{"id":175,"date":"2008-10-31T10:58:17","date_gmt":"2008-10-31T17:58:17","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/?p=175"},"modified":"2009-02-21T02:04:22","modified_gmt":"2009-02-21T09:04:22","slug":"new-it-security-threat-fake-and-recycled-microchips-from-china","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2008\/10\/new-it-security-threat-fake-and-recycled-microchips-from-china","title":{"rendered":"New IT-security threat: fake and recycled microchips from China"},"content":{"rendered":"<p><BLOCKQUOTE>Referring to the seizure of more than 400 fake routers so far, Melissa E. Hathaway, head of cyber security in the Office of the Director of National Intelligence, says: \u201cCounterfeit products have been linked to the crash of mission-critical networks, and may also contain hidden \u2018back doors\u2019 enabling network security to be bypassed and sensitive data accessed [by hackers, thieves, and spies].\u201d She declines to elaborate. In a 50-page presentation for industry audiences, the FBI concurs that the routers could allow Chinese operatives to \u201cgain access to otherwise secure systems\u201d (page 38).<\/BLOCKQUOTE><\/p>\n<p>Read the entire report in <A HREF=\"http:\/\/www.businessweek.com\/magazine\/content\/08_41\/b4103034193886.htm\">Business Week<\/A>. See a TV news report about the problem on <A HREF=\"youtube=https:\/\/www.youtube.com\/watch?v=WVOf2hsWQNc\">YouTube<\/A>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Referring to the seizure of more than 400 fake routers so far, Melissa E. Hathaway, head of cyber security in the Office of the Director of National Intelligence, says: \u201cCounterfeit products have been linked to the crash of mission-critical networks, and may also contain hidden \u2018back doors\u2019 enabling network security to be bypassed and sensitive [\u2026]<\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,9],"tags":[],"class_list":["post-175","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-military"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/175","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=175"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/175\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=175"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}