Wow, what a terse response.
Good day then.
You would think that “certain restricted-access computer systems” would do a better job of monitoring their supply chain...strange how a lowly telecom company like the one I work for can manage to do it...
Don’t be so smug. I am certain your company has counterfeit components in its equipment. The “monitoring of the supply chain” is a complete joke! They inspect paperwork and do QC testing, not teardown and crush inspections of individual components from sub-contractors whom they have no oversight of.
No company makes all its parts. If you had any idea of the number of manufacturers contributing parts to communications equipment you wouldn’t be so confident in your company’s equipment.
Putting devices inside commercial communications equipment for the purpose of espionage, control or sabotage has been going on for decades, mostly by the West. Now it’s being done by China with components going into US systems. But you don’t think anyone could do that to us? Pure hubris.