uncovered troubling issues, prompting AWS to take a closer look at
Elemental’s main product: the expensive servers that customers installed
in their networks to handle the video compression. These servers were
assembled for Elemental by
Super Micro Computer Inc., a San Jose-based company (commonly known
as Supermicro) that’s also one of the world’s biggest suppliers of
server motherboards, the fiberglass-mounted clusters of chips and
capacitors that act as the neurons of data centers large and small. In
late spring of 2015, Elemental’s staff boxed up several servers and sent
them to Ontario, Canada, for the third-party security company to test,
the person says.
Featured in Bloomberg Businessweek, Oct. 8, 2018.
Nested on the servers’ motherboards, the testers found a tiny
microchip, not much bigger than a grain of rice, that wasn’t part of the
boards’ original design. Amazon reported the discovery to U.S.
authorities, sending a shudder through the intelligence community.
Elemental’s servers could be found in Department of Defense data
centers, the CIA’s drone operations, and the onboard networks of Navy
warships. And Elemental was just one of hundreds of Supermicro
customers.
During the ensuing top-secret probe, which remains open more than
three years later, investigators determined that the chips allowed the
attackers to create a stealth doorway into any network that included the
altered machines. Multiple people familiar with the matter say
investigators found that the chips had been inserted at factories run by
manufacturing subcontractors in China.
This attack was something graver than the software-based incidents
the world has grown accustomed to seeing. Hardware hacks are more
difficult to pull off and potentially more devastating, promising the
kind of long-term, stealth access that spy agencies are willing to
invest millions of dollars and many years to get.
“Having a well-done, nation-state-level hardware implant surface
would be like witnessing a unicorn jumping over a rainbow”
There are two ways for spies to alter the guts of computer equipment.
One, known as interdiction, consists of manipulating devices as they’re
in transit from manufacturer to customer. This approach is favored by
U.S. spy agencies, according to documents leaked by former National
Security Agency contractor Edward Snowden. The other method involves
seeding changes from the very beginning.
One country in particular has an advantage executing this kind of
attack: China, which by some estimates makes 75 percent of the world’s
mobile phones and 90 percent of its PCs. Still, to actually accomplish a
seeding attack would mean developing a deep understanding of a product’s
design, manipulating components at the factory, and ensuring that the
doctored devices made it through the global logistics chain to the
desired location—a feat akin to throwing a stick in the Yangtze River
upstream from Shanghai and ensuring that it washes ashore in Seattle.
“Having a well-done, nation-state-level hardware implant surface would
be like witnessing a unicorn jumping over a rainbow,” says Joe Grand, a
hardware hacker and the founder of
Grand Idea Studio Inc. “Hardware is just so far off the radar, it’s
almost treated like black magic.”
But that’s just what U.S. investigators found: The chips had been
inserted during the manufacturing process, two officials say, by
operatives from a unit of the People’s Liberation Army. In Supermicro,
China’s spies appear to have found a perfect conduit for what U.S.
officials now describe as the most significant supply chain attack known
to have been carried out against American companies.
One official says investigators found that it eventually affected
almost 30 companies, including a major bank, government contractors, and
the world’s most valuable company,
Apple Inc. Apple was an important Supermicro customer and had
planned to order more than 30,000 of its servers in two years for a new
global network of data centers. Three senior insiders at Apple say that
in the summer of 2015, it, too, found malicious chips on Supermicro
motherboards. Apple severed ties with Supermicro the following year, for
what it described as unrelated reasons.
In
emailed statements, Amazon (which announced its
acquisition of Elemental in September 2015), Apple, and Supermicro
disputed summaries of Bloomberg Businessweek’s reporting. “It’s
untrue that AWS knew about a supply chain compromise, an issue with
malicious chips, or hardware modifications when acquiring Elemental,”
Amazon wrote. “On this we can be very clear: Apple has never found
malicious chips, ‘hardware manipulations’ or vulnerabilities purposely
planted in any server,” Apple wrote. “We remain unaware of any such
investigation,” wrote a spokesman for Supermicro, Perry Hayes. The
Chinese government didn’t directly address questions about manipulation
of Supermicro servers, issuing a statement that read, in part, “Supply
chain safety in cyberspace is an issue of common concern, and China is
also a victim.” The FBI and the Office of the Director of National
Intelligence, representing the CIA and NSA, declined to comment.
