Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

U.S. official says pre-infected computer tech entering country

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Latest Breaking News Donate to DU
 
RamboLiberal Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 04:25 PM
Original message
U.S. official says pre-infected computer tech entering country
Source: MSNBC

Confirming years of warnings from government and private security experts, a top Homeland Security official has acknowledged that computer hardware and software is already being imported to the United States preloaded with spyware and security-sabotaging components.

The remarks by Greg Schaffer, the Department of Homeland Security's acting deputy undersecretary for national protection and programs, came Thursday during a tense exchange at a hearing of the House Oversight and Government Reform Committee. The panel is considering an Obama administration proposal to tighten monitoring and controls on computer equipment imported for critical government and communications infrastructure.

Schaffer didn't say whether the equipment he was talking about included end-user consumer tech like retail laptops, DVDs and media players. If so, his comments, first reported Friday morning by Fast Company, would be the first time the United States has publicly confirmed that foreign consumer technology is arriving in the country already loaded with nasty bugs like key-logging software, botnet components and even software designed to defeat security programs installed on the same machine.

Msnbc.com has asked DHS to clarify Schaffer's remarks and will update this post when we hear back.



Read more: http://technolog.msnbc.msn.com/_news/2011/07/08/7043349-us-official-says-pre-infected-computer-tech-entering-country
Printer Friendly | Permalink |  | Top
hobbit709 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 04:27 PM
Response to Original message
1. About half the crap that comes preloaded is spyware as far as I'm concerned.
Especially all the Wild Tangent games and all the idiot toolbars.
Printer Friendly | Permalink |  | Top
 
Liberal Veteran Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 04:30 PM
Response to Reply #1
3. What toolbars?
Printer Friendly | Permalink |  | Top
 
MyrnaLoy Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 07:35 PM
Response to Reply #3
23. hhahaaaa
that cracked me up!
Printer Friendly | Permalink |  | Top
 
BlueJazz Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 09:03 PM
Response to Reply #3
25. Sweet Jesus!...There's about an inch of screen left at the bottom.
:rofl:
Printer Friendly | Permalink |  | Top
 
trud Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 10:07 PM
Response to Reply #25
30. just enough room for a banner ad. n/t
Printer Friendly | Permalink |  | Top
 
geckosfeet Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 04:30 PM
Response to Original message
2. I build my own. Not that hard and I know what's on it. Cheaper and I get what I want.
I can't believe government offices do not spec out their own hardware and assemble the pieces. Yes they would have to hire staff to maintain/repair but hey, we need the work.
Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 04:46 PM
Response to Reply #2
4. How do you know what's on the hard-drive or what that extra chip on the mother board does?
Just curious.
Printer Friendly | Permalink |  | Top
 
RC Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 04:58 PM
Response to Reply #4
5. It doesn't even have to be an "extra" chip.
My question is why are we not designing and making our own computer parts? We used to.
Printer Friendly | Permalink |  | Top
 
crikkett Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-09-11 05:16 AM
Response to Reply #5
40. pollution! that is why
along with our jobs, we outsourced all our caustic mfring to china.
Printer Friendly | Permalink |  | Top
 
hobbit709 Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 05:04 PM
Response to Reply #4
6. Before I use a drive I do several things to it.
I doubt that anything on that drive survives.
Plus once you install the OS, you can check out the processes running.
Problem is most people don't know or even want to know how to do this.
Printer Friendly | Permalink |  | Top
 
leveymg Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 05:25 PM
Response to Reply #6
12. Ya, I know what a clean (erase in MACese) install is. But, how do know
you erased all possible hidden files and programming?

Also, you can only check the processes running that are running at the time you check them. Most of the more sophisticated trojans don't run in the background until activated, either by an internal clock, a prompt (such as opening some other program), or a back-door log-in.
Printer Friendly | Permalink |  | Top
 
lbrtbell Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 09:09 PM
Response to Reply #12
26. Run Linux, and none of that crap can function
It's a free download, there are tons of distros, some of which can even be used on very old PC's.

If it runs automatically in Windows, it can't do jack when Linux is running.

Problem solved. :)
Printer Friendly | Permalink |  | Top
 
jmowreader Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-09-11 03:29 AM
Response to Reply #12
39. I'll tell you how I do it...
The first thing I do when I get a new computer is to repartition the hard drive. I used to break them down into a partition for system software and applications, a partition for fonts (which on this machine is a partition for fonts, clip art and logos) and three partitions for user data. Now it's only one partition for user data.

If someone invents a Mac trojan that copies all the files off "your hard drive" (most guys run one partition, so the trojan would be set up that way), and it runs on this machine, said person is going to get a LOT of cat pictures and not much else.
Printer Friendly | Permalink |  | Top
 
cstanleytech Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 07:26 PM
Response to Reply #6
20. If its built into the firmware though for a drive, motherboard or say even a simple network card
though what can you do to check?
Printer Friendly | Permalink |  | Top
 
Occulus Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 10:02 PM
Response to Reply #20
28. You can't check. That's what's so diabolical about this.
You don't know until it's already too late. It really would not surprise me in the least to discover that this is showing up on big-brand devices and nobody's talking about it.

