Chinese Spies Accused of Using Huawei in Secret Australia Telecom Hack bloomberg.com/news/articles/…
This is a really great story from @business and congrats to the reporters for getting the story. A few comments:

1) At its core, this is a story of a Chinese government HUMINT operation that saw intel agencies push compromised software updates to operator networks
2) Subsequently, tipped off by this, US agencies saw similar activities targeting Huawei equipment in the USA. This is part of what has led to the drumbeat of ‘we can’t trust Huawei equipment in our networks’. (Me: I’m curious about Canadian, UK, and New Zealand networks!)
3) The other elements of the concerns are significantly associated with the wide swathe of incidental (i.e., not deliberately planted) vulnerabilities that have been found in Huawei equipment, such as by the UK HCSEC (see: gov.uk/government/pub…)
What can we take away from this?

First, the Bloomberg article actually runs counter to the idea that Huawei was controlled by, operated by, or unduly influenced by the Chinese government at the time of the HUMINT operations in 2012 or so.
Why? Because if you need to impersonate Huawei technicians to deploy implants, and do so without knowledge of execs, then it’s hard to say that the company writ large (or its executive staff) were complicit.
Second, this kind of operation (at the time) was presumably higher-cost/risk. HUMINT can be dicey and if you’re caught it can be pretty apparent. That doesn’t mean a HUMINT operation isn’t serious, but that they tend to be higher stakes and require a lot of prep and planning.
Third, it’s worth noting that the NSA conducted *similar if not identical* operations when they interdicted equipment to implant it before sending it along to its destination. Which is to say that multiple agencies have been playing at this game, including Western agencies.
Forth, the CSE Act (see: laws-lois.justice.gc.ca/PDF/C-35.3.pdf) that was passed into law in 2019 includes language which authorizes @cse_cst to do “anything that is reasonably necessary to maintain the covert nature of the [foreign intelligence] activity” (26(2)(d)).
The language in the CSE Act, at a minimum, raises the prospect that the CSE could also undertake operations paralleling the NSA and, in theory, the Chinese government. (There is a question of whether this was new power or a legislative formalization of an existing secret one.)
None of this is to detract from the seriousness of the Chinese government’s alleged operations towards Australian & US telecom networks. And it’s possible there’s been change in the relationship between Huawei & the Chinese government, such that it is truly captured now.
But what the reporting makes clear is that Huawei circa 2012 didn’t appear captured by the Chinese government given the government’s reliance on HUMINT ops. And, moreover, that the activities being undertaken by the Chinese government were paralleled by Western governments.

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Christopher Parsons

Christopher Parsons Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @caparsons

16 Dec
Ministerial Letters are out. Things I’m seeing:

From ISED (pm.gc.ca/en/mandate-let…): plans for more natsec/surveillance around university research; right to repair stuff; update the Investment Cnd Act to support natsec assessments, more on Digital Charter, DARPA-like program
From PSC (pm.gc.ca/en/mandate-let…): CBSA review body promised, focus on financial crimes, legislation planned for 5G/critical infrastructure, more intel sharing with Cnd partners targeting research/investment; more natsec-related resources to RCMP and other security agencies [½]
More from PSC: involved in cybersecurity plan/strategy, focus on ideologically-inspired extremism + attention to cybercriminals/terroists; implement Clare’s Law; more digital surveillance at the borders, and improve security to ministers/MPs
Read 12 tweets
14 Dec
Yesterday, @nsiracanada released their annual report. You can find it at: nsira-ossnr.gc.ca/tabling-of-the…
In this thread I’ll be highlighting some items of note, and general thoughts, on what we learned about our national security agencies as well as their review body. I’ll be structuring using the top-line headings in the report in case you want to follow along.
Section: Message to Members

The first thing to note is NSIRA recognizes the lack of access to offices and/or information have delayed reviews. Practically, staff have lacked access to classified materials which they regularly depend on to conduct reviews.
Read 84 tweets
28 Sep
🚨🚨NEW REPORT from @citizenlab: Pandemic Privacy: A preliminary analysis of collection technologies, data collection laws, and legislative reform during COVID-19 citizenlab.ca/2021/09/pandem… 🚨🚨
This report by @wbaballard, @AmandaCutinha, & myself:

1) performs a comparative analysis of pandemic data collection technologies
2) finds privacy laws didn’t inhibit Canada’s COVID-19 response, and
3) identifies how proposed privacy law reforms would harm Canadians’ privacy
Core findings:

1) how data was collected to combat the COVID-19 pandemic was unprecedented in terms of the sheer volume of data collected, and retasking of commercial services and systems to facilitate health surveillance
Read 13 tweets
13 Sep
Earlier this year, Canada's National Security Intelligence Review Agency (NSIRA) announced it experienced a 'cyber incident. @NSIRACanada is responsible for, amongst other things, reviewing the operations which have been undertaken by Canada's intelligence community. #cndnatsec
At the time there was very little public information, which led me to raise a serious of questions of what unclassified or Protected (as opposed to Secret, Top Secret, or Top Secret SI) information might have been accessed by a third party. See: christopher-parsons.com/questions-surr…
NSIRA has, subsequently, provided further details on their incident at: nsira-ossnr.gc.ca/nsiras-update-…

In its statement, the agency sets out that only two files were seemingly acquired by the third party.
Read 13 tweets
13 Sep
Encrypted Phone Firm Ciphr, Used by Criminals, Moves to Cut-off Australia vice.com/en/article/k78…
It's really interesting that Ciphr is expanding to include a 'Lite' version that may significantly expand their user base. Why might an organization that ostensibly markets its services criminals do this?
1) The more people using the service who are not potential criminals may increase costs to LEAs who want to insert a backdoor into the application somehow. If they can scale then there may be a public interest argument to *not* backdoor this Ciphr, unlike An0n.
Read 9 tweets
13 Sep
Stanford professors urge U.S. to end program looking for Chinese spies in academia reuters.com/world/us/stanf…
The FBI has a track record of laying charges against American faculty for inappropriately working with Chinese institutions. But it’s critical that observers recognize that a large number of these investigations are subsequently dismissed.
Canada is adopting American methods of scrutinizing academics, with an expected focus on Asian (and specifically Chinese) collaborators. We will likely see similar charging behaviour, harassment, and bias against scholars based on ‘national security’ concerns and investigations.
Read 8 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(