The Hunt for the Kill Switch

May 1st, 2008

Via: IEEE:

Last September, Israeli jets bombed a suspected nuclear installation in northeastern Syria. Among the many mysteries still surrounding that strike was the failure of a Syrian radar—supposedly state-of-the-art—to warn the Syrian military of the incoming assault. It wasn’t long before military and technology bloggers concluded that this was an incident of electronic warfare—and not just any kind.

Post after post speculated that the commercial off-the-shelf microprocessors in the Syrian radar might have been purposely fabricated with a hidden “backdoor” inside. By sending a preprogrammed code to those chips, an unknown antagonist had disrupted the chips’ function and temporarily blocked the radar.

That same basic scenario is cropping up more frequently lately, and not just in the Middle East, where conspiracy theories abound. According to a U.S. defense contractor who spoke on condition of anonymity, a “European chip maker” recently built into its microprocessors a kill switch that could be accessed remotely. French defense contractors have used the chips in military equipment, the contractor told IEEE Spectrum. If in the future the equipment fell into hostile hands, “the French wanted a way to disable that circuit,” he said. Spectrum could not confirm this account independently, but spirited discussion about it among researchers and another defense contractor last summer at a military research conference reveals a lot about the fever dreams plaguing the U.S. Department of Defense (DOD).

Feeding those dreams is the Pentagon’s realization that it no longer controls who manufactures the components that go into its increasingly complex systems. A single plane like the DOD’s next generation F-35 Joint Strike Fighter, can contain an “insane number” of chips, says one semiconductor expert familiar with that aircraft’s design. Estimates from other sources put the total at several hundred to more than a thousand. And tracing a part back to its source is not always straightforward. The dwindling of domestic chip and electronics manufacturing in the United States, combined with the phenomenal growth of suppliers in countries like China, has only deepened the U.S. military’s concern.

Recognizing this enormous vulnerability, the DOD recently launched its most ambitious program yet to verify the integrity of the electronics that will underpin future additions to its arsenal. In December, the Defense Advanced Research Projects Agency (DARPA), the Pentagon’s R&D wing, released details about a three-year initiative it calls the Trust in Integrated Circuits program. The findings from the program could give the military—and defense contractors who make sensitive microelectronics like the weapons systems for the F?35—a guaranteed method of determining whether their chips have been compromised. In January, the Trust program started its prequalifying rounds by sending to three contractors four identical versions of a chip that contained unspecified malicious circuitry. The teams have until the end of this month to ferret out as many of the devious insertions as they can.

Posted in Technology, War | Top Of Page

3 Responses to “The Hunt for the Kill Switch”

  1. krimles says:

    Makes you wonder what kind back doors may be built in to MS Windows. It’s hard to believe that the security forces would not have approached Microsoft.

  2. anothernut says:

    Huge leap:
    “The findings from the program could give the military—and defense contractors who make sensitive microelectronics like the weapons systems for the F?35—a guaranteed method of determining whether their chips have been compromised. In January, the Trust program started its prequalifying rounds by sending to three contractors four identical versions of a chip that contained unspecified malicious circuitry. The teams have until the end of this month to ferret out as many of the devious insertions as they can.”

    “a guaranteed method of determining whether their chips have been compromised”? And this “guarantee” is based on the idea that, if the DOD puts some bugs on some chips, and these contractors find the bugs, then the contractors will then be able to find any and all bugs a malicious entity might put on future chips. Holy faith-based-technology, Batman!

    How about… you want to make sure the chips are clean? Have total control over every aspect of their manufacture. Oops, can’t do that, that would go against the First Commandment of Globalism, “Thou Shalt Not Show Loyalty to Thine Own Nation-State, or Any Other Nation-State”.

    HA! Never thought the all-hallowed Global Economy would bite us in the ass in this particular way, i.e., on the high-tech-military cheek. Once again, Kurt Vonnegut must be having a chuckle.

  3. Kevin says:

    They work with NSA. It’s admitted.

    https://cryptogon.com/?p=193

Leave a Reply

You must be logged in to post a comment.