Close Menu
Technotification
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Technotification
    • Home
    • News
    • How To
    • Explained
    • Facts
    • Lists
    • Programming
    • Security
    • Gaming
    Technotification
    Home › Security › Spy Agencies Have Banned Lenovo Computers

    Spy Agencies Have Banned Lenovo Computers

    By Vikram Singh RaoJuly 9, 2016
    Facebook Twitter Reddit LinkedIn
    cyber-spying-spyware

    Lenovo is either the world’s biggest or second-biggest PC manufacturer, depending on who you ask (the other potential is HP), and certainly one of the best. But according to the Australian Financial Review (AFR), they’ve been banned by spy agencies around the world, from the U.S. to the U.K. to Australia, because of concerns about their hackability–and where those hacks might be coming from. Lenovo, you see, is a Chinese company, and was originally created by a wing of the Chinese government.

    After Lenovo acquired IBM’s PC arm in 2005, it started churning out some of the best computers on the market. Its Thinkpad line became the PC of choice for many Windows users; they totally eschewed aesthetic appeal in favor of hyper-functional, thin, and durable designs. Lately Lenovo’s been stepping up its game in the looks department, and its Yoga line is one of the best-reviewed Windows 8 laptop lines out there. The Economist has a great profile of the company, if you’re curious. But the main thing to know is that Lenovo was created by the Chinese Academy of Sciences, a governmental organization, and still retains a sizable share of Lenovo. And spy agencies are scared of China.

    So the spy agencies are concerned about its lineage. Most computer hacks (including smartphones) that we cover are software hacks, affecting individual programs, services, or entire operating systems. The NSA, in particular, already has enforced limits on what Windows machines operating on classified networks can do. But the spy agencies, including the NSA and MI6, aren’t blocking all Windows machines. Instead they’re afraid of hardware exploits inserted into the production line by one specific manufacturer. Says AFR:

    Members of the British and ­Australian defence and intelligence communities say that malicious modifications to ­Lenovo’s circuitry – beyond more typical vulnerabilities or “zero-days” in its software – were discovered that could allow people to remotely access devices without the users’ knowledge. The
    alleged presence of these hardware “back doors” remains highly classified.

    These hardware hacks, which may include so-called hardware trojans (also known as “malicious circuits), could include all kinds of things, though AFR’s sources don’t specify exactly what the spy agencies are afraid of. Some hardware trojans are designed to be less reliable, causing hardware failures down the road. Some include small antennae to transmit data to an outside source.

    The ban has apparently been in effect for years at some of these agencies, if only for the classified networks. One curious twist to this story is that, if we’re afraid of hardware from a Chinese company, we should probably be afraid of, um, all gadgets. Pretty much every major tech company manufactures in China, from Apple to Samsung to Microsoft, and though some companies (like Google) are trying to manufacture in the States, the vast majority of electronics still comes from Chinese factories. Are they any more trustworthy than Lenovo? Who knows?

    Update: In a very brief statement posted to their website, the Australian Department of Defence (sic) called the Australian Financial Report story “factually incorrect” and stated “There is no Department of Defence ban on the Lenovo Company or their computer products; either for classified or unclassified systems.” No other defense department has responded.

    Share. Facebook Twitter LinkedIn Tumblr Reddit Telegram WhatsApp
    Vikram Singh Rao
    • Website
    • Facebook
    • X (Twitter)
    • LinkedIn

    I am an entrepreneur at heart who has made his hobby turned a passion, his profession now.

    Related Posts

    The Psychology of a Phishing Email: How Scammers Play with Your Mind

    July 16, 2024

    9 Essential Elements of a Strong Cyber Security Management System

    July 3, 2024

    Common Cyber Attacks and How to Prevent Them

    July 3, 2024

    How Cyber Security Paid Training Prepares You for Real-World Threats

    June 13, 2024

    The Role of Security in Server Colocation Environments

    March 12, 2024

    Navigating the Waters: Best Practices for Phishing Testing in 2024

    February 19, 2024
    Lists You May Like

    10 Best RARBG Alternative Sites in April 2025 [Working Links]

    April 1, 2025

    10 Sites to Watch Free Korean Drama [2025 Edition]

    January 2, 2025

    The Pirate Bay Proxy List in 2025 [Updated List]

    January 2, 2025

    10 Best Torrent Search Engine Sites (2025 Edition)

    February 12, 2025

    10 Best GTA V Roleplay Servers in 2025 (Updated List)

    January 6, 2025

    5 Best Torrent Sites for Software in 2025

    January 2, 2025

    1337x Alternatives, Proxies, and Mirror Sites in 2025

    January 2, 2025

    10 Best Torrent Sites for eBooks in 2025 [Working]

    January 2, 2025

    10 Best Anime Torrent Sites in 2025 [Working Sites]

    January 6, 2025

    Top Free Photo Editing Software For PC in 2025

    January 2, 2025
    Pages
    • About
    • Contact
    • Privacy
    • Careers
    Privacy

    Information such as the type of browser being used, its operating system, and your IP address is gathered in order to enhance your online experience.

    © 2013 - 2025 Technotification | All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.