A Ghost in the Machine: Chinese FIS Covert Collection Devices in Solar Inverters

espionage, spy, sabotage, subversion, intelligence, counterintelligence, counterespionage, c. constantin poindexter

National security operatives have found communication devices embedded within Chinese-manufactured solar power inverters and batteries, again raising significant concerns about the security of critical energy infrastructure. These devices, capable of bypassing established cybersecurity measures, appear to be capable of remote manipulation. Successful exploitation could lead to widespread power grid disruption. The following is my take on the technical aspects of the devices, design and data transmission methodologies, the potential locations of data collection receivers, and if their deployment aligns with known Chinese Foreign Intelligence Service (FIS) models and methodology. The following is based on my review of NON-CLASSIFIED INFORMATION.

The integration of renewable energy sources into U.S. power grids has been a cornerstone of our efforts to combat climate change. Central to this integration are power inverters, devices that convert direct current (DC) from solar panels and wind turbines into alternating current (AC) suitable for distribution across the power grid. We now have a really disconcerting development: the discovery of rogue communication devices within Chinese-manufactured inverters and batteries.

Device Composition and Integration

Investigations have revealed that certain Chinese-made solar inverters and batteries contain undocumented communication modules, including cellular-like mechanisms. These components are not listed in product specifications and are capable of establishing independent communication channels, effectively bypassing existing cybersecurity firewalls . The presence of such modules allows for potential remote access and control. (More about this in the counterintelligence section below.) These devices are covertly integrated into the hardware of the inverters and batteries making detection challenging during normal inspections. Their design suggests a deliberate effort to conceal them. The functionalities that can be activated remotely are also a BIG red flag. The integration of these components indicates a high level of sophistication and planning, aligning with tactics observed in state-sponsored cyber-espionage and sabotage operations.

Communication Channels

The devices appear to utilize various communication methods to transmit data, including cellular networks, perhaps local bluetooth-like transmission and potential satellite communications. The use of satellite communication modules such as the Iridium 9603 allows for global coverage and low-latency transmission. This feature would enable remote control capabilities even in areas with limited terrestrial network access .

Data Exfiltration and Command Reception

These communication modules can facilitate both the exfiltration of data from the energy platforms and the reception of remote commands. This bidirectional communication capability poses enormous risks because of the potential extraction of sensitive information and the execution of commands that could disrupt or damage energy infrastructure.

Potential Locations of Data Collection Receivers

The specific locations of collection receivers are classified, however, the nature of the communication methods suggests that data could be transmitted to centralized servers managed by entities affiliated with or under the influence of Chinese FIS. The use of satellite communications makes the identification of data endpoints complicated, as signals can be received from literally any point on the globe. The Chinese station in Cuba would be convenient, however, given China’s extensive global infrastructure and technological reach, it is plausible that transmissions could be routed through multiple international nodes before reaching a final collection point.

Alignment with Chinese Foreign Intelligence Service Models

China’s National Intelligence Law mandates that all organizations and citizens support, assist, and cooperate with state intelligence operations. This legal framework provides Chinese FIE with broad authority to compel companies to integrate surveillance and data collection mechanisms into their products. The deployment of rogue communication devices in energy infrastructure aligns with this model, facilitating intelligence gathering and potential sabotage capabilities. Chinese FIS operations employ a combination of cyber and HUMINT tactics to penetrate foreign systems. The integration of clandestine communication devices into critical infrastructure represents yet another example of these tactics, blending hardware manipulation with cyber capabilities. These tactics are consistent with the strategy of the Ministry of State Security and the People’s Liberation Army’s intelligence units that seek to enhance China’s advantages through technological means.

Implications for Global Energy Security

The discovery of these devices in solar components has grave implications for U.S. energy grid security. The potential for remote manipulation of power systems threatens not only the stability of national grids but also the safety and well-being of populations reliant on consistent energy delivery. The erosion of trust in international supply chains is also a grave peril, leading to increased protectionism and damage to global trade relationships. The integration of undocumented communication devices into Chinese-manufactured solar inverters and batteries represents a grave security concern. The technical sophistication of these components, coupled with their potential alignment with Chinese FIS objectives, underscores the need for new scrutiny and enhanced TSCM practices with regards to foreign-manufactured critical infrastructure components.

