Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security Apple Technology

FBI Director on Whether Apple and Amazon Servers Had Chinese Spy Chips: 'Be Careful What You Read' (cnbc.com) 124

During a hearing in front of the Senate Homeland Security Committee on Wednesday, FBI Director Christopher Wray told senators to "be careful what you read," when asked about a recent story involving spy chips from China being secretly embedded into servers owned by Apple, Amazon and other big companies. From a report: Senator Ron Johnson, R-Wis., chairman of the committee, asked Wray when his agency found out about the chips that server manufacturer Super Micro implanted into server hardware, as reported last week by Bloomberg Businessweek. "I would say to the newspaper article or, I mean, the magazine article, I would say be careful what you read," Wray replied. "Especially in this context." Johnson called on Wray to speak to the accuracy of the story, telling the FBI director that, "We don't want false information out there." Wray said he couldn't offer much detail because the agency has a policy of not confirming or denying that an investigation is underway. "I do want to be careful that my comment not be construed as inferring or implying, I should say, that there is an investigation," Wray said. "We take very seriously our obligation to notify victims when they've been targeted."
This discussion has been archived. No new comments can be posted.

FBI Director on Whether Apple and Amazon Servers Had Chinese Spy Chips: 'Be Careful What You Read'

Comments Filter:
  • by kwoff ( 516741 )
    "We don't want false information out there." - he had a mouse in his pocket?
    • by lgw ( 121541 )

      "We don't want false information out there." - he had a mouse in his pocket?

      More like, he's in the NSA's pocket. He meant "the NSA is trying to subvert these chips to spy on all Americans. If they fail, we'll be sure to notify everyone affected so they can replace these servers. In the meantime, forget we ever mentioned it."

      • A *sting* -- hadn't considered that; nice theory fitting many facts.
      • by gtall ( 79522 )

        NSA wouldn't want Ron Johnson in NSA's pocket. They know he's as stupid as he says. Once in a committee hearing on stock pricing on Wall Street he explained that he used to pay gobs to trade but can now do so for $19.99 per trade, so what's the problem. The fact that money was being skimmed due to timing issues on trades wasn't something he could understand as a law enforcement issue.

        Of course the skimming wasn't tied to Hillary or to those naughty Benghazis so he probably thought it was okay.

    • "We couldn't recover any data from the servers."
  • I always read the White House press statements with a 5lb bag of salt.
    • by gtall ( 79522 )

      Nah, the trick is not read them. They are like the odor of a public restroom that no one cleans. Best to cover your eyes and not let the misinformation in.

  • by Anonymous Coward

    This same guy and guys just like him (and worse) have been able to do the same thing with the legal authority of the US federal government behind them for over a decade and a half with legal immunity. Who cares what the Chinese know. The US government knows it too and they've proven they're ready to use it against you.

    You're going to get fucked if you don't fall in line with big brother. The two part illusion is only a facade to keep the most dimwitted in line. That would be the Democrat and Republican voti

    • by Ungrounded Lightning ( 62228 ) on Wednesday October 10, 2018 @06:10PM (#57458304) Journal

      This same guy and [others in the US "intelligence community"] have been able to do the same thing w... for over a decade and a half

      Quite. They can, and do, do everything this alleged hardware hack is alleged to enable, and more. Since Snowden that's solidly on the public record, manuals and all. Since the Shadow Brokers, lots of others have been able to do some of it and/or see how it works.

      Seems to me they are trying to tone down the outrage - because if it really gets going, it might (finally) be turned on them.

      What's the big deal if the Chinese came up with the capability, but had to put a chip on the boards to make it happen, rather than get Intel and AMD build it into their own chip sets?

  • Wray made a non-statement, that he's unable to make a statement. Nothing to see here, move along.
    'Be careful what you read' is ambiguous enough it doesn't necessarily imply anything one way or the other; I don't think it's supposed to be a subtle hint that we're supposed to read between the lines of. It's like the phrase "so it has come to this", it can be used in any context without adding anything of value.

    • Except for making a statement directed at the old and gullible, disparaging Bloomberg and making other weasle non-statements to downplay everything without addressing the question. Good politician.
    • by Tablizer ( 95088 )

      They might as well say, "We can tell you, but we'd have to kill you right after."

  • by gweihir ( 88907 ) on Wednesday October 10, 2018 @04:12PM (#57457644)

    At least this statement may or may not indicate that. Maybe.

    • It's clear as daylight to me that they can't clean their own house. It's not clear whether they're aware of that and trying to fix it, or aware of that and trying to cover it up, though. In either case they're failing.

      • Peter principle corollary: The older the organization the more of it's staff will be operating at their level of incompetence.

        Sometimes the right move is just to let the old one run (in quarantine), while building a new one. Then shut down the old one and set all their employees to 'no rehire'.

        The FBI is past saving, only the political operatives/appointees are not at their level of incompetence. Only a few though, thank dog, or we'd be truly screwed.

        • Peter principle corollary: The older the organization the more of it's staff will be operating at their level of incompetence.

          That explains Microsoft and Apple.
      • by gtall ( 79522 ) on Wednesday October 10, 2018 @04:33PM (#57457798)

        What the fuck are you talking about? There's no credible information the Chinese did squat with those boards the way it's been reported. They may be up to other things but that's not what is being claimed.

    • Comment removed (Score:4, Insightful)

      by account_deleted ( 4530225 ) on Wednesday October 10, 2018 @07:26PM (#57458586)
      Comment removed based on user account deletion
  • Dolt 45 said it best:

    "What you are seeing and what you are reading is not what's happening"

    https://www.bbc.com/news/av/wo... [bbc.com]

    https://www.newsday.com/long-i... [newsday.com]

  • by gweihir ( 88907 ) on Wednesday October 10, 2018 @04:22PM (#57457726)

    At least it does sound like that to me. Maybe everything we read is correct, except that the attack actually was done by the NSA?

    • by evanh ( 627108 )

      I've been thinking the same thing. Maybe Bloomberg has been misdirected about who is doing the spying.

    • Maybe everything we read is correct, except that the attack actually was done by the NSA?

      Maybe an agreement was made between multiple nations' intelligence agencies to make these systems vulnerable in general, for all their benefit?

      In any case, show me the components.

      • by gweihir ( 88907 )

        In any case, show me the components.

        Indeed. And with an independent analysis on top, please.

  • by Rick Schumann ( 4662797 ) on Wednesday October 10, 2018 @04:27PM (#57457768) Journal
    Don't tell me or anyone else what we should and should not read.
    Now, that being said, if you want to tell people to think carefully about the validity of what they read, then that's something else entirely.
  • by painandgreed ( 692585 ) on Wednesday October 10, 2018 @04:33PM (#57457796)

    What could be going on?

    1) Everything is exactly as Bloomberg states and the Chinese have performed a supply line hack on American industry. - The strong denials from all public sources that might confirm this, including to the public and stockholders, would seem to indicates that a serious investigation is going on and the government is ordering everybody to deny hard if not out lie to preserve it. However, why keep it secret it the cat's out of the bag? China, and anybody involved, would already know and be taking steps to cover their tracks. Seems the proper response by law enforcement to break the news and step up public investigation ASAP.

    2) Bloomberg's editors and writers are just misinterpreting whatever happened to Apple that they say was a compromised driver caught in the lab coming from a variety of sources who don't really have that good of info. - Bad stain on Bloomberg's reputation and failure of their editors to preserve the brand. Will no doubt hurt their operation when things come to light as their business is acting as a reliable source of business news.

    3) The authors of the article are fabricating the article either from a collection of unrelated sources, or whole of cloth and selling it to Bloomberg, perhaps not expecting the attention it's getting. - A worse stain on Bloomberg as their editors still fell for it, but pretty much ruin for the author's careers as journalists in the future.

    4) Bloomberg and the authors are in cahoots to create a fictitious story that can't be confirmed or denied in order to manipulate the markets, push international policy, and/or create fear of China. - This might actually spell doom for Bloomberg, or might not. There are plenty of "news sources" that could get away with such things and nobody would even blink if it was proved to be true. Perhaps Bloomberg thinks they can get sales and get away with it at the same time. I'm sure some people have played harder and faster with more on the line and the end result would depend on how trustworthy the public actually takes Bloomberg to be to begin with. It would also probably be straying into legal territory it it turned out toe be manufactured, cause the people involved to lose their jobs, and maybe do jail time.

