Article 43


Tuesday, October 07, 2008

Bad Moon Rising Part 33 - Dangerous Fakes


How counterfeit, defective computer components from China are getting into U.S. warplanes and ships

By Brian Grow, Chi-Chu Tschang, Cliff Edwards and Brian Burnsed
Businesss Week
October 2, 2008

The American military faces a GROWING THREAT of potentially fatal equipment failure and even foreign espionage - because of counterfeit computer components used in warplanes, ships, and COMMUNICATIONS NETWORKS. Fake microchips flow from unruly bazaars in rural China to dubious kitchen-table brokers in the U.S. and into complex weapons. Senior Pentagon officials publicly play down the danger, but government documents, as well as interviews with insiders, suggest possible connections between phony parts and breakdowns.

In November 2005, a confidential Pentagon-industry program that tracks counterfeits issued an alertthat “BAE Systems experienced field failures,” meaning military equipment malfunctions, which the large defense contractor traced to fake MICROCHIPS. Chips are the tiny electronic circuits found in computers and other gear.

The alertfrom the Government-Industry Data Exchange Program, reviewed by BusinessWeek, said two batches of chips “were never shipped” by their supposed manufacturer, Maxim Integrated Products in Sunnyvale, Calif. “Maxim considers these parts to be counterfeit,” the alertstates. (In response to BusinessWeek’s questions, BAE said the alerthad referred erroneously to field failures. The company denied there were any malfunctions.)

In a separate incident last January, a chip falsely identified as having been made by Xicor, now a unit of Intersil in Milpitas, Calif., was discovered in the flight computer of an F-15 fighter jet at Robins Air Force Base in Warner Robins, Ga. People familiar with the situation say technicians were repairing the F-15 at the time. Special Agent Terry Mosher of the Air Force Office of Special Investigations confirms that the 409th Supply Chain Management Squadron eventually found four counterfeit Xicor chips.


Potentially more alarming than either of the two aircraft episodes are hundreds of COUNTERFEIT ROUTERS made in China and sold to the Army, Navy, Air Force, and Marines over the past four years. These fakes could facilitate foreign espionage, as well as cause accidents. The U.S. Justice Dept. is prosecuting the operators of an electronics distributor in Texasand last year obtained guilty pleas from the proprietors of a company in Washington State - for allegedly selling the military dozens of falsely labeled routers, devices that direct data through digital networks. The routers were marked as having been made by the San Jose technology giant Cisco Systems (CSCO).

Referring to the seizure of more than 400 fake routers so far, Melissa E. Hathaway, head of cyber security in the Office of the Director of National Intelligence, says: “Counterfeit products have been linked to the crash of mission-critical networks, and may also contain hidden ‘back doors’ enabling network security to be bypassed and sensitive data accessed [by hackers, thieves, and spies].” She declines to elaborate. In a 50-page presentation for industry audiences, the FBI concurs that the routers could allow Chinese operatives to “gain access to otherwise secure systems” (page 38).

It’s very difficult to determine whether tiny fake parts have contributed to particular plane crashes or missile mishaps, says Robert P. Ernst, who heads research into counterfeit parts for the Naval Air Systems Command’s Aging Aircraft Program in Patuxent River, Md. Ernst estimates that as many as 15% of all the spare and replacement microchips the Pentagon buys are counterfeit. As a result, he says, “we are having field failures regularly within our weapon systemsand in almost every weapon system.” He declines to provide details but says that, in his opinion, fake parts almost certainly have contributed to serious accidents. When a helicopter goes down in Iraq or Afghanistan, he explains, “we don’t always do the root-cause investigation of every component failure.”

While anxiety about fake computer components has begun to spread within the Pentagon, top officials have been slow to respond, says Ernst, 48, a civilian engineer for the military for the past 26 years. “I am very frustrated with the leadership’s inability to react to this issue.” Retired four-star General William G.T. Tuttle Jr., former chief of the Army Materiel Command and now a defense industry consultant, agrees: “What we have is a pollution of the military supply chain.”

Much of that pollution emanates from the Chinese hinterlands. BusinessWeek tracked counterfeit military components used in gear made by BAE Systems to traders in Shenzhen, China. The traders typically obtain supplies from recycled-chip emporiums such as the Guiyu Electronics Market outside the city of Shantou in southeastern China. The garbage-strewn streets of Guiyu reek of burning plastic as workers in back rooms and open yards strip chips from old PC circuit boards. The components, typically less than an inch long, are cleaned in the nearby Lianjiang River and then sold from the cramped premises of businesses such as Jinlong Electronics Trade Center.

A sign for Jinlong Electronics advertises in Chinese that it sells “military” circuitry, meaning chips that are more durable than commercial components and able to function at extreme temperatures. But proprietor Lu Weilong admits that his wares are counterfeit. His employees sand off the markings on used commercial chips and relabel them as military. Everyone in Guiyu does this, he says: “The dates [on the chips] are 100% fake, because the products pulled off the computer boards are from the ‘80s and ‘90s, [while] customers demand products from after 2000.”

BusinessWeek traced the path of components from Guiyu to BAE Systems Electronics & Integrated Solutions in Nashua, N.H. The company’s confidential reports to the Government-Industry Data Exchange Program were critical to this research. A unit of BAE’s $15 billion U.S. division, the electronics operation makes a variety of sophisticated equipment, ranging from missile-warning systems for fighter jets to laser-targeting devices for snipers. It has reported far more counterfeiting incidents than its rivals: 45 over the past three years. Industry executives say that large figure may reflect BAE’s candor or its aggressive pursuit of low-priced chips from China. The Justice Dept. is investigating BAE’s military electronic-parts procurement, a company spokesman confirmed.

In a statement, the company said that it “has attempted to pursue the origin of components provided through the supply chain, [but] has no further insight, nor certification to the origins of components that are provided by supply-chain distributors.” Only a “small percentage” of its parts have turned out to be counterfeit, BAE said. It now has restricted its purchases to original chipmakers and their approved distributors “except in very limited circumstances,” such as when it needs a hard-to-find component.

BAE isn’t unique. Other contractors that have reported counterfeit microchips to GIDEP include Boeing (BA) Satellite Systems, Raytheon (RTN) Missile Systems, Northrop Grumman (NOC) Navigation Systems, and Lockheed Martin Missiles & Fire Control. The companies all said they take the threat of counterfeits seriously but wouldn’t comment on specific incidents.

The flood of counterfeit military microelectronics results largely from the Pentagon’s need for parts for aging equipment and its long efforts to save money. In the mid-1990s, after the collapse of the Soviet Union, the Clinton Administration launched an initiative, continued during the Bush years, of buying all sorts of components off the shelf. In addition to the traditional pattern of purchasing equipment from original manufacturers and their large, authorized distributors, the Pentagon began doing business with smaller U.S. parts brokers that sprang up to offer low-cost items, including microchips. Federal affirmative-action goals have further encouraged the military to favor suppliers that qualify as “disadvantaged.” The chips wholesale for as little as 10 cents and as much as $2,000 each, depending on their complexity and quality. The Pentagon spends about $3.5 billion a year on spare chips, many of them for planes and ships that are 10 or 20 years old.

Name-brand manufacturers and well-established distributors, some of which acquire the rights to make obsolete chips, say they mark up prices 10% to 30%. Smaller brokers settle for far less generous margins. The number of small brokers increased sharply after 1994, when Congress stopped requiring government contractors to certify that they were either original manufacturers or authorized distributors. The brokers have to obtain a contractor code but receive little or no oversight. Hundreds are now operating, some out of suburban basements and second bedrooms. A BusinessWeek analysis of a contracting database identified at least 24 active brokers that list residential homes as their place of business. Several have won chip contracts for “critical applications,” which the Pentagon defines as “essential to weapon system performance...or the operating personnel.” In many cases these entrepreneurs comb Web sites such as and, which connect them with traders in Shenzhen and Guiyu. The brokers sell either directly to Pentagon depots or via suppliers to defense contractors such as BAE.