The Counterintelligence View

This is a bit technical so bear with me. There is a method to the madness. Problem 1: Inverters are generally equipped with ARM Cortex-M or Cortex-A series microcontrollers that serve as the core processing units for power conversion and monitoring. The covert components appear to use separate, low-power System-on-Chip (SoC) devices (think “MediaTek MT6261D or Espressif ESP32-S3 series”) which deploy onboard baseband processors capable of handling GSM/3G/4G/LTE communications. These SoCs are preloaded with proprietary firmware and operate outside the visibility of the host inverter firmware. These covert devices appear to use integrated RF transceivers on GSM bands, contain embedded GPS modules for geolocation, and have I2C or UART interface capability for stealth data siphoning from inverter controller. Unless there is a simple process for detecting the very small loss of power or disabling the cellular capability, the entire product must be scrapped. Jamming transmissions is not a feasible countermeasure considering the enormous geographic dispersion of a popular solar system component.

A transmission requires a collection part, a transmitter, something that functions as an antenna, and a power source. Problem 2: There is a redundant power supply path. Some units tap the inverter’s DC bus (48V nominal) deploying step-down DC-DC converters to deliver the 3.3V/5V required by the communication hardware. So, the shit-rogue device can acquire and/or broadcast even if the main inverter is powered down (assuming there is residual DC input from the solar panels or battery storage). Sophisticated design is evidenced by minimal-energy storage to allow burst transmissions, EMI shielding to reduce signatures and transient suppression to avoid triggering protective circuits. Again, there may not be any feasible technical countermeasure other than tossing the entire thing in the garbage.

Problem 3: Perhaps the most concerning feature is the presence of covert communication interfaces. The presence of miniature embedded GSM modules that can transmit over mobile networks is a clear indicator of the device’s true purpose. These can be paired with internal PCB-trace antennas which makes detection extremely difficult without picking the entire product apart and/or conducting a full-spectrum TSCM RF analysis. Some units, notably ones used in off-grid or critical infrastructure installations, contain Iridium 9603 transceivers. The Iridium Short Burst Data (SBD) service enables low-latency two-way messaging literally anywhere on Earth. BLE 4.0/5.0 (“Bluetooth”) modules are sometimes embedded to allow nearby short-range device pairing, enabling covert firmware updates or configuration changes via proximity-based access. From a counterintelligence perspective this one is the easiest to detect as it requires the presence of field operatives.

Problem 4: Collection and hijack are extremely problematic. The rogue devices are capable of silently intercepting inverter data via UART snooping of RTU traffic between the inverter controller and grid management mechanisms. RS-485 differential signal bridging architecture in these devices allows simultaneous passive read and active command injection. So, not only can they passively collect performance, grid sync, and telemetry but also insert remote commands (think “demand spikes, phase shifts, or false trip signals”) which could destabilize grid operations. Countermeasure? The garbage bin.

In truth, we are fortunate to have discovered this attempt to compromise these components. Once operational, detection would have been extremely difficult. The unclassified exhibits demonstrate very sophisticated anti-forensic features. They present obfuscated PCB silkscreening or black conformal coating as a physical deception, RF shielding within inverter chassis grounding, no identifiable MAC addresses and time-triggered sleep cycles which makes TSCM useless unless the sweep is conducted at the exact moment of a transmission. Encrypted communication via proprietary, obfuscated firmware (AES-128 in CTR) further points a finger at a sophistication attributable to state-level FIS. China’s intelligence doctrine views everything; commerce, academia, and even kids’ toys as vectors and to their advantage. Chinese “unrestricted warfare” doctrine, i.e., any mass-produced consumer or industrial good may serve as a channel for acquisition or disruption, explains the rogue components in solar inverters, another part of a larger, systematic effort to weaponize supply chains and exploit technological dependencies.