The companies’ denials are countered by six current and former senior
national security officials, who—in conversations that began during the
Obama administration and continued under the Trump
administration—detailed the discovery of the chips and the government’s
investigation. One of those officials and two people inside AWS provided
extensive information on how the attack played out at Elemental and
Amazon; the official and one of the insiders also described Amazon’s
cooperation with the government investigation. In addition to the three
Apple insiders, four of the six U.S. officials confirmed that Apple was
a victim. In all, 17 people confirmed the manipulation of Supermicro’s
hardware and other elements of the attacks. The sources were granted
anonymity because of the sensitive, and in some cases classified, nature
of the information.
One government official says China’s goal was long-term access to
high-value corporate secrets and sensitive government networks. No
consumer data is known to have been stolen.
The ramifications of the attack continue to play out. The Trump
administration has made computer and networking hardware, including
motherboards, a focus of its latest round of trade sanctions against
China, and White House officials have made it clear they think companies
will begin shifting their supply chains to other countries as a result.
Such a shift might assuage officials who have been warning for years
about the security of the supply chain—even though they’ve never
disclosed a major reason for their concerns.
How the Hack Worked, According to
U.S. Officials
Back in 2006, three engineers in Oregon had a
clever idea. Demand for mobile video was about to explode, and they
predicted that broadcasters would be desperate to transform programs
designed to fit TV screens into the various formats needed for viewing
on smartphones, laptops, and other devices. To meet the anticipated
demand, the engineers started Elemental Technologies, assembling what
one former adviser to the company calls a genius team to write code that
would adapt the superfast graphics chips being produced for high-end
video-gaming machines. The resulting software dramatically reduced the
time it took to process large video files. Elemental then loaded the
software onto custom-built servers emblazoned with its leprechaun-green
logos.
Elemental servers sold for as much as $100,000 each, at profit
margins of as high as 70 percent, according to a former adviser to the
company. Two of Elemental’s biggest early clients were the Mormon
church, which used the technology to beam sermons to congregations
around the world, and the adult film industry, which did not.
Elemental also started working with American spy agencies. In 2009
the company announced a development partnership with
In-Q-Tel Inc., the CIA’s investment arm, a deal that paved the way
for Elemental servers to be used in national security missions across
the U.S. government. Public documents, including the company’s own
promotional materials, show that the servers have been used inside
Department of Defense data centers to process drone and
surveillance-camera footage, on Navy warships to transmit feeds of
airborne missions, and inside government buildings to enable secure
videoconferencing. NASA, both houses of Congress, and the Department of
Homeland Security have also been customers. This portfolio made
Elemental a target for foreign adversaries.
Supermicro had been an obvious choice to build Elemental’s servers.
Headquartered north of San Jose’s airport, up a smoggy stretch of
Interstate 880, the company was founded by Charles Liang, a Taiwanese
engineer who attended graduate school in Texas and then moved west to
start Supermicro with his wife in 1993. Silicon Valley was then
embracing outsourcing, forging a pathway from Taiwanese, and later
Chinese, factories to American consumers, and Liang added a comforting
advantage: Supermicro’s motherboards would be engineered mostly in San
Jose, close to the company’s biggest clients, even if the products were
manufactured overseas.
Today, Supermicro sells more server motherboards than almost anyone
else. It also dominates the $1 billion market for boards used in
special-purpose computers, from MRI machines to weapons systems. Its
motherboards can be found in made-to-order server setups at banks, hedge
funds, cloud computing providers, and web-hosting services, among other
places. Supermicro has assembly facilities in California, the
Netherlands, and Taiwan, but its motherboards—its core product—are
nearly all manufactured by contractors in China.
The company’s pitch to customers hinges on unmatched customization,
made possible by hundreds of full-time engineers and a catalog
encompassing more than 600 designs. The majority of its workforce in San
Jose is Taiwanese or Chinese, and Mandarin is the preferred language,
with hanzi filling the whiteboards, according to six former
employees. Chinese pastries are delivered every week, and many routine
calls are done twice, once for English-only workers and again in
Mandarin. The latter are more productive, according to people who’ve
been on both. These overseas ties, especially the widespread use of
Mandarin, would have made it easier for China to gain an understanding
of Supermicro’s operations and potentially to infiltrate the company. (A
U.S. official says the government’s probe is still examining whether
spies were planted inside Supermicro or other American companies to aid
the attack.)
