An anonymous reader writes: The Natanz case proved that cyber instruments can bridge air gaps to poach data and cause physical harm, and supply chains can easily assist these offenders. It takes rigorous and intense efforts to weed out back doors, kill switches, and insidiously implanted malware. Governments need to establish a flexible, risk-based and transparent standard to check supply chain risks – one that covers the entire lifecycle – from production to resale and system upgrade. After all, even if the United States successfully keeps Huawei and ZTE from entering its borders, current global manufacturing processes and markets make it impossible to shut out all Chinese-made products and components that may flow in. If the Chinese Communist Party, or any other perpetrator, wants to implant a kill switch, they can simply sneak it in.