{"id":85677,"date":"2018-08-26T10:41:00","date_gmt":"2018-08-26T10:41:00","guid":{"rendered":"http:\/\/127.0.0.1:10081\/?p=85677 "},"modified":"2018-08-26T10:41:00","modified_gmt":"2018-08-26T10:41:00","slug":"85677-revision-v1","status":"publish","type":"post","link":"https:\/\/minzhuzhongguo.org\/?p=85677","title":{"rendered":"Google Recommends Product From a Chinese Company with Communist Party and Military Ties for its \u2018Advanced Protection Program\u2019"},"content":{"rendered":"<div><span style=\"font-size: 12pt;\">August 23, 2018<\/span><\/div>  <p>&nbsp;<\/p><div><img decoding=\"async\" src=\"https:\/\/www.mzzg.org\/UploadCenter\/ArticlePics\/2018\/34\/2018824FullSizeRender2.jpg\" alt=\"\" \/>&nbsp;<\/div>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">Journalists and dissidents involved in Chinese affairs are accustomed to every so often receiving a pop-up banner on their Gmail from Google informing them that &#8220;state-sponsored attackers&#8221; may have been attempting to gain access to their accounts. To guard against such intrusions, Google suggests signing up for its Advanced Protection Program.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">The Advanced Protection Program involves using a pair of security keys that can be purchased on Amazon. The problem? Google recommends a product &#8212; the Feitian MultiPass FIDO Security Key &#8212; manufactured in China, by Chinese company that is part of an &#8220;IT-Military Alliance&#8221; with the People&#8217;s Liberation Army (PLA). Its chief of research and development of over 16 years is a former member of the PLA. And it does the vast majority of its business selling security hardware to Chinese state banks.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">Google unveiled its Advanced Protection Program in October 2017 as reported by The New York Times. But the report did not explore the extensive relationships between the Chinese supplier, Beijing Feitian Chengxin Technology Co., Ltd., and the Chinese government.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">FullSizeRender<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">Security keys like the Feitian MultiPass are an implementation of public key cryptography &#8212; the most well known version of which is PGP (Pretty Good Privacy) &#8212; in hardware form. They are a form of two-factor authentication that allow an individual with the key and the password to access an account; if either is missing, access is denied. The introduction of hardware to the security equation makes access safe from phishing, social engineering, and even attacks on cell phones that intercept temporary security keys sent via SMS.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">It is unclear how feasible it may be for Chinese intelligence and military actors to install a backdoor in or otherwise compromise the hardware. But if the hardware manufacturer is mobbed up with one of the most sophisticated offensive cyber actors in the world, the &#8220;world&#8217;s worst abuser of internet freedom&#8221; according to Freedom House, and a country where a private company can never say no to government demand, the question arises: Can it be safe?<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">China Change examined security filings, advertisements, periodicals, and media reports to build a mosaic of the interlocking relationships between Chinese state organs and Feitian Chengxin (<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u98de\u5929\u8bda\u4fe1\u80a1\u4efd\u6709\u9650\u516c\u53f8<\/span><span style=\"font-size: 12pt;\">). The image that emerges does not appear encouraging for the computer security of Chinese dissidents and others who may be using the product.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">Company founding<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">Feitian was set up by four friends, three of whom were 1992 computer science graduates of Northern Jiaotong University (now Beijing Jiaotong University <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u5317\u4eac\u4ea4\u901a\u5927\u5b66<\/span><span style=\"font-size: 12pt;\">): among them Huang Yu (<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u9ec4\u715c<\/span><span style=\"font-size: 12pt;\">), the current chairman, Li Wei (<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u674e\u4f1f<\/span><span style=\"font-size: 12pt;\">), the general manager, and Lu Zhou (<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u9646\u821f<\/span><span style=\"font-size: 12pt;\">) their chief engineer.[1] Han Xuefeng (<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u97e9\u96ea\u5cf0<\/span><span style=\"font-size: 12pt;\">), a middle-school friend of Huang Yu, was recruited from a computer job in the Ministry of Railways to form the company with them. The four continue to own the majority of the company<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8217;<\/span><span style=\"font-size: 12pt;\">s shares.