Do Personal Computers Come With NSA Surveillance Devices Built-In As Standard?
Do Personal Computers Come With NSA Surveillance Devices Built-In As Standard?
from the tinfoil-hat dept
As Techdirt reported last year, one of the most bizarre episodes in the unfolding story of the Snowden leaks was when two experts from the UK's GCHQ oversaw the destruction of the Guardian's computers that held material provided by Snowden. As everyone -- including the Guardian's editor Alan Rusbridger -- pointed out, this was a particularly pointless act since copies of the documents were held elsewhere, outside the UK. The only possible explanation seemed to be that the UK government was trying to put the frighteners on the Guardian, and engaged in this piece of theater to ram the point home. But a fascinating blog post from Privacy International raises the possibility that there is another far more disturbing explanation:
GCHQ were not just interested in hard drives nor did they destroy whole devices. An examination of the targeted hardware by Privacy International, with cooperation from the Guardian, has found the whole episode to be more troubling and puzzling than previously believed.
During our investigation, we were surprised to learn that a few very specific components on devices, such as the keyboard, trackpad and monitor, were targeted along with apparently trivial chips on the main boards of laptops and desktops. Initial consultation with members of the technology community supported our identification of the components and that the actions of GCHQ were worth analyzing further.
In other words, GCHQ weren't trying to destroy the data -- which they, like everyone else, knew was completely futile. There were interested in "apparently trivial chips on the main boards of laptops and desktops." Specifically, these were the keyboard controller chip, the trackpad controller chip and the inverting converter chip. Privacy International provides more details:
From our analysis, we believe the targeted component of the keyboard is the keyboard encoder responsible for communicating over the USB and interpreting key presses on its various I/O pins.
...
We believe the targeted [trackpad] component is a serial flash chip that may perform a similar function to the keyboard controller also targeted. It is noteworthy that the device in question uses the controller board on the trackpad to also connect the keyboard to the main device.
...
The final component is an inverting converter, again used on the Apple MacBook Air systems.
http://www.techdirt.com/articles/20140526/08355827362/do-personal-computers-come-with-nsa-surveillance-devices-built-in-as-standard.shtml
RKP5637
(67,112 posts)bemildred
(90,061 posts)Later on XWindows.
OnyxCollie
(9,958 posts)STOA
DEVELOPMENT OF SURVEILLANCE TECHNOLOGY AND RISK OF ABUSE OF ECONOMIC INFORMATION
Vol 5/5
The perception of economic risks arising from the potential vulnerability of electronic commercial media to interception
Working document for the STOA Panel
Luxembourg, October 1999 PE 168.184/Vol 5/5
From 1994 onwards, Washington began to woo private companies to develop an encryption system that would provide access to keys by government agencies. Under the proposals - variously known as `key escrow', `key recovery' or `trusted third parties' - the keys would be held by a corporation, not a government agency, and would be designed by the private sector, not the NSA. The systems, however, still entailed the assumption of guaranteed access to the intelligence community and so proved as controversial as the Clipper Chip. The government used export incentives to encourage companies to adopt key escrow products: they could export stronger encryption, but only if they ensured that intelligence agencies had access to the keys.
Under US law, computer software and hardware cannot be exported if it contains encryption that the NSA cannot break. The regulations stymie the availability of encryption in the USA because companies are reluctant to develop two separate product lines - one, with strong encryption, for domestic use and another, with weak encryption, for the international market. Several cases are pending in the US courts on the constitutionality of export controls; a federal court recently ruled that they violate free speech rights under the First Amendment.
The FBI has not let up on efforts to ban products on which it cannot eavesdrop. In mid- 1997, it introduced legislation to mandate that key-recovery systems be built into all computer systems. The amendment was adopted by several congressional Committees but the Senate preferred a weaker variant. A concerted campaign by computer, telephone and privacy groups finally stopped the proposal; it now appears that no legislation will be enacted in the current Congress.
While the key escrow approach was being pushed in the USA, Washington had approached foreign organisations and states. The lynchpin for the campaign was David Aaron, US ambassador to the Organisation for Economic Co-operation and Development (OECD), who visited dozens of countries in what one analyst derided as a programme of `laundering failed US policy through international bodies to give it greater acceptance'.
bemildred
(90,061 posts)Fat chance. I am familiar with the PGP episode, and I am well aware that the government fears the loss of surveillance. They like the permeability of the web, but they want to control it.
Leme
(1,092 posts)have built in spyware?
-
but the question about
-
Do Personal Computers Come With NSA Surveillance Devices Built-In As Standard?
-
seems to not be answered here yet
burfman
(264 posts)What the heck is an 'inverting converter'. The name is not one that an electrical engineer would use to describe the typical hardware in a keyboard. I think perhaps that some non-technical people were in over their heads when they wrote the original article.
bemildred
(90,061 posts)burfman
(264 posts)Thanks bemildred,
Hey if someone is using the voltage converter to hack the keyboard I'm in awe. Not the part I would have chosen.....
bemildred
(90,061 posts)Which presumably need a different voltage or more amps or something.
AnneD
(15,774 posts)they were telling people that those voices were in their heads....turns out they weren't.
Progressive dog
(6,919 posts)for the Americans and British.
struggle4progress
(118,352 posts)I readed it on th'innertubes so ya know it's gotta be true
bemildred
(90,061 posts)One of the reasons that I assume pretty much anything can be hacked is all those little chips full of micro-code and whatnot.
And now we put little radios in everything.