Hardware viruses and image viruses have been around for some time now. It's a little worrying to me that this is only being taken seriously now. That the viruses are out there means it's already too late. Exactly how long has this been going on? I don't know; two, perhaps three years. Who knows how many systems have already been infected by their devices?


Printer Friendly | Permalink |  | Top
 
geckosfeet Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 07:30 PM
Response to Reply #4
21. There is nothing on the hard drive. I install the OS. If you are that paranoid
Edited on Fri Jul-08-11 07:32 PM by geckosfeet
and the feds probably should be, you can clean it before installing the OS.

Between motherboard, video card, nic or wireless you may be correct.

But I still feel better selecting my own parts. I have no crap ware on the internal hard drives. Most of the external drives shove their software in your face though.

Printer Friendly | Permalink |  | Top
 
Lasher Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 08:45 PM
Response to Reply #21
24. Can't you clean a store-bought computer's hard drive just as well?
I'm pretty sure the cleaning process you described is not unique to a custom built computer. If so, your argument is not valid.
Printer Friendly | Permalink |  | Top
 
geckosfeet Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 10:38 PM
Response to Reply #24
33. You can clean any hard drive. What do you mean "store bought"?
All hardware is "store bought" at some point.

I am not arguing. Just stating fact.
Printer Friendly | Permalink |  | Top
 
Lasher Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 11:58 PM
Response to Reply #33
36. Store bought = already assembled, ready to go as opposed to custom built.
Sorry, you can take the boy out of the country but...
Printer Friendly | Permalink |  | Top
 
geckosfeet Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-09-11 06:52 AM
Response to Reply #36
42. Oh - you mean the whole computer. Yes you can get software to wipe any hard drive.
Printer Friendly | Permalink |  | Top
 
boppers Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 05:09 PM
Response to Reply #2
7. That's fine if you can can verify all the pieces.
Counterfeits are hard to spot without destroying a chip to inspect it on a microscopic level, though.

This is an old story, we've known about this problem for a while:
http://www.businessweek.com/magazine/content/08_41/b4103034193886.htm
Printer Friendly | Permalink |  | Top
 
geckosfeet Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 07:33 PM
Response to Reply #7
22. Still - a whole lot better building your own than buying from dEll or Best Buy.
Printer Friendly | Permalink |  | Top
 
Mugweed Donating Member (939 posts) Send PM | Profile | Ignore Fri Jul-08-11 05:11 PM
Response to Original message
8. Made in the USA
I'd buy a lot of that...keeping in mind that I would need a decent-paying job so that I could afford to buy those products. Even Henry Ford understood that.
Printer Friendly | Permalink |  | Top
 
Taverner Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 05:19 PM
Response to Reply #8
11. Made in USA computers cost the same as Made in China ones
No, I'm not talking about Apple and their overpriced, overdesigned, overhyped bloatware systems

There are a number of laptops and desktops made in the USA - some even by HP and Dell
Printer Friendly | Permalink |  | Top
 
Tesha Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 05:58 PM
Response to Reply #11
14. There is no such thing as a "Made in America" PC or laptop.
They may have their bits and pieces screwed together
in some U.S. factory, but it's a certainty that 95
to 99% of the "value add" happened offshore.

Tesha
Printer Friendly | Permalink |  | Top
 
Taverner Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 06:26 PM
Response to Reply #14
16. This is true, but some computers are more made here than others
Same thing for cars
Printer Friendly | Permalink |  | Top
 
jmowreader Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 05:15 PM
Response to Original message
9. I can almost guarantee end-user consumer tech is similarly infected
Why wouldn't it be? The company makes a huge pile of, say, computer towers. When the US Government, Walmart and Staples order computers, they all come out of the same pile.

Since the hard drive in those computers is set up by sticking it in a computer and copying a disk image to it, if that image is corrupt in some way (maybe it has some spyware on it?) every hard drive set up off that image will be corrupt. There's no way around it. No one is sitting there with a stack of distribution DVDs and CDs setting up each computer individually.
Printer Friendly | Permalink |  | Top
 
TheMadMonk Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 07:12 PM
Response to Reply #9
19. Digital photo frames seem to be notorious for preloaded spyware...
...etcetera.

And it's worse than having a "nasty" hidden in a default system image.

As was done quite recently, a mouse (with bonus extras) was used by penetration testers to successfully breach a client's computer network. "Modified" POS terminals (Why are these things not factory certified, solid blocks of epoxy?) have been around for a while now, and it is perfectly feasible to add effectively indetectable "extra functions" to any number of peripheral devices, particularly those which use a shared interface like USB. Like a keylogger built into mouse, USB printer or even the keyboard itself. Give the same device a hidden keyboard "emulator" and you're fooked when said device, in the middle of the night, "wakes up" and uses IRC to check in with home base.



