Huawei

Huawei is a major Chinese electronics company, specialising in telecommunications; a world leader getting rapidly bigger. Their research funding is huge; US$13.8 billion in 2017, with 76,000 researchers. It is paying off. It is the world leader in #5G , the latest mobile phone system, one offering what is said to be dramatically improved performance. Huawei is the leading developer because #Bell Labs  has fallen behind. Americans chose to sell it off to Nokia, a Finnish company; more fool them. The American government is complaining because Her Majesty's Government is considering whether to use Huawei machinery in our phone system.

A lengthy analysis by Godfree Roberts at #Huawei, 5G and the Fourth Industrial Revolution reads as well informed. The comments confirm the point. But there is no mention of hacking operations. There is more on his decidedly odd background at #Godfree Roberts. Trust him? Not me!

Are they really happening? Bloomberg, a major American Mainstream Media Outfit say that they are. See its article #The Big Hack How China Used a Tiny Chip to Infiltrate U.S. Companies. It is right or it is wrong, true or false. Claiming that the Chinese insert concealed hardware components at the manufacturing stage is interesting and very checkable. It would be far from accidental. El Rego denies it - #Forgotten that Chinese spy chip story We haven't – it's still wrong, Super Micro tells SEC.

Would the Chinese use Espionage to steal information? Yes, of course. More to the point perhaps; do they need to try this approach? Stealing technology is one way forward but they have their own high grade, scientific and technical research capabilities. The pay off is big and getting bigger; billions anyway, trillions quite possibly.

NB Doctor Roberts, lately of the University of Massachusetts also wrote about the China Hoax, part of the Fake News that is being perpetrated by the American government or, if you prefer its Deep State.

A major issue is system security. Buying all Chinese machinery puts us at risk of Sabotage and Espionage. This reality is being pushed by the American government; it regards China as a rival for superpower status. However we have #HUAWEI CYBER SECURITY EVALUATION CENTRE (HCSEC) OVERSIGHT BOARD at Banbury in Oxfordshire, a collaboration between HMG and China. It is one that has been running since late in 2010. That is probably as good as it gets. Further comment comes from WIRED UK. See Here's how GCHQ scours Huawei hardware for malicious code WIRED UK

Given that the firm is seriously involved in scientific research and manufacture it is probably a good financial choice.

The Register, a magazine for computer geeks tells us about Bloomberg's Red Herring; its story about secret chips implanted by Huawei. See #Oh dear. Secret Huawei enterprise router snoop backdoor was Telnet service, sighs Vodafone. Bloomberg is feeding us Fake News; politics in action.

Be aware that this is part of China's move to world dominance. Another is One Belt, One Road ex Infogalactic   
PS The Daily Mail has let the cat out of the bag - 'Ultra-secretive Cell' in Banbury where UK spooks decided it was safe to open up 5G network to China [ says ] Daily Mail.

 

Huawei ex Wiki         
Huawei Technologies Co., Ltd.
  is a Chinese multinational telecommunications equipment and consumer electronics manufacturer, headquartered in Shenzhen.

Ren Zhengfei, a former engineer in the People's Liberation Army, founded Huawei in 1987. At the time of its establishment, Huawei focused on manufacturing phone switches, but has since expanded to include building telecommunications networks, providing operational and consulting services and equipment to enterprises inside and outside of China, and manufacturing communications devices for the consumer market.[3][4] Huawei had over 170,000 employees as of September 2017, around 76,000 of them engaged in research and development (R&D).[5][6] It has 21 R&D institutes in countries including China, the United States,[7] Canada,[8] the United Kingdom,[9] Pakistan, Finland, France, Belgium, Germany, Colombia, Sweden, Ireland, India,[10] Russia, Israel, and Turkey.[11][12] As of 2017 the company invested US$13.8 billion in R&D, up from US$5 billion in 2013.[13][14]

Huawei has deployed its products and services in more than 170 countries, and as of 2011 it served 45 of the 50 largest telecom operators. Huawei overtook Ericsson in 2012 as the largest telecommunications-equipment manufacturer in the world,[16] and overtook Apple in 2018 as the second-largest manufacturer of smartphones in the world, behind Samsung Electronics.[17] It ranks 72nd on the Fortune Global 500 list.[18] In December 2018, Huawei reported that its annual revenue had risen to US$108.5 billion in 2018 (a 21% increase over 2017), surpassing $100 billion for the first time in company history.[19]

Although successful internationally, Huawei has faced difficulties in some markets, due to allegations — particularly from the United States government — that its telecom infrastructure equipment may contain backdoors that could enable unauthorised surveillance by the Chinese government and the People's Liberation Army (citing, in particular, its founder having previously worked for the Army). Cybersecurity concerns over Huawei intensified with the development of 5G wireless networks, with calls to prevent the company from providing equipment for them, and to prevent use of products by Huawei, or fellow Chinese telecom ZTE, by government entities. While the company has argued that its products posed "no greater cybersecurity risk" than those of any other vendors, several major U.S. wireless carriers, as well as retailer Best Buy, began to drop Huawei's products in early-2018. In April, Huawei stated that it would pull out of the U.S. consumer market, as the government scrutiny had impacted its marketability there.

In December 2018, Huawei's vice-chairperson and CFO Meng Wanzhou was arrested in Canada on December 1, 2018, at the request of the United States, which accuses her of violating US sanctions against Iran.[20] The U.S. Department of Justice filed formal charges of fraud, obstruction of justice, and theft of trade secrets against Huawei in January 2019.

 

5G ex Wiki     
In telecommunications, 5G is the fifth generation technology standard for cellular networks, which cellular phone companies began deploying worldwide in 2019, the planned successor to the 4G networks which provide connectivity to most current cellphones.[1] Like its predecessors, 5G networks are cellular networks, in which the service area is divided into small geographical areas called cells. All 5G wireless devices in a cell are connected to the Internet and telephone network by radio waves through a local antenna in the cell. The main advantage of the new networks is that they will have greater bandwidth, giving higher download speeds,[1] eventually up to 10 gigabits per second (Gbit/s).[2] Due to the increased bandwidth, it is expected that the new networks will not just serve cellphones like existing cellular networks, but also be used as general internet service providers for laptops and desktop computers, competing with existing ISPs such as cable internet, and also will make possible new applications in internet of things (IoT) and machine to machine areas. Current 4G cellphones will not be able to use the new networks, which will require new 5G enabled wireless devices.

The increased speed is achieved partly by using higher-frequency radio waves than current cellular networks.[1] However, higher-frequency radio waves have a shorter range than the frequencies used by previous cell phone towers, requiring smaller cells. So to ensure wide service, 5G networks operate on up to three frequency bands, low, medium, and high.[3][1] A 5G network will be composed of networks of up to 3 different types of cells, each requiring different antennas, each type giving a different tradeoff of download speed vs. distance and service area. 5G cellphones and wireless devices will connect to the network through the highest speed antenna within range at their location:

Low-band 5G uses a similar frequency range to current 4G cellphones, 600-700 MHz, giving download speeds a little higher than 4G: 30-250 megabits per second (Mbit/s).[3] Low-band cell towers will have a range and coverage area similar to current 4G towers. Mid-band 5G uses microwaves of 2.5-3.7 GHz, currently allowing speeds of 100-900 Mbit/s, with each cell tower providing service up to several miles in radius. This level of service is the most widely deployed, and should be available in most metropolitan areas in 2020. Some countries are not implementing low-band, making this the minimum service level. High-band 5G currently uses frequencies of 25-39 GHz, near the bottom of the millimeter wave band, although higher frequencies may be used in the future. It often achieves download speeds of a gigabit per second (Gbit/s), comparable to cable internet. However, millimeter waves (mmWave or mmW) have a more limited range, requiring many small cells. They have trouble passing through some types of walls and windows. Due to their higher costs, current plans are to deploy these cells only in dense urban environments and areas where crowds of people congregate such as sports stadiums and convention centers. The above speeds are those achieved in actual tests in 2020, and speeds are expected to increase during rollout.[3]

The industry consortium setting standards for 5G is the 3rd Generation Partnership Project (3GPP).[1] It defines any system using 5G NR (5G New Radio) software as "5G", a definition that came into general use by late 2018. Minimum standards are set by the International Telecommunications Union (ITU). Previously, some reserved the term 5G for systems that deliver download speeds of 20 Gbit/s as specified in the ITU's IMT-2020 document.

 

 

Forgotten that Chinese spy chip story We haven't – it's still wrong, Super Micro tells SEC
QUOTE
Computer server maker at the center of a dramatic secret Chinese spy-chip story has again insisted the yarn is wrong, and called the whole thing "technically implausible."

US-headquartered Super Micro sent a note to its customers late last week denying all claims in a recent Bloomberg BusinessWeek article that the Chinese government had slipped tiny surveillance chips into selected Super Micro server motherboards during their manufacture in the Middle Kingdom.

These bugged boards were supposedly shipped to some 30 organizations – from a major bank and US government contractors to Apple and Amazon – and the chips were allegedly designed to open backdoors, allowing data to be extracted by Chinese state spies. Apple and Amazon, like Super Micro, state none of this ever happened.

Crucially, Super Micro also forwarded a copy of its customer advisory to the America's financial watchdog, the Securities and Exchange Commission, which has published it online.

In the letter to customers, Super Micro CEO Charles Liang, and two senior veeps, say they are confident Bloomberg's tale of surveillance chips inserted into its products was wrong.

"From everything we know and have seen, no malicious hardware chip has been implanted during the manufacturing of our motherboards," they wrote.

They also complain about the difficulty of dealing with a false negative: "We trust you appreciate the difficulty of proving that something did not happen, even though the reporters have produced no affected motherboard or any such malicious hardware chip. As we have said firmly, no one has shown us a motherboard containing any unauthorized hardware chip, we are not aware of any such unauthorized chip, and no government agency has alerted us to the existence of any unauthorized chip."

Regardless, the biz is "undertaking a complicated and time-consuming review" of its supply chain "despite the lack of any proof that a malicious hardware chip exists.".............

Super Micro stresses that no one has come to the support of Bloomberg's article, and that numerous officials, including FBI director Christopher Wray, NSA Senior Cybersecurity Advisor Rob Joyce, Director of National Intelligence Dan Coats, the US Department of Homeland Security, and the UK’s GCHQ have all questioned the story.............

That said, the denials have been unusually specific and categorical. As time has passed, the growing consensus appears to be that Bloomberg got the story wrong. Although a better explanation may be that it accurately reported a misinformation campaign put together by some part of the intelligence services.
UNQUOTE
El Rego is in the business. It understands these things. It is very likely to be right.

 

Huawei, 5G and the Fourth Industrial Revolution, by Godfree Roberts ex Unz 
Huawei, 5G and the #Fourth Industrial Revolution
Shooting Two Feet With One Bullet
by • January 29, 2019

Wireless carriers around the world are sprinting to adopt 5G networks to power self-driving cars, virtual reality and smart cities. We’re talking about billions of devices on the same network, not just millions. First-adopter countries embracing 5G could sustain more than a decade of competitive advantage. Countries that adopt 5G first are expected to experience disproportionate gains in macroeconomic impact compared to those that lag. China’s Five-Year Plan calls for investing a further $400 billion in 5G and consequently, China may be creating a 5G tsunami, making it near impossible to catch up. Deloitte.

5G is a national productivity tool whose benefits, like those we derive from our railways, are less noticeable to end users yet critical to industry and commerce. 5G is 20 times faster than 4G, serves as the fast backbone of the “#Internet Of Things”(IoT), handles a million connected devices/km2 simultaneously with millisecond latency and uses power and radio frequencies more effectively with downloads of 20 Gb/second, enabling smart factories and smart cities.

Gear based on the 5G stand-alone specifications, the standard China is pushing, is designed to run independently of 4G networks so operators will need to rebuild their core networks and buy new 5G base stations to provide higher data speeds and greater capacity, as well as ultra-reliable, low-latency services to support machine-to-machine connection and autonomous driving. Today, many new technologies like IoT and AI are ready for broad application and 5G technology itself is remarkably well developed. Once implemented, a 5G system provides an almost unimaginable increase in the capabilities of all internet-connected devices. Instead of new devices being standalone, they will create an internet-connected web of things to integrate their activities into an almost-living machine-machine and machine-human environment.

Imagine thousands of apps, billions of printable RF identifiers, millions of machine controls, automobiles and many processes that 5G’s low latency alone makes possible. 5G’s one millisecond reaction time is ten times faster than the human experience, which gives the man-machine interface a reactive ‘living’ feel. After a surgeon in China conducted the world’s first remote operation via a 5G network, Dr Michael Kranzfelder told the German Surgical College, “5G networks constitute a trend-setting technology which will play an important role in surgery and open many new applications for which the previous mobile data transmission standard was simply not fast enough.”

The 5G infrastructure market, $528 million in 2018, will grow at a 118 percent CAGR, reaching $26 billion in 2022. Direct and indirect outputs will reach $6.3 trillion and $10.6 trillion by 2030, according to IDC.

In return for millisecond latency, 10cm locational accuracy, blinding speed and wide bandwidth, 5G requires five times more cell sites than 4G. This is how installations stood at the end of 2018:

A crucial element of 5G deployment is the installation of new wireless sites, many of which must be placed on lamp posts and utility poles in densely populated areas. China dominates on that front. During 2017, China Tower, the state-owned cell phone tower operator, added 500 cell sites daily and now has two million wireless sites, compared to approximately 200,000 in the United States. “This disparity between the speed at which China and the United States can add network infrastructure and capacity bodes well for China’s prospects in the race to 5G,” Deloitte said.

 Remarkably, only one company owns significant 5G intellectual property, controls its own silicon from end to end, produces all the elements of 5G networks–including proprietary chips–assembles and installs them affordably on a national scale: Huawei.

Non-Huawei customers must integrate more costly, less functional, less compatible and less upgradeable elements, pay twice as much, take twice as long to implement 5G and experience inferior service because Huawei produces every element of 5G systems and assembles turnkey networks–from antennas to the power stations needed to operate them to chips, servers and handsets–at scale and cost. It is literally unrivalled in enhanced mobile broadband.

Huawei employs 700 mathematicians, 800 physicists, 120 chemists and 6,000 fundamental researchers. Among its 87,805 patents, 11,152 core patents were granted in the US and the company has cross-licensing agreements for patents with many Western companies. Your Huawei phone is assembled with just 28.5 seconds of human labor in a high-end automated plant spread over 1.4 square km. Automation and technology upgrades have reduced the staff to 17 yet its more than 30 production lines produce 2 million smartphones every month:

In 2018 Huawei unveiled the world’s first 5G Base Station Chipset, Tiangang, which enables simplified 5G networks and large-scale network deployment. It makes breakthroughs in integration, computing capability and spectral bandwidth and supports the 200 MHz high spectral bandwidth required for future networks while running 2.5 times faster than existing products. Tiangang improves active antenna units (AAU) in a revolutionary way and cuts the weight of 5G base stations by half. Huawei has shipped over 25,000 5G base stations worldwide, deployed 5G networks in more than 10 countries and will deploy 5G in 20 countries in 2019.

