http://cryptome.info/0001/manchu-chip.htm 

18 October 2008. Thanks to Robert Eringer. 

  _____  



And now the Manchurian microchip 


Robert Eringer 

October 18, 2008 7:13 AM 

The geniuses at Homeland Security who brought you hare-brained procedures at
airports (which inconvenience travelers without snagging terrorists) have
decreed that October is National Cyber Security Awareness Month. This means
The Investigator -- at the risk of compromising national insecurities --
would be remiss not to make you aware of the hottest topic in U.S.
counterintelligence circles: rogue microchips. This threat emanates from
China (PRC) -- and it is hugely significant.

The myth: Chinese intelligence services have concealed a microchip in every
computer everywhere, programmed to "call home" if and when activated.

The reality: It may actually be true.

All computers on the market today -- be they Dell, Toshiba, Sony, Apple or
especially IBM -- are assembled with components manufactured inside the PRC.
Each component produced by the Chinese, according to a reliable source
within the intelligence community, is secretly equipped with a hidden
microchip that can be activated any time by China's military intelligence
services, the PLA.

"It is there, deep inside your computer, if they decide to call it up," the
security chief of a multinational corporation told The Investigator. "It is
capable of providing Chinese intelligence with everything stored on your
system -- on everyone's system -- from e-mail to documents. I call it Call
Home Technology. It doesn't mean to say they're sucking data from everyone's
computer today, it means the Chinese think ahead -- and they now have the
potential to do it when it suits their purposes."

Discussed theoretically in high-tech security circles as "Trojan Horse on a
Chip" or "The Manchurian Chip," Call Home Technology came to light after the
Defense Advanced Research Projects Agency (DARPA) launched a security
program in December 2007 called Trust in Integrated Circuits. DARPA awarded
almost $25 million in contracts to six companies and university research
labs to test foreign-made microchips for hardware Trojans, back doors and
kill switches -- techie-speak for bugs and gremlins -- with a view toward
microchip verification.

Raytheon, a defense contractor, was granted almost half of these funds for
hardware and software testing.

Its findings, which are classified, have apparently sent shockwaves through
the counterintelligence community.

"It is the hottest topic concerning the FBI and the Pentagon," a retired
intelligence official told The Investigator. "They don't know quite what to
do about it. The Chinese have even been able to hack into the computer
system that handles our Intercontinental Ballistic Missile system."

Another senior intelligence source told The Investigator, "Our military is
aware of this and has had to take some protective measures. The problem
includes defective chips that don't reach military specs -- as well as
probable Trojans."

A little context: In 2005 the Lenovo Group in China paid $1.75 billion for
IBM's PC unit, even though that unit had lost $965 million the previous four
years. Three congressmen, including the chairman of the House Armed Services
Committee, tried to block this sale because of national security concerns,
to no avail. (The PRC embassy in Washington, D.C., maintains a large
lobbying presence to influence congressmen and their staffs through direct
contact.)

In June 2007, a Pentagon computer network utilized by the U.S. defense
secretary's office was hacked into -- and traced directly back to the
Chinese PLA.

A report presented to Congress late last year characterized PRC espionage as
"the single greatest risk to the security of American technologies." Almost
simultaneously, Jonathan Evans, director-general of MI5, Britain's domestic
security and counterintelligence service, sent a confidential letter to CEOs
and security chiefs at 300 UK companies to warn that they were under attack
by "Chinese state organizations" whose purpose, said Mr. Evans, was to
defeat their computer security systems and steal confidential commercial
information.

The Chinese had specifically targeted Rolls-Royce and Shell Oil.

The key to unlocking computer secrets through rogue microchips is uncovering
(or stealing) source codes, without which such microchips would be useless.
This is why Chinese espionage is so heavily focused upon the U.S. computer
industry.

Four main computer operating systems exist. Two of them, Unix and Linux,
utilize open-source codes. Apple's operating system is Unix-based.

Which leaves only Microsoft as the source code worth cracking. But in early
2004, Microsoft announced that its security had been breached and that its
source code was "lost or stolen."

"As technology evolves, each new program has a new source code," a computer
forensics expert told The Investigator. "So the Chinese would need ongoing
access to new Microsoft source codes for maintaining their ability to
activate any microchips they may have installed, along with the expertise to
utilize new hardware technology."

No surprise then that the FBI expends much of its counterintelligence
resources these days on Chinese high-tech espionage within the United
States. Timothy Bereznay, while still serving as assistant director of the
FBI's Counterintelligence Division, told USA Today, "Foreign collectors
don't wait until something is classified -- they're targeting it at the
research and development stage." Mr. Bereznay now heads Raytheon's
Intelligence and Information Systems division.

