Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

bemildred

(90,061 posts)
Wed May 28, 2014, 10:05 AM May 2014

Do Personal Computers Come With NSA Surveillance Devices Built-In As Standard?

Do Personal Computers Come With NSA Surveillance Devices Built-In As Standard?
from the tinfoil-hat dept

As Techdirt reported last year, one of the most bizarre episodes in the unfolding story of the Snowden leaks was when two experts from the UK's GCHQ oversaw the destruction of the Guardian's computers that held material provided by Snowden. As everyone -- including the Guardian's editor Alan Rusbridger -- pointed out, this was a particularly pointless act since copies of the documents were held elsewhere, outside the UK. The only possible explanation seemed to be that the UK government was trying to put the frighteners on the Guardian, and engaged in this piece of theater to ram the point home. But a fascinating blog post from Privacy International raises the possibility that there is another far more disturbing explanation:

GCHQ were not just interested in hard drives nor did they destroy whole devices. An examination of the targeted hardware by Privacy International, with cooperation from the Guardian, has found the whole episode to be more troubling and puzzling than previously believed.

During our investigation, we were surprised to learn that a few very specific components on devices, such as the keyboard, trackpad and monitor, were targeted along with apparently trivial chips on the main boards of laptops and desktops. Initial consultation with members of the technology community supported our identification of the components and that the actions of GCHQ were worth analyzing further.


In other words, GCHQ weren't trying to destroy the data -- which they, like everyone else, knew was completely futile. There were interested in "apparently trivial chips on the main boards of laptops and desktops." Specifically, these were the keyboard controller chip, the trackpad controller chip and the inverting converter chip. Privacy International provides more details:

From our analysis, we believe the targeted component of the keyboard is the keyboard encoder responsible for communicating over the USB and interpreting key presses on its various I/O pins.

...

We believe the targeted [trackpad] component is a serial flash chip that may perform a similar function to the keyboard controller also targeted. It is noteworthy that the device in question uses the controller board on the trackpad to also connect the keyboard to the main device.

...

The final component is an inverting converter, again used on the Apple MacBook Air systems.


http://www.techdirt.com/articles/20140526/08355827362/do-personal-computers-come-with-nsa-surveillance-devices-built-in-as-standard.shtml
13 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Do Personal Computers Come With NSA Surveillance Devices Built-In As Standard? (Original Post) bemildred May 2014 OP
Yes, doable and plausible IMO. n/t RKP5637 May 2014 #1
Oh quite, I used to write custom keyboard drivers, on DOS. bemildred May 2014 #2
From 1999: OnyxCollie May 2014 #3
Back then I was trying to tell my bosses not to put things they care about on the web at all. bemildred May 2014 #5
didn't Apple or some phone Leme May 2014 #4
inverting converter burfman May 2014 #6
Inverting converter: bemildred May 2014 #7
quite a tech feat t use that tho hack a keyboard burfman May 2014 #10
I'm guessing it's about a power source for the other things. bemildred May 2014 #11
All these years... AnneD May 2014 #8
Sure the Chinese are making spy chips Progressive dog May 2014 #9
Yup! Chinese manufacturin plants is stuffin th'boxes full o'goodies for th'NSA! struggle4progress May 2014 #12
I imagine the chinese are working on their own behalf. bemildred May 2014 #13
 

OnyxCollie

(9,958 posts)
3. From 1999:
Wed May 28, 2014, 10:23 AM
May 2014
SCIENTIFIC AND TECHNOLOGICAL OPTIONS ASSESSMENT
STOA

DEVELOPMENT OF SURVEILLANCE TECHNOLOGY AND RISK OF ABUSE OF ECONOMIC INFORMATION

Vol 5/5

The perception of economic risks arising from the potential vulnerability of electronic commercial media to interception

Working document for the STOA Panel

Luxembourg, October 1999 PE 168.184/Vol 5/5

From 1994 onwards, Washington began to woo private companies to develop an encryption system that would provide access to keys by government agencies. Under the proposals - variously known as `key escrow', `key recovery' or `trusted third parties' - the keys would be held by a corporation, not a government agency, and would be designed by the private sector, not the NSA. The systems, however, still entailed the assumption of guaranteed access to the intelligence community and so proved as controversial as the Clipper Chip. The government used export incentives to encourage companies to adopt key escrow products: they could export stronger encryption, but only if they ensured that intelligence agencies had access to the keys.

Under US law, computer software and hardware cannot be exported if it contains encryption that the NSA cannot break. The regulations stymie the availability of encryption in the USA because companies are reluctant to develop two separate product lines - one, with strong encryption, for domestic use and another, with weak encryption, for the international market. Several cases are pending in the US courts on the constitutionality of export controls; a federal court recently ruled that they violate free speech rights under the First Amendment.

The FBI has not let up on efforts to ban products on which it cannot eavesdrop. In mid- 1997, it introduced legislation to mandate that key-recovery systems be built into all computer systems. The amendment was adopted by several congressional Committees but the Senate preferred a weaker variant. A concerted campaign by computer, telephone and privacy groups finally stopped the proposal; it now appears that no legislation will be enacted in the current Congress.

While the key escrow approach was being pushed in the USA, Washington had approached foreign organisations and states. The lynchpin for the campaign was David Aaron, US ambassador to the Organisation for Economic Co-operation and Development (OECD), who visited dozens of countries in what one analyst derided as a programme of `laundering failed US policy through international bodies to give it greater acceptance'.

bemildred

(90,061 posts)
5. Back then I was trying to tell my bosses not to put things they care about on the web at all.
Wed May 28, 2014, 10:27 AM
May 2014

Fat chance. I am familiar with the PGP episode, and I am well aware that the government fears the loss of surveillance. They like the permeability of the web, but they want to control it.

 

Leme

(1,092 posts)
4. didn't Apple or some phone
Wed May 28, 2014, 10:27 AM
May 2014

have built in spyware?
-
but the question about
-
Do Personal Computers Come With NSA Surveillance Devices Built-In As Standard?
-
seems to not be answered here yet

burfman

(264 posts)
6. inverting converter
Wed May 28, 2014, 10:52 AM
May 2014

What the heck is an 'inverting converter'. The name is not one that an electrical engineer would use to describe the typical hardware in a keyboard. I think perhaps that some non-technical people were in over their heads when they wrote the original article.

burfman

(264 posts)
10. quite a tech feat t use that tho hack a keyboard
Wed May 28, 2014, 03:55 PM
May 2014

Thanks bemildred,

Hey if someone is using the voltage converter to hack the keyboard I'm in awe. Not the part I would have chosen.....

bemildred

(90,061 posts)
11. I'm guessing it's about a power source for the other things.
Wed May 28, 2014, 04:21 PM
May 2014

Which presumably need a different voltage or more amps or something.

AnneD

(15,774 posts)
8. All these years...
Wed May 28, 2014, 12:11 PM
May 2014

they were telling people that those voices were in their heads....turns out they weren't.

struggle4progress

(118,352 posts)
12. Yup! Chinese manufacturin plants is stuffin th'boxes full o'goodies for th'NSA!
Wed May 28, 2014, 09:43 PM
May 2014

I readed it on th'innertubes so ya know it's gotta be true

bemildred

(90,061 posts)
13. I imagine the chinese are working on their own behalf.
Thu May 29, 2014, 07:51 AM
May 2014

One of the reasons that I assume pretty much anything can be hacked is all those little chips full of micro-code and whatnot.

And now we put little radios in everything.

Latest Discussions»Issue Forums»Editorials & Other Articles»Do Personal Computers Com...