Nearly two years ago, the White House warned Congress that some software and hardware components being imported into the U.S. are deliberately being infected with spyware and malware – but we’re only hearing about it now.
The Cyberspace Policy Review, first issued in 2009 by the Obama administration concedes, “The nation’s approach to cybersecurity over the past 15 years has failed to keep pace with the threat.”
Yet, the so-called warning was buried in the official report, which said so-called counterfeit products “have created the most obvious supply problems, but few documented examples exist of unambiguous, deliberate subversions.”
“The challenge with supply chain attacks is that a sophisticated adversary might narrowly focus on particular systems and make manipulation virtually impossible to discover. Foreign manufacturing does present easier opportunities for nation-state adversaries to subvert products; however, the same goals could be achieved through the recruitment of key insiders or other espionage activities,” the report said.
But wait, it gets worse.
Since the report was published, Acting Deputy Undersecretary of the Department of Homeland Security (DHS) National Protection and Programs Directorate Greg Schaffer told the House Oversight and Government Reform Committee that he has uncovered “specific occasions” when such potential “espionage” activity has occurred, TG Daily reported.
And yet, it gets worse.
IT Blogwatch reports that Schaffer recently testified that the threat has been on Obama’s radar for some time.
“[I]n testimony before the House Oversight and Government Reform Committee...Greg Schaffer [said] Homeland Security and the White House have been aware of the threat for quite some time. .. This supply chain security issue essentially means that...technology being marketed in the United States was either compromised or purposely designed to enable cyberattacks,” the Computerworld blog round-up says.
When the report hit the desks of legislators nearly two years ago, White House officials asserted the U.S. “needs to develop a strategy designed to shape the international environment and bring like-minded nations together on a host of issues, including acceptable norms regarding territorial jurisdiction, sovereign responsibility and use of force.”
Perhaps the focus now should not be on these “specific occasions,” but more so on the strategy the U.S. still lacks two years after this report was filed.
Executive Editor, Strategic Initiatives
To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…
The digital transformation of business is generating a lot of value, through more automation, more intelligence, and ultimately more efficiency.
Last week, at the Open Source Summit, hosted by The Linux Foundation, the Open Mainframe Project gave birth to Zowe, introduced a new open source soft…
Not many of us love going to see the dentist, and one company working across unified voice, productivity and even IoT systems is out to make the exper…
Moogsoft Observe advances the capabilities of AIOps to help IT teams better manage their services and applications in the face of a massive proliferat…