Mariya Hakimuddin owns IT Enterprise, a company she runs with her mother out of a modest one-story house in Bakersfield, Calif. Rosebushes line the street, and a basketball hoop hangs in the driveway. Hakimuddin, who is in her 40s, says she has no college education. She began brokering military chips four years ago, after friends told her about the expanding trade. Since 2004 she has won Pentagon contracts worth a total of $2.7 million, records show. The military has acquired microchips and other parts from IT Enterprise for use in radar on the aircraft carrier USS Ronald Reagan and the antisubmarine combat system of Spruance-class destroyers.

Hakimuddin says she knows little about the parts she has bought and sold. She started her business by signing up on the Internet for a government supplier code. After the Defense Dept. approved her application, with no inspection, she began scanning online military procurement requests. She plugged part codes into Google (GOOG) and found Web sites offering low prices. Then she ordered parts and had them shipped directly to military depots. “I wouldn’t know what [the parts] were before I’d order them,” she says, standing near her front door. “I didn’t even know what the parts were for.”

The Navy’s Ernst became concerned about IT Enterprise in March 2007. His team found a suspicious transistor - a basic type of microchipsupplied by the firm for use in the AV-8B Harrier, a Marine Corps fighter jet. The transistor, which turned up during an inspection of a military depot in Cherry Point, N.C., was supposed to contain lead in its solder joints, but didn’t. That defect could cause solders to crack and the flight control system to fail, Ernst explains. When a member of the team telephoned IT Enterprise in Bakersfield, he heard children chattering in the background, Ernst recalls. “It was the ‘Aha!’ moment for me on counterfeit parts,” he says.

Unknown to Ernst, a separate Defense inquiry later found that at least five shipments from IT Enterprise since 2004 had contained counterfeit microcircuits, including those intended for the USS Ronald Reagan, according to Pentagon records. During her interview with BusinessWeek, Hakimuddin denied any wrongdoing and blamed her suppliers, but she wouldn’t name them. In January the Defense Dept. banned IT Enterprise, Hakimuddin, and her mother, Lubaina Nooruddin, from supplying the military for three years.

The Hakimuddins weren’t deterred. A month after Mariya was barred, her husband, Mukerram, received his own supplier code, using the same home address with a new company name, Mil Enterprise. This time the Pentagon caught on more quickly, banning Mukerram for three years as well. He couldn’t be reached for comment. People familiar with the matter say the Defense Criminal Investigative Service is looking into IT Enterprise.

In written responses to questions about kitchen-table brokers, officials at the Defense Supply Center in Columbus, Ohioחa major Pentagon electronic-parts buyersaid they don’t inspect brokers or conduct background checks. “The law does not prohibit” work-at-home brokers or using the Internet to find parts, the officials said. “Is there risk? Yes, there is risk,” Brigadier General Patricia E. McQuistion, the center’s commander, says in an interview. She estimates that “less than one-quarter of 1% of what we buy is compromised.”


Nevertheless, after BusinessWeek’s inquiries, the center in August issued new contracting rules for microchips. Suppliers now must documentthe “conformance” and “traceability” of chips when they place bids. Previously such records didn’t have to be filed at the bidding stage and were sometimes missing or faked, industry and government officials say.

Even after the likes of IT Enterprise are identified, it can take time to clean up the mess. On Feb. 5, 2008, a manager at Tobyhanna Army Depot, the Pentagon’s largest electronics maintenance facility, in Stroud Township, Pa., notified the supply center in Columbus that his unit had discovered counterfeit chips supplied by IT Enterprise for use in global positioning systems on F-15 fighters, according to internal Pentagon e-mails reviewed by BusinessWeek. The e-mails show that, as late as July, the Columbus center was still trying to locate parts purchased from IT Enterprise.

In a July 24 e-mail, an F-15 engineer, whom BusinessWeek agreed not to identify, wrote: “Suppose that a part like that makes it onto a flight-critical piece of hardware or mission-essential piece of hardware. The[re] is a very good chance that the part may work...but what happens at 40[,000] ft and -50 degrees? Hardware failure. Not good.”