Printer Friendly | Permalink |  | Top
 
Occulus Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 09:52 PM
Response to Reply #19
27. To continue drawing your horrific picture, the computer then
sends a command to a bot on the IRC server to activate the direct-file function while the hidden program on the infected hardware begins creating .torrent files of specific locations from your hard drive. It also looks at the start menu and obtains file and data locations for your installed programs.

The hidden program on your computer happily creates and sends .torrent files, while at the same time running a barebones bittorrent client. It sends the .torrents to the IRC server bot, which then distributes them to wherever the software directs it to be sent. Those computers then begin downloading data from your computer.

Over time, your entire hard drive gets copied all over the world. All you do is plug in the receiver for that new wireless keyboard you bought. You never do anything else.

Isn't this fun!

:evilfrown:
Printer Friendly | Permalink |  | Top
 
Taverner Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 05:16 PM
Response to Original message
10. Lenovo anyone?
Any surprise that Lenovo laptops are banned in any secure rooms?
Printer Friendly | Permalink |  | Top
 
Johnny Harpo Donating Member (330 posts) Send PM | Profile | Ignore Fri Jul-08-11 05:27 PM
Response to Original message
13. Pre-Infected?...Oh No...Quick Call The CDC...LOL...n/t
Printer Friendly | Permalink |  | Top
 
2Design Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 05:59 PM
Response to Original message
15. Well this would be one way to get the jobs back here
Printer Friendly | Permalink |  | Top
 
alfredo Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 06:34 PM
Response to Reply #15
17. Now that foreign countries and corporations launder their political
money through the US Chamber of Commerce, it will never happen. Some Banker in the UAE can send in 50 grand, then later he can tell the Chamber that he sent in 50 grand and he wants them to donate from their general fund that money to the RNCC and the Tea Party Express. The Chamber can then casually tell those groups that such and such banker has been very generous and will be in contact in the future.
Printer Friendly | Permalink |  | Top
 
freshwest Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 10:21 PM
Response to Reply #17
31. Yup. And we'll never make these in the USA again, either, for that reason.
Printer Friendly | Permalink |  | Top
 
alfredo Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 10:53 PM
Response to Reply #31
34. If we accept near slave labor conditions they will come back.
Printer Friendly | Permalink |  | Top
 
freshwest Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-09-11 12:42 AM
Response to Reply #34
37. But who will we sell them to? Would slaves need to own a computer?
Printer Friendly | Permalink |  | Top
 
alfredo Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-09-11 06:07 AM
Response to Reply #37
41. South Asia and South America.
No, only their bosses will need computers. Why allow the lumpen access to information?
Printer Friendly | Permalink |  | Top
 
saras Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 06:55 PM
Response to Original message
18. Hard drives aren't the point. Chips are.
No matter what you do to the data on the hard drive, you can't do much if one of the chips on the hard-drive controller board has an extra bit of circuitry on the chip that either destroys or leaks unencrypted data after receiving a special command.

If the keylogger is inside the chip on your motherboard that appears to be a standard keyboard controller, what are the odds of you finding it? Or if the CPU in the cable modem the cable company gave you records and forwards data to a third party when activated?

It's easy to hide things that won't be found unless and until someone either

A. physically dismantles and disassembles the chip
or
B. has equipment actually fails on them

if the chip has to see 4K of special data to be activated, the odds of one going off by accident are close enough to zero to not worry about. By choosing the right chip and input, the special data is detected when it passes through the device in a normal manner.

Software isn't irrelevant, or immune, but so far easier to deal with. You CAN wipe all the software from a computer and replace it, even BIOS. But you can't replace all the chips.
Printer Friendly | Permalink |  | Top
 
Occulus Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 10:04 PM
Response to Reply #18
29. ^^^this^^^ n/t
Printer Friendly | Permalink |  | Top
 
Liberal Veteran Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 10:23 PM
Response to Reply #18
32. A good point. By outsourcing our chip fabrication we leave ourselves vulnerable.
Of course we have little evidence of any widespread infiltration, but it doesn't take much imagination to realize that they could easily insert something that would make stuxnet look like an unwelcome popup box.
Printer Friendly | Permalink |  | Top
 
quakerboy Donating Member (1000+ posts) Send PM | Profile | Ignore Sat Jul-09-11 01:29 AM
Response to Reply #32
38. To be completely, overly fair
Would you trust US companies to do any better? I mean, even at the production level, how many people there really understand each section of what they are making does? At a guess all you have to have is one designer paid to do it the companies way and you still have spyware built in.
Printer Friendly | Permalink |  | Top
 
BeFree Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Jul-08-11 11:40 PM
Response to Original message
35. Wow, read the whole thread
All I can say is thank gawd our votes aren't counted via computers.

Oh... wait....
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Thu Apr 25th 2024, 08:09 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Latest Breaking News Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC