https://www.privacyinternational.org/blog/what-does-gchq-know-about-our-devices-that-we-dont?print=yes

> What does GCHQ know about our devices that we don't?
> 
> Share:
> 
>      
> By: 
> Dr Richard Tynan
> on: 
> 22-May-2014
> 
> While the initial disclosures by Edward Snowden revealed how US authorities 
> are conducting mass surveillance on the world's communications, further 
> reporting by the Guardian newspaper uncovered that UK intelligence services 
> were just as involved in this global spying apparatus. Faced with the 
> prospect of further public scrutiny and accountability, the UK Government 
> gave the Guardian newspaper an ultimatum: hand over the classified documents 
> or destroy them.
>  
> The Guardian decided that having the documents destroyed was the best option. 
> By getting rid of only the documents stored on computers in the UK, it would 
> allow Guardian journalists to continue their work from other locations while 
> acquiescing to the Government's demand. However, rather than trust that the 
> Guardian would destroy the information on their computers to the Government's 
> satisfaction, GCHQ sent two representatives to supervise the operation. 
> Typically, reliable destruction of such hardware in the circumstances would 
> be to shred or melt all electronic components using a much larger version of 
> the common paper shredder and leaving only the dust of the original devices. 
> Indeed, some devices such as external USB sticks were turned to dust.
>  
> Alternatively, it might have been expected that GCHQ would solely target the 
> hard drives of the devices in question. The hard drives, after all, are one 
> of the few components of a computer where user data is supposed to be 
> retained after the power to the device is removed. 
>  
> Surprisingly, however, GCHQ were not just interested in hard drives nor did 
> they destroy whole devices. An examination of the targeted hardware by 
> Privacy International, with cooperation from the Guardian, has found the 
> whole episode to be more troubling and puzzling than previously believed. 1
>  
> During our invesitgation, we were surprised to learn that a few very specific 
> components on devices, such as the keyboard, trackpad and monitor, were 
> targeted along with apparently trivial chips on the main boards of laptops 
> and desktops. Initial consultation with members of the technology community 
> supported our identification of the components and that the actions of GCHQ 
> were worth analyzing further.
>  
> In light of GCHQ's actions, we have asked hardware manufacturers to explain 
> what these elements actually do: what information can be stored on a device, 
> how much information it can retain, and for how long. 

> What was targeted?
>  
> We examined all the destroyed components, and while much was destroyed, our 
> intial investigation will look to find out more about the following 
> components targeted by GCHQ:
>     
>     - keyboard controller chip
>     - trackpad controller chip
>     - inverting converter chip
>  

.... Detailed images of destroyed chips.

> We will continue to explore the rest of the chips destroyed by GCHQ. We 
> welcome any thoughts from individuals who have an understanding of these 
> components and what their storage capabilities are, and for what purposes. We 
> hope to achieve some much needed transparency about what our devices do and 
> how the unseen components on the inside might betray our privacy.
> 

-- 
Kim Holburn
IT Network & Security Consultant
T: +61 2 61402408  M: +61 404072753
mailto:[email protected]  aim://kimholburn
skype://kholburn - PGP Public Key on request 




_______________________________________________
Link mailing list
[email protected]
http://mailman.anu.edu.au/mailman/listinfo/link

Reply via email to