Forwarded from BlackBox (Security) Archiv
Banned recording reveals: China ambassador threatened Faroese leader at secret meeting
China's ambassador to Denmark threatened the Faroese prime minister by indicating that a trade agreement would be dropped if the autonomous Danish archipelago does not sign a 5G contract with technology giant Huawei, Berlingske can now reveal.
#China ambassador to #Denmark, Mr. Feng Tie, made overt #threats to prominent members of the #Faroese #government in order to secure a strategically important contract for the #Chinese telecoms giant #Huawei, by indicating that the Chinese government would drop a free trade agreement with the Faroe Islands if the company did not get the contract.
This appears from an #audio #recording which was subsequently banned from publication, #Berlingske can now reveal.
The recording marks the first instance where the Chinese government has linked access to China's huge market to Huawei being awarded contracts for #5G #networks in #Europe. Huawei has publicly stated that it is a private company with no ties to the Chinese state.
For the past seven days, the Faroese government has sought to keep the recording a secret by getting an injunction to prevent the Faroese TV station Kringvarp Føroya from publishing its content. Kringvarp Føroya had planned to reveal the recording in a Faroese news broadcast Monday a week ago.
But as Berlingske can now reveal, the audio clip clearly indicates how the Chinese top #diplomat used the meeting to unequivocally tie the Huawei contract to wider trade interests, which would particularly affect the Faroe Islands' large and growing exports of salmon to China.
👉🏼 Read more:
https://www.berlingske.dk/internationalt/banned-recording-reveals-china-ambassador-threatened-faroese-leader
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
China's ambassador to Denmark threatened the Faroese prime minister by indicating that a trade agreement would be dropped if the autonomous Danish archipelago does not sign a 5G contract with technology giant Huawei, Berlingske can now reveal.
#China ambassador to #Denmark, Mr. Feng Tie, made overt #threats to prominent members of the #Faroese #government in order to secure a strategically important contract for the #Chinese telecoms giant #Huawei, by indicating that the Chinese government would drop a free trade agreement with the Faroe Islands if the company did not get the contract.
This appears from an #audio #recording which was subsequently banned from publication, #Berlingske can now reveal.
The recording marks the first instance where the Chinese government has linked access to China's huge market to Huawei being awarded contracts for #5G #networks in #Europe. Huawei has publicly stated that it is a private company with no ties to the Chinese state.
For the past seven days, the Faroese government has sought to keep the recording a secret by getting an injunction to prevent the Faroese TV station Kringvarp Føroya from publishing its content. Kringvarp Føroya had planned to reveal the recording in a Faroese news broadcast Monday a week ago.
But as Berlingske can now reveal, the audio clip clearly indicates how the Chinese top #diplomat used the meeting to unequivocally tie the Huawei contract to wider trade interests, which would particularly affect the Faroe Islands' large and growing exports of salmon to China.
👉🏼 Read more:
https://www.berlingske.dk/internationalt/banned-recording-reveals-china-ambassador-threatened-faroese-leader
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
The U.S. Government funded smartphones which come with pre-installed malware
https://www.xda-developers.com/us-government-smartphones-pre-installed-malware
#usa #gov #phones #malware #android #huawei
https://www.xda-developers.com/us-government-smartphones-pre-installed-malware
#usa #gov #phones #malware #android #huawei
XDA Developers
The U.S. Government funded smartphones which come with pre-installed malware
The U.S. Government has seemingly funded smartphones which come with pre-installed malware, as part of the Assurance Wireless program founded by the FCC.
Huawei built a poorly hidden, insecure backdoor into surveillance equipment that uses its HiSilicon subsidiary's chips
https://www.theregister.co.uk/2020/02/04/hisilicon_camera_backdoor
#huawei #backdoor #cam #security #camera #surveillance #why
https://www.theregister.co.uk/2020/02/04/hisilicon_camera_backdoor
#huawei #backdoor #cam #security #camera #surveillance #why
The Register
Trivial backdoor found in firmware for Chinese-built net-connected video recorders
Crap security in millions of cheap gadgets? Shocked, shocked, we tell you
Forwarded from BlackBox (Security) Archiv
U.S. Officials Say Huawei Can Covertly Access Telecom Networks
Trump administration ramps up push for allies to block Chinese company
U.S. officials say Huawei Technologies Co. can covertly access mobile-phone networks around the world through “back doors” designed for use by law enforcement, as Washington tries to persuade allies to exclude the Chinese company from their networks.
