When Prime Minister David Cameron ordered two GCHQ spooks to go the the Guardian's offices and ritually exorcise two laptops that had held copies of the Snowden leaks, we assumed it was just spook-lunacy; but Privacy International thinks that if you look at which components the spies targeted for destruction, there are hints about ways that spies can control computer hardware.
We examined all the destroyed components, and while much was destroyed, our intial investigation will look to find out more about the following components targeted by GCHQ:
- keyboard controller chip
- trackpad controller chip
- inverting converter chip
Below, the left image shows a keyboard controller board intact while the right image is the destroyed component provided by the Guardian. From our analysis, we believe the targeted component of the keyboard is the keyboard encoder responsible for communicating over the USB and interpreting key presses on its various I/O pins. We believe this component, under the black covering in the image below, is similar in function to the chip described here.
What does GCHQ know about our devices that we don't? [Dr Richard Tynan, Mustafa Al-Bassam/Privacy International]
The Isis River, which flows through the English university city of Oxford, has inspired many place names that include “Isis,” including “Isis Close.”
The agency says that the angle of the sunlight that strikes its tracks creates glare that blinds the CCTVs that train-drivers use to ensure that the platform is clear before pulling out of the station.
Jonathan Mathew is one of the bankers at Barclays who participated in the Libor rigging fraud, which cost people all over the world trillions of dollars in higher payments on mortgages, government bonds, student loans, and other assets totalling $350 trillion.
Jared Sinclair developed the RSS reader app Unread, which made $10,000 in its first 24 hours on the iOS market. And we’ve all heard the story of Flappy Bird developer Dong Nguyen, whose creation was reportedly earning $50,000 a day at the height of its 2013 explosion. While those are rare examples, they’re also testament to the […]
If you or your company’s IT system are besieged by black hat cyber attacks, an ethical hacker might be all that stands between crippling damage and a company’s long-term prosperity. It’s no wonder that the market for IT security specialists is exploding. Certification is the key – so learn the tenets of ethical hacking and get […]
Your laptop and mobile devices are top of the line…so why are you trotting out that raggedy decades-old suitcase when you go somewhere? Time to up your travel game with a complete 5-piece Herschel Travel Luggage bundle…and we’ll even give it to you for free!Of course, you’ve got to win the Ultimate Herschel Travel Bundle […]