Professional Documents
Culture Documents
TO
NATIONAL SECURITY
JUNE 2018 SPECIAL REPORT
Spies Are Going After US Supply
Chains, Intel Agencies Say
P
As cyber defenses close resident Trump astounded many in as a broader set of U.S. targets including critical
the easier holes, foreign Washington on Sunday by vowing to rescue infrastructure and supply chain, often without
agents are looking to ZTE, the Chinese manufacturer whose attribution.”
penetrate makers of mobile phones are viewed as a security threat Evanina declined to slam Trump’s decision
parts and software. by the U.S. intelligence community. America’s on ZTE, but said, “I will say that the intelligence
BY PATRICK TUCKER own spies have been warning that China and community is on the record about the threat posed
other potential adversaries might seek to weaken by Chinese telecom.” Asked whether he would use
U.S.security through the electronic goods and a ZTE phone, Evanina answered, “I would not.”
services it buys. The government’s efforts to better manage
“The most critical CI threats cut across these security risks to the government and military
threat actors: influence operations, critical supply chain go back a decade. They include a
infrastructure, supply chain, and traditional 2015 best-practices report from the National
as well as economic espionage. Regional actors Institute of Standards and Technology, and a
such as Iran and North Korea, and nonstate requirement in the 2018 defense authorization
actors such as terrorist groups, transnational act that the Pentagon develop a better process for
criminal organizations, and hackers/hacktivists supply-chain security.
are growing in intent and capability,” But the risk is growing and there’s no simple
William Evanina, who leads the National solution, according to Joyce Corell, the assistant
Counterintelligence Security Center, told the director for supply chain at the National
Senate Intelligence Committee on Tuesday. “For Counterintelligence and Security Center, or NCSC.
example, a growing set of threat actors are now “The software supply chain is clearly being
capable of using cyber operations to remotely used as a threat vector,” Corell said.
access traditional intelligence targets, as well She cited reports from cybersecurity company
Law said. If you could figure out the most likely before. The concept of the radio-frequency
locations for a vehicle-borne terrorist attack, you stopper reflects a breakthrough in shrinking
could pre-position the device. A video of a live power generators as in ray gun tech. Direct-energy
demonstration of the technology is below. weapons use a lot of power. Electricity to run the
stopper comes from a gasoline-powered turbine
The military is developing the weapon for from Indianapolis-based Candent Technologies
“force protection” — as in protecting soldiers and that generates 300 kilowatts of power. Says Law.
bases. But it has applications for police as well. At 400 pounds, it’s about the size of a large
Placed strategically around cities, it could prevent copy machine. But that’s a fraction of the size
attacks like the ones in Europe, Canada, the United of generators that the military would use for
States, and elsewhere. There are, however, some similarly power-hungry tasks, like massive Mobile
tricky legal issues involved in using electronic and Electric Power 809A, which starts at 6,200 pounds
radio jamming devices in the United States. The directorate will take possession of the
The directorate hopes to have a working generator in September.
prototype by FY 2019.
There’s a reason no one has thought of this