Tiangang is not the company’s only trick. Andrei Frumusanu says Huawei’s semiconductor division, HiSilicon, is the only company to provide high-end competition with Qualcomm and, in some areas, is comfortably ahead. Its 7 nm Ascend 910 chipset for data centers is twice as powerful as Nvidia’s v100 and the first AI IP chip series to natively provide optimal TeraOPS per watt in all scenarios. Its 7nm ARM-based CPU, the Kunpeng 920 boosts the development of computing in big data, distributed storage, and ARM-native application scenarios by 20%. Its Kirin 980 CPU is the world’s first commercial 7nm system-on-chip (SoC) and the first to use Cortex-A76 cores, dual neural processing units, Mali G76 GPU, a 1.4 Gbps LTE modem and supports faster RAM. With 20 percent faster performance and 40 percent less power consumption compared to 10nm systems, it has twice the performance of Qualcomm’s Snapdragon 845 and Apple’s A11 while consuming 40% less power. The Kirin 980 fits 6.9 billion transistors on a chip no larger than a thumbnail. Huawei’s patented modem has the world’s fastest WiFi and its GPS receiver taps L5 frequency to deliver 10cm positioning and supports speeds up to 1.4Gbps and 2,133MHz LPDDR4X RAM.

Huawei’s 5G phone will launch in June this year. Apple will release its first 5G handset in September, 2020.

Beijing’s four telcos are spending 30 billion yuan (US$5.4 billion) on a 5G network in the city by 2022 and applying the technology to infrastructure like the new airport, the new satellite city and the 2022 Winter Olympics. The city, home to many of the country’s top tech companies, plans to achieve 200 billion yuan of 5G related revenue by 2022. Beijing has set up product innovation centers, special projects and manufacturing bases for developing the key components, including radio frequency parts and chips. The city aims to have its tech companies reach a 10 percent share in the global 5G component market. “Obtaining breakthroughs on developing core components for the 5G network and putting them into industrial use is the primary task for developing the 5G industry in the city,” says the mayor’s plan.

Xiongan New Area, a brand new city of six million located sixty miles from Beijing, which will welcome its first residents in 2020, is being wired for 5G. Residents will find no traffic lights, many autonomous vehicles, face recognition providing seamless access and be able to reach the capital via a driverless maglev train costing the same to build and operate as regular subways but traveling silently at 120 mph, with no moving parts. A literal city of the future, courtesy of 5G, Xiongan is designed to deliver the same relative productivity gains for its residents that the Industrial Revolution gave England’s in the 19th century.

The US labels Huawei a ‘security risk’ because Huawei gear protects the confidentiality of users’ communications: “Most of the personal data you store on your Huawei device (such as your photos, call logs, mailing list, messages, frequently visited websites, and so on) will be strictly protected. In addition, you will be clearly notified of any personal information being collected, and have complete control over the collection, processing, and sharing of your personal data. Without your authorization, your personal data will not be disclosed with any third parties.”

Snowden's revelations suggest Huawei is more sinned against than sinning. The NSA’s ‘Tailored Access Operations’ unit broke into Huawei’s corporate servers and by 2010 was reading corporate emails and examining the source code in Huawei’s products.“We currently have good access and so much data that we don’t know what to do with it,” boasted one NSA briefing. Slides also disclosed that the NSA intended to plant its own backdoors in Huawei firmware. In 2014 the New York Times, Time and Reuters revealed that the NSA had infiltrated Huawei headquarters, monitored all of its executives and gone through the company’s entire data infrastructure.

One goal was to find links between Huawei and the PLA and the other was to find vulnerabilities so that the NSA could spy on nations through computer and telephone networks Huawei sold, as it did through Cisco’s, which had installed ‘back doors’ for the CIA. The Times said its story of operation Shotgiant was based on NSA documents provided by Edward Snowden. The NSA planned to unleash offensive cyber attacks through Huawei if ordered by the President, “Many of our targets communicate over Huawei-produced products. We want to make sure that we know how to exploit these products,” the Times quoted an NSA document as saying, to “gain access to networks of interest” around the world.

Bien Perez and Li Tao say, “The Chinese government wants every industry to use the most advanced infrastructure to upgrade productivity. This is a strategic agenda, and they think that 5G will help. China has very ambitious plans to promote the industrial internet of things, cloud computing and artificial intelligence (AI), the capabilities of which require the support of brand-new 5G networks. For example, self-driving cars require sensors, AI and roadside base stations for fast and reliable connectivity to allow vehicles to talk to each other to avoid collisions and avoid pedestrians. Today’s 4G networks cannot meet those quick response times.

China’s plan for an aggressive 5G roll-out is in line with the Made In China2025 road map. Initially, this focused on the domestic telecoms sector’s ability to increase broadband penetration nationwide to 82 per cent by 2025 as part of a push for industrial modernisation. Another objective was to see local suppliers making 40 percent of all mobile phone chips used in the domestic market. Under an updated version published in January, Beijing now wants China to become the world’s leading maker of telecoms equipment.

Smart factories will integrate the entire factory production process, arranging the smooth transfer from minimal energy, raw materials and water inputs and the just-in-time delivery of subcomponents to the optimised assembly line production of custom-designed-and-ordered by customers to the effective delivery of these products to the user and the continual (and maybe continuous) product reporting of its use, effectiveness and location. Smart cities will have driverless cars, buses and delivery trucks and ports and airports. The smart economy will have very fast HST intercity services, along with transparent data on the operation of mines, energy generation, transport, communications and government. Medical monitoring and the rise of the extended healthspan technology will free China from the dependency trap because people are likely to remain healthy all their lives using continuous medical assessment through an internet bangle.

President Trump has attacked the Made In China 2025 policy because the US, stuck in neoclassical macroeconomics, is committed to a system which not only does not produce the goods but also can’t afford the essential infrastructure required for the next major advance in the ongoing industrial revolution. The decision will put the Five Eyes countries ten years behind China in 5G and its associated technologies. The Germans correctly describe their version of China2025, Industrie04 as “the fourth industrial revolution.” The 5G stakes are so big that, if Germany rejects Huawei it risks committing economic suicide.

 

Super Micro ex Wiki       
Super Micro Computer, Inc.
, doing business as Supermicro, is an information technology company based in San Jose, California. Supermicro's headquarters are located in Silicon Valley, with a manufacturing space in the Netherlands and a Science and Technology Park in Taiwan.

Founded by Charles Liang, Wally Liaw and Sara Liu on November 1, 1993, Supermicro specializes in servers, storage, blades, rack solutions, networking devices, server management software and high-end workstations for data center, cloud computing, enterprise IT, big data, high performance computing (HPC), and embedded markets.[1][2][3]

In 2016, the company deployed thousands of servers into a single data center[4] and was ranked the 18th fastest growing company on Fortune Magazine’s Top 100 list of the world’s largest US publicly traded companies in 2016 and the fastest growing IT infrastructure company.

 

China Hoax     
QUOTE              
Propaganda is to a democracy what the bludgeon is to a totalitarian state. Noam Chomsky.

I was researching Chinese censorship when–irony of ironies–I fell afoul of American censorship, providing an opportunity to update you on the state of the art under both regimes, starting at home, with the recent attempt to frame the President [ That is dear old Don ] for crimes he did not commit.

Like many attempts to frame people, events and nations–Vietnam, Iraq, 9/11, JFK, Bin Laden–it was a State hoax, a falsehood deliberately fabricated to masquerade as truth . An atrocity story sustained by artful censorship and loud, proud, bold and brassy propaganda. An expensive, in-your-face, preposterous conspiracy, sustained for two years at great financial and reputational cost to the nation. Wildly ambitious, batshit crazy and so self-destructive as to boggle the mind, it was one of many propaganda-driven frame-ups, another of which in progress as you read these lines.

It checks all the boxes: big, bold, loud and proud, expensive, in-your-face, a preposterous hoax, daringly ambitious and utterly self-destructive.

The China Hoax frames China’s Confucian politics and economics as if they were–or should be–Roman. It explains why thousands of predictions of China’s collapse have been one hundred percent wrong for seventy years and why we keep repeating them, and why we think of China’s government as oppressively authoritarian when ninety-five percent of Chinese think it’s super [ NB It is only 83% in fact but that is not at all bad - Editor ]. It also helps us see how the narrative is sustained by an almost totalitarian censorship regime [ the American one? - Editor ].
UNQUOTE
Would the American Deep State do that? Believe it.

 

Oh dear. Secret Huawei enterprise router snoop 'backdoor' was Telnet service, sighs Vodafone • The Register
QUOTE
Given Bloomberg's previous history of trying to break tech news, when it claimed that tiny spy chips were being secretly planted on Supermicro server motherboards – something that left the rest of the tech world scratching its collective head once the initial dust had settled – it may be best to take this latest revelation with a pinch of salt. Telnet wasn't even mentioned in the latest report from the UK's Huawei Cyber Security Evaluation Centre, which savaged Huawei's pisspoor software development practices.

While there is ample evidence in the public domain that Huawei is doing badly on the basics of secure software development, so far there has been little that tends to show it deliberately implements hidden espionage backdoors. Rhetoric from the US alleging Huawei is a threat to national security seems to be having the opposite effect around the world.

With Bloomberg, an American company, characterising Vodafone's use of Huawei equipment as "defiance" showing "that countries across Europe are willing to risk rankling the US in the name of 5G preparedness," it appears that the US-Euro-China divide on 5G technology suppliers isn't closing up any time soon.
®
This isn't shaping up to be a good week for Bloomberg. Only yesterday High Court judge Mr Justice Nicklin ordered the company to pay up £25k for the way it reported a live and ongoing criminal investigation.
UNQUOTE
El Rego is in the business. It understands these things unlike Bloomberg.

 

The Big Hack How China Used a Tiny Chip to Infiltrate U.S. Companies ex Bloomberg
The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple, by compromising America’s technology supply chain, according to extensive interviews with government and corporate sources.
undefined
In 2015, Amazon.com Inc. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video. Based in Portland, Ore., Elemental made software for compressing massive video files and formatting them for different devices. Its technology had helped stream the Olympic Games online, communicate with the International Space Station, and funnel drone footage to the Central Intelligence Agency. Elemental’s national security contracts weren’t the main reason for the proposed acquisition, but they fit nicely with Amazon’s government businesses, such as the highly secure cloud that Amazon Web Services (AWS) was building for the CIA.

To help with due diligence, AWS, which was overseeing the prospective acquisition, hired a third-party company to scrutinize Elemental’s security, according to one person familiar with the process. The first pass uncovered troubling issues, prompting AWS to take a closer look at Elemental’s main product: the expensive servers that customers installed in their networks to handle the video compression. These servers were assembled for Elemental by Super Micro Computer Inc., a San Jose-based company (commonly known as Supermicro) that’s also one of the world’s biggest suppliers of server motherboards, the fiberglass-mounted clusters of chips and capacitors that act as the neurons of data centers large and small. In late spring of 2015, Elemental’s staff boxed up several servers and sent them to Ontario, Canada, for the third-party security company to test, the person says.

relates to The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies
Featured in Bloomberg Businessweek, Oct. 8, 2018.

Nested on the servers’ motherboards, the testers found a tiny microchip, not much bigger than a grain of rice, that wasn’t part of the boards’ original design. Amazon reported the discovery to U.S. authorities, sending a shudder through the intelligence community. Elemental’s servers could be found in Department of Defense data centers, the CIA’s drone operations, and the onboard networks of Navy warships. And Elemental was just one of hundreds of Supermicro customers.

During the ensuing top-secret probe, which remains open more than three years later, investigators determined that the chips allowed the attackers to create a stealth doorway into any network that included the altered machines. Multiple people familiar with the matter say investigators found that the chips had been inserted at factories run by manufacturing subcontractors in China.

This attack was something graver than the software-based incidents the world has grown accustomed to seeing. Hardware hacks are more difficult to pull off and potentially more devastating, promising the kind of long-term, stealth access that spy agencies are willing to invest millions of dollars and many years to get.

“Having a well-done, nation-state-level hardware implant surface would be like witnessing a unicorn jumping over a rainbow”

There are two ways for spies to alter the guts of computer equipment. One, known as interdiction, consists of manipulating devices as they’re in transit from manufacturer to customer. This approach is favored by U.S. spy agencies, according to documents leaked by former National Security Agency contractor Edward Snowden. The other method involves seeding changes from the very beginning.

One country in particular has an advantage executing this kind of attack: China, which by some estimates makes 75 percent of the world’s mobile phones and 90 percent of its PCs. Still, to actually accomplish a seeding attack would mean developing a deep understanding of a product’s design, manipulating components at the factory, and ensuring that the doctored devices made it through the global logistics chain to the desired location—a feat akin to throwing a stick in the Yangtze River upstream from Shanghai and ensuring that it washes ashore in Seattle. “Having a well-done, nation-state-level hardware implant surface would be like witnessing a unicorn jumping over a rainbow,” says Joe Grand, a hardware hacker and the founder of Grand Idea Studio Inc. “Hardware is just so far off the radar, it’s almost treated like black magic.”

But that’s just what U.S. investigators found: The chips had been inserted during the manufacturing process, two officials say, by operatives from a unit of the People’s Liberation Army. In Supermicro, China’s spies appear to have found a perfect conduit for what U.S. officials now describe as the most significant supply chain attack known to have been carried out against American companies.

One official says investigators found that it eventually affected almost 30 companies, including a major bank, government contractors, and the world’s most valuable company, Apple Inc. Apple was an important Supermicro customer and had planned to order more than 30,000 of its servers in two years for a new global network of data centers. Three senior insiders at Apple say that in the summer of 2015, it, too, found malicious chips on Supermicro motherboards. Apple severed ties with Supermicro the following year, for what it described as unrelated reasons.

In emailed statements, Amazon (which announced its acquisition of Elemental in September 2015), Apple, and Supermicro disputed summaries of Bloomberg Businessweek’s reporting. “It’s untrue that AWS knew about a supply chain compromise, an issue with malicious chips, or hardware modifications when acquiring Elemental,” Amazon wrote. “On this we can be very clear: Apple has never found malicious chips, ‘hardware manipulations’ or vulnerabilities purposely planted in any server,” Apple wrote. “We remain unaware of any such investigation,” wrote a spokesman for Supermicro, Perry Hayes. The Chinese government didn’t directly address questions about manipulation of Supermicro servers, issuing a statement that read, in part, “Supply chain safety in cyberspace is an issue of common concern, and China is also a victim.” The FBI and the Office of the Director of National Intelligence, representing the CIA and NSA, declined to comment.