Intelligence shows Huawei has had this secret capability for more than a decade, U.S. officials said. Huawei rejected the allegations.
The U.S. kept the intelligence highly classified until late last year, when American officials provided details to allies including the U.K. and Germany, according to officials from the three countries. That was a tactical turnabout by the U.S., which in the past had argued that it didn’t need to produce hard evidence of the threat it says Huawei poses to nations’ security.
👉🏼 Read more:
https://www.wsj.com/articles/u-s-officials-say-huawei-can-covertly-access-telecom-networks-11581452256
#huawei #usa #backdoors
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
Trump administration ramps up push for allies to block Chinese company
U.S. officials say Huawei Technologies Co. can covertly access mobile-phone networks around the world through “back doors” designed for use by law enforcement, as Washington tries to persuade allies to exclude the Chinese company from their networks.
Intelligence shows Huawei has had this secret capability for more than a decade, U.S. officials said. Huawei rejected the allegations.
The U.S. kept the intelligence highly classified until late last year, when American officials provided details to allies including the U.K. and Germany, according to officials from the three countries. That was a tactical turnabout by the U.S., which in the past had argued that it didn’t need to produce hard evidence of the threat it says Huawei poses to nations’ security.
👉🏼 Read more:
https://www.wsj.com/articles/u-s-officials-say-huawei-can-covertly-access-telecom-networks-11581452256
#huawei #usa #backdoors
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
Huawei calls America's bluff about evidence of back doors: "Don’t be shy. Publish it"
https://www.phonearena.com/news/huawei-calls-trump-administrations-bluff_id122282
#huawei #5g #usa #china
https://www.phonearena.com/news/huawei-calls-trump-administrations-bluff_id122282
#huawei #5g #usa #china
Phone Arena
Huawei calls America's bluff about evidence of back doors: "Don’t be shy. Publish it"
Huawei's cybersecurity chief responded to claims made by an American official who claims that the U.S. has evidence showing that the Chinese manufacturer intercepts conversations over mobile betworks.
Forwarded from BlackBox (Security) Archiv
Huawei HKSP Introduces Trivially Exploitable Vulnerability
5/11/2020 Update: We were contacted this morning by Huawei PSIRT who referenced an email by the patch author to the KSPP list: https://www.openwall.com/lists/kernel-hardening/2020/05/10/3 and stated that "The patchset is not provided by Huawei official but an individual. And also not used in any Huawei devices." They asked if we would update the description of the article to correct this information.
Based on publicly-available information, we know the author of the patch is a Huawei employee, and despite attempts now to distance itself from the code after publication of this post, it still retains the Huawei naming. Further, on information from our sources, the employee is a Level 20 Principal Security staffer, the highest technical level within Huawei.
The Github repository mentioned in the article had a commit added to it this morning that inserted a notice to the top of the README file, distancing the code from Huawei. This commit was (intentionally or not) backdated to Friday when the repository was created, creating the impression that we somehow intentionally ignored pertinent information that was readily available. This is obviously untrue, and examining the contents of https://api.github.com/repos/cloudsec/hksp/events proves the commit was pushed to the repo this morning.
We replied to Huawei PSIRT's mail and mentioned that we'd be fine with mentioning the patches aren't shipping on any Huawei devices (I believed it already to be unlikely given the poor code quality), but regarding the other claim (particularly due to the surreptitious Github repo edit), we'd have to also include the additional information we discovered.
