Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Chinese Regime Has Backdoor Access to US Systems
The Epoc Times ^ | 5/26/2012 | Joshua Philipp and Epoc Times Staff

Posted on 06/05/2012 10:06:32 PM PDT by ex-Texan

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-4041-50 last
To: sam_paine
Exactly, except the "round-eye" might well be a Chinese engineer who came here on a PLA sponsored student visa.

The saying here in Silicon Valley is:

Half the Chinese here are spying on us.
The other half are spying on them!

41 posted on 06/06/2012 10:51:10 AM PDT by null and void (Day 1233 of our ObamaVacation from reality [and what dark chill/is gathering still/before the storm])
[ Post Reply | Private Reply | To 40 | View Replies]

To: Carry_Okie

From the typical trash that is a utilities power line waveform, computer power supplies are already expected to produce a silky smooth DC at various levels and currents. Switching supplies are all the rage today. Now if a switching supply producer were in cahoots with a CPU producer and spyware designer, so as to selectively let “noise” in and out, there could be an interesting interaction. The switching supply would need a few smarts to be able to know when and what to pass through. It would take more than the dumb discrete designs of the present.


42 posted on 06/06/2012 12:17:42 PM PDT by HiTech RedNeck (Let me ABOs run loose Lou!)
[ Post Reply | Private Reply | To 30 | View Replies]

To: Carry_Okie
I don't save $.03 per part.

Apple, Acer, and others do.

Perhaps you should whine at them then, instead of at me?

Or do you know crap about manufacturing?

Whiner says what?

43 posted on 06/06/2012 1:08:07 PM PDT by Toddsterpatriot (Math is hard. Harder if you're stupid.)
[ Post Reply | Private Reply | To 36 | View Replies]

To: sam_paine
"Does anyone here really care about the real potential for espionage from Norks, Russians, and Chinese that can so easily be done via USA fabs and design houses?"

I can only speak for me - Yes, and assume others care based on what I read in comments on FR, like this from "null and void":

The rules of threat assessment call for identifying what an enemy is capable of doing, not necessarily what they are actually doing.

I like that quote a lot - given almost 30 years of high-end global industry experience (see note 1 below).

Based on your comments, I believe we're in agreement on the risk assessment facts from known design and engineering practices. We don't need to invent complicated engineering scenarios in order to be concerned about what's already installed across America and the globe that controls core elements of every day life.

The WashedUp Times pointed out some of the recently published studies on PLC vulnerabilities:

Project Basecamp at S4

"Project Basecamp had six great researchers looking for vulnerabilities in six different PLC’s / field devices, and the PLC’s took a beating. There were backdoors, weak credential storage, ability to change ladder logic and firmware, command line interface, overflows galore, TFTP for important files and so much more."

Cyber search engine Shodan exposes industrial control systems to new risks

Researchers found that one machine made by General Electric, the D-20, uses the same microprocessor installed in Apple computers two decades ago. The company that made its operating software stopped updating it in 1999. It is often shipped to customers with no meaningful security.“Security is disabled by default,” the manual says. “To log in, enter any name; you do not need a password.”

In a statement to The Washington Post, General Electric said: “The D-20 was designed for deployment in a layered security environment, in which asset owners and operators employ a range of measures to prevent, detect and respond to intrusions. GE actively works with our customers to design and support those security measures.”

The company added that the software for the machine “is designed to be secure and includes a layer of password-protection, which can be activated if the customer chooses to do so.

Other machines had flaws that enabled the researchers to take control through electronic back doors.

In January, Digital Bond said the results were “a bloodbath, mostly.”

Most of the guys were able to hack their controllers in a single day,” said K. Reid Wightman, a Digital Bond security researcher and former Pentagon cyberwarrior. “It’s just too easy. If we can do it, imagine what a well-funded foreign power could do.”

(1) My first professional job was in semiconductor manufacturing, not as an EE, but I designed their first distributed systems with desktops and "file servers" delivering integrated data from big iron global systems. And I pioneered some of the first commercial Software as a Service products. This was way before there were any books available on how to build, sell, run, scale, and support such products.

44 posted on 06/06/2012 5:08:14 PM PDT by uncommonsense (Conservatives believe what they see; Liberals see what they believe.)
[ Post Reply | Private Reply | To 37 | View Replies]

Comment #45 Removed by Moderator

To: GOPsterinMA; Clintonfatigued

Clinton, the reason W Bush was the best President since Reagan even though W Bush stunk.


46 posted on 06/06/2012 11:45:28 PM PDT by Impy (Don't call me red.)
[ Post Reply | Private Reply | To 20 | View Replies]

To: ex-Texan

Is the Russian mob still after you?


47 posted on 06/07/2012 5:16:25 AM PDT by Toddsterpatriot (Math is hard. Harder if you're stupid.)
[ Post Reply | Private Reply | To 45 | View Replies]

To: ex-Texan
Linking a video by the Loose Change truther?

You should be ashamed.

48 posted on 06/07/2012 5:34:41 AM PDT by Toddsterpatriot (Math is hard. Harder if you're stupid.)
[ Post Reply | Private Reply | To 45 | View Replies]

Comment #49 Removed by Moderator

To: Impy; All

Amen to that!


50 posted on 06/07/2012 9:00:27 PM PDT by GOPsterinMA (We may die, but DISCO LIVES FOREVER!!!)
[ Post Reply | Private Reply | To 46 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-50 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson