The first half -- 美军拒绝联想 -- may have been translated from
Bill Gertz, Military Warns Chinese Computer Gear Poses Cyber Spy Threat; Lenovo seeking access to classified Pentagon networks, J-2 report says. Washington free Beacon, Oct 26, 2016. http://freebeacon.com/national-s ... s-cyber-spy-threat/
Quote:
"The Pentagon's Joint Staff recently warned against using equipment made by China's Lenovo computer manufacturer * * * A recent internal report produced by the J-2 intelligence directorate * * * The J-2 report was sent Sept. 28, and also contained a warning that Lenovo was seeking to purchase American information technology companies in a bid to gain access to classified Pentagon and military information networks. * * * One official said Lenovo equipment in the past was detected 'beaconing'—covertly communicating with remote users in the course of cyber intelligence-gathering.
"A congressional China commission report produced several years ago revealed that the Army Cyber Directorate in 2007 investigated a Lenovo-brand desktop computer that was engaged in 'beaconing activity.' The report said the beacon was a 'self-initiating attempt to establish a connection to a suspicious foreign entity.
"Disclosure of the Joint Staff warning comes after a similar warning from the Air Force Cyber Command in April. An email notice stated that 'per AF Cyber Command direction, Lenovo products are being removed from the Approved Products List and should not be purchased for DoD use.'
"According to the Department of Homeland Security, Lenovo computers since September 2014 were loaded with adware called Superfish that could allow hackers to spoof encrypted security controls in what are called 'man-in-the-middle' cyber attacks. The attacks allow hackers to take over secure web browsers.
"US intelligence agencies in August 2015 warned that Lenovo, along with another Chinese-government-linked firm, Huawei Technologies, had shipped some 80,000 computers to several nations in the Caribbean. The computers were found to contain spyware that can permit remote intrusions.
My comment: The report is quite long. The quotations above are essence; there is no need to read the rest.