Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Justa

Wow, what a terse response.

Good day then.

You would think that “certain restricted-access computer systems” would do a better job of monitoring their supply chain...strange how a lowly telecom company like the one I work for can manage to do it...


130 posted on 05/22/2012 7:35:48 PM PDT by jrestrepo (See you all in Galt's gulch)
[ Post Reply | Private Reply | To 119 | View Replies ]


To: jrestrepo

Don’t be so smug. I am certain your company has counterfeit components in its equipment. The “monitoring of the supply chain” is a complete joke! They inspect paperwork and do QC testing, not teardown and crush inspections of individual components from sub-contractors whom they have no oversight of.

No company makes all its parts. If you had any idea of the number of manufacturers contributing parts to communications equipment you wouldn’t be so confident in your company’s equipment.

Putting devices inside commercial communications equipment for the purpose of espionage, control or sabotage has been going on for decades, mostly by the West. Now it’s being done by China with components going into US systems. But you don’t think anyone could do that to us? Pure hubris.


135 posted on 05/23/2012 3:56:13 AM PDT by Justa
[ Post Reply | Private Reply | To 130 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson