{"id":41292,"date":"2014-03-24T12:00:06","date_gmt":"2014-03-24T12:00:06","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=41292"},"modified":"2015-05-05T21:35:11","modified_gmt":"2015-05-05T20:35:11","slug":"n-s-a-breached-chinese-servers-seen-as-security-threat","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2014\/03\/n-s-a-breached-chinese-servers-seen-as-security-threat\/","title":{"rendered":"N.S.A. Breached Chinese Servers Seen as Security Threat"},"content":{"rendered":"<p>American officials have long considered Huawei, the Chinese telecommunications giant, a security threat, blocking it from business deals in the United States for fear that the company would create \u201cback doors\u201d in its equipment that could allow the Chinese military or Beijing-backed hackers to steal corporate and government secrets.<\/p>\n<p>But even as the United States made a public case about the dangers of buying from Huawei, classified documents show that the <a target=\"_blank\" href=\"http:\/\/topics.nytimes.com\/top\/reference\/timestopics\/organizations\/n\/national_security_agency\/index.html?inline=nyt-org\" title=\"More articles about National Security Agency, U.S.\" >National Security Agency<\/a> was creating its own back doors \u2014 directly into Huawei\u2019s networks.<\/p>\n<p>The agency pried its way into the servers in Huawei\u2019s sealed headquarters in Shenzhen, <a target=\"_blank\" href=\"http:\/\/topics.nytimes.com\/top\/news\/international\/countriesandterritories\/china\/index.html?inline=nyt-geo\" title=\"More news and information about China.\" >China<\/a>\u2019s industrial heart, according to N.S.A. documents provided by the former contractor Edward J. Snowden. It obtained information about the workings of the giant routers and complex digital switches that Huawei boasts connect a third of the world\u2019s population, and monitored communications of the company\u2019s top executives.<\/p>\n<p>One of the goals of the operation, code-named \u201cShotgiant,\u201d was to find any links between Huawei and the People\u2019s Liberation Army, one 2010 document made clear. But the plans went further: to exploit Huawei\u2019s technology so that when the company sold equipment to other countries \u2014 including both allies and nations that avoid buying American products \u2014 the N.S.A. could roam through their computer and telephone networks to conduct surveillance and, if ordered by the president, offensive cyberoperations.<\/p>\n<p>\u201cMany of our targets communicate over Huawei-produced products,\u201d the N.S.A. document said. \u201cWe want to make sure that we know how to exploit these products,\u201d it added, to \u201cgain access to networks of interest\u201d around the world.<\/p>\n<p>The documents were disclosed by The New York Times and <a target=\"_blank\" href=\"http:\/\/www.spiegel.de\/international\/world\/nsa-spied-on-chinese-government-and-networking-firm-huawei-a-960199.html\" title=\"Article on Der Spiegel website \" >Der Spiegel<\/a>, and are also part of a book by Der Spiegel, \u201cThe N.S.A. Complex.\u201d The documents, as well as interviews with intelligence officials, offer new insights into the United States\u2019 escalating digital cold war with Beijing. While President Obama and China\u2019s president, Xi Jinping, have begun talks about limiting the cyber conflict, it appears to be intensifying.<\/p>\n<p>The N.S.A., for example, is tracking more than 20 Chinese hacking groups \u2014 more than half of them Chinese Army and Navy units \u2014 as they break into the networks of the United States government, companies including Google, and drone and nuclear-weapon part makers, according to a half-dozen current and former American officials.<\/p>\n<p>If anything, they said, the pace has increased since the revelation last year that some of the most aggressive Chinese hacking originated at a People\u2019s Liberation Army facility, <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2013\/02\/19\/technology\/chinas-army-is-seen-as-tied-to-hacking-against-us.html?_r=0&amp;gwh=1F8882CC86CB87898C237E9DC1989D5D&amp;gwt=regi\" title=\"Times article\" >Unit 61398<\/a>, in Shanghai.<\/p>\n<p>The Obama administration distinguishes between the hacking and corporate theft that the Chinese conduct against American companies to buttress their own state-run businesses, and the intelligence operations that the United States conducts against Chinese and other targets.<\/p>\n<p>American officials have repeatedly said that the N.S.A. breaks into foreign networks only for legitimate national security purposes.<\/p>\n<p>A White House spokeswoman, Caitlin M. Hayden, said: \u201cWe do not give intelligence we collect to U.S. companies to enhance their international competitiveness or increase their bottom line. Many countries cannot say the same.\u201d<\/p>\n<p>But that does not mean the American government does not conduct its own form of corporate espionage with a different set of goals. Those concerning Huawei were described in the 2010 document.<\/p>\n<p>\u201cIf we can determine the company\u2019s plans and intentions,\u201d an analyst wrote, \u201cwe hope that this will lead us back to the plans and intentions of the PRC,\u201d referring to the People\u2019s Republic of China. The N.S.A. saw an additional opportunity: As Huawei invested in new technology and laid undersea cables to connect its $40 billion-a-year networking empire, the agency was interested in tunneling into key Chinese customers, including \u201chigh priority targets \u2014 Iran, Afghanistan, Pakistan, Kenya, Cuba.\u201d<\/p>\n<p style=\"text-align: center;\"><b>Slides Describe Mission Involving Huawei <\/b><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-docs-promo-master495.png\" ><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-41293\" alt=\"nsa-docs-promo-master495\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-docs-promo-master495-300x226.png\" width=\"300\" height=\"226\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-docs-promo-master495-300x226.png 300w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2014\/03\/nsa-docs-promo-master495.png 495w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><span style=\"text-decoration: underline;\"><a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/interactive\/2014\/03\/23\/world\/asia\/23nsa-docs.html\" >OPEN Document <\/a><\/span><\/p>\n<p>The documents offer no answer to a central question: Is Huawei an independent company, as its leaders contend, or a front for the People\u2019s Liberation Army, as American officials suggest but have never publicly proved?<\/p>\n<p>Two years after Shotgiant became a major program, the House Intelligence Committee delivered an unclassified report on Huawei and another Chinese company, ZTE, that cited no evidence confirming the suspicions about Chinese government ties. Still, the October 2012 report concluded that the companies must be blocked from \u201cacquisitions, takeover or mergers\u201d in the United States, and \u201ccannot be trusted to be free of foreign state influence.\u201d<\/p>\n<p>Huawei, which has all but given up its hopes of entering the American market, complains that it is the victim of protectionism, swathed in trumped-up national security concerns. Company officials insist that it has no connection to the People\u2019s Liberation Army.<\/p>\n<p>William Plummer, a senior Huawei executive in the United States, said the company had no idea it was an N.S.A. target, adding that in his personal opinion, \u201cThe irony is that exactly what they are doing to us is what they have always charged that the Chinese are doing through us.\u201d<\/p>\n<p>\u201cIf such espionage has been truly conducted,\u201d Mr. Plummer added, \u201cthen it is known that the company is independent and has no unusual ties to any government, and that knowledge should be relayed publicly to put an end to an era of mis- and disinformation.\u201d<\/p>\n<p><b>Blocked at Every Turn<\/b><\/p>\n<p>Washington\u2019s concerns about Huawei date back nearly a decade, since the RAND Corporation, the research organization, evaluated the potential threat of China for the American military. RAND concluded that \u201cprivate Chinese companies such as Huawei\u201d were part of a new \u201cdigital triangle\u201d of companies, institutes and government agencies that worked together secretly.<\/p>\n<p>Huawei is a global giant: it manufactures equipment that makes up the backbone of the Internet, lays submarine cables from Asia to Africa and has become the world\u2019s third largest smartphone maker after Samsung and Apple.<\/p>\n<p>The man behind its strategy is Ren Zhengfei, the company\u2019s elusive founder, who was a P.L.A. engineer in the 1970s. To the Chinese, he is something akin to Steve Jobs \u2014 an entrepreneur who started a digital empire with little more than $3,000 in the mid-1980s, and took on both state-owned companies and foreign competitors. But to American officials, he is a link to the People\u2019s Liberation Army.<\/p>\n<p style=\"text-align: center;\"><em><b>Acting to Block a Chinese Telecom Giant <\/b><\/em><\/p>\n<figure id=\"Acting-to-Block-a-Chinese-Telecom-Giant\"><figcaption><em>Over the past seven years, the United States government has taken steps to block the Chinese telecommunications and internet giant Huawei from gaining a foothold here, fearing that the company could act on behalf of the Chinese military to gain access to government and corporate secrets. The company was founded in 1987 and by the mid-90s had begun making inroads into the U.S. telecom equipment market.<\/em> <\/figcaption><div>\n<div id=\"g-0323_nat_webnsa-artboard_1-0\">\n<div id=\"g-0323_nat_webnsa-artboard_1-0-graphic\">\n<div id=\"g-ai1\" style=\"text-align: left;\">\n<p><em>U.S. RELATIONS WITH HUAWEI<\/em><\/p>\n<\/div>\n<div id=\"g-ai2\" style=\"text-align: left;\">\n<p><em>2003\u20134 Cisco sues Huawei for stealing source code; the suit is settled with neither side revealing terms.<\/em><\/p>\n<p><em>\u00a02005 The Air Force hires the RAND corporation to examine threats from Chinese networking firms; it concludes there is a \u201cdigital triangle\u201d of Chinese military, state research groups, and companies like Huawei.<\/em><\/p>\n<p><em>\u00a02007 The National Security Administration begins its \u201cShotgiant\u201d effort to pierce Huawei\u2019s networks and exploit its systems.<\/em><\/p>\n<\/div>\n<div id=\"g-ai3\" style=\"text-align: left;\">\n<p><em>\u00a02008 The U.S. blocks Huawei from buying 3Com on national security grounds.<\/em><\/p>\n<p><em>\u00a02010 The U.S. persuades Australia to kill a plan to let Huawei build a national broadband network.<\/em><\/p>\n<\/div>\n<div id=\"g-ai4\" style=\"text-align: left;\">\n<p><em>2011 In an open letter to the U.S., Huawei denies that it is a front for the Chinese government, and invites investigation.<\/em><\/p>\n<p><em>\u00a02012 The House Intelligence Committee produces a long report urging the U.S. to \u201cblock acquisitions, takeovers or mergers\u201d with Huawei, and to exclude its equipment from U.S. systems.<\/em><\/p>\n<p><em>\u00a02013 The U.S. approves purchase of Sprint Nextel by Softbank Corporation, but under conditions that probably exclude Huawei equipment.