【禁闻】“联想”陷阱大 五国情报机构禁用

2013年08月03日社会
【新唐人2013年08月03日讯】澳洲媒体近日揭露,美、英、加、新和澳五国组成的情报联盟,禁止在国防部和情报部门的机密网路中使用中国个人电脑制造商“联想”,已经很多年了。因为大量的实验室测试显示,联想电脑存在恶意硬体和漏洞,容易遭到入侵者远程操控。计算机专业人士指出,这是中共为监控中国人和窃取西方国家机密的卑鄙手段。

澳大利亚《金融评论报》(Australian Financial Review)7月27号和29号,援引英国与澳大利亚多个情报及防务领域内部人士消息称,美国、英国、澳大利亚、纽西兰和加拿大组成的“五只眼”情报联盟从2000年代中期就颁布书面禁令,禁止各自国家的情报与国防部门机密和绝密层级的网路使用联想电脑。因为多项检测结果证明,联想电脑的硬碟设有后门,晶元含有固件漏洞,将会受到潜在攻击。

全球自由资讯运动创办人原大陆电脑博士张新宇:“在中国大陆生产的这些机器啊,包括手机啊、电脑啊,如果你要在这里设厂,这个项目要上,就必须得加一个政府已经开发好的一个开后门的这样所谓的一个骇客,而且加到硬体里面去,加这个目的就是为了监控所有的人。所以联想这种电脑,如果是在中国大陆生产,它一定会加这些东西的,因为它要控制全世界。”

澳大利亚国防部专家称,隶属于国防部的国防部的信号局(Defence Signals Directorate)曾经大量使用IBM电脑,但是在2005年联想收购IBM的电脑部门后,从2006年起就不再使用IBM电脑。这与美国国务院的决定一致。主要原因是他们担心有着中共官方背景的联想,会威胁到本国的资讯安全。

Java工程师陈帅:“因为在2005年,联想收购IBM就做了一种中国(共)政府的统战的行为, 它们为了达到监控所有中国人与异议人士,另外也是了解国外的一些资讯,了解不同政府的一些机密,所以,它就把联想——中国的品牌打出去,那么这个时候,它就挂靠到IBM上面。”

据报导,英国情报机构的实验室在联想产品的研究方面发挥了主导作用。专家发现联想电路的恶意修改,超越一般典型的漏洞,可允许他人在没有任何个人用户资讯的情况下远程进入用户的电脑。而这种经过精心设计的硬体“后门”往往很难被监测到。

陈帅:“它为了避免它的声誉受到影响,它就把后门都设置在最底层,对电脑技术方面来说,最底层的东西都是在晶元与晶元组里,也是绕过了大部分的检测软体与厂商。如果有人检查出来它们问题的话,中国(共)政府可能会说,这是我们在技术方面不成熟,一些漏洞。但是它们是以漏洞为藉口,实际是行使它们的监控与窃取的目的。”

联想的这种做法,被IT专家形容为非常隐晦、非常卑鄙,因为普通民众在日常使用的时候跟本察觉不到自己的电脑已经被完全入侵,甚至是被时刻监控着,如果遇到当局想要筛选的内容,电脑的IP会立刻被传输到网路上面,随后会有相应的骇客进入电脑,搜寻他们要取得的资料,包括在中国异议人士的个人资讯,以及海外各国政府部门与商业组织的相关机密。

此外,曾多次被指控为大陆从事间谍活动的华为科技,也因为安全问题被排除在澳大利亚国家网路之外。同时,美国中央情报局和国家安全局前负责人海顿将军也在最近指出,有证据证明华为在国外安装通讯设施过程中安置木马进行窃听和破坏。目前有越来越多的国家开始了对华为科技的调查。


采访陈汉 编辑 张天宇 后制 李勇


Intelligence agencies of five countries prohibit the use of Lenovo

Australian media recently revealed that the intelligence
alliance of five countries—the US, Britain, Canada,
Australia and New Zealand—has prohibited the use of the
Chinese PC manufacturer Legend (Lenovo) for many years.
A large number of laboratory tests showed the
presence of malicious Lenovo hardware and loopholes,
which are vulnerable to intruders' remote control.

Computer professionals have pointed out

this is a dirty trick the Communist Party (CCP) uses
to monitor its people and steal Western state secrets.

On July 27 & 29, Australian Financial Review cited British
and Australian defense insider information.
Since 2000, the five eyes of intelligence, the US, Britain,
Australia, New Zealand and Canada, issued a written ban
on the use of Lenovo computers in national intelligence
and defense sector.
Tests proved that Lenovo computer's hard disk has
a "back door," and the chip contains firmware loopholes which could be attacked.

Dr. Zhang Xinyu from China, founder of Freedom
of Information Worldwide: “If you want to have a factory
in China to manufacture machines,
including mobile phones and computers, you have to
add a back door—the so-called hacker—developed by the government.
It aims to monitor everyone.

If Legend computers are made in China, these things
will surely be added because they want to control the world.”

An Australian Defense expert said the Ministry
of Defense extensively used IBM computers,
but they stopped using them in 2006,
after Legend acquired IBM's PC division.
This is consistent with the decision
of the US State Department.
Mainly they worry about Legend, with a "Chinese official
background,” being a threat to the country's security.

Java Engineer Chen Shuai: "In 2005, the acquisition of PC
from IBM was an act of the CCP's United Front.
They wanted to monitor all Chinese people and dissidents
as well as to understand some foreign information
and secrets from foreign states, so they took Chinese brand
Legend and hooked on to IBM.”

According to reports, the British intelligence agency played
a leading role in Legend product research.
Experts found that Legend circuits were maliciously
modified, beyond typical vulnerabilities, to allow others to access a user's computer.
This carefully designed hardware back door
is often hard to monitor.

Chen Shuai: "In order to avoid its reputation being affected,
the back door is set at the bottom of a computer.
As computer technology is concerned, things at the bottom
will be in the wafer or wafer group, bypassing most
of software testings and vendors.
If someone discovers it, the CCP may say, 'this is our
immaturity in terms of technology, and there are loopholes'.
But, they are using it as an excuse to reach
their monitoring and stealing purposes."

IT experts described Legend's practice as
“very dirty and hidden."
Ordinary people in everyday use would not realize their
computers have been completely compromised.
If authorities want to filter the content, the computer's IP
will immediately transmit to the network above.
Thus, a computer will be hacked into and the desirable
information obtained.
They do this to all Chinese dissidents, all state departments
and commercial organizations overseas.

Australian national network has excluded Huawei
Technologies from China because of security issues.
Meanwhile, General Hayden, former director of the CIA
and the National Security Agency, also recently pointed out
the mounting evidence that Huawei Technologies placed
Trojans in foreign countries to facilitate eavesdropping and destruction.
Currently, more and more countries are beginning
to investigate Huawei Technologies.

相关话题