👉🏼 Read more:
https://grsecurity.net/huawei_hksp_introduces_trivially_exploitable_vulnerability
https://www.openwall.com/lists/kernel-hardening/2020/05/10/3
https://api.github.com/repos/cloudsec/hksp/events
#huawei #PSIRT #hksp #exploitable #kernel #hardening #vulnerability
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
5/11/2020 Update: We were contacted this morning by Huawei PSIRT who referenced an email by the patch author to the KSPP list: https://www.openwall.com/lists/kernel-hardening/2020/05/10/3 and stated that "The patchset is not provided by Huawei official but an individual. And also not used in any Huawei devices." They asked if we would update the description of the article to correct this information.
Based on publicly-available information, we know the author of the patch is a Huawei employee, and despite attempts now to distance itself from the code after publication of this post, it still retains the Huawei naming. Further, on information from our sources, the employee is a Level 20 Principal Security staffer, the highest technical level within Huawei.
The Github repository mentioned in the article had a commit added to it this morning that inserted a notice to the top of the README file, distancing the code from Huawei. This commit was (intentionally or not) backdated to Friday when the repository was created, creating the impression that we somehow intentionally ignored pertinent information that was readily available. This is obviously untrue, and examining the contents of https://api.github.com/repos/cloudsec/hksp/events proves the commit was pushed to the repo this morning.
We replied to Huawei PSIRT's mail and mentioned that we'd be fine with mentioning the patches aren't shipping on any Huawei devices (I believed it already to be unlikely given the poor code quality), but regarding the other claim (particularly due to the surreptitious Github repo edit), we'd have to also include the additional information we discovered.
👉🏼 Read more:
https://grsecurity.net/huawei_hksp_introduces_trivially_exploitable_vulnerability
https://www.openwall.com/lists/kernel-hardening/2020/05/10/3
https://api.github.com/repos/cloudsec/hksp/events
#huawei #PSIRT #hksp #exploitable #kernel #hardening #vulnerability
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@BlackBox_Archiv
U.S. to allow companies to work with Huawei on 5G standards
https://www.reuters.com/article/us-usa-china-huawei-tech-exclusive/exclusive-us-to-allow-companies-to-work-with-huawei-on-5g-standards-sources-idUSKBN23M2DF
#huawei #usa #china #5g
https://www.reuters.com/article/us-usa-china-huawei-tech-exclusive/exclusive-us-to-allow-companies-to-work-with-huawei-on-5g-standards-sources-idUSKBN23M2DF
#huawei #usa #china #5g
Reuters
U.S. companies can work with Huawei on 5G, other standards: Commerce Department
(Reuters) - The United States on Monday confirmed a Reuters report that it will amend its prohibitions on U.S. companies doing business with China’s Huawei to allow them to work together on setting standards for next-generation 5G networks.
Mass Surveillance and 5G in Tibet: Between Oppression and Espionage
Tibetans are continuously controlled through camera networks and artificial intelligence. Now, #Huawei’s highest 5G base station on Mount Everest will also favor international cyber-espionage
Repressing #Tibet before and after the coronavirus
Amidst fears of the coronavirus sending billions of people into lockdown around the world, #China is widely expanding its surveillance network to strengthen and maintain vigilance of its entire population. It is true that such measures have proven effective during the pandemic by tracking people’s movements through cellphones, and have provided services through robots delivering food to hospitals, facial recognition cameras tracking people’s temperature, and mechanical drones enforcing lockdown for quarantines.
https://bitterwinter.org/mass-surveillance-and-5g-in-tibet-between-oppression-and-espionage
https://reclaimthenet.org/5g-tibet
https://e.huawei.com/en/products/intelligent-video-surveillance
Tibetans are continuously controlled through camera networks and artificial intelligence. Now, #Huawei’s highest 5G base station on Mount Everest will also favor international cyber-espionage
Repressing #Tibet before and after the coronavirus
Amidst fears of the coronavirus sending billions of people into lockdown around the world, #China is widely expanding its surveillance network to strengthen and maintain vigilance of its entire population. It is true that such measures have proven effective during the pandemic by tracking people’s movements through cellphones, and have provided services through robots delivering food to hospitals, facial recognition cameras tracking people’s temperature, and mechanical drones enforcing lockdown for quarantines.
https://bitterwinter.org/mass-surveillance-and-5g-in-tibet-between-oppression-and-espionage
https://reclaimthenet.org/5g-tibet
https://e.huawei.com/en/products/intelligent-video-surveillance
Forwarded from BlackBox (Security) Archiv
Exclusive: Trump administration says Huawei, Hikvision backed by Chinese military
WASHINGTON (Reuters) - The Trump administration has determined that top Chinese firms, including telecoms equipment giant Huawei Technologies and video surveillance company Hikvision (002415.SZ), are owned or controlled by the Chinese military, laying the groundwork for new U.S. financial sanctions.
Washington placed Huawei and Hikvision on a trade blacklist last year over national security concerns and has led an international campaign to convince allies to exclude Huawei from their 5G networks.
A Department of Defense (DOD) document listing 20 companies operating in the United States that Washington alleges are backed by the Chinese military was first reported by Reuters.
The DOD document also includes China Mobile Communications Group (0941.HK) and China Telecommunications Corp [CTTTC.UL] as well as aircraft manufacturer Aviation Industry Corp of China [SASADY.UL].
The designations were drawn up by the Defense Department, which was mandated by a 1999 law to compile a list of Chinese military companies operating in the United States, including those “owned or controlled” by the People’s Liberation Army that provide commercial services, manufacture, produce or export.
https://www.cnbc.com/2020/06/25/trump-administration-says-huawei-hikvision-backed-by-chinese-military.html
👉🏼 Read more:
https://www.reuters.com/article/us-usa-china-military-exclusive/exclusive-trump-administration-says-huawei-hikvision-backed-by-chinese-military-idUSKBN23V309
👉🏼 🇩🇪:
https://www.golem.de/news/us-verteidigungsministerium-neue-us-liste-erlaubt-beschlagnahmung-von-huawei-eigentum-2006-149311.html
#usa #china #huawei #hikvision #Trump #ToddlerTrump
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
WASHINGTON (Reuters) - The Trump administration has determined that top Chinese firms, including telecoms equipment giant Huawei Technologies and video surveillance company Hikvision (002415.SZ), are owned or controlled by the Chinese military, laying the groundwork for new U.S. financial sanctions.
Washington placed Huawei and Hikvision on a trade blacklist last year over national security concerns and has led an international campaign to convince allies to exclude Huawei from their 5G networks.
A Department of Defense (DOD) document listing 20 companies operating in the United States that Washington alleges are backed by the Chinese military was first reported by Reuters.
The DOD document also includes China Mobile Communications Group (0941.HK) and China Telecommunications Corp [CTTTC.UL] as well as aircraft manufacturer Aviation Industry Corp of China [SASADY.UL].
The designations were drawn up by the Defense Department, which was mandated by a 1999 law to compile a list of Chinese military companies operating in the United States, including those “owned or controlled” by the People’s Liberation Army that provide commercial services, manufacture, produce or export.
https://www.cnbc.com/2020/06/25/trump-administration-says-huawei-hikvision-backed-by-chinese-military.html
👉🏼 Read more:
https://www.reuters.com/article/us-usa-china-military-exclusive/exclusive-trump-administration-says-huawei-hikvision-backed-by-chinese-military-idUSKBN23V309
👉🏼 🇩🇪:
https://www.golem.de/news/us-verteidigungsministerium-neue-us-liste-erlaubt-beschlagnahmung-von-huawei-eigentum-2006-149311.html
#usa #china #huawei #hikvision #Trump #ToddlerTrump
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
CNBC
Trump administration says Huawei, Hikvision backed by Chinese military
The Department of Defense (DOD) document listing 20 allegedly military-backed companies includes China Mobile Communications Group and China Telecommunications Corp, as well as aircraft manufacturer Aviation Industry Corp of China.
Uganda’s uptake of Huawei’s “Safe Cities” surveillance initiative is getting a foothold
Huawei has just leveled up its spying efforts. Why spy on people directly, when they can provide a service that lets authoritarian governments spy on people? Either way, Huawei is getting the data, but the latter is easier to sell to oppressive regimes.
