The ‘News’ Has Been Ignoring Some Of China’s Big Plans To Undermine USA

Written by Michael Cummings on October 8, 2018

Years ago, I was at a tradeshow in Las Vegas geared toward construction companies and suppliers. A couple booths down from ours was a Chinese manufacturer of laser survey levels, those telescope-looking things atop tripods that engineers use to mark and map areas planned for construction.

For those of you who’ve attended or worked at tradeshows, you know of the various tactics people use to get the attention of passers-by like swag, prize drawings, and games. This guy used the built-in laser in the level to shine in the eyes of people walking past his booth. I don’t know if it was a cultural or language thing but when my co-workers and I explained how he had to stop doing this, he didn’t seem remotely apologetic.

From the micro to the macro, it seems our friends from the east aren’t playing well with others.

In 2015, Amazon.com Inc. began quietly evaluating a startup called Elemental Technologies, a potential acquisition to help with a major expansion of its streaming video service, known today as Amazon Prime Video. Based in Portland, Ore., Elemental made software for compressing massive video files and formatting them for different devices. Its technology had helped stream the Olympic Games online, communicate with the International Space Station, and funnel drone footage to the Central Intelligence Agency. Elemental’s national security contracts weren’t the main reason for the proposed acquisition, but they fit nicely with Amazon’s government businesses, such as the highly secure cloud that Amazon Web Services (AWS) was building for the CIA.

Trending: LMAO! This Eminem Meme Will Make You Howl Like A Spider Monkey

To help with due diligence, AWS, which was overseeing the prospective acquisition, hired a third-party company to scrutinize Elemental’s security, according to one person familiar with the process. The first pass uncovered troubling issues, prompting AWS to take a closer look at Elemental’s main product: the expensive servers that customers installed in their networks to handle the video compression. These servers were assembled for Elemental by Super Micro Computer Inc., a San Jose-based company (commonly known as Supermicro) that’s also one of the world’s biggest suppliers of server motherboards, the fiberglass-mounted clusters of chips and capacitors that act as the neurons of data centers large and small. In late spring of 2015, Elemental’s staff boxed up several servers and sent them to Ontario, Canada, for the third-party security company to test, the person says.

Nested on the servers’ motherboards, the testers found a tiny microchip, not much bigger than a grain of rice, that wasn’t part of the boards’ original design. Amazon reported the discovery to U.S. authorities, sending a shudder through the intelligence community. Elemental’s servers could be found in Department of Defense data centers, the CIA’s drone operations, and the onboard networks of Navy warships. And Elemental was just one of hundreds of Supermicro customers.

During the ensuing top-secret probe, which remains open more than three years later, investigators determined that the chips allowed the attackers to create a stealth doorway into any network that included the altered machines. Multiple people familiar with the matter say investigators found that the chips had been inserted at factories run by manufacturing subcontractors in China.

This attack was something graver than the software-based incidents the world has grown accustomed to seeing. Hardware hacks are more difficult to pull off and potentially more devastating, promising the kind of long-term, stealth access that spy agencies are willing to invest millions of dollars and many years to get.

There are two ways for spies to alter the guts of computer equipment. One, known as interdiction, consists of manipulating devices as they’re in transit from manufacturer to customer. This approach is favored by U.S. spy agencies, according to documents leaked by former National Security Agency contractor Edward Snowden. The other method involves seeding changes from the very beginning.

One country in particular has an advantage executing this kind of attack: China, which by some estimates makes 75 percent of the world’s mobile phones and 90 percent of its PCs. Still, to actually accomplish a seeding attack would mean developing a deep understanding of a product’s design, manipulating components at the factory, and ensuring that the doctored devices made it through the global logistics chain to the desired location—a feat akin to throwing a stick in the Yangtze River upstream from Shanghai and ensuring that it washes ashore in Seattle. “Having a well-done, nation-state-level hardware implant surface would be like witnessing a unicorn jumping over a rainbow,” says Joe Grand, a hardware hacker and the founder of Grand Idea Studio Inc. “Hardware is just so far off the radar, it’s almost treated like black magic.”

But that’s just what U.S. investigators found: The chips had been inserted during the manufacturing process, two officials say, by operatives from a unit of the People’s Liberation Army. In Supermicro, China’s spies appear to have found a perfect conduit for what U.S. officials now describe as the most significant supply chain attack known to have been carried out against American companies.

This is concerning. With China dictating what results end up in Google search results (and Google having no spine to stop them), meddling with our elections, and stealing trade secrets from anyone wishing to do business in their country – oh, and terraforming the South China Sea to install military bases — it’s safe to say we have an enemy actively engaging in non-military warfare right before our eyes. If we don’t stop them, this will not end well.

Whatever Trump needs to do to put these communists in their place – including tariffs and currency manipulations — do it.

Image: Excerpted from: https://pixabay.com/en/security-cyber-internet-computer-3728124/

Michael Cummings
Michael A. Cummings has a Bachelors in Business Management from St. John's University in Collegeville, MN, and a Masters in Rhetoric & Composition from Northern Arizona University. He has worked as a department store Loss Prevention Officer, bank auditor, textbook store manager, Chinese food delivery man, and technology salesman. Cummings wrote position pieces for the 2010 Trevor Drown for US Senate (AR) and 2012 Joe Coors for Congress (CO) campaigns.

 

Join the conversation!

We have no tolerance for comments containing violence, racism, profanity, vulgarity, doxing, or discourteous behavior. If a comment is spam, instead of replying to it please hover over that comment, click the ∨ icon, and mark it as spam. Thank you for partnering with us to maintain fruitful conversation.