    4)Somebody has manufactured the story and fed it to Bloomberg's authors in order to manipulate the markets, push international policy, create fear of China, hurt Bloomberg's reputation, or any combination of these. - Now we're practically back into spook territory. There are certainly people who would like to do any number of things, but to have the scale to do beyond simply option #2 would take resources and also probably venture into legal territory for acting against Bloomberg, the companies involved, China, etc.

    • by Anonymous Coward

      How about option 1.1 (quite similar to your #1): The Chinese have done what Bloomberg claims they have done. But the FBI's (or some other 3-let federal agency) done the same, so exposing the China hack could mean exposing the hacks the US have already done or are continuing to do against China or other other countries, including presumably US allies.

    • by Junta ( 36770 )

      I think it's some weird blend of 2 and 3. Note:
      https://9to5mac.com/2018/10/09... [9to5mac.com]

      One of the sources gave a view of what it was like to be a source for the story. The writers came with some vague 'maybes' that probably had accumulated over several previous hypotheticals and then published as absolute fact, rather than 'this is how this could go down', then doubling down on the story when it's controversial.

      I don't know if they had any maliciousness or were just caught up in thinking they were unwinding peop

    • by Falos ( 2905315 )

      You suggest many possible factors at many tiers. A nice visual aid, that the Real Truth is not likely to be "It's exactly as they said" / "Every word is a total fabrication"

      Even though simple minds only want to think binary. Good. Bad. Us. Them. True. False.

    • 2) Bloomberg's editors and writers are just misinterpreting whatever happened to Apple that they say was a compromised driver caught in the lab coming from a variety of sources who don't really have that good of info

      Why did Apple drop them as a supplier in that case? Did Apple go directly to the ODM and use open compute designs? I am not sure. But I don't think that it is normal to drop a supplier for a reason like an infected driver.

  • We can be sure that Chinese, if they did indeed sponsor implanting chips as described, already know if we know.

    And we can be certain that the truth of this has been known for a while, by the agencies interested, globally. And for a while, possibly months. Keeping the knowledge quiet is important to fully understanding the problem, since the target servers would likely be reconfigured to obscure their true purposes, then quietly killed. And the data being sent would need to be evaluated with live examples to

  • to say we shouldn't be attentive of our sources, but "Be careful what you read" isn't a good way to say it. What he should have said was "Be critical of what you read".
    • by gweihir ( 88907 )

      I think he meant exactly "be careful what you read" with an implied "we may come after you if you read heretical texts". It is how a totalitarian state works, after all.

  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Wednesday October 10, 2018 @06:57PM (#57458486)
    Comment removed based on user account deletion
    • Re: (Score:2, Informative)

      by Anonymous Coward

      If they were, you'd think that someone would have noticed the extra traffic on their network going through, or trying to get through, their firewalls.

      Having attended the DEFCON and Blackhat conferences, I'm not so sure I agree with you. The level of publicly known ways to disguise malicious traffic to look like innocent traffic is quite scary.

    • Re:Breadcrumbs (Score:4, Insightful)

      by DCFusor ( 1763438 ) on Thursday October 11, 2018 @04:12AM (#57459916) Homepage
      Some assets are meant to be hidden until use. Instant gratification often gets you less than waiting for the best setup.
    • IIRC, that is exactly how they were discovered; through anomalous traffic.

      This whole thing screams that there is a Top Secret investigation going on and that someone who knew about the compromise but not about the investigation revealed to Bloomberg.

      I kind of don't care about any of this. I assume all hardware is compromised, it is merely a question of who compromised it this time. Nobody respects the rights of the average person.

  • by AHuxley ( 892839 ) on Wednesday October 10, 2018 @08:01PM (#57458724) Journal
    Its the decades of before PRISM talk?

    Did the intelligence community find a way back to China?
    Sending back altered data?
    Did the USA have spies in China that warned the USA and the US just watched on to protect its spies?
    Did one part of the US gov use methods for decryption and does not want methods talked about?
  • by Reeses ( 5069 ) on Wednesday October 10, 2018 @10:24PM (#57459232)

    The part that got me about the article was that there were no pictures of actual compromised motherboards.

    Supposedly they were sold by the thousand, and the IT crews pulled them all out and replaced them. No one thought to keep one?

    Or there isn't one still lying on some shelf somewhere?

  • Our intelligence organs have hacked the hackers and are using it against them. Blanket denial would support this.

"Gravitation cannot be held responsible for people falling in love." -- Albert Einstein

Working...