With more than 900 customers in 100 countries by 2015, Supermicro
offered inroads to a bountiful collection of sensitive targets. “Think
of Supermicro as the Microsoft of the hardware world,” says a former
U.S. intelligence official who’s studied Supermicro and its business
model. “Attacking Supermicro motherboards is like attacking Windows.
It’s like attacking the whole world.”
Well before evidence of the attack surfaced
inside the networks of U.S. companies, American intelligence sources
were reporting that China’s spies had plans to introduce malicious
microchips into the supply chain. The sources weren’t specific,
according to a person familiar with the information they provided, and
millions of motherboards are shipped into the U.S. annually. But in the
first half of 2014, a different person briefed on high-level discussions
says, intelligence officials went to the White House with something more
concrete: China’s military was preparing to insert the chips into
Supermicro motherboards bound for U.S. companies.
The specificity of the information was remarkable, but so were the
challenges it posed. Issuing a broad warning to Supermicro’s customers
could have crippled the company, a major American hardware maker, and it
wasn’t clear from the intelligence whom the operation was targeting or
what its ultimate aims were. Plus, without confirmation that anyone had
been attacked, the FBI was limited in how it could respond. The White
House requested periodic updates as information came in, the person
familiar with the discussions says.
Apple made its discovery of suspicious chips inside Supermicro
servers around May 2015, after detecting odd network activity and
firmware problems, according to a person familiar with the timeline. Two
of the senior Apple insiders say the company reported the incident to
the FBI but kept details about what it had detected tightly held, even
internally. Government investigators were still chasing clues on their
own when Amazon made its discovery and gave them access to sabotaged
hardware, according to one U.S. official. This created an invaluable
opportunity for intelligence agencies and the FBI—by then running a full
investigation led by its cyber- and counterintelligence teams—to see
what the chips looked like and how they worked.
The chips on Elemental servers were designed to be as inconspicuous
as possible, according to one person who saw a detailed report prepared
for Amazon by its third-party security contractor, as well as a second
person who saw digital photos and X-ray images of the chips incorporated
into a later report prepared by Amazon’s security team. Gray or
off-white in color, they looked more like signal conditioning couplers,
another common motherboard component, than microchips, and so they were
unlikely to be detectable without specialized equipment. Depending on
the board model, the chips varied slightly in size, suggesting that the
attackers had supplied different factories with different batches.
Officials familiar with the investigation say the primary role of
implants such as these is to open doors that other attackers can go
through. “Hardware attacks are about access,” as one former senior
official puts it. In simplified terms, the implants on Supermicro
hardware manipulated the core operating instructions that tell the
server what to do as data move across a motherboard, two people familiar
with the chips’ operation say. This happened at a crucial moment, as
small bits of the operating system were being stored in the board’s
temporary memory en route to the server’s central processor, the CPU.
The implant was placed on the board in a way that allowed it to
effectively edit this information queue, injecting its own code or
altering the order of the instructions the CPU was meant to follow.
Deviously small changes could create disastrous effects.
Since the implants were small, the amount of code they contained was
small as well. But they were capable of doing two very important things:
telling the device to communicate with one of several anonymous
computers elsewhere on the internet that were loaded with more complex
code; and preparing the device’s operating system to accept this new
code. The illicit chips could do all this because they were connected to
the baseboard management controller, a kind of superchip that
administrators use to remotely log in to problematic servers, giving
them access to the most sensitive code even on machines that have
crashed or are turned off.
This system could let the attackers alter how the device functioned,
line by line, however they wanted, leaving no one the wiser. To
understand the power that would give them, take this hypothetical
example: Somewhere in the Linux operating system, which runs in many
servers, is code that authorizes a user by verifying a typed password
against a stored encrypted one. An implanted chip can alter part of that
code so the server won’t check for a password—and presto! A secure
machine is open to any and all users. A chip can also steal encryption
keys for secure communications, block security updates that would
neutralize the attack, and open up new pathways to the internet. Should
some anomaly be noticed, it would likely be cast as an unexplained
oddity. “The hardware opens whatever door it wants,” says Joe
FitzPatrick, founder of Hardware Security Resources LLC, a company that
trains cybersecurity professionals in hardware hacking techniques.
U.S. officials had caught China experimenting with hardware tampering
before, but they’d never seen anything of this scale and ambition. The
security of the global technology supply chain had been compromised,
even if consumers and most companies didn’t know it yet. What remained
for investigators to learn was how the attackers had so thoroughly
infiltrated Supermicro’s production process—and how many doors they’d
opened into American targets.
