Report: Chinese PLA Access 80% of “World’s Communications”

China has found a backdoor to access 80 percent of the “world’s communications” to include information passed through the internet and sensitive infrastructure databases, writes a former senior security analyst for the Pentagon.

F. Michael Maloof, who now writes for WND, cites Huawei Technologies Co. Ltd and ZTE Corporation as the companies the Chinese government and People Liberation Army can use to gain access to this information via commercial networks installed by each Chinese electronic manufacturer.

“The two companies give the Chinese remote electronic “backdoor” access through the equipment they have installed in telecommunications networks in 140 countries. The Chinese companies service 45 of the world’s 50 largest telecom operators,” Maloof writes.

He goes further to say the Chinese are working to access the remaining 20 percent. Individuals and companies who communicate over their “virtual private networks” or VPNs are especially susceptible. Sources have told Maloof those networks are leaking like a “sieve” to Chinese data collectors, especially those that connect to companies based in places like Mexico.

U.S. government officials are aware of this threat. The U.S. House Intelligence Committee has also chosen to investigate the two companies in question. U.S. Commerce Department leaders banned Huawei from helping build a national wireless network as Maloof also points out.

It’s easy to connect this to the further cyber threat posed by the Chinese. It also brings to mind the 1,800 cases of counterfeit Chinese parts found in U.S. military equipment to include missile defense systems and intelligence sensors. On the drum beats for more cyber awareness inside the Pentagon.

If you want to hear more from Maloof on the subject he did an interview on The Cyber Jungle about the topic. Fast forward to the last segment when Maloof’s interview picks up.

51 Comments on "Report: Chinese PLA Access 80% of “World’s Communications”"

  1. i think it is time to strike back. How long do you want to wait?

  2. SUPRISE….!!!!

    the next pearl harbor/ 9-11 will be when "YOUR" electric, wireless, phone lines and cable shut down…. also the delivery schedules to "YOUR" local supermarket, gas station and hardware store…. along with anything and everything digitized you need to make an honest days living…. to include possibly your water, and sewer lines if they can find any chinese coders willing to slum like that….

    oh, you can forget about the USPS too, and for at least a month.

  3. This all started when IBM was allowed to sell their laptop business to the ChiComs. Reverse engineering reveals many secrets.

    But go right ahead, buy cheap. And import engineers with no allegiance to the US>

  4. I remember people on this board giving me negative ratings when I said they could do the same to the knockoff equipment sold to our military, including gear in our aircraft. Chinese would plant a "backdoor" into our military equipment. This should be a grave concern to th U.S. and our Allies.

  5. J.E. McKellar | July 16, 2012 at 8:11 am | Reply

    I think its time we singled out the corrupt businessmen that sold out our country to a foreign power and charge them with treason. Then we need to start a program of 100% US-sourced procurement for military equipment and critical infrastructure. Give Americans the chance to rebuilt their own country, and throw the nwo-liberal looters, financial con-artists, and corrupt politicians into those prisons they were so eager to build and fill with the American poor.

  6. Does this mean in case of War – I won't be able to use my I-phone?

    /s

  7. Doesnt the US have the ability to access something like 100% of the worlds communications? I'm sure the NSA is doing the same damn thing to the Chinese and everyone else. Before we start crying strike back at china maybe we should think about what kind of world we would have if we made acts of espionage cause for war. The US would be fighting everybody and everybody would be fighting each other. Not that I really care. I own stock in Lockheed :)

  8. China and a lot of other countries learned from the US, they watched us and took notes. China is dumping all kids of money into africa, just like america does with other countries, but China does not tell them how to run their country, they just want to do busisness. In the past American tossed all kinds of money at othe countries, and we still do. And not a one of them can we trust, or really depend on. As fare as war goes, there will only be wars in countries, where it doesn't hurt the bottom line, or in the case where it threatens certain interest of another country. Things are going to get heated as othe countries grow and depend a bigger share of the resources.

  9. They (China) have the parts, they manufacture and produce, they have the manpower, money and ingenuity. They are dangerous.

  10. This sounds liek another joke article by Kevin Coleman. Anybody who could see 80% of the worlds communications wouldnt have to work as hard as the Chinese do. LOL

  11. In the words of one of Tom Clancy's characters "THIS REPRESENTS A CLEAR AND PRESENT DANGER!!!!!!!!!!!!!!!!!!!" Where is Reagan when you need him. Either we take a stand now or we lose the next war!

  12. Uhhhm, if WND is going to become a regular source for Defensetech's posts, I may need to revise my bookmarks….

  13. Wasn't this the guy who alleged Israel also had stealth Blackhawks?

  14. Apple have braches and factories in China. PC phones, Laptop, desktop, telephoney electronics and parts were also produce in China, aside from Reebok, Nike and etc. USA export jobs and technology to China to produce what is now sold in US and the rest of the world as consumer products to profit from low produce and export tax. This is no suprise. Probably the next hollywood movie after I see dead people is I see Chinese people.

  15. Is ANYBODY Surprised at this?

    make your cost's cheap….
    get the market….
    keep your back door open…

    Simple…

  16. This is the BIGGEST ''DUH'' ever. Of course they have accesses they make 90% of the worlds computer parts and assemblies.

  17. Can somebody please WAKE UP and smell the EGG ROLLS?

    Connect the dots folks … the next war will be with the Communist Chinese.

    I don't trust them … further than I can spit them.

  18. Hey! PLA! Stop reading this post immediately!

  19. Urallparanoid | July 16, 2012 at 4:59 pm | Reply

    I think you should all calm down and pity the poor Chinese intel officers who (if this is true) have to sift through 80% of the world's communications, 79.9999999999% of which are boring nonsense (79.9999999999999999999% in the case of America).

  20. And all U.S. phone call records and billing are done by the Israelis.. They have access to just about every landline in America. 60 minutes did a report of this over a decade ago. How the U.S. gov't could allow this is beyond me and most Americans given the Israeli's history and continued spying on America.

  21. Marcellus Hambrick | July 16, 2012 at 6:43 pm | Reply

    The Chinese are getting every advantage over the US. All we are concerned about is social programs. We are a country in decline. You can see it coming. The Chinese, with no dissention from their populace, will “bury us” like Khrushchev said. The Chinese are stealing military and economic secrets left and right and we are only concerned about people paying their “fair share”. Give me a break.

  22. Some Other Steve | July 16, 2012 at 7:13 pm | Reply

    Before blowing a gasket, consider the source: WND: Wing Nut Daily.

    Sheesh.

  23. Actucally i've known this for over a year already it was reported awhile back by quite a few internet science/tech sites.

  24. Ping wow. Ming chow.

  25. There's nothing deadlier than a Chinaman behind a keyboard.

  26. American: Nice Duds General, bet the Talibs can see you for miles.

    Red General: Camo is for Pu**ies

  27. LISTEN UP USA a mate here in Australia just told me how much his brother makes (electronic eng) in China. His china Co is making boards etc for the US NAVY. It's godda be in the script …..surely the greedy US CEO's have not sold u all down the river.

  28. We are pathetic…

  29. But when the US use Echelon to snoop on 90% of all world comms it's OK?

  30. Having the capability to access 80% of the world’s commercial networks and actually tapping them are two very different things. Large scale eavesdropping efforts like the one suggested in this article would have been detected a long time ago simply because of the traffic volume flowing back to China.

    This article would have been a little more relevant if the journalist had tied China’s selective monitoring agenda to the referenced hardware taps.

    In the same respect, we and our partners have our own large scale foreign communications monitoring programs so we shouldn’t act surprised when we hear about another country doing the same thing.

  31. Are we this incompetent?

    I thought the USA was supposed to be smart. Wouldn't important layers in our internet and communications networks be made with American made electronics for this very reason?

    Or is this propaganda?

    What is stopping American made computers? Besides the lack of cheap labor compared to Asia. I would probably pay a few hundred dollars more for a computer if it was made in the USA and had it's design improved by the NSA/CIA.

    I trust them more then I trust foreigners because ultimately they have the USA's interest in heart (I hope).

  32. And we're waiting for??? Get with the program folks. You're supposed to be our first line of defense.

  33. Yea, a Chinese spy does not looky like Chinese.

  34. microsoft left a huge backdoor open in windows 7 google metasploit 2 exploit and you will see that everyone is leaving backdoors open so that the governments can control your pc. This is no news since most backdoors that are discovered by hackers are left open and are never patched. How come MS has done nothing to close the metasploit back door and it has been evident that it exists for 2 years. the most dangerouse thing about metasploit is that the hacker has full control of your pc and can also see your desktop, copy password hashes for brute force attacks, and worst of all you can format or delete partitions. like i said full control. metasploit can also attack unix and linux machines its success rate on unix based machines im unsure about. Macs are next for that exploit team. For those of you who think macs are safe think again. there were "no virus's for mac since there was no way to scan for them" most macs are infected.

  35. You know that having the network traffic is not the same thing as having the data in that network traffic. If I do end to end encryption, theoretically I can broadcast it to the world and it wouldn't matter. You don't have the key to open the data so you just have a stream of junk.

    This is not to say allowing your network gear to push data streams places that you didn't intend is ok, just that if you have planned for that eventuality it's shouldn't be a huge issue.

  36. Impostor?

  37. I guess America has to wake up its bloody idea n start dealing with tis sinister panda. rethink how US can deal with china's asymmetrical warfare using a more down to earth approach rather than political fighting over the 2 parties and overspend on too precious to destroy war toys that stand too vulnerable to china's cheap missiles n weapn

  38. LOL !! I wish I could say who has "backdoor" instead of his head, but I afraid to be banned. The real risk is only that Cisco etc are loosing huge money competing with Chinese companies. The rest – sniffing and transferring 80% of conversation via WAN to China, reading encrypted conversations first of all is technically impossible and second – has no sense at all. US gave China technologies. Moved plants and development to China. Why to steal something US already gave for free? Large US companies (including Cisco) outsourced IT support to India, China, Philippines, gave them access rights to networks and nobody has concerns that sensitive data could be compromised. US public dept to China is in my opinion something we should worry about. Lack of jobs is something we should worry about. More than 100.000 people killed during US presence in Irak – this is something we should worry about. Stop looking for enemy to switch our attention from really important things.

  39. look, we hack them all the time. they hack us all the time. tis just how the game works. you think for a second that the dod or dhs hasnt breaches their infra then youre wrong. use google and just search it out. the evidence is there. its been leaked for the last few years now. we hack them. them hack us. its a game. if the US guys thought there was any real danger dont you think we’d have patched our own country then taken china offline? c’mon, with barely any effort a few folks tooks down brazil, you know the country, down for days. not just the net either. google foos. debate all your guys want. leave the grown up stuff to the pros. good day.

    I SAID GOOD DAY.

  40. look, we hack them all the time. they hack us all the time. tis just how the game works. you think for a second that the dod or dhs hasnt breaches their infra then youre wrong. use google and just search it out. the evidence is there. its been leaked for the last few years now. we hack them. them hack us. its a game. if the US guys thought there was any real danger dont you think we’d have patched our own country then taken china offline? c’mon, with barely any effort a few folks tooks down brazil, you know the country, down for days. not just the net either. google foos. debate all your guys want. leave the grown up stuff to the pros. good day.

    I SAID GOOD DAY.

  41. Pencil,paper,and courier worked well for a long time.Go back to it .

  42. I wonder how much of the world's communications the US and UK are able to monitor via installations such as RAF Menwith Hill? I would expect it's at least in the area of 80% as well.

  43. Besides supplying weapons to North Vietnam and North Korea which is on their border, it seems the Chinese keep to themselves and always have. Genghis rode shotgun for a while however.

  44. It is perfect time to make a few plans for the long run and it’s time to be happy. I’ve read this post and if I may just I wish to counsel you few interesting things or tips. Maybe you could write subsequent articles referring to this article. I wish to read more things about it!

  45. you do realize that 81% of internet traffic is ****….so sue PLA for piracy, don’t use this as an excuse to pay for cyber war to fattening the 1% of the MIC!

  46. Read the book "CYBER WAR – THE NEXT THREAT TO NATIONAL SECURITY AND WHAT TO DO ABOUT IT" by, Richard A. Clarke and Robert K. Knake.
    Look at WHO gave the Chinese Proprietary Rights so they could sell their merchandise in China. You may be amazed!!

  47. I love what you guys are up too. Such clever work and reporting!

    Keep up the very good works guys I’ve added you guys to my own blogroll.

  48. after reading alot of good and nonsenses it makes me think that some of you smoke tooooo much
    Google for Internet usage stats for 2011 ASIA / China uses 44% of all internet
    Another plus to that story, at once i know a guy that worked @******** according to his stories 30-40% of all supplied weapons for use @/in military bases was unaccounted for, meaning been stolen and nobody(maybe 1-5 people) knows where they went tooooo or still are.!

  49. Signup free of cost email accounts verification API here and acquire 500 credits which you could utilise in web or desktop application or this zero cost JAVA based application here to validate and scrub
    your mailing lists

Leave a comment

Your email address will not be published.


*