[2]<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">The company was founded in 1998 at the beginning of a technology and internet boom in China. It has since become &#8220;the No.1 supplier of user authentication and transaction security for China Online Banking,&#8221; according to its website, employing 850 staff and serving thousands of businesses in 100 countries.[3]<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">As Feitian grew, so too did its ties to official China. By 2015, the conference room in its main Beijing campus had a wall full of awards and certifications from Chinese government departments.[4]<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">Dominance in the state bank market<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">The foundation of Feitian&#8217;s business in China has been in providing security fobs to state banks.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">Lucrative contracts with the Industrial and Commercial Bank of China (the country&#8217;s largest) and China Merchants Bank were its first major orders in 2003, though it sat lower down in the food chain at that point, only able to operate as the original equipment manufacturer (OEM) for another brand.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">Later the company was certified by the People&#8217;s Bank of China, China&#8217;s central bank,[5] and by 2005 was doing business with banks directly &#8212; including China CITIC Bank &#8212; not merely as an OEM.[6]<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">By 2014, 85% of the company&#8217;s revenue was coming from state banks, and Feitian was among the top three such vendors by revenue in the country.[7]<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">State information security a &#8216;precious business opportunity&#8217;<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">In 2003 the company joined the <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8220;<\/span><span style=\"font-size: 12pt;\">IT-Military Alliance<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8221;<\/span><span style=\"font-size: 12pt;\"> (<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u8ba1\u7b97\u673a\u4e16\u754c\u79d1\u6280\u62e5\u519b\u8054\u76df<\/span><span style=\"font-size: 12pt;\">) upon its founding. The event was hosted by the Network Infrastructure Department of the PLA<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8217;<\/span><span style=\"font-size: 12pt;\">s General Armaments Department, along with other official organizations.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">Only 12 companies formed the IT-Military Alliance. The founding ceremony was marketed as an opportunity for industry to present tribute to the PLA in celebration of the 76th year since its founding. Feitian notes on its website that &#8220;the head of the General Armaments Department expressed a deep interest in Feitian&#8217;s products,&#8221; and that &#8220;Feitian will inevitably provide earnest service to the giant military market under the grand strategy of &#8216;civil-military integration,&#8217; and thus do our bit to help the construction of the nation&#8217;s informatized defensive infrastructure!&#8221;[8]<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">Though it is unclear when in 2003 Feitian won its first contract with ICBC, it is difficult not to imagine that its involvement with the PLA &#8212; irresistible though it may have been &#8212; helped in forging such relationships. Its approval and verification by the State Cryptography Administration in 2004 was also flagged as a &#8220;key milestone.&#8221;[9]<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">Already successful with banks in 2003, Feitian<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8217;<\/span><span style=\"font-size: 12pt;\">s chief of research and development told the media in 2003 that the next areas of growth would be military and departments and offices for classified information (<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u673a\u8981\u90e8\u95e8<\/span><span style=\"font-size: 12pt;\">).[10]<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">The logic was obvious to Feitian executives: &#8220;As government procurement strengthens and priority is given to domestic products, our country&#8217;s state information security will be pushed forward considerably, and this is a precious business opportunity for the vast field of security companies.&#8221;[11]<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">It is difficult to find public information on the extent of that line of business. The company&#8217;s technology has however been certified as &#8220;military-use information security products.