Unlike software-based hacks, hardware
manipulation creates a real-world trail. Components leave a wake of
shipping manifests and invoices. Boards have serial numbers that trace
to specific factories. To track the corrupted chips to their source,
U.S. intelligence agencies began following Supermicro’s serpentine
supply chain in reverse, a person briefed on evidence gathered during
the probe says.
As recently as 2016, according to DigiTimes, a news site
specializing in supply chain research, Supermicro had three primary
manufacturers constructing its motherboards, two headquartered in Taiwan
and one in Shanghai. When such suppliers are choked with big orders,
they sometimes parcel out work to subcontractors. In order to get
further down the trail, U.S. spy agencies drew on the prodigious tools
at their disposal. They sifted through communications intercepts, tapped
informants in Taiwan and China, even tracked key individuals through
their phones, according to the person briefed on evidence gathered
during the probe. Eventually, that person says, they traced the
malicious chips to four subcontracting factories that had been building
Supermicro motherboards for at least two years.
As the agents monitored interactions among Chinese officials,
motherboard manufacturers, and middlemen, they glimpsed how the seeding
process worked. In some cases, plant managers were approached by people
who claimed to represent Supermicro or who held positions suggesting a
connection to the government. The middlemen would request changes to the
motherboards’ original designs, initially offering bribes in conjunction
with their unusual requests. If that didn’t work, they threatened
factory managers with inspections that could shut down their plants.
Once arrangements were in place, the middlemen would organize delivery
of the chips to the factories.
The investigators concluded that this intricate scheme was the work
of a People’s Liberation Army unit specializing in hardware attacks,
according to two people briefed on its activities. The existence of this
group has never been revealed before, but one official says, “We’ve been
tracking these guys for longer than we’d like to admit.” The unit is
believed to focus on high-priority targets, including advanced
commercial technology and the computers of rival militaries. In past
attacks, it targeted the designs for high-performance computer chips and
computing systems of large U.S. internet providers.
Provided details of Businessweek’s reporting, China’s
Ministry of Foreign Affairs sent a statement that said “China is a
resolute defender of cybersecurity.” The ministry added that in 2011,
China proposed international guarantees on hardware security along with
other members of the Shanghai Cooperation Organization, a regional
security body. The statement concluded, “We hope parties make less
gratuitous accusations and suspicions but conduct more constructive talk
and collaboration so that we can work together in building a peaceful,
safe, open, cooperative and orderly cyberspace.”
The Supermicro attack was on another order entirely from earlier
episodes attributed to the PLA. It threatened to have reached a dizzying
array of end users, with some vital ones in the mix. Apple, for its
part, has used Supermicro hardware in its data centers sporadically for
years, but the relationship intensified after 2013, when Apple acquired
a startup called Topsy Labs, which created superfast technology for
indexing and searching vast troves of internet content. By 2014, the
startup was put to work building small data centers in or near major
global cities. This project, known internally as Ledbelly, was designed
to make the search function for Apple’s voice assistant, Siri, faster,
according to the three senior Apple insiders.
Documents seen by Businessweek show that in 2014, Apple
planned to order more than 6,000 Supermicro servers for installation in
17 locations, including Amsterdam, Chicago, Hong Kong, Los Angeles, New
York, San Jose, Singapore, and Tokyo, plus 4,000 servers for its
existing North Carolina and Oregon data centers. Those orders were
supposed to double, to 20,000, by 2015. Ledbelly made Apple an important
Supermicro customer at the exact same time the PLA was found to be
manipulating the vendor’s hardware.
Project delays and early performance problems meant that around 7,000
Supermicro servers were humming in Apple’s network by the time the
company’s security team found the added chips. Because Apple didn’t,
according to a U.S. official, provide government investigators with
access to its facilities or the tampered hardware, the extent of the
attack there remained outside their view.
Microchips found on altered motherboards in some cases looked
like signal conditioning couplers.
Photographer: Victor Prado for Bloomberg Businessweek
American investigators eventually figured out
who else had been hit. Since the implanted chips were designed to ping
anonymous computers on the internet for further instructions, operatives
could hack those computers to identify others who’d been affected.
Although the investigators couldn’t be sure they’d found every victim, a
person familiar with the U.S. probe says they ultimately concluded that
the number was almost 30 companies.
