On Point: State and Commerce Declare War on Chinese Malware and Malgear

by Austin Bay
August 19, 2020

This past week, the U.S. State Department and U.S. Department of Commerce launched new diplomatic, economic and legal initiatives designed to counter communist China's global malware and malgear offensive.

Right -- a malgear offensive.

Everyone with a smartphone understands malware, the cybersecurity portmanteau for "malicious software." Invading malware code can sabotage, spy upon, seize control of or even destroy a digital information device.

Malgear is my portmanteau for malicious digital equipment, malicious gear (hardware) that has the built-in ability to surveil, sabotage and destroy when its manufacturer gives the command.

Which takes us back to the State and Commerce Departments' recent initiatives that expand the Clean Network program announced in April. Clean Network is a comprehensive attempt to protect the privacy and information of American citizens and corporations "from aggressive intrusions by malign actors."

One component of Clean Network is Clean Store, an initiative designed to "remove untrusted applications from U.S. mobile app stores."

TikTok, owned by China's ByteDance, is a video-sharing application many teenagers use. Spies can use the app as a perfectly camouflaged data collector to build data files on future adults and identify people the Chinese Communist Party might one day influence. For example, racy teenage imagery could leave an embarrassed 30-year-old working at the CIA open to blackmail.

Outrageous? The Commerce Department didn't think so when it told ByteDance TikTok will be banned in six weeks if it isn't sold to an American corporation. Divest it and Americans will remove the vulnerabilities. Don't divest and the product's banned. Commerce is waging economic and investment warfare.

Huawei's 5G "next generation" wireless communication systems are designed to connect cellphones, the internet, the internet of things -- essentially, all things digital. Huawei has tried to position itself as the world's biggest supplier of telecommunications equipment, with the goal of dominating global and regional communications infrastructure and international digital systems.

Huawei's equipment works well enough, but the Justice Department contends Huawei telecommunications systems and its business operations mask a sinister purpose: They aid and, in fact, participate in Beijing's global espionage efforts.

Huawei employees have admitted that the company's hardware can intercept communications both in mainland China and globally. The U.S. government has confirmed Huawei databases hold information on foreign personnel, phone records and personal property that has nothing to do with Huawei's business.

In February 2020, the DOJ called Huawei a security risk and then indicted the company for "racketeering conspiracy and conspiracy to steal trade secrets" -- industrial espionage.

On Aug. 17, Secretary of State Mike Pompeo described Huawei as "an arm of the CCP's surveillance state" and announced ever harsher economic and diplomatic measures to "protect U.S. national security, our citizens' privacy and the integrity of our 5G infrastructure from Beijing's malign influence."

Pompeo praised the Commerce Department's new initiatives to "prevent Huawei from circumventing U.S. law through alternative chip production and provision of off-the-shelf chips produced with tools acquired from the United States." The U.S. wants Huawei customers to "shift to other sources of equipment, software, and technology" and end their reliance on Huawei.

Huawei malgear does more than spy. An intercontinental ballistic missile can launch a communications satellite -- a civilian function -- or carry an armed warhead to a target -- a military mission.

During the Cold War, "dual-use" indicated a weapon system could deliver conventional or nuclear weapons. Think of Huawei's equipment as dual-use malgear. Huawei systems are a Trojan horse Beijing can use to launch an intercontinental digital attack. Remember, a 5G system can connect the "internet of things," handy things like an automatic garage door or a remote temperature control. But it can also connect things like the "supervisory control and data acquisition" (SCADA) systems controlling a nuclear power plant or a dam's floodgates.

What if a saboteur were to open the floodgates and deluge an American city? If the saboteur were a Chinese intelligence operative, would this be an act of kinetic war?

Better to deploy a "clean network" and deny Beijing the option.

Read Austin Bay's Latest Book

To find out more about Austin Bay and read features by other Creators Syndicate writers and cartoonists, visit the Creators Syndicate Web page at www.creators.com.


On Point Archives:

On Point Archives: Current 2021  2020  2019  2018  2017  2016  2015  2014  2013  2012  2011  2010  2009  2008  2007  2006  2005  2004  2003  2002  2001



Help Keep Us Soaring

We need your help! Our subscription base has slowly been dwindling. We need your help in reversing that trend. We would like to add 20 new subscribers this month.

Each month we count on your subscriptions or contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage. A contribution is not a donation that you can deduct at tax time, but a form of crowdfunding. We store none of your information when you contribute..
Subscribe   Contribute   Close