&#8221;[12]<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">In 2006, the company was awarded over one million yuan from a fund for new technology set up by China&#8217;s Ministry of Science and Technology. &#8220;This is the country&#8217;s strong affirmation of Feitian Co., and a thorough recognition of its technological prowess, project management capacity, and reputation,<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8221;<\/span><span style=\"font-size: 12pt;\"> said an announcement in the scientific press at the time.[13] Later in the year the company<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8217;<\/span><span style=\"font-size: 12pt;\">s tech was declared <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8220;<\/span><span style=\"font-size: 12pt;\">A New Important National Product<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8221;<\/span><span style=\"font-size: 12pt;\"> (<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u56fd\u5bb6\u91cd\u70b9\u65b0\u4ea7\u54c1<\/span><span style=\"font-size: 12pt;\">) by a number of government departments.[14]<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">From 2007 onwards, Feitian was selected to provide a smart card identity recognition system (<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u667a\u80fd\u7f51\u7edc\u8eab\u4efd\u8ba4\u8bc1\u7cfb\u7edf<\/span><span style=\"font-size: 12pt;\">) as part of the Torch Program,[15] China<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8217;<\/span><span style=\"font-size: 12pt;\">s national plan to develop its high-technology industrial base.[16]<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">The company is part of a Smartcard Intellectual Property Alliance, a kind of government-industry group associated with the Beijing Municipal Intellectual Property Rights Bureau. A member of the Bureau<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8217;<\/span><span style=\"font-size: 12pt;\">s Party Group (<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u515a\u7ec4<\/span><span style=\"font-size: 12pt;\">) presided over the alliance<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8217;<\/span><span style=\"font-size: 12pt;\">s founding ceremony, on the basis that &#8220;the smartcard security industry concerns national information security and is an area of high-technology strongly supported by Beijing.&#8221;[17]<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">Since 2009 Feitian has been listed in numerous databases maintained by the Ministry of Public Security among the accepted providers of identity recognition systems.[18] The list contains only Chinese companies trusted by the state, among them Huawei.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">The company has also be the recipient of praise from former vice minister of Public Security Chen Zhimin (<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u9648\u667a\u654f<\/span><span style=\"font-size: 12pt;\">) and other public and information security cadres, who are said to have expressed <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8220;<\/span><span style=\"font-size: 12pt;\">excellent regard<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8221;<\/span><span style=\"font-size: 12pt;\"> for the company<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8217;<\/span><span style=\"font-size: 12pt;\">s security management, and identification security.[19]<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">Perhaps most notably, since 2002 its research and development chief has been Yu Huazhang (<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u4e8e\u534e\u7ae0<\/span><span style=\"font-size: 12pt;\">), a graduate of the PLA<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8217;<\/span><span style=\"font-size: 12pt;\">s Information Engineering University and for the first seven years of his career an assistant researcher in the PLA<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8217;<\/span><span style=\"font-size: 12pt;\">s General Staff Department. In April 2010, he became a 1% shareholder in the company. He is also a vice general manager.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">The company and its key engineers won third prize (among many others) in the 2014 Beijing Municipal Technology Awards for <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8220;<\/span><span style=\"font-size: 12pt;\">Application and operating system research and development for a chip in a visible-button smart security card<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8221;<\/span><span style=\"font-size: 12pt;\"> (<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u53ef\u89c6\u6309\u952e\u578b\u667a\u80fd\u5bc6\u7801\u94a5\u5319\u7247\u5185\u64cd\u4f5c\u7cfb\u7edf\u7814\u53d1\u4e0e\u5e94\u7528<\/span><span style=\"font-size: 12pt;\">) which sounds similar to the product being vended for Google&#8217;s enhanced security.