That left the question of whom to notify and how. U.S. officials had
been warning for years that hardware made by two Chinese
telecommunications giants,
Huawei Corp. and
ZTE Corp., was subject to Chinese government manipulation. (Both
Huawei and ZTE have said no such tampering has occurred.) But a similar
public alert regarding a U.S. company was out of the question. Instead,
officials reached out to a small number of important Supermicro
customers. One executive of a large web-hosting company says the message
he took away from the exchange was clear: Supermicro’s hardware couldn’t
be trusted. “That’s been the nudge to everyone—get that crap out,” the
person says.
Amazon, for its part, began acquisition talks with an Elemental
competitor, but according to one person familiar with Amazon’s
deliberations, it reversed course in the summer of 2015 after learning
that Elemental’s board was nearing a deal with another buyer. Amazon
announced its acquisition of Elemental in September 2015, in a
transaction whose value one person familiar with the deal places at $350
million. Multiple sources say that Amazon intended to move Elemental’s
software to AWS’s cloud, whose chips, motherboards, and servers are
typically designed in-house and built by factories that Amazon contracts
from directly.
A notable exception was AWS’s data centers inside China, which were
filled with Supermicro-built servers, according to two people with
knowledge of AWS’s operations there. Mindful of the Elemental findings,
Amazon’s security team conducted its own investigation into AWS’s
Beijing facilities and found altered motherboards there as well,
including more sophisticated designs than they’d previously encountered.
In one case, the malicious chips were thin enough that they’d been
embedded between the layers of fiberglass onto which the other
components were attached, according to one person who saw pictures of
the chips. That generation of chips was smaller than a sharpened pencil
tip, the person says. (Amazon denies that AWS knew of servers found in
China containing malicious chips.)
China has long been known to monitor banks, manufacturers, and
ordinary citizens on its own soil, and the main customers of AWS’s China
cloud were domestic companies or foreign entities with operations there.
Still, the fact that the country appeared to be conducting those
operations inside Amazon’s cloud presented the company with a Gordian
knot. Its security team determined that it would be difficult to quietly
remove the equipment and that, even if they could devise a way, doing so
would alert the attackers that the chips had been found, according to a
person familiar with the company’s probe. Instead, the team developed a
method of monitoring the chips. In the ensuing months, they detected
brief check-in communications between the attackers and the sabotaged
servers but didn’t see any attempts to remove data. That likely meant
either that the attackers were saving the chips for a later operation or
that they’d infiltrated other parts of the network before the monitoring
began. Neither possibility was reassuring./p>
When in 2016 the Chinese government was about to pass a new
cybersecurity law—seen by many outside the country as a pretext to give
authorities wider access to sensitive data—Amazon decided to act, the
person familiar with the company’s probe says. In August it
transferred operational control of its Beijing data center to its
local partner,
Beijing Sinnet, a move the companies said was needed to comply with
the incoming law. The following November, Amazon
sold the entire infrastructure to Beijing Sinnet for about $300
million. The person familiar with Amazon’s probe casts the sale as a
choice to “hack off the diseased limb.”
As for Apple, one of the three senior insiders says that in the
summer of 2015, a few weeks after it identified the malicious chips, the
company started removing all Supermicro servers from its data centers, a
process Apple referred to internally as “going to zero.” Every
Supermicro server, all 7,000 or so, was replaced in a matter of weeks,
the senior insider says. (Apple denies that any servers were removed.)
In 2016, Apple informed Supermicro that it was severing their
relationship entirely—a decision a spokesman for Apple ascribed in
response to Businessweek’s questions to an
unrelated and relatively minor security incident.
That August, Supermicro’s CEO, Liang, revealed that the company had
lost two major customers. Although he didn’t name them, one was later
identified in news reports as Apple. He blamed competition, but his
explanation was vague. “When customers asked for lower price, our people
did not respond quickly enough,” he said on a conference call with
analysts. Hayes, the Supermicro spokesman, says the company has never
been notified of the existence of malicious chips on its motherboards by
either customers or U.S. law enforcement.
Concurrent with the illicit chips’ discovery in 2015 and the
unfolding investigation, Supermicro has been plagued by an accounting
problem, which the company characterizes as an issue related to the
timing of certain revenue recognition. After missing two deadlines to
file quarterly and annual reports required by regulators, Supermicro was
delisted from the Nasdaq on Aug. 23 of this year. It marked an
extraordinary stumble for a company whose annual revenue had risen
sharply in the previous four years, from a reported $1.5 billion in 2014
to a projected $3.2 billion this year.
