ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Computer Chips are Hackable!

Updated on August 27, 2012
Is the New World Oder alive and well? Is there a conspiracy whereby all is known to the select few? Are our computers designed controlled by others to enable them to have access?
Is the New World Oder alive and well? Is there a conspiracy whereby all is known to the select few? Are our computers designed controlled by others to enable them to have access?

Backdoor Access to Chips: Nation-state Designed?

Are Nations-States Creating Computer Hackable Computer Chips?

Backdoor Access to Chips: Nation-state Designed?

Is the New World Order (NWO) alive and well? Is there a conspiracy whereby all is known to the select few? Are our computers designed and controlled by others to enable them to have access? Here are examples:

  • Two Cambridge experts have discovered a "back door" in a computer chip used in military systems and aircraft such as the Boeing 787 that could allow the chip to be taken over via the internet.
  • Deep inside millions of computers is a digital Fort Knox, a special chip with the locks to highly guarded secrets, including classified government reports and confidential business plans. Now a former U.S. Army computer security specialist has devised a way to break those locks.
  • Security researchers in the U.K. have released a paper describing the first real world detection of a backdoor in a microchip. This discovery is in a computer chip with an opening that could allow a malicious person monitor or change the information on the chip. The researchers, Sergi Skorobogatovof the University of Cambridge and Christopher Woods of Quo Vadis Labs, concluded that the vulnerability made it possible to reprogram the contents of supposedly secure memory and obtain information regarding the internal logic of the chip.

What is a Back Door?

A back door is an additional undocumented featured deliberately inserted into a device for extra functionality – in effect, a secret way to get into the computer chip and control it.

The hacker can can disable all the security on the chip, reprogram cryptographic and access keys … or permanently damage the device.

This chip the industry's most secure and are estimated to be in as many as 100 million personal computers and servers.

It is rumored the manufacturer knew this type of attack was possible when it was testing its chips. But the company said independent tests determined that the hack would require such a high skill level that there was a limited chance of it affecting many users. Was this the company’s decision, or were they told to install backdoor?

My concern is who is in charge? We are at risk of cyber-attacks on sensitive information. Moreover, our infrastructure may be manipulated for/by foreign powers, or terrorist.

Who is Responsible?

It is uncertain whom or what entities are creating these vulnerabilities. Could this be part of a Chinese state-sponsored sabotage attempt?


Are Computer Chips Designed to be Hacked?

Comments

    0 of 8192 characters used
    Post Comment

    • dallas93444 profile imageAUTHOR

      Dallas W Thompson 

      6 years ago from Bakersfield, CA

      Michele Travis,

      Reminds me of the scientific method of solving a problem. They are:

      1. State the Problem - A problem can't be solved if it isn't understood.

      2. Form a Hypothesis - This is a possible solution to the problem formed after gathering information about the problem. The term "research" is properly applied here.

      3. Test the Hypothesis - An experiment is performed to determine if the hypothesis solves the problem or not. Experiments are done to gather data. It is very important that good observations and records are made during an experiment.

      4. Collect the Data - This is where you record your observations, measurements, or information from experiment.

      5. Analyze the Data - Just what does all that data indicate about answering the problem you are solving?

      6. Draw Conclusions - After examining the data from the experiment, conclusions can be drawn. In it's simplest form, the conclusion will be "yes" the hypothesis was correct, or "no" the hypothesis was not correct.

      First, one must define the problem. The "Problem" is not understood, not known, and clearly not defined. The NWO is who/what? How does one determine valid facts? Who determines what is valid? What does "valid" mean? Who decides what the "problem" is? Until the needs are clearly defined, there will be no "consensus."

      The "answers" are different for each of us. You must determine what your questions are, then the answers will be obvious! The answers are hidden in plain site.

      Who benefits from NWO? Where does the money flow? Where does the ideology flow? An octopus has many arms, but ONE head...

    • Michele Travis profile image

      Michele Travis 

      6 years ago from U.S.A. Ohio

      dallas, how can we make a difference? I have written about the NWO and Revelation and the bible. There seems, at least to me to be a connection. I know your book " dances around this topic" But I am sort of an idiot. I want answers now! lol, We do need to be together and work out how to help each other in order to protect, organize, and protect each other, but I have no idea how to do this.

    • dallas93444 profile imageAUTHOR

      Dallas W Thompson 

      6 years ago from Bakersfield, CA

      Michele Travis,

      "... it is just the way the world seems to be going now." This does not have to be. We can make a difference!

    • dallas93444 profile imageAUTHOR

      Dallas W Thompson 

      6 years ago from Bakersfield, CA

      teaches12345 ,

      As noted in prior articles, our infrastructure is at risk... There is no central entity to detect, protect and eradicate the intrusions/control of our computers... both governmental and civilian.

    • dallas93444 profile imageAUTHOR

      Dallas W Thompson 

      6 years ago from Bakersfield, CA

      femmeflashpoint,

      Perhaps the enigma is the "NWO" works because it works best unfettered by public knowledge and "interference..." As you know, my book, "Eyes Wide Shut: An Enigma" dances around this topic.... not admitting, nor denying the NWO existence.

    • Michele Travis profile image

      Michele Travis 

      6 years ago from U.S.A. Ohio

      I agree with femmeflashpoint and teaches, it is just the way the world seems to be going now.

    • teaches12345 profile image

      Dianna Mendez 

      6 years ago

      Interesting topic. I suppose that we have some type of chip in many things within our homes. There isn't really any privacy these days. It is alarming when you think about the potential for your innocent, private information to be hacked and used against you.

    • profile image

      femmeflashpoint 

      6 years ago

      Dallas,

      The caption under the first photo asks if the New World Order is alive and well, and if there's a conspiracy in which the select few have access to everything ....

      I gotta say yes, I believe the answer is "yes" to both.

      Although it's not surprising, it's still very good information you've put in here.

      I think the situation could have easily been the designing company being pressed, or even ordered and threatened, to install a back door in their chips.

      femme

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)