[20]<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">Then there are the numerous exhibitions of official fealty on Feitian&#8217;s website, each not particularly significant taken on its own, but as a collection making clear that the company knows which way the wind blows. As a matter of routine, Feitian engages in activities like the following:<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">Hosting workshops for Chinese academicians to explicate the &#8220;spirit&#8221; of a series of Xi Jinping&#8217;s important speeches in order to &#8220;implement and carry out&#8221; the political directives resultant from the 18th Party Congress;[21]<\/span><\/p>  <p><span style=\"font-size: 12pt;\">Hosting tours of officials studying at the Party School;[22]<\/span><\/p>  <p><span style=\"font-size: 12pt;\">Advertising its award for &#8220;important contributions&#8221; to information security given by the Party-Government Password Science &amp; Technology Progress Award Assessment Committee (yes).[23]<\/span><\/p>  <p><span style=\"font-size: 12pt;\">The company has been relatively profitable. Within its first year or so it had booked five million yuan in revenue, at gross profit of nearly 50%; by 2014 when it went public on the Shenzhen Stock Exchange its revenues were just over one billion yuan, 250 million yuan profit. (Its stock has been cut nearly in half since April 2018, however, due to &#8220;an inexplicable explosion in all manner of costs.&#8221;) In 2003 it occupied around 50% of the market for USB security keys, a dominance that it has likely grown since.[24]<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">The company has sought to expand overseas for at least a decade, in 2007 noting on its website that &#8220;Feitian&#8217;s ePass identification authentication products have been adopted by governments, banks, and others around the world. We have won a strong reputation as an independent Chinese company with our own intellectual property striding onto the world stage in information security.&#8221;<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">It is difficult to gather data on the extent of those expansion efforts &#8212; though the recommendation by Google speaks well to at least a partial success.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">But does this compromise user security?<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">It goes without saying that almost everything we have documented above is simply part and parcel of Chinese companies doing business in China &#8212; in particular in a sensitive sector like information and network security, and especially when doing large business with state banks. When the PLA invites your company to join in the &#8220;earnest celebration&#8221; of its anniversary, present gifts, and join its industrial &#8220;alliance,&#8221; you don&#8217;t respectfully decline.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">The same would obtain if the company were ever approached by military or civilian intelligence and instructed to install backdoors in its security fobs, according to Tom Uren, a visiting fellow in the International Cyber Policy Centre at the Australian Strategic Policy Institute.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">&#8220;Companies in China aren&#8217;t able to refuse to engage in intelligence activities. This is laid out very clearly in Article 7 of China&#8217;s new 2017 National Intelligence Law,&#8221; Uren wrote in an email.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">The law states: &#8220;All organizations and citizens shall, in accordance with the law, support, cooperate with, and collaborate in national intelligence work, and guard the secrecy of national intelligence work they are aware of. The state will protect individuals and organizations that support, cooperate with, and collaborate in national intelligence work.&#8221;<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">A Chinese information security business has no choice in the matter. The question then becomes how feasible it is for the security device to be weakened or tampered with. At the very least, there is an obvious opportunity at the level of firmware &#8212; the software layer coded into a device that controls its hardware &#8212; for an adversary to create mischief.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">&#8220;The firmware matters a lot, and that looks like why Google is planning to replace the firmware on their whitelabeled Feitian keys,&#8221; says Dan Guido, CEO of Trail of Bits, a New York-based computer security firm.