One Friday in late September 2015, President
Barack Obama and Chinese President Xi Jinping appeared together at the
White House for an hourlong press conference headlined by a landmark
deal on cybersecurity. After months of negotiations, the U.S. had
extracted from China a grand promise: It would no longer support the
theft by hackers of U.S. intellectual property to benefit Chinese
companies. Left out of those pronouncements, according to a person
familiar with discussions among senior officials across the U.S.
government, was the White House’s deep concern that China was willing to
offer this concession because it was already developing far more
advanced and surreptitious forms of hacking founded on its near monopoly
of the technology supply chain.
In the weeks after the agreement was announced, the U.S. government
quietly raised the alarm with several dozen tech executives and
investors at a small, invite-only meeting in McLean, Va., organized by
the Pentagon. According to someone who was present, Defense Department
officials briefed the technologists on a recent attack and asked them to
think about creating commercial products that could detect hardware
implants. Attendees weren’t told the name of the hardware maker
involved, but it was clear to at least some in the room that it was
Supermicro, the person says.
The problem under discussion wasn’t just technological. It spoke to
decisions made decades ago to send advanced production work to Southeast
Asia. In the intervening years, low-cost Chinese manufacturing had come
to underpin the business models of many of America’s largest technology
companies. Early on, Apple, for instance, made many of its most
sophisticated electronics domestically. Then in 1992, it closed a
state-of-the-art plant for motherboard and computer assembly in Fremont,
Calif., and sent much of that work overseas.
Over the decades, the security of the supply chain became an article
of faith despite repeated warnings by Western officials. A belief formed
that China was unlikely to jeopardize its position as workshop to the
world by letting its spies meddle in its factories. That left the
decision about where to build commercial systems resting largely on
where capacity was greatest and cheapest. “You end up with a classic
Satan’s bargain,” one former U.S. official says. “You can have less
supply than you want and guarantee it’s secure, or you can have the
supply you need, but there will be risk. Every organization has accepted
the second proposition.”
In the three years since the briefing in McLean, no commercially
viable way to detect attacks like the one on Supermicro’s motherboards
has emerged—or has looked likely to emerge. Few companies have the
resources of Apple and Amazon, and it took some luck even for them to
spot the problem. “This stuff is at the cutting edge of the cutting
edge, and there is no easy technological solution,” one of the people
present in McLean says. “You have to invest in things that the world
wants. You cannot invest in things that the world is not ready to accept
yet.”
Bloomberg LP has been a Supermicro customer. According to a
Bloomberg LP spokesperson, the company has found no evidence to suggest
that it has been affected by the hardware issues raised in the article.
CIA Warns Britain Over China's Secret Funding Of Huawei
[ 22 April 2019 ]
QUOTE
The CIA has accused Huawei of being funded by
Chinese state security amid a list of allegations facing the company. They say the technologies giant, who wants to
provide Britain with technology for the new 5G network, has received funds
from China's
National Security Commission, the People's Liberation Army and a third
branch of the Chinese state intelligence network,
The Times reported.
The US source explained that Huawei wants to
sell its 5G technology to members of the Five Eyes intelligence-sharing
group - including Britain, Australia,
Canada and
New Zealand. But critics have warned that Chinese law could
force the tech company to co-operate with its security branches, leading to
software being built to spy on or disrupt communications in Britain..........
They [ Huawei ]
told the publication: 'Huawei does not comment on unsubstantiated
allegations backed up by zero evidence from anonymous sources.'
The Whitehall review, which is looking at the
future of the UK's telecom systems and introducing 5G into Britain, will be
discussed at the National Security Council by Theresa May, cabinet ministers
and security chiefs.
UNQUOTE
There is no mention of the NSA attacking
communications worldwide but is different. Chinese security outfits do not
need law; they have power. China is a world leader in
5G and other research areas.
China Says Buy From Huawei
[ 29 April 2019 ]
QUOTE
China's ambassador in
London has moved to reassure the Government over
Huawei spying concerns as
he defended the tech giant's 'good track record on security'. Liu Xioming urged
the UK to ignore supposed scaremongering from its allies and act independently
by pressing ahead with the 5G communications network which will be partly built
by Huawei.
In what will be viewed as a slap down to the
United States, which has shut out the Shenzhen-based company from its telecoms
grid, the Beijing diplomat impelled [ sic ] Theresa
May to resist 'protectionism'.
