Thursday 23 October 2008

PC, Call Home, now! (could it be true?)

china-flag

We all use computers and you're reading this blog on one. I ran across an interesting article on Cryptome.org's website. It's been widely circulated since published a few days ago. Here's the article by Robert Eringer.

And Now The Manchurian Microchip

The geniuses at Homeland Security who brought you hare-brained procedures at airports (which inconvenience travelers without snagging terrorists) have decreed that October is National Cyber Security Awareness Month. This means The Investigator -- at the risk of compromising national insecurities -- would be remiss not to make you aware of the hottest topic in U.S. counterintelligence circles: rogue microchips. This threat emanates from China (PRC) -- and it is hugely significant.

The myth: Chinese intelligence services have concealed a microchip in every computer everywhere, programmed to "call home" if and when activated.

The reality: It may actually be true.

All computers on the market today -- be they Dell, Toshiba, Sony, Apple or especially IBM -- are assembled with components manufactured inside the PRC. Each component produced by the Chinese, according to a reliable source within the intelligence community, is secretly equipped with a hidden microchip that can be activated any time by China's military intelligence services, the PLA.

"It is there, deep inside your computer, if they decide to call it up," the security chief of a multinational corporation told The Investigator. "It is capable of providing Chinese intelligence with everything stored on your system -- on everyone's system -- from e-mail to documents. I call it Call Home Technology. It doesn't mean to say they're sucking data from everyone's computer today, it means the Chinese think ahead -- and they now have the potential to do it when it suits their purposes."

Discussed theoretically in high-tech security circles as "Trojan Horse on a Chip" or "The Manchurian Chip," Call Home Technology came to light after the Defense Advanced Research Projects Agency (DARPA) launched a security program in December 2007 called Trust in Integrated Circuits. DARPA awarded almost $25 million in contracts to six companies and university research labs to test foreign-made microchips for hardware Trojans, back doors and kill switches -- techie-speak for bugs and gremlins -- with a view toward microchip verification.

Raytheon, a defense contractor, was granted almost half of these funds for hardware and software testing.

Its findings, which are classified, have apparently sent shockwaves through the counterintelligence community.

You can read the rest of the article here at Cryptome's archives.

Here's a little about the author Robert Eringer too.

Counterfeit Chips Raise Big Hacking, Terror Threats, Experts Say

No comments: