Feeds

US allies are spying with bugged software

A "national outrage" one expert calls it

  • alert
  • submit to reddit

High performance access to file storage

America's allies, like France, and her adversaries, like China, are selling flawed software and hardware which can divert sensitive data from US corporations and government bureaus back to the country of origin, security outfit iDefense CEO James Adams claims. "If you buy a piece of hardware or software from several countries, among them some of our allies, there is real concern that you will be buying doctored equipment that will siphon copies of all material that passes across that equipment," Adams warned in testimony before the Senate Governmental Affairs Committee last week. Adams mentioned France and China by name, because in those countries there is a pronounced "blurring of boundaries between the public and private sectors. What the [national government] does, it does on behalf of the private sector," he noted. Of course we could name two dozen countries off the top of our heads where that is equally the case, and we took Adams to mean that high-tech equipment from Russia, Israel, Japan, India, and the rest we have in mind should be treated with the same skepticism. "Some thirty countries have aggressive information warfare programs, and all of them have America in their sights," Adams warned. He said it is absurdly easy for foreign nationals to steal US intellectual property, both public and private, because American businesses and government bureaus simply don't understand the threat. "The awareness among CEOs and CIOs in the private sector is lamentable," he said. "And the way America's technological advantage is being exploited is a national outrage." By way of illustration, Adams said that during a recent intelligence strategy meeting convened to identify future threats, it was agreed by all that China is a "very significant threat to the United States." But at that same meeting, a "senior officer of one of America's leading high technology companies described an investment decision about a new and revolutionary technology product," he recalled. The company was looking for a location with cheap labour and a good supply of engineers. And where did they build their new factory? Why China, naturally. An entertaining scene, we are sure. But we have to ask, with generous intellectual property giveaways like that, who needs to bother writing bugged software? ®

Top three mobile application threats

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.