~ C. Constantin Poindexter, Master in Intelligence Studies, Graduate Certificate in Counterintelligence, CISA/NICCS OSINT Certified

References

Reuters. (2025, May 14). Rogue communication devices found in Chinese solar power inverters. Retrieved from: https://www.reuters.com/sustainability/climate-energy/ghost-machine-rogue-communication-devices-found-chinese-inverters-2025-05-14/

TechRadar. (2025, May 14). Chinese energy tech exports found to contain hidden comms and radio devices. Retrieved from: https://www.techradar.com/pro/security/chinese-energy-tech-exports-found-to-contain-hidden-comms-and-radio-devices

DIY Solar Forum. (2025, May 14). Rogue Chinese communication devices found in Solar inverters. Retrieved from: https://diysolarforum.com/threads/rogue-chinese-communication-devices-found-in-solar-inverters.104871/page-4

Wikipedia. (2025, April). National Intelligence Law of the People’s Republic of China. Retrieved from: https://en.wikipedia.org/wiki/National_Intelligence_Law_of_the_People%27s_Republic_of_China

Jamestown Foundation. (2024, March). Foreign Intelligence Hackers and Their Place in the PRC Intelligence Community. Retrieved from: https://jamestown.org/program/foreign-intelligence-hackers-and-their-place-in-the-prc-intelligence-community/

Russian Intelligence Plot Against European Air Cargo

russian FIS, intelligence, espionage, subversion, sabotage, counterintelligence, c. constantin poindexter

Recent reporting of a disturbing plot orchestrated by Russian FIS targeting European air cargo networks, potentially including flights bound for the United Kingdom has raised the “grey zone” warfare being waged against the West. A fairly sophisticated operation, reportedly involving the placement of incendiary devices within seemingly innocuous parcels carried by logistics giant DHL, underscores the evolving and increasingly brazen nature of adversarial hybrid warfare campaigns against Western nations. While the Kremlin has denied involvement, the convergence of evidence and assessments from multiple European security agencies paints an ugly picture of a deliberate and dangerous attempt to disrupt critical infrastructure and sow chaos. I am NOT going to provide instruction on how to make a thermostat mercury tube and block of magnesium into something useful, offer detail on attack surfaces, nor placement logistics however knowledge of the plot, briefly stating the nature of the devices employed, the chosen attack vector, the timing of the discovered incidents, the suspected involvement of Russian intelligence services, and a brief assessment of the potential effectiveness and broader implications of such an operation are fine for open source commentary.

The devices were not conventional high explosives designed for immediate, destructive detonation. Non-classified reports suggest the use of incendiary mechanisms concealed within ordinary consumer goods shipped through standard air cargo channels. Details emerging from investigations in Germany, the United Kingdom, and Poland indicate that items such as massage pillows and sex toys were used as Trojan horses to smuggle these components into the logistics network. The incendiary nature of the devices is a critical aspect, suggesting that the actors were not focused on instantaneous structural failure of an aircraft but rather on initiating a fire within the cargo hold. At cruising altitude a fire presents a severe threat capable of compromising the aircraft’s structural integrity, affect flight control systems, and/or produce incapacitating smoke and fumes.  

NO blueprints here! However, the reported outcomes of their ignition provide clues about their composition and design. That the incidents occurred in logistics hubs on the ground in Germany and the UK rather than in flight suggests a timing mechanism designed for delayed activation. This delay could have been triggered by a variety of methods, such as a timer, barometric pressure changes (simulating altitude), or simple friction or impact during transit. Camouflage as harmless consumer electronics points to a degree of technical sophistication aimed at bypassing standard security screening protocols, which are primarily geared to detecting traditional explosives and weapons. German authorities, in testing replicas of the devices, reportedly found that fire suppression systems typically installed in aircraft cargo holds might not be sufficient to extinguish the fires initiated by these incendiaries. The operators clearly conducted research into the vulnerabilities of air cargo safety measures. The selection of materials that burn intensely and are difficult to suppress, such as certain metallic compounds or accelerants, is consistent with the objective of causing an uncontainable fire.