<\/em><\/p>\n<\/div>\n<div id=\"g-ai5\">\n<p style=\"text-align: left;\"><em>\u00a0Vice President Joseph R. Biden Jr., on a trip to Seoul, urges South Korea to kill a contract for Huawei to build an advanced telecom network for Seoul<\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/figure>\n<p>They have blocked his company at every turn: pressing Sprint to kill a $3 billion deal to buy Huawei\u2019s fourth generation, or 4G, network technology; scuttling a planned purchase of 3Com for fear that Huawei would alter computer code sold to the United States military; and pushing allies, like Australia, to back off from major projects.<\/p>\n<p>As long ago as 2007, the N.S.A. began a covert program against Huawei, the documents show. By 2010, the agency\u2019s Tailored Access Operations unit \u2014 which breaks into hard-to-access networks \u2014 found a way into Huawei\u2019s headquarters. The agency collected Mr. Ren\u2019s communications, one document noted, though analysts feared they might be missing many of them.<\/p>\n<p>N.S.A. analysts made clear that they were looking for more than just \u201csignals intelligence\u201d about the company and its connections to Chinese leaders; they wanted to learn how to pierce its systems so that when adversaries and allies bought Huawei equipment, the United States would be plugged into those networks. (The Times withheld technical details of the operation at the request of the Obama administration, which cited national security concerns.)<\/p>\n<p>The N.S.A.\u2019s operations against China do not stop at Huawei. Last year, the agency cracked two of China\u2019s biggest cellphone networks, allowing it to track strategically important Chinese military units, according to an April 2013 document leaked by Mr. Snowden. Other major targets, the document said, are the locations where the Chinese leadership works. The country\u2019s leaders, like everyone else, are constantly upgrading to better, faster Wi-Fi \u2014 and the N.S.A. is constantly finding new ways in.<\/p>\n<p><b>Hack Attacks Accelerate <\/b><\/p>\n<p>Chinese state attacks have only accelerated in recent years, according to the current and former intelligence officials, who spoke on condition of anonymity about classified information.<\/p>\n<p>A dozen P.L.A. military units \u2014 aside from Unit 61398 \u2014 do their hacking from eavesdropping posts around China, and though their targets were initially government agencies and foreign ministries around the world, they have since expanded into the private sector. For example, officials point to the First Bureau of the army\u2019s Third Department, which the N.S.A. began tracking in 2004 after it hacked into the Pentagon\u2019s networks. The unit\u2019s targets have grown to include telecom and technology companies that specialize in networking and encryption equipment \u2014 including some Huawei competitors.<\/p>\n<p>For some of its most audacious attacks, China relies on hackers at state-funded universities and privately owned Chinese technology companies, apparently as much for their skills as for the plausible deniability it offers the state if it gets caught. The N.S.A. is tracking more than half a dozen such groups suspected of operating at the behest of the Chinese Ministry of State Security, China\u2019s civilian spy agency, the officials said.<\/p>\n<p>Their targets, they noted, closely align with China\u2019s stated economic and strategic directives. As China strove to develop drones and next-generation ballistic and submarine-launched missiles in recent years, the N.S.A. and its partners watched as one group of privately employed engineers based in Guangzhou in southern China pilfered the blueprints to missile, satellite, space, and nuclear propulsion technology from businesses in the United States, Canada, Europe, Russia and Africa.<\/p>\n<p>And as China strove to make its own inroads on the web, officials said another group of private hackers infiltrated Google, Adobe and dozens of other global technology companies in 2010. Lately, the officials said, that group and its counterparts are also going after security firms, banks, chemical companies, automakers and even nongovernment organizations.<\/p>\n<p>\u201cChina does more in terms of cyberespionage than all other countries put together,\u201d said James A. Lewis, a computer security expert at the Center for Strategic and International Studies in Washington.<\/p>\n<p>\u201cThe question is no longer which industries China is hacking into,\u201d he added. \u201cIt\u2019s which industries they aren\u2019t hacking into.\u201d<\/p>\n<p>A version of this article appears in print on March 23, 2014, on page A1 of the New York edition with the headline: U.S. Penetrated Chinese Servers it Saw as Spy Risk.<\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2014\/03\/23\/world\/asia\/nsa-breached-chinese-servers-seen-as-spy-peril.html?hp\" >Go to Original \u2013 nytimes.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The NSA pried its way into the servers in Huawei\u2019s sealed headquarters in Shenzhen, China\u2019s industrial heart, according to documents provided by Edward J. Snowden. It obtained information about the workings of the giant routers and complex digital switches that Huawei boasts connect a third of the world\u2019s population, and monitored communications of the company\u2019s top executives.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-41292","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/41292","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=41292"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/41292\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=41292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=41292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=41292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}