Ernst says the Hakimuddin episode helped him realize how blind the military has been: “We don’t know how big the counterfeit problem is, and, to me, that is irresponsible.” Now he’s trying to get others in the bureaucracy to confront what he considers to be a crisis: “The risk of counterfeiting is so high, and the cost to our weapon systems is so great, that we need to take action.” Glenn Benninger, a senior civilian engineer at the Naval Surface Warfare Center in Crane, Ind., concurs: “Counterfeiting has literally exploded over the last few years, but not a lot of people have been paying attention.”

The pending investigations could force the Defense Dept. to heed such warnings. In addition to the Justice Dept.’s probe of BAE, there is the Pentagon’s in-house criminal inquiry. “The DoD takes this threat very seriously,” John J. Young Jr., Defense Under Secretary for Acquisition, Technology, and Logistics, said in a statement. “This security threat will require great vigilance by DoD to defeat, but we will do everything within our power to do so.”

Policies aimed at promoting “disadvantaged” businesses have apparently encouraged dealings with brokers that otherwise might seem questionable. Federal affirmative-action goals require the Pentagon to seek to make 22% of its purchases from small contractors - as measured by staff and revenueincluding those run by women, military veterans, or members of certain ethnic minority groups. A contracting database refers to IT Enterprise as a “Subcontinent Asian American Owned Business.” Hakimuddin wouldn’t discuss her ethnicity but says she was born in the U.S.

Daniel Spencer designated his wife, Brenda, as the legal owner of his brokering business, BDS Supply. “I thought we’d get some kind of benefit [from being woman-owned],” says Spencer, 54, who acknowledges that he runs the company with his wife. Working from home in Great Falls, Mont., he says, he buys from legitimate suppliers and has parts shipped to him before sending them on to the Pentagon. But he admits that, despite a background in computers, he doesn’t have the expertise to identify fake chips. Promod Dubey, who runs Phoenix Systems Engineering, a broker in Lake Mary, Fla., complains that military procurement offices “want the cheapest possible s--t they can get.” Dubey, who lists Phoenix as a “small disadvantaged” business on Pentagon documents, says he acquires parts from China only as a “last resort” because “sometimes the quality is questionable.” Neither he nor Spencer has been accused of impropriety in their military work.

Contractor reports to the GIDEP counterfeits database show a total of 115 incidents over the past six years. But “everybody believes the [GIDEP] reports are just the tip of the iceberg,” says Brian Hughitt, manager of quality assurance for NASA. Hughitt says that, during testing, NASA inspectors have identified two shipments of counterfeit chips in the past 18 months. One lot was installed in flight hardware. “That’s something that is going to be launched into space,” Hughitt says, declining to elaborate. “It could have been real bad.” NASA, which helps launch military satellites and missiles, is investigating the shipments.


To understand the counterfeiting phenomenon, BusinessWeek independently traced four incidents of phony parts that BAE Systems reported to GIDEP. The circuitous trails all led back to China, as did those of at least six other BAE incidents that BusinessWeek did not investigate in detail.

In April 2007 BAE reported receiving fake military-grade chips purportedly made by Philips Semiconductor for undisclosed weapon systems. A production date stamped on the supposedly military-grade chips identified them as having been made in 1998. But NXP Semiconductors, a unit spun off from the Dutch company Philips two years ago, confirms that it stopped making military-grade chips in 1997.

BAE bought the chips from Port Electronics, a Salem (N.H.) distributor. Robert W. Wentworth, a vice-president at Port, says in an interview that BAE asked his firm to find a series of older microchips to avoid a redesign of weapon systems “that would have cost [BAE] millions.” He declines to specify the weapons but adds: “These people [at BAE] were desperate to find the parts.”

BAE said in a statement that, after discovering the counterfeits in 2007, it “immediately ceased” using all independent chip brokers, including Port. Following a careful review, BAE added, it again began buying certain products from Port, which it described as a “small disadvantaged and disabled veteran-owned business.” Without commenting directly on Wentworth’s account, BAE said that redesigning older weapon technology is expensive and that it sometimes makes more economic sense to seek “small quantities of the original parts.”

Port obtained the fake Philips chips from another distributor, Aapex International, in Salem, Mass. Aapex had purchased the components from Hong Kong Fair International Electronics in Shenzhen, according to BAE documents. A brochure provided by Hong Kong Fair at its office on the 15th floor of a well-kept commercial building says it enjoys “a good relationship and faithful partnership” with Aapex. Jiang Hongyan, 43, Hong Kong Fair’s export manager, says in an interview that her company never tests the microchips it supplies and rarely knows anything about the companies from which it buys. “We are a trading company,” says Jiang, who wears red-rimmed glasses and uses the English name “Snow.” She adds: “We buy goods with one hand and sell them with the other hand. We do not have any capability to do research, production, or modifications.”


The owner of Aapex, Marie Gauthier, says her company purchased chips from Hong Kong Fair only once. She says she doesn’t know anything about the brochure in which Hong Kong Fair boasts of its “faithful partnership” with Aapex. She says she made chip sales worth $2 million to Port Electronics between 1999 and 2007. “Ninety-nine percent of it was for BAE,” she says. BAE engineers regularly contacted Aapex in their search for older, hard-to-find chips, Gauthier says. She told the defense contractor she was buying parts from China. “We notified BAE that this was high-risk,” says Gauthier. “They begged us because they said they needed the product.” E-mail exchanges, reviewed by BusinessWeek, confirm that Aapex repeatedly warned Port and BAE about parts from China.

Gauthier says BAE and Port no longer buy from Aapex. “I got thrown under the bus by BAE,” she says. “They did not want to take responsibility, so they pointed at us.” BAE declined to comment on her assertion or on the e-mail exchanges.

Hong Kong Fair bought the fake Philips chips from the Guiyu Electronics Market, according to the BAE documents. No specific vendor is listed in BAE’s GIDEP report. At Jinlong Electronics Trade Center in Guiyu, proprietor Lu Weilong says he could easily supply many types of military-grade chips, including those acquired for BAE. As he speaks, he turns to a PC in the back of his cluttered store and types military part numbers into Google to see from which kinds of circuit boards they can be extracted. “I have the circuit boards at home,” he says confidently.

Some Chinese parts providers appear to have set up front companies in the U.S. and sell to brokers that supply the U.S. defense industry. JFBK of Fullerton, Calif., seems to be one such Chinese affiliate. The company is identified in GIDEP documents from this past June as having provided chips to North Shore Components, a distributor in Bellport, N.Y. The chips, typically used in the FA-18 fighter and E-2C Hawkeye surveillance plane, were supposed to have been made by National Semiconductor (NSM) in Santa Clara, Calif., but they turned out to be counterfeits of only commercial grade, according to North Shore’s report to GIDEP. North Shore Vice-President Joseph Ruggiero says in an interview that his company found JFBK on the chip-trading Web site NetComponents.

JFBK’s office in a strip mall in Fullerton is a single small room that also houses two other companies: MeiXin Technologies and New World Tech, both chip brokers. JFBK’s Web site describes a “knowledgeable and friendly staff” with “years of collective experience and professional support.” One afternoon in mid-July, four women and a man, who all appeared to be in their 20s, sat at desks with small signs tacked above them bearing the names of the three companies. The employees answered the phone on each desk with the name of the company designated on the card. Asked about microchip sales, one young woman, who declined to give her name, said: “We’re not allowed to talk about what we do.”

According to the California Department of Corporations, JFBK and New World have been “dissolved” as legal entities since 2000. MeiXin is still listed as active. Public records identify a woman named JianJu Cho as the agent for JFBK. Reached by phone while on vacation in Florida, Cho said neither she nor her staff knows much about microchips. “I don’t have any knowledge about electronic components,” said Cho. “All the things just depend on what our supplier tells us.” Cho says the owners of JFBK and MeiXin are “a couple from China and a man from Taiwan. MeiXin and JFBK [are from] China; New World is from Taiwan.”

