Steve Blank is a retired serial entrepreneur and has been a founder or participant in eight Silicon Valley startups since 1978. This article originally appeared on his blog.
In Russia, President Putin’s office just stopped using PCs and switched to typewriters. What do they know what we don’t?
Perhaps it’s Intel NSA inside.
For those of you who haven’t kept up, the National Security Agency (NSA’s) Prism program has been in the news. Prism provides the NSA with access to data on the servers of Microsoft, Google, Facebook, etc., extracting audio and video chats, photographs, e-mails, documents, etc.
AI Weekly
The must-read newsletter for AI and Big Data industry written by Khari Johnson, Kyle Wiggers, and Seth Colaner.
Included with VentureBeat Insider and VentureBeat VIP memberships.
Prism is just a part of the NSA’s larger mass electronic surveillance program that covers every possible path someone might use to communicate; tapping raw data as it flows through fiber optic cables and Internet peering points, copying the addressees on all letters you physically mail, all credit card purchases, your phone calls and your location (courtesy your smart phone.)
All hell broke loose when Edward Snowden leaked all this to press.
Given my talks on the Secret History of Silicon Valley, I was interviewed on NPR about the disclosure that the NSA said they had a new capability that tripled the amount of Skype video calls being collected through Prism. Like most Americans I said, “I didn’t remember getting the memo that the 4th Amendment to our Constitution had been cancelled.”
But while the interviewer focused on the Skype revelation, I thought the most interesting part was the other claim, “that the National Security Agency already had pre-encryption stage access to email on Outlook.”
Say what? They can see the plaintext on my computer before I encrypt it? That defeats any and all encryption methods. How could they do that?
Bypass encryption
While most outside observers think the NSA’s job is cracking encrypted messages, as the Prism disclosures have shown, the actual mission is simply to read all communications. Cracking codes is a last resort.
The NSA has a history of figuring out how to get to messages before or after they are encrypted. Whether it was by putting keyloggers on keyboards and recording the keystrokes or detecting the images of the characters as they were being drawn on a CRT.
Today every desktop and laptop computer has another way for the NSA to get inside.
Intel Inside
It’s inevitable that complex microprocessors have bugs in them when they ship. When the first microprocessors shipped the only thing you could hope is that the bug didn’t crash your computer. The only way the chip vendor could fix the problem was to physically revise the chip and put out a new version. But computer manufacturers and users were stuck if you had an old chip.
After a particularly embarrassing math bug in 1994 that cost Intel $475 million, the company decided to fix the problem by allowing its microprocessors to load fixes automatically when your computer starts.
Starting in 1996 with the Intel P6 (Pentium Pro) to today’s P7 chips (Core i7) these processors contain instructions that are reprogrammable in what is called microcode. Intel can fix bugs on the chips by reprogramming a microprocessors microcode with a patch. This patch, called a microcode update, can be loaded into a processor by using special CPU instructions reserved for this purpose. These updates are not permanent, which means each time you turn the computer on, its microprocessor is reset to its built-in microcode, and the update needs to be applied again (through a computer’s BIOS.).
Since 2000, Intel has put out 29 microcode updates to their processors. The microcode is distributed by 1) Intel or by 2) Microsoft integrated into a BIOS or 3) as part of a Windows update.
Unfortunately, the microcode update format is undocumented and the code is encrypted. This allows Intel to make sure that third parties can’t make unauthorized add-ons to their chips. But it also means that no one can look inside to understand the microcode, which makes it impossible to know whether anyone is loading a backdoor into your computer.
The dog that never barked
The NSA has been incredibly thorough in nailing down every possible way to tap into communications. Yet the one company’s name that hasn’t come up as part of the surveillance network is Intel. Perhaps they are the only good guys in the entire Orwellian mess.
Or perhaps the NSA, working with Intel and/or Microsoft, have wittingly have put backdoors in the microcode updates. A backdoor is is a way of gaining illegal remote access to a computer by getting around the normal security built-in to the computer. Typically someone trying to sneak malicious software on to a computer would try to install a rootkit (software that tries to conceal the malicious code.) A rootkit tries to hide itself and its code, but security-conscious sites can discover rootkits by tools that check kernel code and data for changes.
But what if you could use the configuration and state of microprocessor hardware in order to hide? You’d be invisible to all rootkit detection techniques that check the operating system. Or what if you can make the microprocessor random number generator (the basis of encryption) not so random for a particular machine? (The NSA’s biggest coup was inserting backdoors in crypto equipment the Swiss sold to other countries.)
Rather than risk getting caught messing with everyone’s updates, my bet is that the NSA has compromised the microcode update signing keys, giving the NSA the ability to selectively target specific computers. (Your operating system ensures security of updates by checking downloaded update packages against the signing key.) The NSA then can send out backdoors disguised as a Windows update for “security.” (Ironic but possible.)
That means you don’t need backdoors baked in the hardware, don’t need Intel’s buy-in, don’t have discoverable rootkits, and you can target specific systems without impacting the public at large.
Two can play the game
A few months ago these kind of discussions would have been theory at best, if not paranoia. The Prism disclosures prove otherwise: The National Security Agency has decided it needs the ability to capture all communications in all forms. Getting inside of a target computer and weakening its encryption or having access to the plaintext of encrypted communication seems likely. Given the technical sophistication of the other parts of their surveillance net, the surprise would be if they haven’t implemented a microcode backdoor.
The downside is that 1) backdoors can be hijacked by others with even worse intent (so if the NSA has a microcode backdoor, the question is, who else is using it?) and 2) What other pieces of our infrastructure, such as routers, smartphones, military computers, and satellites, also use processors with uploadable microcode?
And that may be why the Russian president is now using a typewriter rather than a personal computer.
VentureBeat's mission is to be a digital town square for technical decision-makers to gain knowledge about transformative enterprise technology and transact. Learn More