Former Pentagon analyst - China can shut down our communicatins
Former Pentagon Analyst Says China Can Shut Down All The Telecom Gear It Sold To The US
Chinese companies apparently have a covert capability to remotely access
communications technology sold to the United States and other Western
countries and could "disable a country's telecommunications
infrastructure before a military engagement," according to former and
current intelligence sources.
The Chinese also have the ability to exploit networks "to enable
China to continue to steal technology and trade secrets," according to
the open source intelligence company Lignet, which is comprised of
former U.S. intelligence analysts.
The issue centers on the Chinese firm Huawei Technologies Co. Ltd.,
which U.S. intelligence sources say has direct links to the Chinese
government and the People's Liberation Army, or PLA. These sources
assert that Huawei and other Chinese telecommunications firms such as
ZTE Corp. have "electronic backdoors" to telecommunications technology
sold to the U.S. and other countries.
Revelation of China's electronic backdoor capability into U.S. and
Western telecommunications networks comes on the heels of recent
WND/G2Bulletin revelations that China has been manufacturing counterfeit
components that have made their way into sensitive U.S. weapons
The problem of fake Chinese electronic components, which were
installed by defense contractors without prior testing and are operating
in U.S. military systems, is far more widespread than originally
These parts don't just come directly from China but also from
suppliers in Britain and Canada who redirect Chinese products to U.S.
These counterfeit components have been found in sensitive U.S.
missile systems meant to thwart the potential of a Chinese missile
attack, in night vision devices and in various military aircraft.
"We do not want a $12 million defense interceptor's reliability
compromised by a $2 counterfeit part," Gen. Patrick O'Reilly, director
of the U.S. Missile Defense Agency said.
Huawei, suspected of exploiting electronic telecommunications
backdoors, continues to sell communications technology in the U.S. and
other countries despite a supposed ban on the company that was supposed
to keep it from bidding on cellular networks and government contracts, a
current intelligence source said.
The electronic backdoor capability reportedly could allow the Chinese
government through Huawei and ZTE to access information traveling
through telecommunications networks or even sabotage electronic devices,
With this capability, China would be in a position to sabotage
critical U.S. weapons systems and sensitive cyber sites and could
include intelligence or systems used by defense contractors doing work
on behalf of the U.S. government.
With cyber espionage on the rise and increasing attacks aimed at U.S.
government computer systems, these sources contend that Huawei has
achieved that capability on behalf of the Chinese government.
Sources say that Huawei can use its backdoor access to reach into
foreign telecommunications company systems without its knowledge or
In the case of the mobile phone maker ZTE, Lignet said that the
company pursued a security vulnerability through an electronic backdoor
on cell phones run on Google's Android system.
"This backdoor reportedly could allow someone to remotely control the phone," Lignet said.
In 2013 defense budget legislation, the House Armed Services
Committee's Strategic Forces Subcommittee had introduced language to
require a search of all U.S. nuclear weapons arsenals and infrastructure
to remove products from Chinese companies such as Huawei and ZTE
because of the possibility of "backdoors or code for espionage and/or
sabotage purposes by the Chinese government," Lignet pointed out.
These revelations follow a warning by the U.S. Department of Defense
that Chinese hackers are aiming malware at U.S. government agencies and
industries that could threaten the nation's economy.
The indication is that these attacks are directed by the Chinese government itself.
"Chinese actors are the world's most active and persistent
perpetrators of economic espionage," according to a DOD in a recent
report to Congress. "Chinese attempts to collect U.S. technological and
economic information will continue at a high level and will represent a
growing and persistent threat to U.S. economic security.
"China is likely to remain an aggressive and capable collector of
sensitive U.S. economic information and technologies, particularly in
cyberspace," DOD added.
Another concern raised by sources is that Huawei and the other
Chinese telecommunications companies also provide technology to Iran and
According to sources, Iran's security network relies on Huawei
technology, raising the prospect, sources say, that the Iranians could
gain the same backdoor access as the Chinese intelligence service does
to U.S. defense and sensitive industries.
This concern has been heightened by new Iranian threats to undertake a
cyber war with the U.S. in response to recent revelations that the U.S.
was a principal player in launching a sophisticated cyber attack on
Iran's nuclear program.
Code-named Olympic Games, the effort by the Obama administration was
to initiate a cyber war against Iran along with Israel. Such a
revelation left little doubt that the U.S. and Israel also were behind
the Stuxnet virus which was inflicted on Iran's centrifuge machines used
to enrich uranium.
One source said that Washington already has declared that a cyber
attack on U.S. computer systems would constitute an act of war and that
would call for a military response. The Pentagon earlier this month said
that there would be a U.S. military response if there is a cyber attack
on government networks – in effect, equating hacking with an act of
Yet, the U.S. already has initiated such an attack on Iran which now
is threatening to do the same thing to U.S. computer systems.
In attempting to uncover cyber attacks before too much damage has
been done, sources say that there are millions of lines of software code
that transmit data securely and to find a malicious code would be
problematic and cost-prohibitive.
Behind the ostensible government sits enthroned an invisible government owing no allegiance and acknowledging no responsibility to the people.