MacMusic  |  PcMusic  |  440 Software  |  440 Forums  |  440TV  |  Zicos
supply
Search

The Messy Truth About Infiltrating Computer Supply Chains

Friday January 25, 2019. 09:36 PM , from Slashdot
In October last year, Bloomberg Businessweek published an alarming story: Operatives working for China's People's Liberation Army had secretly implanted microchips into motherboards made in China and sold by U.S.-based Supermicro.
While Bloomberg's story -- which has been challenged by numerous players -- may well be completely (or partly) wrong, the danger of China compromising hardware supply chains is very real, judging from classified intelligence documents, reports The Intercept.

From the report: U.S. spy agencies were warned about the threat in stark terms nearly a decade ago and even assessed that China was adept at corrupting the software bundled closest to a computer's hardware at the factory, threatening some of the U.S. government's most sensitive machines, according to documents provided by National Security Agency whistleblower Edward Snowden. The documents also detail how the U.S. and its allies have themselves systematically targeted and subverted tech supply chains, with the NSA conducting its own such operations, including in China, in partnership with the CIA and other intelligence agencies. The documents also disclose supply chain operations by German and French intelligence.

What's clear is that supply chain attacks are a well-established, if underappreciated, method of surveillance -- and much work remains to be done to secure computing devices from this type of compromise. 'An increasing number of actors are seeking the capability to target... supply chains and other components of the U.S. information infrastructure,' the intelligence community stated in a secret 2009 report. 'Intelligence reporting provides only limited information on efforts to compromise supply chains, in large part because we do not have the access or technology in place necessary for reliable detection of such operations.'

Read more of this story at Slashdot.
rss.slashdot.org/~r/Slashdot/slashdot/~3/6PgmIEE3cYM/the-messy-truth-about-infiltrating-computer-sup...
News copyright owned by their original publishers | Copyright © 2004 - 2024 Zicos / 440Network
Current Date
Nov, Fri 1 - 04:38 CET