The choice of the air cargo network as the attack service highlights several strategic considerations for adversarial FIE. Air cargo is a vital component of global commerce, moving vast quantities of goods rapidly across international borders. Targeting this network allows for potential disruption on a significant scale, impacting supply chains and causing economic damage. Cargo planes, while subject to security measures generally do not have the same level of stringent passenger screening associated with commercial passenger flights. They are softer targets for introducing illicit devices. The distributed nature of cargo handling across numerous facilities and the sheer volume of packages processed daily also present opportunities for effective camouflage and smuggling. Utilizing established courier services like DHL, with their extensive networks and trusted reputation, leveraged existing infrastructure for Russia’s ends, blending the dangerous parcels with legitimate shipments to reduce suspicion.  

The timing of the discovered incidents in July 2024, is noteworthy. These events occurred within the broader context of Russia’s ongoing full-scale invasion of Ukraine and heightened tensions between Russia and Western countries providing support to Kyiv. Western officials have increasingly warned of an intensification of Russian hybrid warfare. “Grey zone” operations that include sabotage, cyberattacks, and disinformation are distinctively Russian and likely aimed at undermining support for Ukraine and destabilizing European societies. This sort of kinetic act of sabotage with potentially far-reaching consequences aligns with the I.C.’s understanding of Russian FIS’s pattern of escalation. The incidents in July 2024 in Germany and the UK appear to be “test runs,” intended to assess the feasibility of the method and the reaction of security agencies before execution of a more widespread and/or impactful attack. We have good cause to be concerned with the likelihood of the targeting of flights destined to North America. The subsequent arrests in Poland and Lithuania in the latter half of 2024 evidence that investigations advanced quickly, certainly through intelligence liaison with European security services.  

Attribution requires compelling evidence, often gathered through covert means, however, the consistent assessment by multiple Western security agencies pointing towards Russian FIE, specifically the GRU (Main Intelligence Directorate of the General Staff), should surprise no one. The GRU has a documented history of engaging in aggressive foreign operations, including sabotage, assassination attempts and cyberattacks, often conducted with a high degree of risk tolerance and a willingness to operate in a gray area between conventional warfare and deniable covert action. Their involvement in previous incidents on European soil, such as the Sergei Kripal assassination attempt, demonstrate Russia’s capability and intent to carry out dangerous operations abroad.  

There are more specifics that give us good reason to point to the GRU. The nature of the operation, a covert act of sabotage targeting critical infrastructure in countries supporting Ukraine, aligns with Russia’s strategic objectives in its conflict with the West. Disrupting logistics networks, creating fear and uncertainty serves to pressure governments and populations supporting Ukraine. The use of “disposable agents” or recruited individuals in various European countries to handle the parcels is consistent with known GRU tradecraft, which often utilizes cut-outs to maintain plausible deniability. The arrests in Poland and Lithuania were of individuals from different nationalities, suggesting a network of recruited operatives rather than directly deployed intelligence officers. Further, comm. intercepts revealed discussions among senior GRU officials regarding the plot, providing direct evidence of the involvement of Russian FIS. The Kremlin’s standard practice of flatly denying involvement does NOT refute the I.C.’s assessments and attribution.  

The effectiveness of the explosive/incendiary device and its attack service must be assessed on multiple levels. From a technical standpoint, an incendiary device capable of initiating an uncontrollable fire in an aircraft cargo hold at altitude is highly effective at creating a catastrophic in-flight emergency. Modern cargo planes have sophisticated fire detection and suppression systems, but if the fire source is resistant to the suppression agents (like halon or nitrogen), or if the fire spreads rapidly before suppression is effective, the consequences can be dire. The potential for loss of the aircraft and its cargo, as well as the risk to populated areas if a crash were to occur, makes this a high-impact peril. German authorities’ findings regarding the potential ineffectiveness of fire suppression systems against the tested replicas should make the hair on your neck stand up.