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">This refers to Google&#8217;s &#8216;Titan&#8217; security keys, which appear to be Feitian hardware with Google&#8217;s own firmware. On its Advanced Protection Program page, however, Google links users directly to Feitian&#8217;s own website, not to the Titan keys with Google&#8217;s own firmware.<\/span><\/p>  <p>&nbsp;<\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">&#8220;Attackers will tend to use the easiest method to achieve their goals,&#8221; says Tom Uren. &#8220;Is compromising the Feitian security key supply chain the easiest way? Maybe. Phishing is certainly the easiest\/cheapest way to hack data currently and security keys significantly reduce its effectiveness. It will certainly be an avenue that Chinese intelligence would have to consider if security keys are widely used by people of interest to them.&#8221;<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">The means by which attackers could gain unauthorized access through the keys are potentially numerous, including complex methods of introducing flaws in the cryptography or its implementation. Markus Vervier, a computer security researcher, has documented vulnerabilities in some implementations of U2F (universal two factor authentication). His work was not in reference to Feitian.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">Yubico, a Swedish-founded company and Google&#8217;s other suggested vendor of U2F products, seems to have previously made a veiled suggestion as to the potential vulnerability of its competitor. CEO Stina Ehrensvard wrote on the company&#8217;s blog: &#8220;Yubico strongly believes there are security and privacy benefits for our customers by manufacturing and programming our products in the USA and Sweden.&#8221; The company declined to comment for this article.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">Google did not respond to a request for comment. The FIDO Alliance, an organization that certifies hardware (and which has certified Feitian) for implementing the security protocols used in U2F products, did not respond to a request for comment. Feitian did not respond to a request for comment.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">One security researcher refused to comment because it&#8217;s &#8220;obvious&#8221; that backdoors could be put into hardware at the manufacturing stage, and his team didn&#8217;t want to single out any particular country.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">Perhaps the simplest test of the security of the Feitian keys is a gut check: would security experts themselves use them?<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">&#8220;No,&#8221; wrote Tom Uren. &#8220;I use Yubico keys.&#8221;<\/span><\/p>  <p>&nbsp;<\/p>  <p>&nbsp;<\/p>  <p>&nbsp;<\/p>  <p>&nbsp;<\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;&#8212;<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[1] <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u4eb2\u5386\u8005\u8bf4\uff1a&#8220;\u5c0f\u4e4c\u9e21&#8221;\u5982\u4f55\u53d8\u6210&#8220;\u91d1\u51e4\u51f0&#8221;<\/span> <span style=\"font-family: SimSun; font-size: 12pt;\">\u4e2d\u5173\u6751\u80a1\u6743\u4ea4\u6613\u670d\u52a1\u96c6\u56e2\u6709\u9650\u516c\u53f8\u7ec4\u7ec7\u7f16\u5199<\/span><span style=\"font-size: 12pt;\">. <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u521b\u5ba2\u65f6\u4ee3<\/span> <span style=\"font-family: SimSun; font-size: 12pt;\">\u4eb2\u5386\u8005\u8bb2\u521b\u4e1a<\/span><span style=\"font-size: 12pt;\">. 2016<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[2] http:\/\/www.csrc.gov.cn\/pub\/zjhpublic\/cyb\/cybypl\/201207\/P020120702612306569933.pdf<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[3] &#8220;About.&#8221; n.d. Feitian Technologies Co. Accessed August 17, 2018. https:\/\/www.ftsafe.com\/about.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[4] <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u795d\u60e0\u6625<\/span><span style=\"font-size: 12pt;\">. 2015. <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8220;\u98de\u5929\u8bda\u4fe1\u5927&#8216;\u8d77\u5e95&#8217;<\/span> <span style=\"font-family: SimSun; font-size: 12pt;\">\u770b\u5b83\u5982\u4f55\u53d8\u6210\u521b\u4e1a\u677f\u91d1\u51e4\u51f0<\/span><span style=\"font-size: 12pt;\">&#8211;<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u4e00\u5361\u901a\u4e16\u754c<\/span><span style=\"font-size: 12pt;\">.<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8221;<\/span> <span style=\"font-family: SimSun; font-size: 12pt;\">\u7ecf\u6d4e\u65e5\u62a5<\/span><span style=\"font-size: 12pt;\">. June 3, 2015. https:\/\/web.archive.org\/web\/20180817204339\/http:\/\/news.yktworld.com\/201506\/201506031013120738.html.