UNQUOTE
What does
5G kit from
Huawei do? Pass! Has it got
backdoors in it? Yes, of course! The
Bloomberg story telling us
How China Used a Tiny Chip to Infiltrate America's Top Companies is
nonsense. But the software issues are real. Of course the
NSA does the same sort of thing for America on an industrial scale but that
is different, isn't it? Why does Theresa May want
Huawei?
She is an Enemy Of The People.
Huawei
Software Is Rubbish [ 28 March 2019 ]
QUOTE
Huawei’s telecommunications equipment software is riddled with severe
security flaws, according to a report from the company’s oversight board in
the U.K.
On the plus side, the British spies in charge of the oversight say they
don’t “believe that the defects identified are a result of Chinese state
interference.” However, the bugs are serious enough to cause telecoms
networks to stop functioning if they are exploited. And given the amount of
pressure the Chinese manufacturer currently finds itself subjected
to—particularly from the U.S.—the report’s timing could not be worse for
Huawei.
Suspicion over Huawei’s ties to the Chinese state is nothing new, but
it’s the world’s top telecoms equipment vendor and its products are widely
used. Facing concerns in the U.K., the company agreed in 2010 to set up a
lab there called the Huawei Cyber Security Evaluation Centre (HCSEC,) where
Huawei employees would help representatives of GCHQ—the U.K. equivalent of
the U.S.’s National Security Agency (NSA)—examine the equipment and its
software very closely. Huawei has recently set up other cybersecurity labs
in
Germany and Belgium, but those only give access to network operators,
not intelligence agencies.
Each year, the HCSEC board issues a report on how that scrutiny is going,
and
the latest report came out Thursday. It was pretty damning.
One major problem is that Huawei can’t prove that the code it submitted
for review is exactly the same code running in its equipment. According to
the report, Huawei’s software development process is so complex and
antiquated that it makes it hard for the British spies to analyze the bugs.
All this has been raised with Huawei before, but the company’s plan for
dealing with it was “unacceptable” to the spies and U.K. network operators,
the report stated, adding that the GCHQ representatives were “not confident
that Huawei is able to remediate the significant problems it faces.”
It gets worse: “Given both the shortfalls in good software engineering
and cyber security practice and the currently unknown trajectory of Huawei’s
R&D processes… it is highly likely that security risk management of products
that are new to the U.K. or new major releases of software for products
currently in the U.K. will be more difficult [and] that there would be new
software engineering and cyber security issues in products HCSEC has not yet
examined.”
In other words, the oversight board isn’t brimming with confidence about
the new-fangled 5G equipment that Huawei is trying to sell into the U.K.
UNQUOTE
Or to put it simply
Huawei
Software Is Rubbish. See e.g. the
HCSEC Oversight Board Report 2019 at page 4
- Overall,
the Oversight Board can
only provide limited assurance that
all risks to UK national security from Huawei’s involvement in the
UK’s critical networks can be sufficiently mitigated
long
-term.
Americans Warn Boris Off Huawei [ 30 January 2020 ]
QUOTE
US Secretary of State Mike Pompeo warned
Huawei's 5G role is a 'real risk'
as he arrived in the UK for potentially stormy talks tonight. Mr Pompeo
urged Boris Johnson to look again at the decision to involve the Chinese
tech giant in the infrastructure project. The pressure came as the PM vowed the Huawei
row will not 'imperil' the Special Relationship.
Amid claims Mr Johnson defied misgivings from
his own ministers to give the firm a limited part in the 5G network, former
Cabinet ministers have suggested his huge 80-strong majority might not be
enough to save him from defeat on the issue.....................
But challenged on the issue at PMQs this
afternoon, Mr Johnson said: 'I want to assure the House and indeed the
country that I think it is absolutely vital that people in this country do
have access to the best technology available...
'But that we also do absolutely nothing to
imperil our relationship with the United States, to do anything to
compromise our critical national security infrastructure or to do anything
to imperil our extremely valuable cooperation with Five Eyes security
partners.'
UNQUOTE Boris Johnson makes the right noises. Why
are the Americans objecting? One important reason, perhaps the real reason is
that they will not be able to break into our network. Yes, the American
NSA tapped German Chancellery for decades.
The US labels Huawei a ‘security
risk’ because Huawei gear protects the confidentiality
of users’ communications:
So says
#Godfree Roberts - see
Huawei, 5G and the Fourth Industrial Revolution.