The Ugandan government is one such client. After the Assistant Inspector General of Police was murdered in 2017, they decided to set up CCTV surveillance across the African nation, making them the fourth in Africa to purchase security equipment from Huawei – after Kenya, Egypt and Zambia.
https://reclaimthenet.org/ugandas-huaweis-safe-cities-surveillance/
#africa #uganda #huawei #surveillance
Huawei has just leveled up its spying efforts. Why spy on people directly, when they can provide a service that lets authoritarian governments spy on people? Either way, Huawei is getting the data, but the latter is easier to sell to oppressive regimes.
The Ugandan government is one such client. After the Assistant Inspector General of Police was murdered in 2017, they decided to set up CCTV surveillance across the African nation, making them the fourth in Africa to purchase security equipment from Huawei – after Kenya, Egypt and Zambia.
https://reclaimthenet.org/ugandas-huaweis-safe-cities-surveillance/
#africa #uganda #huawei #surveillance
FCC designates Huawei, ZTE as risks to national security
Telecoms can no longer use federal funds to purchase their equipment
On Tuesday, the Federal Communications Commission officially designated telecommunications companies Huawei and ZTE as threats to national security.
“With today’s Orders, and based on the overwhelming weight of evidence, the Bureau has designated Huawei and ZTE as national security risks to America’s communications networks — and to our 5G future,” FCC Chairman Ajit Pai said in a statement Tuesday. “Both companies have close ties to the Chinese Communist Party and China’s military apparatus, and both companies are broadly subject to Chinese law obligating them to cooperate with the country’s intelligence services.”
https://www.theverge.com/2020/6/30/21308477/fcc-huawei-zte-ban-universal-service-fund-national-security-threat-risk
#us #fcc #huawei #zte #security
Telecoms can no longer use federal funds to purchase their equipment
On Tuesday, the Federal Communications Commission officially designated telecommunications companies Huawei and ZTE as threats to national security.
“With today’s Orders, and based on the overwhelming weight of evidence, the Bureau has designated Huawei and ZTE as national security risks to America’s communications networks — and to our 5G future,” FCC Chairman Ajit Pai said in a statement Tuesday. “Both companies have close ties to the Chinese Communist Party and China’s military apparatus, and both companies are broadly subject to Chinese law obligating them to cooperate with the country’s intelligence services.”
https://www.theverge.com/2020/6/30/21308477/fcc-huawei-zte-ban-universal-service-fund-national-security-threat-risk
#us #fcc #huawei #zte #security
Did a Chinese Hack Kill Canada’s Greatest Tech Company?
Nortel was once a world leader in wireless technology. Then came a hack and the rise of Huawei.
The documents began arriving in China at 8:48 a.m. on a Saturday in April 2004. There were close to 800 of them: PowerPoint presentations from customer meetings, an analysis of a recent sales loss, design details for an American communications network. Others were technical, including source code that represented some of the most sensitive information owned by Nortel Networks Corp., then one of the world’s largest companies.
https://www.bloomberg.com/news/features/2020-07-01/did-china-steal-canada-s-edge-in-5g-from-nortel
https://www.assemblymag.com/blogs/14-assembly-blog/post/90631-did-outsourcing-and-corporate-espionage-kill-nortel
https://www.cbc.ca/news/politics/former-nortel-exec-warns-against-working-with-huawei-1.1137006
#huawei #nortel #canada #china #industrial #espionage #telecom
Nortel was once a world leader in wireless technology. Then came a hack and the rise of Huawei.
The documents began arriving in China at 8:48 a.m. on a Saturday in April 2004. There were close to 800 of them: PowerPoint presentations from customer meetings, an analysis of a recent sales loss, design details for an American communications network. Others were technical, including source code that represented some of the most sensitive information owned by Nortel Networks Corp., then one of the world’s largest companies.
https://www.bloomberg.com/news/features/2020-07-01/did-china-steal-canada-s-edge-in-5g-from-nortel
https://www.assemblymag.com/blogs/14-assembly-blog/post/90631-did-outsourcing-and-corporate-espionage-kill-nortel
https://www.cbc.ca/news/politics/former-nortel-exec-warns-against-working-with-huawei-1.1137006
#huawei #nortel #canada #china #industrial #espionage #telecom