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[5] https:\/\/www.ftsafe.com\/about\/History<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[6] <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u795d\u60e0\u6625<\/span><span style=\"font-size: 12pt;\"> (2015)<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[7] <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u8d75\u9633\u6208<\/span><span style=\"font-size: 12pt;\">. 2014. <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8220;\u98de\u5929\u8bda\u4fe1\uff1a\u5e02\u573a\u5360\u6709\u7387\u8dfb\u8eab\u884c\u4e1a\u524d\u4e09<\/span><span style=\"font-size: 12pt;\">.<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8221;<\/span> <span style=\"font-family: SimSun; font-size: 12pt;\">\u6bcf\u7ecf\u7f51<\/span><span style=\"font-size: 12pt;\">. June 18, 2014. http:\/\/www.nbd.com.cn\/articles\/2014-06-18\/842169.html; <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u97e6\u4f1f<\/span><span style=\"font-size: 12pt;\">. 2014. <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8220;\u98de\u5929\u8bda\u4fe1\u4e1a\u7ee9\u4f9d\u8d56\u94f6\u884c<\/span> <span style=\"font-family: SimSun; font-size: 12pt;\">\u7a7f&#8216;\u9a6c\u7532&#8217;\u6295\u6807\u6d89\u4e0d\u6b63\u5f53\u7ade\u4e89<\/span><span style=\"font-size: 12pt;\">.<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8221;<\/span> <span style=\"font-family: SimSun; font-size: 12pt;\">\u8d22\u7ecf\u9891\u9053<\/span><span style=\"font-size: 12pt;\">, <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u4e2d\u56fd\u7ecf\u6d4e\u7f51<\/span><span style=\"font-size: 12pt;\">; May 15, 2014. http:\/\/finance.ce.cn\/rolling\/201405\/15\/t20140515_2816496.shtml.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[8] <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u5c0f\u6668<\/span><span style=\"font-size: 12pt;\">. <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u516b\u4e00\u524d\u5915<\/span> <span style=\"font-family: SimSun; font-size: 12pt;\">\u79d1\u6280\u62e5\u519b&#8212;&#8212;\u8ba1\u7b97\u673a\u4e16\u754c\u79d1\u6280\u62e5\u519b\u6350\u8d60\u4eea\u5f0f\u66a8\u79d1\u6280\u62e5\u519b\u8054\u76df\u6210\u7acb\u5927\u4f1a\u9686\u91cd\u4e3e\u884c<\/span><span style=\"font-size: 12pt;\">. <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u5fae\u7535\u8111\u4e16\u754c<\/span><span style=\"font-size: 12pt;\">,2003,(15).<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[9] <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u98de\u5929\u8bda\u4fe1\u559c\u83b7\u56fd\u5bc6\u529e\u4e24\u9879\u8d44\u8d28<\/span><span style=\"font-size: 12pt;\">_<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u5546\u7528\u5bc6\u7801\u751f\u4ea7\u5b9a\u70b9\u548c\u9500\u552e\u8bb8\u53ef<\/span><span style=\"font-size: 12pt;\">. <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u7535\u8111\u7f16\u7a0b\u6280\u5de7\u4e0e\u7ef4\u62a4<\/span><span style=\"font-size: 12pt;\"> 2004(6).<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[10] <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u80e1\u6ee2<\/span><span style=\"font-size: 12pt;\">. <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u9501\u4f4f\u7684\u5546\u673a<\/span><span style=\"font-size: 12pt;\">. <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u4e2d\u56fd\u7535\u5b50\u5546\u52a1\u6742\u5fd7<\/span><span style=\"font-size: 12pt;\">. 2003(8). 58<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[11] Ibid.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[12] http:\/\/download.ftsafe.com\/files\/reader\/FT-QUALIFICATION.pdf<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[13] <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u98de\u5929\u8bda\u4fe1\u8363\u83b7\u79d1\u6280\u90e8\u6280\u672f\u521b\u65b0\u57fa\u91d1\u652f\u6301<\/span><span style=\"font-size: 12pt;\">. <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u7535\u8111\u7f16\u7a0b\u6280\u5de7\u4e0e\u7ef4\u62a4<\/span><span style=\"font-size: 12pt;\"> 2006(6).<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[14] <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u5d14\u5149\u8000<\/span><span style=\"font-size: 12pt;\">. <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u884c\u4e1a<\/span> <span style=\"font-family: SimSun; font-size: 12pt;\">\u6807\u6746<\/span> <span style=\"font-family: SimSun; font-size: 12pt;\">\u5982\u4f55\u7ad6\u8d77<\/span> <span style=\"font-family: SimSun; font-size: 12pt;\">&#8212;<\/span> <span style=\"font-family: SimSun; font-size: 12pt;\">\u98de\u5929\u8425\u9500\u603b\u76d1\u5f90\u4e1c\u8c08\u56fd\u5185\u4e1a\u52a1<\/span><span style=\"font-size: 12pt;\">. <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u4fe1\u606f\u5b89\u5168\u4e0e\u901a\u4fe1\u4fdd\u5bc6<\/span><span style=\"font-size: 12pt;\"> 2007(7). 