A company called Tongda MeiXin Electronics operates on the 15th floor of an office building in Shenzhen. Under the MeiXin nameplate is another sign that states, in Chinese, “JFBK Shenzhen office.” Asked about the relationship between JFBK and Tongda MeiXin, Wang Tong, general manager of MeiXin, says: “We are their supplier.” Wang, 27, says JFBK probably didn’t appreciate that the purportedly military-grade chips supplied to North Shore were counterfeit because neither MeiXin nor JFBK knows where the product came from. “They don’t understand the technology,” says Tong. “They only do trade. None of us understand the technology.”

Wayne Chao, secretary general of the China Electronics Purchasing Assn., based in Shenzhen, admits that microchip counterfeiting is rife in China: “It’s widespread, and we acknowledge that.” Asked why Chinese officials don’t shut down the blatant counterfeiting, he says: “Everyone wants to blame China. But it’s difficult to differentiate between a legitimate product and a fake.”

U.S. chipmakers say it is not their job to police a disorderly global marketplace, although some companies are at least trying to assess the challenge. John Sullivan, vice-president for worldwide security at Dallas-based Texas Instruments (TXN), has traveled to chip markets in Shenzhen to photograph allegedly counterfeit stockpiles and label-printing machines.

U.S. Customs & Border Protection officials at American ports have seized eight shipments of fake military-grade chips purportedly made by Texas Instruments in the past three years, according to GIDEP records. Sullivan says Pentagon representatives have met with TI and other chipmakers. “They’re not seeing it as just an economic problem; they’re seeing it as a problem that could affect national security and health and safety,” he says.

Major chipmakers blame the Pentagon and its practice of buying from small brokers for the spread of counterfeit military-grade chips. “We’ve been telling people [at Defense] for 10 years to buy only from us or our authorized distributor,” says Chuck Mulloy, a spokesman for Intel (INTC). “The military is slavishly following the low-cost paradigm but not following the idea of checking the quality as well.”

Hong Kong Fair’s Jiang, the alleged supplier of counterfeit chips to BAE, argues that if the U.S. military wants guaranteed high-quality chips, it should purchase them directly from the original manufacturers or their official franchisees. “Why do you come to China to buy it? You know that these things in China are cheap,” Jiang says. “Why are they cheap? They have problems with quality.”

For a video tour of a microchip bazaar in China where counterfeits are sold, go HERE.

Grow is a correspondent in BusinessWeek’s Atlanta bureau . Tschang is a correspondent in BusinessWeek’s Beijing bureau. Edwards is a correspondent in BusinessWeek’s Silicon Valley bureau. Burnsed is an editorial assistant for BusinessWeek based in Atlanta.



China Demands Source Code

By The Yomiuri Shimbun
The Daily Yomiuri
September 18, 2008

China to make foreign firms reveal secret info

The Chinese goverment plans to introduce a new system requiring foreign firms to disclose secret information about digital household appliances and other products starting from May, sources said Thursday.

The envisaged system is likely to target products such as IC cards, digital copiers and possibly flat-panel TVs.

If a company refuses to disclose such information, the Chinese government plans to ban the firm from exporting the product to the Chinese market, as well as bar production and sales in the country, according to the sources.

Critics worry that such a system risks seeing the intellectual property of foreign firms passed onto their Chinese competitors.

In addition, the envisaged system poses security concerns if coding technology used in digital devices developed in other countries is leaked to China, they added.

Observers say the issue could develop into a serious international trade dispute, with Japan’s Economy, Trade and Industry Ministry and U.S. Trade Representatives expected to urge the Chinese government to drop the plan.

The Chinese government is calling the planned system an “obligatory accreditation system for IT security products,” according to the sources.

Specifically, foreign companies will be obliged to disclose relevant products’ source code, or a sequence of statements written in computer programming language designed to control digital appliances and other high-tech products.

The system, whereby manufacturers will be allowed to sell their products on the Chinese market only after they pass tests based on disclosed source code and inspections by an accreditation body, is said to be unprecedented.

Products expected to be subject to the system are those equipped with secret coding, such as the Felica contactless smart card system developed by Sony Corp., digital copiers and computer servers.

The Chinese government said it needs the source code to prevent computer viruses taking advantage of software vulnerabilities and to shut out hackers.

However, this explanation is unlikely to satisfy concerns that disclosed information might be handed from the Chinese government to Chinese companies.

There also are fears that Chinese intelligence services could exploit such confidential information by making it easier to break codes used in Japanese digital devices.

Source code is considered a company’s intellectual property. Microsoft Corp., for instance, kept secret its Windows’ source code, helping it earn huge profits from licensing.



Security backdoor found in China-made US military chip
Cambridge University researchers find that a microprocessor used by the US military but made in China contains secret remote access capability

Information Age
May 2012

A microchip used by the US military and manufactured in China contains a secret “backdoor” that means it can be shut off or reprogrammed without the user knowing, according to researchers at Cambridge University’s Computing Laboratory.

UPDATE: However, one security consultancy has said that the implication that the backdoor might have been secretly inserted by the Chinese manufacturer is “bogus”, and that malicious intent is unlikely.

IN A DRAFT PAPER, Cambridge University researcher Sergei Skorobogatov wrote that the chip in question is widely used in military and industrial applications. The “backdoor” means it is “wide open to intellectual property theft, fraud and reverse engineering of the design to allow the introduction of a backdoor or Trojan”, they said.

The discovery was made during testing of a new technique to extract the encryption key from chips, developed by Cambridge spin-off Quo Vadis Labs. The “bug” is in the actual chip itself, Skorobogatov wrote, rather than the firmware installed on the devices that use it, meaning there is no way to fix it than to replace the chip altogether.

“The discovery of a backdoor in a military grade chip raises some serious questions about hardware assurance in the semiconductor industry,” wrote Skorobogatov.
Interesting Links

Anonymous forces plant research website offline

However, Robert Graham, of US security consultancy Errata Security, wrote yesterday that the backdoor is unlikely to have been added maliciously. He claims that the entry route discovered by Skorobogotov is likely to be a debugging tool deliberately installed by the manufacturer.

“It’s remotely possible that the Chinese manufacturer added the functionality, but highly improbable. It’s prohibitively difficult to change a chip design to add functionality of this complexity.”

He also questioned the description of the chip as “military grade”. “The military uses a lot of commercial, off-the-shelf products. That doesn’t mean there is anything special about it.”

Graham writes that the backdoor could pose a security threat, however. “It not only allows the original manufacturer to steal intellectual-property, but any other secrets you tried to protect with the original [encryption] key.”


Bad Moon Rising
Part 1 - Part 2 - Part 3 - Part 4 - Part 5
Part 6 - Part 7 - Part 8 - Part 9 - Part 10
Part 11 - Part 12 - Part 13 - Part 14 - Part 15
Part 16 - Part 17 - Part 18 - Part 19 - Part 20
Part 21 - Part 22 - Part 23 - Part 24 - Part 25
Part 26 - Part 27 - Part 28 - Part 29 - Part 30
Part 31 - Part 32 - Part 33 - Part 34 - Part 35
Part 36 - Part 37 - Part 38 - Part 39 - Part 40
Part 41 - Part 42 - Part 43 - Part 44 - Part 45
Part 46 - Part 47 - Part 48 - Part 49 - Part 50
Part 51 - Part 52 - Part 53 - Part 54

Posted by Elvis on 10/07/08 •
Section Bad Moon Rising
View (0) comment(s) or add a new one
Printable viewLink to this article
Page 1 of 1 pages


Total page hits 10837097
Page rendered in 2.2513 seconds
41 queries executed
Debug mode is off
Total Entries: 3359
Total Comments: 339
Most Recent Entry: 10/14/2021 11:24 am
Most Recent Comment on: 09/26/2021 05:03 pm
Total Logged in members: 0
Total guests: 6
Total anonymous users: 0
The most visitors ever was 172 on 12/25/2019 07:40 am

Email Us


Login | Register
Resumes | Members

In memory of the layed off workers of AT&T

Today's Diversion

Before I got married I had six theories about bringing up children; now I have six children and no theories. - John Wilmont


Advanced Search



October 2021
          1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30

Must Read

Most recent entries

RSS Feeds

Today's News

ARS Technica

External Links

Elvis Picks

BLS and FRED Pages


All Posts



Creative Commons License

Support Bloggers' Rights