Information Warfare: Backdoor Man


December 19, 2011: The U.S. government, apparently acting on more than the usual rumors or suspicions, is officially seeking information from companies in the telecommunications industry (service providers plus hardware and software manufacturers) about the use of Chinese made hardware and software. This investigation is trying to find out if Chinese espionage efforts include the use of communications hardware and software secretly modified to allow information to be secretly monitored and sent back to China. But many of the companies receiving the questionnaire are refusing to comply because they fear that poor network security in U.S. government networks will allow others to steal questionnaire answers and reveal company secrets. In response, the U.S. government invoked some Cold War era laws that compel answering the questionnaire on "national security" grounds.

This is but the latest effort to get a handle on the extent, if any, of Chinese spies using electronics and communications gear made in China to help steal American secrets. The fear began with the increased use of counterfeit Chinese electronic components. For several years now it was believed that the illegal sale of Chinese made counterfeit computer components (microprocessors and related items) was part of an effort to gain secret access to U.S. government and military secrets.

Such counterfeit components ending up in American military equipment is old news. The fraud here is largely in the paperwork, where convincing looking counterfeit chips are labeled as "military grade" (the most robust and durable of that item available.) These sell for more than "consumer grade" (the most common) and "industrial grade" (for use in factories, where failure can cause more damage and expensive down time.) Failure in military grade parts can get people killed.

One reason China tolerates the widespread manufacture of counterfeit products is because some of them have some military benefit for China's Cyber War effort. Last year, for example, the FBI arrested two Americans for running a computer parts company that was selling counterfeit computer parts (especially Cisco router components), manufactured in China. The phony parts had counterfeit labels and were delivered in counterfeit boxes. The two brothers had a contract to sell these parts to the Department of Defense and other government agencies. It was feared that the Chinese government could have some of these counterfeit chips equipped with a semi-magical "backdoor" that would enable an evil genius (or government bureaucrat) back in China to take control over equipment using the counterfeit part, and hooked up to the Internet. Or something like that. This is something the U.S. government is now trying to clarify, via the controversial questionnaires. So far, there have been no reports of backdoors discovered in Chinese hardware or software.

Actually, the Chinese got lucky with this one. Normally these counterfeit parts are sold by transitory operations. Eventually the user has reason to contact the manufacturer of the shoddy part. At that point the buyer discovers that say, Cisco, has no router component with the serial number the scammed buyer is reading over the phone. It is then that the buyer realizes they have been screwed.

Of more immediate concern is not backdoors in counterfeit chips but such secret features in legitimate chips or larger items (like routers and other hardware needed to operate the Internet). American engineers know that such secret features can be added to electronics. American espionage officials know that it can be done because the U.S. has already used this sort of thing and has been doing so for decades. So it's not unreasonable to believe that the Chinese are catching up in this area as well. Exactly what is known about Chinese operations in this area is kept secret, because it is possible to send false information via this backdoor channel, but only if the Chinese believe their backdoors are still hidden from American view.

Meanwhile, counterfeit high-tech items are a growing business and a growing danger. In addition to computer gear, auto and aircraft components are also being faked. Some aircraft and auto accidents have been traced to the fakes, which makes it a public safety issue. But with the Department of Defense installing counterfeit computer components it becomes a national security issue. There's also the fear that the Chinese, or some other hostile nation, might get their hands on real computer components and replace some of the chips with modified ones that will make government networks easier to hack. Yes, it just gets worse.




Help Keep Us From Drying Up

We need your help! Our subscription base has slowly been dwindling.

Each month we count on your contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage.
Subscribe   Contribute   Close