34-35<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[15] 2007: http:\/\/www.chinatorch.gov.cn\/2\/c100933\/201402\/72b304fcfb264910977d831759d23d9e.shtml; 2009: http:\/\/www.chinatorch.gov.cn\/2\/dddtt\/200908\/63f169a86da8411d804c555cb53767d9.shtml; 2011: http:\/\/www.most.gov.cn\/tztg\/201110\/W020111013381125627477.pdf; 2016: http:\/\/www.chinatorch.gov.cn\/2\/c100924\/201611\/f2e7a55aef2847b8a3d578d6ec19c6ec.shtml<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[16] https:\/\/web.archive.org\/web\/20171226031054\/http:\/\/www.chinatorch.gov.cn:80\/english\/index.shtml<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[17] <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8220;\u5317\u4eac\u5e02\u6210\u7acb\u667a\u80fd\u5361\u884c\u4e1a\u77e5\u8bc6\u4ea7\u6743\u8054\u76df<\/span><span style=\"font-size: 12pt;\">.<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">&#8221;<\/span><span style=\"font-size: 12pt;\"> 2015. HRWF.com. May 2, 2015. https:\/\/web.archive.org\/web\/20180819201245\/http:\/\/www.hwrf.com.cn\/news\/87276.html.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[18] See for instance: https:\/\/goo.gl\/sJwD7B; https:\/\/goo.gl\/sJwD7B; https:\/\/goo.gl\/JuzmR4;&nbsp; https:\/\/goo.gl\/Ld4XEC<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[19] <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u98de\u5929\u8bda\u4fe1\u5b88\u62a4\u9996\u90fd\u7f51\u7edc\u5b89\u5168<\/span><span style=\"font-size: 12pt;\">. <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u7535\u8111\u7f16\u7a0b\u6280\u5de7\u4e0e\u7ef4\u62a4<\/span><span style=\"font-size: 12pt;\">. 2015(10),97.<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[20] 2014<\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u5e74\u5317\u4eac\u5e02\u79d1\u5b66\u6280\u672f\u5956\u83b7\u5956\u516c\u544a\u4e09\u7b49\u5956<\/span><span style=\"font-size: 12pt;\">. May 6, 2015. http:\/\/jxw.beijing.gov.cn\/creditbj\/sxgs\/14819.jhtml<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[21] https:\/\/www.ftsafe.com.cn\/article\/483.html<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[22] https:\/\/www.ftsafe.com.cn\/article\/500.html<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[23] https:\/\/www.ftsafe.com.cn\/article\/509.html<\/span><\/p>  <p>&nbsp;<\/p>  <p><span style=\"font-size: 12pt;\">[24] <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u80e1\u6ee2<\/span><span style=\"font-size: 12pt;\">. <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u9501\u4f4f\u7684\u5546\u673a<\/span><span style=\"font-size: 12pt;\">. <\/span><span style=\"font-family: SimSun; font-size: 12pt;\">\u4e2d\u56fd\u7535\u5b50\u5546\u52a1\u6742\u5fd7<\/span><span style=\"font-size: 12pt;\">. 2003(8). 58<\/span><\/p>  <p>&nbsp;<\/p>  <p><br \/><\/p>  <p><a href=\"https:\/\/chinachange.org\/2018\/08\/23\/google-recommends-product-from-a-chinese-company-with-communist-party-and-military-ties-for-its-advanced-protection-program\/\"><span style=\"font-size: 12pt;\">For detail please visit here<\/span><\/a><\/p>  <p>&nbsp;<\/p>  <p>&nbsp;<\/p>  <div>&nbsp;&nbsp;<\/div>","protected":false},"excerpt":{"rendered":"<p>&lt;div&gt;The Advanced Protection Program involves using a pair of security keys that can be purchased on Amazon. The problem? Google recommends a product &amp;#8212; the Feitian MultiPass FIDO Security Key &amp;#8212; manufactured in China, by Chinese company that is part of an &amp;#8220;IT-Military Alliance&amp;#8221; with the People&amp;#8217;s Liberation Army (PLA). Its chief of research and development of over 16 years is a former member of the PLA. And it does the vast majority of its business selling security hardware to Chinese state banks.&lt;\/div&gt;<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[14],"tags":[],"class_list":["post-85677","post","type-post","status-publish","format-standard","hentry","category-ChinaHumanRights","et-doesnt-have-format-content","et_post_format-et-post-format-standard"],"_links":{"self":[{"href":"https:\/\/minzhuzhongguo.org\/index.php?rest_route=\/wp\/v2\/posts\/85677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/minzhuzhongguo.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/minzhuzhongguo.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/minzhuzhongguo.org\/index.php?rest_route=\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/minzhuzhongguo.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=85677"}],"version-history":[{"count":0,"href":"https:\/\/minzhuzhongguo.org\/index.php?rest_route=\/wp\/v2\/posts\/85677\/revisions"}],"wp:attachment":[{"href":"https:\/\/minzhuzhongguo.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=85677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/minzhuzhongguo.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=85677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/minzhuzhongguo.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=85677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}