Computer Chips are Hackable!

Is the New World Oder alive and well? Is there a conspiracy whereby all is known to the select few? Are our computers designed controlled by others to enable them to have access?
Is the New World Oder alive and well? Is there a conspiracy whereby all is known to the select few? Are our computers designed controlled by others to enable them to have access?

Backdoor Access to Chips: Nation-state Designed?

Are Nations-States Creating Computer Hackable Computer Chips?

Backdoor Access to Chips: Nation-state Designed?

Is the New World Order (NWO) alive and well? Is there a conspiracy whereby all is known to the select few? Are our computers designed and controlled by others to enable them to have access? Here are examples:

  • Two Cambridge experts have discovered a "back door" in a computer chip used in military systems and aircraft such as the Boeing 787 that could allow the chip to be taken over via the internet.
  • Deep inside millions of computers is a digital Fort Knox, a special chip with the locks to highly guarded secrets, including classified government reports and confidential business plans. Now a former U.S. Army computer security specialist has devised a way to break those locks.
  • Security researchers in the U.K. have released a paper describing the first real world detection of a backdoor in a microchip. This discovery is in a computer chip with an opening that could allow a malicious person monitor or change the information on the chip. The researchers, Sergi Skorobogatovof the University of Cambridge and Christopher Woods of Quo Vadis Labs, concluded that the vulnerability made it possible to reprogram the contents of supposedly secure memory and obtain information regarding the internal logic of the chip.

What is a Back Door?

A back door is an additional undocumented featured deliberately inserted into a device for extra functionality – in effect, a secret way to get into the computer chip and control it.

The hacker can can disable all the security on the chip, reprogram cryptographic and access keys … or permanently damage the device.

This chip the industry's most secure and are estimated to be in as many as 100 million personal computers and servers.

It is rumored the manufacturer knew this type of attack was possible when it was testing its chips. But the company said independent tests determined that the hack would require such a high skill level that there was a limited chance of it affecting many users. Was this the company’s decision, or were they told to install backdoor?

My concern is who is in charge? We are at risk of cyber-attacks on sensitive information. Moreover, our infrastructure may be manipulated for/by foreign powers, or terrorist.

Who is Responsible?

It is uncertain whom or what entities are creating these vulnerabilities. Could this be part of a Chinese state-sponsored sabotage attempt?


Are Computer Chips Designed to be Hacked?

More by this Author


Comments 8 comments

femmeflashpoint 4 years ago

Dallas,

The caption under the first photo asks if the New World Order is alive and well, and if there's a conspiracy in which the select few have access to everything ....

I gotta say yes, I believe the answer is "yes" to both.

Although it's not surprising, it's still very good information you've put in here.

I think the situation could have easily been the designing company being pressed, or even ordered and threatened, to install a back door in their chips.

femme


teaches12345 profile image

teaches12345 4 years ago

Interesting topic. I suppose that we have some type of chip in many things within our homes. There isn't really any privacy these days. It is alarming when you think about the potential for your innocent, private information to be hacked and used against you.


Michele Travis profile image

Michele Travis 4 years ago from U.S.A. Ohio

I agree with femmeflashpoint and teaches, it is just the way the world seems to be going now.


dallas93444 profile image

dallas93444 4 years ago from Bakersfield, CA Author

femmeflashpoint,

Perhaps the enigma is the "NWO" works because it works best unfettered by public knowledge and "interference..." As you know, my book, "Eyes Wide Shut: An Enigma" dances around this topic.... not admitting, nor denying the NWO existence.


dallas93444 profile image

dallas93444 4 years ago from Bakersfield, CA Author

teaches12345 ,

As noted in prior articles, our infrastructure is at risk... There is no central entity to detect, protect and eradicate the intrusions/control of our computers... both governmental and civilian.


dallas93444 profile image

dallas93444 4 years ago from Bakersfield, CA Author

Michele Travis,

"... it is just the way the world seems to be going now." This does not have to be. We can make a difference!


Michele Travis profile image

Michele Travis 4 years ago from U.S.A. Ohio

dallas, how can we make a difference? I have written about the NWO and Revelation and the bible. There seems, at least to me to be a connection. I know your book " dances around this topic" But I am sort of an idiot. I want answers now! lol, We do need to be together and work out how to help each other in order to protect, organize, and protect each other, but I have no idea how to do this.


dallas93444 profile image

dallas93444 4 years ago from Bakersfield, CA Author

Michele Travis,

Reminds me of the scientific method of solving a problem. They are:

1. State the Problem - A problem can't be solved if it isn't understood.

2. Form a Hypothesis - This is a possible solution to the problem formed after gathering information about the problem. The term "research" is properly applied here.

3. Test the Hypothesis - An experiment is performed to determine if the hypothesis solves the problem or not. Experiments are done to gather data. It is very important that good observations and records are made during an experiment.

4. Collect the Data - This is where you record your observations, measurements, or information from experiment.

5. Analyze the Data - Just what does all that data indicate about answering the problem you are solving?

6. Draw Conclusions - After examining the data from the experiment, conclusions can be drawn. In it's simplest form, the conclusion will be "yes" the hypothesis was correct, or "no" the hypothesis was not correct.

First, one must define the problem. The "Problem" is not understood, not known, and clearly not defined. The NWO is who/what? How does one determine valid facts? Who determines what is valid? What does "valid" mean? Who decides what the "problem" is? Until the needs are clearly defined, there will be no "consensus."

The "answers" are different for each of us. You must determine what your questions are, then the answers will be obvious! The answers are hidden in plain site.

Who benefits from NWO? Where does the money flow? Where does the ideology flow? An octopus has many arms, but ONE head...

    Sign in or sign up and post using a HubPages Network account.

    0 of 8192 characters used
    Post Comment

    No HTML is allowed in comments, but URLs will be hyperlinked. Comments are not for promoting your articles or other sites.


    Click to Rate This Article
    working