The companies’ denials are countered by six current and former senior national security officials, who—in conversations that began during the Obama administration and continued under the Trump administration—detailed the discovery of the chips and the government’s investigation. One of those officials and two people inside AWS provided extensive information on how the attack played out at Elemental and Amazon; the official and one of the insiders also described Amazon’s cooperation with the government investigation. In addition to the three Apple insiders, four of the six U.S. officials confirmed that Apple was a victim. In all, 17 people confirmed the manipulation of Supermicro’s hardware and other elements of the attacks. The sources were granted anonymity because of the sensitive, and in some cases classified, nature of the information.

One government official says China’s goal was long-term access to high-value corporate secrets and sensitive government networks. No consumer data is known to have been stolen.

The ramifications of the attack continue to play out. The Trump administration has made computer and networking hardware, including motherboards, a focus of its latest round of trade sanctions against China, and White House officials have made it clear they think companies will begin shifting their supply chains to other countries as a result. Such a shift might assuage officials who have been warning for years about the security of the supply chain—even though they’ve never disclosed a major reason for their concerns.

How the Hack Worked, According to U.S. Officials

Back in 2006, three engineers in Oregon had a clever idea. Demand for mobile video was about to explode, and they predicted that broadcasters would be desperate to transform programs designed to fit TV screens into the various formats needed for viewing on smartphones, laptops, and other devices. To meet the anticipated demand, the engineers started Elemental Technologies, assembling what one former adviser to the company calls a genius team to write code that would adapt the superfast graphics chips being produced for high-end video-gaming machines. The resulting software dramatically reduced the time it took to process large video files. Elemental then loaded the software onto custom-built servers emblazoned with its leprechaun-green logos.

Elemental servers sold for as much as $100,000 each, at profit margins of as high as 70 percent, according to a former adviser to the company. Two of Elemental’s biggest early clients were the Mormon church, which used the technology to beam sermons to congregations around the world, and the adult film industry, which did not.

Elemental also started working with American spy agencies. In 2009 the company announced a development partnership with In-Q-Tel Inc., the CIA’s investment arm, a deal that paved the way for Elemental servers to be used in national security missions across the U.S. government. Public documents, including the company’s own promotional materials, show that the servers have been used inside Department of Defense data centers to process drone and surveillance-camera footage, on Navy warships to transmit feeds of airborne missions, and inside government buildings to enable secure videoconferencing. NASA, both houses of Congress, and the Department of Homeland Security have also been customers. This portfolio made Elemental a target for foreign adversaries.

Supermicro had been an obvious choice to build Elemental’s servers. Headquartered north of San Jose’s airport, up a smoggy stretch of Interstate 880, the company was founded by Charles Liang, a Taiwanese engineer who attended graduate school in Texas and then moved west to start Supermicro with his wife in 1993. Silicon Valley was then embracing outsourcing, forging a pathway from Taiwanese, and later Chinese, factories to American consumers, and Liang added a comforting advantage: Supermicro’s motherboards would be engineered mostly in San Jose, close to the company’s biggest clients, even if the products were manufactured overseas.

Today, Supermicro sells more server motherboards than almost anyone else. It also dominates the $1 billion market for boards used in special-purpose computers, from MRI machines to weapons systems. Its motherboards can be found in made-to-order server setups at banks, hedge funds, cloud computing providers, and web-hosting services, among other places. Supermicro has assembly facilities in California, the Netherlands, and Taiwan, but its motherboards—its core product—are nearly all manufactured by contractors in China.

The company’s pitch to customers hinges on unmatched customization, made possible by hundreds of full-time engineers and a catalog encompassing more than 600 designs. The majority of its workforce in San Jose is Taiwanese or Chinese, and Mandarin is the preferred language, with hanzi filling the whiteboards, according to six former employees. Chinese pastries are delivered every week, and many routine calls are done twice, once for English-only workers and again in Mandarin. The latter are more productive, according to people who’ve been on both. These overseas ties, especially the widespread use of Mandarin, would have made it easier for China to gain an understanding of Supermicro’s operations and potentially to infiltrate the company. (A U.S. official says the government’s probe is still examining whether spies were planted inside Supermicro or other American companies to aid the attack.)

With more than 900 customers in 100 countries by 2015, Supermicro offered inroads to a bountiful collection of sensitive targets. “Think of Supermicro as the Microsoft of the hardware world,” says a former U.S. intelligence official who’s studied Supermicro and its business model. “Attacking Supermicro motherboards is like attacking Windows. It’s like attacking the whole world.”

Well before evidence of the attack surfaced inside the networks of U.S. companies, American intelligence sources were reporting that China’s spies had plans to introduce malicious microchips into the supply chain. The sources weren’t specific, according to a person familiar with the information they provided, and millions of motherboards are shipped into the U.S. annually. But in the first half of 2014, a different person briefed on high-level discussions says, intelligence officials went to the White House with something more concrete: China’s military was preparing to insert the chips into Supermicro motherboards bound for U.S. companies.

The specificity of the information was remarkable, but so were the challenges it posed. Issuing a broad warning to Supermicro’s customers could have crippled the company, a major American hardware maker, and it wasn’t clear from the intelligence whom the operation was targeting or what its ultimate aims were. Plus, without confirmation that anyone had been attacked, the FBI was limited in how it could respond. The White House requested periodic updates as information came in, the person familiar with the discussions says.

Apple made its discovery of suspicious chips inside Supermicro servers around May 2015, after detecting odd network activity and firmware problems, according to a person familiar with the timeline. Two of the senior Apple insiders say the company reported the incident to the FBI but kept details about what it had detected tightly held, even internally. Government investigators were still chasing clues on their own when Amazon made its discovery and gave them access to sabotaged hardware, according to one U.S. official. This created an invaluable opportunity for intelligence agencies and the FBI—by then running a full investigation led by its cyber- and counterintelligence teams—to see what the chips looked like and how they worked.

The chips on Elemental servers were designed to be as inconspicuous as possible, according to one person who saw a detailed report prepared for Amazon by its third-party security contractor, as well as a second person who saw digital photos and X-ray images of the chips incorporated into a later report prepared by Amazon’s security team. Gray or off-white in color, they looked more like signal conditioning couplers, another common motherboard component, than microchips, and so they were unlikely to be detectable without specialized equipment. Depending on the board model, the chips varied slightly in size, suggesting that the attackers had supplied different factories with different batches.

Officials familiar with the investigation say the primary role of implants such as these is to open doors that other attackers can go through. “Hardware attacks are about access,” as one former senior official puts it. In simplified terms, the implants on Supermicro hardware manipulated the core operating instructions that tell the server what to do as data move across a motherboard, two people familiar with the chips’ operation say. This happened at a crucial moment, as small bits of the operating system were being stored in the board’s temporary memory en route to the server’s central processor, the CPU. The implant was placed on the board in a way that allowed it to effectively edit this information queue, injecting its own code or altering the order of the instructions the CPU was meant to follow. Deviously small changes could create disastrous effects.

Since the implants were small, the amount of code they contained was small as well. But they were capable of doing two very important things: telling the device to communicate with one of several anonymous computers elsewhere on the internet that were loaded with more complex code; and preparing the device’s operating system to accept this new code. The illicit chips could do all this because they were connected to the baseboard management controller, a kind of superchip that administrators use to remotely log in to problematic servers, giving them access to the most sensitive code even on machines that have crashed or are turned off.

This system could let the attackers alter how the device functioned, line by line, however they wanted, leaving no one the wiser. To understand the power that would give them, take this hypothetical example: Somewhere in the Linux operating system, which runs in many servers, is code that authorizes a user by verifying a typed password against a stored encrypted one. An implanted chip can alter part of that code so the server won’t check for a password—and presto! A secure machine is open to any and all users. A chip can also steal encryption keys for secure communications, block security updates that would neutralize the attack, and open up new pathways to the internet. Should some anomaly be noticed, it would likely be cast as an unexplained oddity. “The hardware opens whatever door it wants,” says Joe FitzPatrick, founder of Hardware Security Resources LLC, a company that trains cybersecurity professionals in hardware hacking techniques.

U.S. officials had caught China experimenting with hardware tampering before, but they’d never seen anything of this scale and ambition. The security of the global technology supply chain had been compromised, even if consumers and most companies didn’t know it yet. What remained for investigators to learn was how the attackers had so thoroughly infiltrated Supermicro’s production process—and how many doors they’d opened into American targets.

Unlike software-based hacks, hardware manipulation creates a real-world trail. Components leave a wake of shipping manifests and invoices. Boards have serial numbers that trace to specific factories. To track the corrupted chips to their source, U.S. intelligence agencies began following Supermicro’s serpentine supply chain in reverse, a person briefed on evidence gathered during the probe says.

As recently as 2016, according to DigiTimes, a news site specializing in supply chain research, Supermicro had three primary manufacturers constructing its motherboards, two headquartered in Taiwan and one in Shanghai. When such suppliers are choked with big orders, they sometimes parcel out work to subcontractors. In order to get further down the trail, U.S. spy agencies drew on the prodigious tools at their disposal. They sifted through communications intercepts, tapped informants in Taiwan and China, even tracked key individuals through their phones, according to the person briefed on evidence gathered during the probe. Eventually, that person says, they traced the malicious chips to four subcontracting factories that had been building Supermicro motherboards for at least two years.

As the agents monitored interactions among Chinese officials, motherboard manufacturers, and middlemen, they glimpsed how the seeding process worked. In some cases, plant managers were approached by people who claimed to represent Supermicro or who held positions suggesting a connection to the government. The middlemen would request changes to the motherboards’ original designs, initially offering bribes in conjunction with their unusual requests. If that didn’t work, they threatened factory managers with inspections that could shut down their plants. Once arrangements were in place, the middlemen would organize delivery of the chips to the factories.

The investigators concluded that this intricate scheme was the work of a People’s Liberation Army unit specializing in hardware attacks, according to two people briefed on its activities. The existence of this group has never been revealed before, but one official says, “We’ve been tracking these guys for longer than we’d like to admit.” The unit is believed to focus on high-priority targets, including advanced commercial technology and the computers of rival militaries. In past attacks, it targeted the designs for high-performance computer chips and computing systems of large U.S. internet providers.

Provided details of Businessweek’s reporting, China’s Ministry of Foreign Affairs sent a statement that said “China is a resolute defender of cybersecurity.” The ministry added that in 2011, China proposed international guarantees on hardware security along with other members of the Shanghai Cooperation Organization, a regional security body. The statement concluded, “We hope parties make less gratuitous accusations and suspicions but conduct more constructive talk and collaboration so that we can work together in building a peaceful, safe, open, cooperative and orderly cyberspace.”

The Supermicro attack was on another order entirely from earlier episodes attributed to the PLA. It threatened to have reached a dizzying array of end users, with some vital ones in the mix. Apple, for its part, has used Supermicro hardware in its data centers sporadically for years, but the relationship intensified after 2013, when Apple acquired a startup called Topsy Labs, which created superfast technology for indexing and searching vast troves of internet content. By 2014, the startup was put to work building small data centers in or near major global cities. This project, known internally as Ledbelly, was designed to make the search function for Apple’s voice assistant, Siri, faster, according to the three senior Apple insiders.

Documents seen by Businessweek show that in 2014, Apple planned to order more than 6,000 Supermicro servers for installation in 17 locations, including Amsterdam, Chicago, Hong Kong, Los Angeles, New York, San Jose, Singapore, and Tokyo, plus 4,000 servers for its existing North Carolina and Oregon data centers. Those orders were supposed to double, to 20,000, by 2015. Ledbelly made Apple an important Supermicro customer at the exact same time the PLA was found to be manipulating the vendor’s hardware.

Project delays and early performance problems meant that around 7,000 Supermicro servers were humming in Apple’s network by the time the company’s security team found the added chips. Because Apple didn’t, according to a U.S. official, provide government investigators with access to its facilities or the tampered hardware, the extent of the attack there remained outside their view.

relates to The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies
Microchips found on altered motherboards in some cases looked like signal conditioning couplers.
Photographer: Victor Prado for Bloomberg Businessweek

American investigators eventually figured out who else had been hit. Since the implanted chips were designed to ping anonymous computers on the internet for further instructions, operatives could hack those computers to identify others who’d been affected. Although the investigators couldn’t be sure they’d found every victim, a person familiar with the U.S. probe says they ultimately concluded that the number was almost 30 companies.

That left the question of whom to notify and how. U.S. officials had been warning for years that hardware made by two Chinese telecommunications giants, Huawei Corp. and ZTE Corp., was subject to Chinese government manipulation. (Both Huawei and ZTE have said no such tampering has occurred.) But a similar public alert regarding a U.S. company was out of the question. Instead, officials reached out to a small number of important Supermicro customers. One executive of a large web-hosting company says the message he took away from the exchange was clear: Supermicro’s hardware couldn’t be trusted. “That’s been the nudge to everyone—get that crap out,” the person says.

Amazon, for its part, began acquisition talks with an Elemental competitor, but according to one person familiar with Amazon’s deliberations, it reversed course in the summer of 2015 after learning that Elemental’s board was nearing a deal with another buyer. Amazon announced its acquisition of Elemental in September 2015, in a transaction whose value one person familiar with the deal places at $350 million. Multiple sources say that Amazon intended to move Elemental’s software to AWS’s cloud, whose chips, motherboards, and servers are typically designed in-house and built by factories that Amazon contracts from directly.

A notable exception was AWS’s data centers inside China, which were filled with Supermicro-built servers, according to two people with knowledge of AWS’s operations there. Mindful of the Elemental findings, Amazon’s security team conducted its own investigation into AWS’s Beijing facilities and found altered motherboards there as well, including more sophisticated designs than they’d previously encountered. In one case, the malicious chips were thin enough that they’d been embedded between the layers of fiberglass onto which the other components were attached, according to one person who saw pictures of the chips. That generation of chips was smaller than a sharpened pencil tip, the person says. (Amazon denies that AWS knew of servers found in China containing malicious chips.)

