Putin Has Switched From PC To Typewriter

Your Computer May Already be Hacked – NSA Inside?

by steveblank
In a time of universal deceit - telling the truth is a revolutionary act.
George Orwell
In Russia, President Putin’s office just stopped using PC’s and switched to typewriters.  What do they know what we don’t?
Perhaps it’s Intel NSA inside.
Putin's Typewriter
---------
For those of you who haven’t kept up, the National Security Agency (NSA’s) Prism program has been in the news. Prism provides the NSA with access to data on the servers of Microsoft, Google, Facebook, etc, extracting audio and video chats, photographs, e-mails, documents, etc.
Prism is just a part of the NSA’s larger mass electronic surveillance program that covers every possible path someone might use to communicate; tapping raw data as it flows through fiber optic cables and Internet peering points, copying the addressees on all letters you physically mail, all credit card purchases, your phone calls and your location (courtesy your smart phone.)Slide03
All hell broke loose when Edward Snowden leaked all this to press.
Given my talks on the Secret History of Silicon Valley I was interviewed on NPR about the disclosure that the NSA said they had a new capability that tripled the amount of Skype video calls being collected through Prism. Like most Americans I said, "I didn't remember getting the memo that the 4th amendment to our constitution had been cancelled."
But while the interviewer focused on the Skype revelation, I thought the most interesting part was the other claim, “that the National Security Agency already had pre-encryption stage access to email on Outlook.”  Say what??  They can see the plaintext on my computer before I encrypt it? That defeats any/all encryption methods. How could they do that?
Bypass Encryption
While most outside observers think the NSA’s job is cracking encrypted messages, as the Prism disclosures have shown, the actual mission is simply to read all communications. Cracking codes is a last resort.
Slide04
The NSA has a history of figuring out how to get to messages before or after they are encrypted. Whether it was by putting keyloggers on keyboards and recording the keystrokes or detecting the images of the characters as they were being drawn on a CRT.
Today every desktop and laptop computer has another way for the NSA to get inside.
Intel Inside
It’s inevitable that complex microprocessors have bugs in them when they ship. When the first microprocessors shipped the only thing you could hope is that the bug didn't crash your computer. The only way the chip vendor could fix the problem was to physically revise the chip and put out a new version. But computer manufacturers and users were stuck if you had an old chip. After a particularly embarrassing math bug in 1994 that cost Intel $475 million, the company decided to fix the problem by allowing it’s microprocessors to load fixes automatically when your computer starts.
Slide05
Starting in 1996 with the Intel P6 (Pentium Pro) to today’s P7 chips (Core i7) these processors contain instructions that are reprogrammable in what is called microcode. Intel can fix bugs on the chips by reprogramming a microprocessors microcode with a patch. This patch, called a microcode update, can be loaded into a processor by using special CPU instructions reserved for this purpose. These updates are not permanent, which means each time you turn the computer on, its microprocessor is reset to its built-in microcode, and the update needs to be applied again (through a computer's BIOS.).
Since 2000, Intel has put out 29 microcode updates to their processors. The microcode is distributed by 1) Intel or by 2) Microsoft integrated into a BIOS or 3) as part of a Windows update. Unfortunately, the microcode update format is undocumented and the code is encrypted. This allows Intel to make sure that 3rd parties can’t make unauthorized add-ons to their chips. But it also means that no one can look inside to understand the microcode, which makes it is impossible to know whether anyone is loading a backdoor into your computer.
The Dog That Never Barked
The NSA has been incredibly thorough in nailing down every possible way to tap into communications. Yet the one company’s name that hasn't come up as part of the surveillance network is Intel. Perhaps they are the only good guys in the entire Orwellian mess.Slide07
Or perhaps the NSA, working with Intel and/or Microsoft, have wittingly have put backdoors in the microcode updates. A backdoor is is a way of gaining illegal remote access to a computer by getting around the normal security built-in to the computer. Typically someone trying to sneak malicious software on to a computer would try to install a rootkit (software that tries to conceal the malicious code.) A rootkit tries to hide itself and its code, but security conscious sites can discover rootkits by tools that check kernel code and data for changes.
But what if you could use the configuration and state of microprocessor hardware in order to hide? You'd be invisible to all rootkit detection techniques that checks the operating system. Or what if you can make the microprocessor random number generator (the basis of encryption) not so random for a particular machine? (The NSA's biggest coup was inserting backdoors in crypto equipment the Swiss sold to other countries.)
Rather than risk getting caught messing with everyone’s updates, my bet is that the NSA has compromised the microcode update signing keys  giving the NSA the ability to selectively target specific computers. (Your operating system ensures security of updates by checking downloaded update packages against the signing key.) The NSA then can send out backdoors disguised as a Windows update for “security." (Ironic but possible.)
That means you don't need backdoors baked in the hardware, don't need Intel's buy-in, don't have discoverable rootkits, and you can target specific systems without impacting the public at large.
Two Can Play the Game
A few months ago these kind of discussions would have been theory at best, if not paranoia. Slide09The Prism disclosures prove otherwise - the the National Security Agency has decided it needs the ability to capture all communications in all forms. Getting inside of a target computer and weakening its encryption or having access to the plaintext of encrypted communication seems likely. Given the technical sophistication of the other parts of their surveillance net, the surprise would be if they haven't implemented a microcode backdoor.
The downside is that 1) backdoors can be hijacked by others with even worse intent. So if NSA has a microcode backdoor - who else is using it? and 2) What other pieces of our infrastructure, (routers, smartphones, military computers, satellites, etc) use processors with uploadable microcode?
------
And that may be why the Russian president is now using a typewriter rather than a personal computer.
Putin's Typewriter
E-mail me when people leave their comments –

You need to be a member of Earthchangers College to add comments!

Join Earthchangers College

Comments

  • Basic civil rights is certainly the main point Keith.

    They are wasting their time with me as well - I'm certainly a minnow in all of this - and if I wasn't I think I would take the appropriate precautions.

  • Nice comment Peter.  I agree.  And for people who might want to make some changes to their computing habits due to the NSA leaks, here's a good website I found that lists alternative software you can use:

    https://prism-break.org/

  • But they can't read my mind - yet!

    Not that I know of anyway.

    IMO, this is why it is so important for us to not just gain (or regain) our telepathic ability - which I believe is coming - but also the skills in how to block it when and as required to retain individual sovereignty.

    Yes, we are all part of the greater "oneness" - and what ever we do affects everything else to some degree - but our individuality must be respected and retained.

This reply was deleted.

Blog Topics by Tags

Monthly Archives