Feeds

Oz defence department: We don't have a ban on Lenovo kit

Nobody said you did, sunshine

Securing Web Applications Made Simple and Scalable

Update The Australian Department of Defence has issued an official statement denying it banned the use of Lenovo computers over concerns they contained backdoor vulnerabilities.

A report from the Australian Financial Review last weekend claimed that the ban applied to top secret networks run by the intelligence and defence services of the “Five Eyes” allies – US, UK, Australia, New Zealand and Canada.

the report claimed to have obtained confirmation of a written ban by “multiple intelligence and defences sources” in the UK and Oz, and further added that an Australian Department of Defence spokesman confirmed that Lenovo kit had “never been accredited” for such networks.

However, the DoD released the following short statement on its site today:

Reports published on 27 and 29 July 2013 in the Australian Financial Review allege a Department of Defence ban on the use of Lenovo computer equipment on the Defence Secret and Top Secret Networks.‪ ‪

This reporting is factually incorrect. There is no Department of Defence ban on the Lenovo Company or their computer products; either for classified or unclassified systems. ‪

That statement calls into question whether the other Five Eyes members ever had similar bans in place. GCHQ, MI5, MI6, the Australian Security Intelligence Organisation, the Australian Secret Intelligence Service, and the NSA were all named as observing the now-discredited ban.

The original report had claimed that serious backdoor vulnerabilities in Lenovo hardware and firmware had been discovered in testing in the mid-2000s – vulnerabilities which could allow attackers to remotely access a device without the owner’s knowledge.

For its part, Lenovo on Monday said it was surprised by the news as it has good working relationships with public and private sector clients around the world.

“We have not received word of any sort of a restriction of sales so we are not in a position to respond to this question,” it added. ®

Updated to Add

Of course the original report never said there was an Australian defence-department-wide ban on Lenovo kit, just that the secret intelligence and security agencies of the five Anglophone nations - many of which do not belong to their parent countries' defence departments, in any case, but to other arms of government - do not use Lenovo equipment to handle highly classified data.

That fact is not denied by the Australian defence-department statement mentioned above, which contradicts an assertion that nobody actually made. The Register has since received confirmation that what was actually reported - that the allied security/intelligence community doesn't use Lenovo gear to handle sensitive data - is correct.

As usual, the use of the term "factually incorrect" by a press officer has turned out to mean that the story was true. -Ed

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.