China has long been known to monitor banks, manufacturers, and ordinary citizens on its own soil, and the main customers of AWS’s China cloud were domestic companies or foreign entities with operations there. Still, the fact that the country appeared to be conducting those operations inside Amazon’s cloud presented the company with a Gordian knot. Its security team determined that it would be difficult to quietly remove the equipment and that, even if they could devise a way, doing so would alert the attackers that the chips had been found, according to a person familiar with the company’s probe. Instead, the team developed a method of monitoring the chips. In the ensuing months, they detected brief check-in communications between the attackers and the sabotaged servers but didn’t see any attempts to remove data. That likely meant either that the attackers were saving the chips for a later operation or that they’d infiltrated other parts of the network before the monitoring began. Neither possibility was reassuring./p>

When in 2016 the Chinese government was about to pass a new cybersecurity law—seen by many outside the country as a pretext to give authorities wider access to sensitive data—Amazon decided to act, the person familiar with the company’s probe says. In August it transferred operational control of its Beijing data center to its local partner, Beijing Sinnet, a move the companies said was needed to comply with the incoming law. The following November, Amazon sold the entire infrastructure to Beijing Sinnet for about $300 million. The person familiar with Amazon’s probe casts the sale as a choice to “hack off the diseased limb.”

As for Apple, one of the three senior insiders says that in the summer of 2015, a few weeks after it identified the malicious chips, the company started removing all Supermicro servers from its data centers, a process Apple referred to internally as “going to zero.” Every Supermicro server, all 7,000 or so, was replaced in a matter of weeks, the senior insider says. (Apple denies that any servers were removed.) In 2016, Apple informed Supermicro that it was severing their relationship entirely—a decision a spokesman for Apple ascribed in response to Businessweek’s questions to an unrelated and relatively minor security incident.

That August, Supermicro’s CEO, Liang, revealed that the company had lost two major customers. Although he didn’t name them, one was later identified in news reports as Apple. He blamed competition, but his explanation was vague. “When customers asked for lower price, our people did not respond quickly enough,” he said on a conference call with analysts. Hayes, the Supermicro spokesman, says the company has never been notified of the existence of malicious chips on its motherboards by either customers or U.S. law enforcement.

Concurrent with the illicit chips’ discovery in 2015 and the unfolding investigation, Supermicro has been plagued by an accounting problem, which the company characterizes as an issue related to the timing of certain revenue recognition. After missing two deadlines to file quarterly and annual reports required by regulators, Supermicro was delisted from the Nasdaq on Aug. 23 of this year. It marked an extraordinary stumble for a company whose annual revenue had risen sharply in the previous four years, from a reported $1.5 billion in 2014 to a projected $3.2 billion this year.

One Friday in late September 2015, President Barack Obama and Chinese President Xi Jinping appeared together at the White House for an hourlong press conference headlined by a landmark deal on cybersecurity. After months of negotiations, the U.S. had extracted from China a grand promise: It would no longer support the theft by hackers of U.S. intellectual property to benefit Chinese companies. Left out of those pronouncements, according to a person familiar with discussions among senior officials across the U.S. government, was the White House’s deep concern that China was willing to offer this concession because it was already developing far more advanced and surreptitious forms of hacking founded on its near monopoly of the technology supply chain.

In the weeks after the agreement was announced, the U.S. government quietly raised the alarm with several dozen tech executives and investors at a small, invite-only meeting in McLean, Va., organized by the Pentagon. According to someone who was present, Defense Department officials briefed the technologists on a recent attack and asked them to think about creating commercial products that could detect hardware implants. Attendees weren’t told the name of the hardware maker involved, but it was clear to at least some in the room that it was Supermicro, the person says.

The problem under discussion wasn’t just technological. It spoke to decisions made decades ago to send advanced production work to Southeast Asia. In the intervening years, low-cost Chinese manufacturing had come to underpin the business models of many of America’s largest technology companies. Early on, Apple, for instance, made many of its most sophisticated electronics domestically. Then in 1992, it closed a state-of-the-art plant for motherboard and computer assembly in Fremont, Calif., and sent much of that work overseas.

Over the decades, the security of the supply chain became an article of faith despite repeated warnings by Western officials. A belief formed that China was unlikely to jeopardize its position as workshop to the world by letting its spies meddle in its factories. That left the decision about where to build commercial systems resting largely on where capacity was greatest and cheapest. “You end up with a classic Satan’s bargain,” one former U.S. official says. “You can have less supply than you want and guarantee it’s secure, or you can have the supply you need, but there will be risk. Every organization has accepted the second proposition.”

In the three years since the briefing in McLean, no commercially viable way to detect attacks like the one on Supermicro’s motherboards has emerged—or has looked likely to emerge. Few companies have the resources of Apple and Amazon, and it took some luck even for them to spot the problem. “This stuff is at the cutting edge of the cutting edge, and there is no easy technological solution,” one of the people present in McLean says. “You have to invest in things that the world wants. You cannot invest in things that the world is not ready to accept yet.”

Bloomberg LP has been a Supermicro customer. According to a Bloomberg LP spokesperson, the company has found no evidence to suggest that it has been affected by the hardware issues raised in the article.

 


 

CIA Warns Britain Over China's Secret Funding Of Huawei  [ 22 April 2019 ]
QUOTE
The CIA has accused Huawei of being funded by Chinese state security amid a list of allegations facing the company. They say the technologies giant, who wants to provide Britain with technology for the new 5G network, has received funds from China's National Security Commission, the People's Liberation Army and a third branch of the Chinese state intelligence network, The Times reported.

The US source explained that Huawei wants to sell its 5G technology to members of the Five Eyes intelligence-sharing group - including Britain, Australia, Canada and New Zealand. But critics have warned that Chinese law could force the tech company to co-operate with its security branches, leading to software being built to spy on or disrupt communications in Britain..........

They [ Huawei ] told the publication: 'Huawei does not comment on unsubstantiated allegations backed up by zero evidence from anonymous sources.' 

The Whitehall review, which is looking at the future of the UK's telecom systems and introducing 5G into Britain, will be discussed at the National Security Council by Theresa May, cabinet ministers and security chiefs.
UNQUOTE
There is no mention of the NSA attacking communications worldwide but is different. Chinese security outfits do not need law; they have power. China is a world leader in 5G and other research areas.

 

China Says Buy From Huawei   [ 29 April 2019 ]
QUOTE
China's ambassador in London has moved to reassure the Government over Huawei spying concerns as he defended the tech giant's 'good track record on security'. Liu Xioming urged the UK to ignore supposed scaremongering from its allies and act independently by pressing ahead with the 5G communications network which will be partly built by Huawei. 

In what will be viewed as a slap down to the United States, which has shut out the Shenzhen-based company from its telecoms grid, the Beijing diplomat impelled [ sic ] Theresa May to resist 'protectionism'.
UNQUOTE
What does 5G kit from Huawei do? Pass! Has it got backdoors in it? Yes, of course! The Bloomberg story telling us How China Used a Tiny Chip to Infiltrate America's Top Companies is nonsense. But the software issues are real. Of course the NSA does the same sort of thing for America on an industrial scale but that is different, isn't it? Why does Theresa May want Huawei? She is an Enemy Of The People.

 

Huawei Software Is Rubbish [ 28 March 2019 ]
QUOTE
Huawei’s telecommunications equipment software is riddled with severe security flaws, according to a report from the company’s oversight board in the U.K.

On the plus side, the British spies in charge of the oversight say they don’t “believe that the defects identified are a result of Chinese state interference.” However, the bugs are serious enough to cause telecoms networks to stop functioning if they are exploited. And given the amount of pressure the Chinese manufacturer currently finds itself subjected to—particularly from the U.S.—the report’s timing could not be worse for Huawei.

Suspicion over Huawei’s ties to the Chinese state is nothing new, but it’s the world’s top telecoms equipment vendor and its products are widely used. Facing concerns in the U.K., the company agreed in 2010 to set up a lab there called the Huawei Cyber Security Evaluation Centre (HCSEC,) where Huawei employees would help representatives of GCHQ—the U.K. equivalent of the U.S.’s National Security Agency (NSA)—examine the equipment and its software very closely. Huawei has recently set up other cybersecurity labs in Germany and Belgium, but those only give access to network operators, not intelligence agencies.

Each year, the HCSEC board issues a report on how that scrutiny is going, and the latest report came out Thursday. It was pretty damning.

One major problem is that Huawei can’t prove that the code it submitted for review is exactly the same code running in its equipment. According to the report, Huawei’s software development process is so complex and antiquated that it makes it hard for the British spies to analyze the bugs. All this has been raised with Huawei before, but the company’s plan for dealing with it was “unacceptable” to the spies and U.K. network operators, the report stated, adding that the GCHQ representatives were “not confident that Huawei is able to remediate the significant problems it faces.”

It gets worse: “Given both the shortfalls in good software engineering and cyber security practice and the currently unknown trajectory of Huawei’s R&D processes… it is highly likely that security risk management of products that are new to the U.K. or new major releases of software for products currently in the U.K. will be more difficult [and] that there would be new software engineering and cyber security issues in products HCSEC has not yet examined.”

In other words, the oversight board isn’t brimming with confidence about the new-fangled 5G equipment that Huawei is trying to sell into the U.K.
UNQUOTE
Or to put it simply  Huawei Software Is Rubbish. See e.g. the HCSEC Oversight Board Report 2019 at page 4 - Overall, the Oversight Board can only provide limited assurance that all risks to UK national security from Huawei’s involvement in the UK’s critical networks can be sufficiently mitigated long
-term.

 

Americans Warn Boris Off Huawei   [ 30 January 2020 ]
QUOTE
US Secretary of State Mike Pompeo warned Huawei's 5G role is a 'real risk' as he arrived in the UK for potentially stormy talks tonight. Mr Pompeo urged Boris Johnson to look again at the decision to involve the Chinese tech giant in the infrastructure project. The pressure came as the PM vowed the Huawei row will not 'imperil' the Special Relationship.

Amid claims Mr Johnson defied misgivings from his own ministers to give the firm a limited part in the 5G network, former Cabinet ministers have suggested his huge 80-strong majority might not be enough to save him from defeat on the issue.....................

But challenged on the issue at PMQs this afternoon, Mr Johnson said: 'I want to assure the House and indeed the country that I think it is absolutely vital that people in this country do have access to the best technology available...

'But that we also do absolutely nothing to imperil our relationship with the United States, to do anything to compromise our critical national security infrastructure or to do anything to imperil our extremely valuable cooperation with Five Eyes security partners.' 
UNQUOTE
Boris Johnson makes the right noises. Why are the Americans objecting? One important reason, perhaps the real reason is that they will not be able to break into our network. Yes, the American NSA tapped German Chancellery for decades. The US labels Huawei a ‘security risk’ because Huawei gear protects the confidentiality of users’ communications: So says #Godfree Roberts - see Huawei, 5G and the Fourth Industrial Revolution. Of course the NSA broke into  Huawei’s corporate servers back in 2010; cyberwar is part of modern life.

 

Godfree Roberts explained(?)
Go to Tinker, Tailor, Soldier, Spiv, by Steve Sailer - The Unz Review and search for Achmed E. Neuman to get:-
Hail, I did not read the article or thread by “Metallicman”, so it’s too bad I can’t give you any inkling of whether he is full of it or not. I’ll correct for the record that my trips were not all extended (though I stayed for over a month one time), and not all business.

Anyway, you do a GREAT and very helpful job with searching up biographies, Hail, but I have already read some of Mr. Roberts’ background from his own blogspot site. I also looked through some other material of his.

Here’s what I remember offhand: Godfree Roberts makes (or attempts to make, I dunno) a living in Thailand by providing retirement advice for those Westerners wishing to move there. The site’s in English, so I figure he caters to Americans, Brits, etc. Part of it is some sort of tours over there, for the clients to check out quality of life and real estate. That’s a living, and I don’t begrudge Mr. Roberts for that.

However, his parents, from the bios I read, travelled to China in the middle of the hard-core Commie days and were Communists themselves. Now, listen, back in those days, not a lot of Westerners went to China. It was a big deal for Nixon to go! You were either a missionary, a Communist sympathizer of the Mao regime, or that one British writer (Needham) who reckoned the Chinese invented EVERYTHING … but was also a Communist.

Mr. Roberts, per his bio, has lived all over the place, and I’m guessing he knows China from either time there with his parents or their stories of it. Indeed, the question is: If China is so great, WTH does the guy live in Thailand? My speculation, and that’s all it is, is that the Chinese government doesn’t want him there, least not for good. Now, immigration there for anyone isn’t easy, but the modern Chinese government may say they’re Communist, and they do want control, but they really don’t want another died-in-the-wool Mao-sack-hanging true Communist in China. That’s not good for business!

I did not get any answers to my questions from Godfree Roberts.

Lastly, I think Godfree Roberts, a very polite guy on-line, BTW, is so off-the-wall pro-Communist China (the real thing of Chairman Mao) that if I found out he were some kind of bizarro-world-Yakov-Smirnoff parody, the whole thing would make lots more sense to me. He comes up with lots of bar graphs, but I think most of them are made-up garbage.

However, I really don’t know how much Ron Unz vets the commenters for honesty or background. In the same way as he deals impulsively, IMO, in dealing with some long-time commenters, I think Mr. Unz may just not read that much of some of these people’s material before letting them post articles. (This site hosts a LOT of content.) Mr. Unz runs a bang-up site, for error-free usability and interesting material. He also seems like a stand-up guy who would be the last to budge under pressure from the Deep State/Tech Totalitarians/Whomever. I wouldn’t argue with him about his choice of writers, but, yeah, this guy is a piece of work.

• Replies: @Lot

 

Huawei Loses 4G Patent Fight In English Supreme Court   [ 27 August 2020 ]
QUOTE
Huawei has lost a landmark Supreme Court case over its use of 4G technology in mobile phones that has forced it to shell out tens of millions of pounds for licences. Britain's Supreme Court ruled on Wednesday that Huawei and fellow Chinese smartphone maker ZTE must pay licence fees for the use of 4G technology patents.

Unwired Planet, a US company that charges for technology licences, had challenged Huawei’s use of “standard essential patents” it owned that had been acquired from telecoms firm Ericsson. Huawei and ZTE were also challenged by Conversant, another patent holder.............

That finding leaves Huawei liable to paying 5p in every £100 to Unwired Planet on phones it sells. Lawyers for the claimants declined to comment on the size of the total payments, but with Huawei selling 240m handsets last year the liability could run into tens of millions of pounds...........

The defeat comes as Huawei’s smartphone business has been battered by US sanctions that have prevented it using Android software made by Google and could block it from access to key chips.
UNQUOTE
Huawei lost this one but it is far ahead in 5G research and development. It does the research so it has the patents. Other firms will get to pay. All of this is keeping lotsa lawyers off the dole queue. That is a pity.

 

 

 

Errors & omissions, broken links, cock ups, over-emphasis, malice [ real or imaginary ] or whatever; if you find any I am open to comment.
 
Email me at Mike Emery. All financial contributions are cheerfully accepted. If you want to keep it private, use my PGP KeyHome Page

Updated on 25/07/2021 15:41