【禁聞】「聯想」陷阱大 五國情報機構禁用

2013年08月03日社會
【新唐人2013年08月03日訊】澳洲媒體近日揭露,美、英、加、新和澳五國組成的情報聯盟,禁止在國防部和情報部門的機密網路中使用中國個人電腦製造商「聯想」,已經很多年了。因為大量的實驗室測試顯示,聯想電腦存在惡意硬體和漏洞,容易遭到入侵者遠程操控。計算機專業人士指出,這是中共為監控中國人和竊取西方國家機密的卑鄙手段。

澳大利亞《金融評論報》(Australian Financial Review)7月27號和29號,援引英國與澳大利亞多個情報及防務領域內部人士消息稱,美國、英國、澳大利亞、紐西蘭和加拿大組成的「五隻眼」情報聯盟從2000年代中期就頒布書面禁令,禁止各自國家的情報與國防部門機密和絕密層級的網路使用聯想電腦。因為多項檢測結果證明,聯想電腦的硬碟設有後門,晶元含有固件漏洞,將會受到潛在攻擊。

全球自由資訊運動創辦人原大陸電腦博士張新宇:「在中國大陸生產的這些機器啊,包括手機啊、電腦啊,如果你要在這裡設廠,這個項目要上,就必須得加一個政府已經開發好的一個開後門的這樣所謂的一個駭客,而且加到硬體裡面去,加這個目的就是為了監控所有的人。所以聯想這種電腦,如果是在中國大陸生產,它一定會加這些東西的,因為它要控制全世界。」

澳大利亞國防部專家稱,隸屬於國防部的國防部的信號局(Defence Signals Directorate)曾經大量使用IBM電腦,但是在2005年聯想收購IBM的電腦部門後,從2006年起就不再使用IBM電腦。這與美國國務院的決定一致。主要原因是他們擔心有著中共官方背景的聯想,會威脅到本國的資訊安全。

Java工程師陳帥:「因為在2005年,聯想收購IBM就做了一種中國(共)政府的統戰的行為, 它們為了達到監控所有中國人與異議人士,另外也是了解國外的一些資訊,了解不同政府的一些機密,所以,它就把聯想——中國的品牌打出去,那麼這個時候,它就掛靠到IBM上面。」

據報導,英國情報機構的實驗室在聯想產品的研究方面發揮了主導作用。專家發現聯想電路的惡意修改,超越一般典型的漏洞,可允許他人在沒有任何個人用戶資訊的情況下遠程進入用戶的電腦。而這種經過精心設計的硬體「後門」往往很難被監測到。

陳帥:「它為了避免它的聲譽受到影響,它就把後門都設置在最底層,對電腦技術方面來說,最底層的東西都是在晶元與晶元組裡,也是繞過了大部分的檢測軟體與廠商。如果有人檢查出來它們問題的話,中國(共)政府可能會說,這是我們在技術方面不成熟,一些漏洞。但是它們是以漏洞為藉口,實際是行使它們的監控與竊取的目的。」

聯想的這種做法,被IT專家形容為非常隱晦、非常卑鄙,因為普通民眾在日常使用的時候跟本察覺不到自己的電腦已經被完全入侵,甚至是被時刻監控著,如果遇到當局想要篩選的內容,電腦的IP會立刻被傳輸到網路上面,隨後會有相應的駭客進入電腦,搜尋他們要取得的資料,包括在中國異議人士的個人資訊,以及海外各國政府部門與商業組織的相關機密。

此外,曾多次被指控為大陸從事間諜活動的華為科技,也因為安全問題被排除在澳大利亞國家網路之外。同時,美國中央情報局和國家安全局前負責人海頓將軍也在最近指出,有證據證明華為在國外安裝通訊設施過程中安置木馬進行竊聽和破壞。目前有越來越多的國家開始了對華為科技的調查。


採訪陳漢 編輯 張天宇 後制 李勇


Intelligence agencies of five countries prohibit the use of Lenovo

Australian media recently revealed that the intelligence
alliance of five countries—the US, Britain, Canada,
Australia and New Zealand—has prohibited the use of the
Chinese PC manufacturer Legend (Lenovo) for many years.
A large number of laboratory tests showed the
presence of malicious Lenovo hardware and loopholes,
which are vulnerable to intruders' remote control.

Computer professionals have pointed out

this is a dirty trick the Communist Party (CCP) uses
to monitor its people and steal Western state secrets.

On July 27 & 29, Australian Financial Review cited British
and Australian defense insider information.
Since 2000, the five eyes of intelligence, the US, Britain,
Australia, New Zealand and Canada, issued a written ban
on the use of Lenovo computers in national intelligence
and defense sector.
Tests proved that Lenovo computer's hard disk has
a "back door," and the chip contains firmware loopholes which could be attacked.

Dr. Zhang Xinyu from China, founder of Freedom
of Information Worldwide: “If you want to have a factory
in China to manufacture machines,
including mobile phones and computers, you have to
add a back door—the so-called hacker—developed by the government.
It aims to monitor everyone.

If Legend computers are made in China, these things
will surely be added because they want to control the world.”

An Australian Defense expert said the Ministry
of Defense extensively used IBM computers,
but they stopped using them in 2006,
after Legend acquired IBM's PC division.
This is consistent with the decision
of the US State Department.
Mainly they worry about Legend, with a "Chinese official
background,” being a threat to the country's security.

Java Engineer Chen Shuai: "In 2005, the acquisition of PC
from IBM was an act of the CCP's United Front.
They wanted to monitor all Chinese people and dissidents
as well as to understand some foreign information
and secrets from foreign states, so they took Chinese brand
Legend and hooked on to IBM.”

According to reports, the British intelligence agency played
a leading role in Legend product research.
Experts found that Legend circuits were maliciously
modified, beyond typical vulnerabilities, to allow others to access a user's computer.
This carefully designed hardware back door
is often hard to monitor.

Chen Shuai: "In order to avoid its reputation being affected,
the back door is set at the bottom of a computer.
As computer technology is concerned, things at the bottom
will be in the wafer or wafer group, bypassing most
of software testings and vendors.
If someone discovers it, the CCP may say, 'this is our
immaturity in terms of technology, and there are loopholes'.
But, they are using it as an excuse to reach
their monitoring and stealing purposes."

IT experts described Legend's practice as
“very dirty and hidden."
Ordinary people in everyday use would not realize their
computers have been completely compromised.
If authorities want to filter the content, the computer's IP
will immediately transmit to the network above.
Thus, a computer will be hacked into and the desirable
information obtained.
They do this to all Chinese dissidents, all state departments
and commercial organizations overseas.

Australian national network has excluded Huawei
Technologies from China because of security issues.
Meanwhile, General Hayden, former director of the CIA
and the National Security Agency, also recently pointed out
the mounting evidence that Huawei Technologies placed
Trojans in foreign countries to facilitate eavesdropping and destruction.
Currently, more and more countries are beginning
to investigate Huawei Technologies.

相關話題