Of course the NSA broke into
Huawei’s corporate servers
back in 2010; cyberwar
is part of modern life.
Godfree Roberts explained(?)
Go to
Tinker, Tailor, Soldier, Spiv, by Steve Sailer - The Unz Review
and search for Achmed E. Neuman to get:-
Hail, I did not read the article or thread by “Metallicman”, so it’s
too bad I can’t give you any inkling of whether he is full of it or not.
I’ll correct for the record that my trips were not all extended (though
I stayed for over a month one time), and not all business.
Anyway, you do a GREAT and very helpful job with searching up
biographies, Hail, but I have already read some of Mr. Roberts’
background from his own
blogspot site. I also looked through some other material of
his.
Here’s what I remember offhand: Godfree Roberts makes (or attempts to
make, I dunno) a living in Thailand by providing retirement advice for
those Westerners wishing to move there. The site’s in English, so I
figure he caters to Americans, Brits, etc. Part of it is some sort of
tours over there, for the clients to check out quality of life and real
estate. That’s a living, and I don’t begrudge Mr. Roberts for that.
However, his parents, from the bios I read, travelled to China in the
middle of the hard-core Commie days and were Communists themselves. Now,
listen, back in those days, not a lot of Westerners went to China. It
was a big deal for Nixon to go! You were either a missionary, a
Communist sympathizer of the Mao regime, or that one British writer
(Needham) who reckoned the Chinese invented EVERYTHING … but was also a
Communist.
Mr. Roberts, per his bio, has lived all over the place, and I’m
guessing he knows China from either time there with his parents or their
stories of it. Indeed, the question is: If China is so great, WTH does
the guy live in Thailand? My speculation, and that’s all it is, is that
the Chinese government doesn’t want him there, least not for good. Now,
immigration there for anyone isn’t easy, but the modern Chinese
government may say they’re Communist, and they do want control, but they
really don’t want another died-in-the-wool Mao-sack-hanging true
Communist in China. That’s not good for business!
I did not get any answers to my questions from Godfree Roberts.
Lastly, I think Godfree Roberts, a very polite guy on-line, BTW, is
so off-the-wall pro-Communist China (the real thing of Chairman Mao)
that if I found out he were some kind of bizarro-world-Yakov-Smirnoff
parody, the whole thing would make lots more sense to me. He comes up
with lots of bar graphs, but I think most of them are made-up garbage.
However, I really don’t know how much Ron Unz vets the commenters for
honesty or background. In the same way as he deals impulsively, IMO, in
dealing with some long-time commenters, I think Mr. Unz may just not
read that much of some of these people’s material before letting them
post articles. (This site hosts a LOT of content.) Mr. Unz runs a
bang-up site, for error-free usability and interesting material. He also
seems like a stand-up guy who would be the last to budge under pressure
from the Deep State/Tech Totalitarians/Whomever. I wouldn’t argue with
him about his choice of writers, but, yeah, this guy is a piece of work.
Huawei Loses 4G Patent Fight In English Supreme Court [ 27
August 2020 ]
QUOTE
Huawei has lost a landmark Supreme Court case
over its use of 4G technology in mobile phones that has forced
it to shell out tens of millions of pounds for licences. Britain's Supreme Court ruled on Wednesday that Huawei and fellow
Chinese smartphone maker ZTE must pay licence fees for the use of 4G
technology patents.
Unwired Planet, a US company that charges for technology licences,
had challenged Huawei’s use of “standard essential patents” it owned
that had been acquired from telecoms firm Ericsson. Huawei and ZTE
were also challenged by Conversant, another patent holder.............
That finding leaves Huawei liable to paying 5p in every £100 to
Unwired Planet on phones it sells. Lawyers for the claimants
declined to comment on the size of the total payments, but with
Huawei selling 240m handsets last year the liability could
run into tens of millions of pounds...........
The defeat comes as Huawei’s smartphone business has been
battered by US sanctions that have prevented it using Android
software made by Google and could block it from access to key chips.
UNQUOTE
Huawei lost this one but it is far ahead
in
5G
research and development.
It does the research so it has the patents. Other firms will get to pay.
All of this is keeping lotsa lawyers off the dole queue. That is a
pity.
Errors & omissions, broken links,
cock ups, over-emphasis, malice [ real or imaginary ] or whatever; if
you find any I am open to comment.
Email
me at Mike Emery. All
financial contributions are cheerfully accepted. If you want to keep
it private, use my
PGP Key.
Home
Page