From an operational perspective, the attack service (legitimate air cargo network) was effective in allowing the devices to penetrate security layers and reach their intended environment. The volume and speed of air cargo movement make comprehensive, item-by-item security screening a significant logistical challenge. By concealing the incendiaries within seemingly innocuous items and utilizing established shipping routes, the operators exploited inherent vulnerabilities in this system. The incidents in July 2024, demonstrated that the devices could be successfully introduced into the network and ignite, thereby validating the initial stages of the attack methodology and giving the GRU proof of concept They just didn’t count on the unintended early ignition. The plot was ultimately disrupted, indicating limitations in the overall effectiveness of the methodolgy, however, the GRU learns from its mistakes. Early ignition of the devices on the ground, while potentially providing valuable data to the perpetrators, also served as a big red flag to security agencies allowing for rapid investigation, intelligence sharing, and the apprehension of individuals involved, thereby preventing in-flight incidents. These were described as “test runs” so the operation was likely still in an experimental phase. The premature ignitions forced the perpetrators’ hand and exposed the plot before it could be realized on a larger scale.

The broader effectiveness must also be considered in the context of Russian hybrid warfare objectives. The successful downing of a cargo plane would create significant shock and disruption, even the exposure of such a plot serves Russia’s goals of sowing fear, demonstrating capability, and forcing Western nations to expend resources on the enhancement of security measures. The psychological impact of knowing that potentially dangerous devices could be present in everyday shipments carried by air can and will erode public confidence in transportation networks. Further, attribution of the plot to Russian FIS exacerbates existing tensions and reinforces the narrative of Russia as a hostile and unpredictable actor.

Russian FIS’s plot to plant incendiary devices on DHL cargo planes flying over Europe represents a serious and sophisticated attempt to conduct sabotage against Western infrastructure. The use of concealed incendiary devices, the exploitation of the air cargo network, and the involvement of the GRU align with Russia’s broader hybrid warfare strategy. Russia’s plan exposed vulnerabilities in air cargo security and highlighted the persistent threat posed by adversarial FIEs generally, and Russia more specifically. The incident serves as a stark reminder of the need for continued vigilance, enhanced security measures, and robust intelligence liaison to counter covert bullshit of this nature that are clearly aimed at destabilizing global systems. The plot underscores the evolving landscape of Russia’s willingness to do engage in unacceptable methods, international security more broadly, and the critical importance of understanding the motivations, methods, and capabilities of adversarial intelligence services.

Sources:

Associated Press. (2024, November 5). Western officials suspect Russia was behind a plot to put incendiary packages on cargo planes. PBS NewsHour.
 
Business Standard. (2024, November 5). Russia suspected of plotting to send incendiary devices to US on planes. Business Standard.
 
CSIS. (n.d.). Russia’s Shadow War Against the West. Center for Strategic & International Studies.

EUvsDisinfo. (2024, November 26). Disinfo: The West organised the DHL cargo plane crash in Vilnius to blame Russia. EuvsDisinfo.
 
Newsweek. (2024, November 5). Russia Suspected of Plot to Put Incendiary Devices on US-Bound Planes. Newsweek.

Politico.eu. (n.d.). Europe is under attack from Russia. Why isn’t it fighting back? Politico.eu.

Radio Free Europe/Radio Liberty. (n.d.). A Russian Airline Bomb Plot? What We Know About The Polish PM’s Accusations. Radio Free Europe/Radio Liberty.

The Record. (2024, November 5). Lithuania: Russian military intelligence behind plot to parcel bomb cargo planes. The Record.

UNN. (n.d.). Incendiary devices in parcels in Europe: Russian intelligence services are behind the sabotage – investigation. UNN.

UNITED24 Media. (2024, October 15). Suspected Russian Sabotage Nearly Caused German Plane Crash, German Intelligence Chief Says. UNITED24 Media.