The PRC's intelligence services use tourists, exchange students and trade
show attendees to gather strategic data, mostly from open sources. They have
also created over 3,500 front companies in the United States -- including
several based in Palo Alto to focus on computer technology.

Back in 2005, when the Chinese espionage problem was thought to be focused
on military technology, then-FBI counterintelligence operations chief Dave
Szady said, "I think the problem is huge, and it's something we're just
getting our arms around." Little did he know just how huge, as it currently
applies to computer network security.

The FBI is reported to have arrested more than 25 Chinese nationals and
Chinese-Americans on suspicion of conspiracy to commit espionage between
2004 and 2006. The Investigator endeavored to update this figure, but was
told by FBI spokesman William Carter, "We do not track cases by ethnicity."

Excuse us for asking. We may be losing secrets, but at least the dignity of
our political correctness remains intact.

Oh, and Homeland Security snagged comic icon Jerry Lewis, 82, trying to
board a plane in Las Vegas with a gun -- no joke.

If you have a story idea for The Investigator, contact him at
[EMAIL PROTECTED] State if your query is confidential. 

  _____  

 

 

 

*** exposing the hidden truth for further educational research only ***
CAVEAT LECTOR ***

In accordance with Title 17 U.S.C. Section 107, this material is distributed
without profit to those who have expressed a prior interest in receiving the
included information for research and educational purposes. NOTE: Some links
may require cut and paste into your Internet Browser.

Please check  <http://tinyurl.com/33c9yr> http://tinyurl.com/33c9yr
<http://groups.google.com/group/total_truth_sciences/topics?gvc=2>
http://groups.google.com/group/total_truth_sciences/topics?gvc=2  for more
real news posts and support the truth! (sorry but don't have time to email
all posts)

free book download:   <http://www.lulu.com/content/165077>
http://www.lulu.com/content/165077 or
http://www.lulu.com/items/volume_63/165000/165077/21/print/165077.pdf  

 <http://blogs.albawaba.com/alexanderjames>
http://blogs.albawaba.com/alexanderjames
http://blogs.albawaba.com/Alexanderjames/page/links
http://bb.domaindlx.com/alexjames999  

*** Revealing the hidden Truth For Educational & Further Research Purposes
only. *** Welcome to Real News Edited excerpts, non-partisan,
pro-truth-honesty-peace, and anti-war-lies-crime. The purpose is to expose
corruptions, frauds, deceptions, lies, criminal plans, cover-ups and
free-speech silencing by powerful people in governments, foundations,
corporations and media, which are done using the name of democracy, human
rights, false interpretations of religions, cults, occults, patriotism,
economy, business, media, elections, justice, charity, etc., and are used to
trick the public into hatred & wars and out of their lives, money and
freedoms, while the propaganda we are subjected to makes us believe that we
have evolved to where such things cannot happen [remember slavery,
apartheid.]. Please share what you learn with others who do not have access
to the internet. This is only a tip of the iceberg. Stop the hatred that is
used to promote the dehumanization of the victims of predatory
aggressions;spread the truth;free your mind from being a Zioncon occupied
territory of the neo-feudal lords by rejecting the mainstream news
propaganda. Caution: real news may induce a kind of schizophrenia because it
provides a true vision of reality which is so different from the one we are
presented by the mass media spins. Latest real infonews available at
alternate news. ***** Check whatreallyhappened.com, inforwars.com, whtt.org,
savethemales.ca  & other alternative news sites for latest news flashes. In
Truth We Trust! The opinions expressed herein contain positions and
viewpoints that are not necessarily those of the recipient, disseminator or
others mentioned in the information. These are offered as a means to
stimulate dialogue and discussion.

NOTICE: Due to Presidential Executive Orders, the National Security Agency
(NSA) may have read emails without warning, warrant, or notice. They may do
this without any judicial or legislative oversight. You have no recourse,
nor protection.......... IF anyone other than the addressee of this e-mail
is reading it, you are in violation of the 1st & 4th Amendments to the
Constitution of the United States. Patriot Act 5 & H.R. 1955 Disclaimer
Notice: This post & all my past & future posts represent parody & satire &
are all intended for entertainment and amusement only.

To be removed from the list, please reply with the subject line "REMOVE"

To receive email at another address, please reply with subject line "CHANGE"

To receive email, please reply  with "WEEKLY"

 

 


--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"total_truth_sciences" group.
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/total_truth_sciences
-~----------~----~----~----~------~----~------~--~---

Reply via email to