What's new

Something wrong with our **** chips today

ANG

FULL MEMBER
Joined
Mar 15, 2009
Messages
766
Reaction score
0
Country
Azerbaijan
Location
Azerbaijan
Hi, this was very interesting article in the Economist. Kindly please pay special attention to the bottom part of the article. Not to digress, but notice how careful Pakistan is with its nuke program, and why they have not been in the situation that Iran is with the Stuntex virus.

High-tech warfare: Something wrong with our **** chips today | The Economist

However, the purpose of this post is to wonder if the new F-16s Block50/52 and upgraded MLUed F-16s have this potential fatal flaw in them of “kill switches”. I know this has been debated before, but this is the first time I have read an article that specifically mentions this point.

I wanted to know if Pakistan has the capacity to fabricate its own chips and circuits? I also hope the JF-17 chips come from China.

/*********************************************/
Something wrong with our **** chips today
Kill switches are changing the conduct and politics of war
Apr 7th 2011 | from the print edition

IN THE 1991 Gulf war Iraq’s armed forces used American-made colour photocopiers to produce their battle plans. That was a mistake. The circuitry in some of them contained concealed transmitters that revealed their position to American electronic-warfare aircraft, making bomb and missile strikes more precise. The operation, described by David Lindahl, a specialist at the Swedish Defence Research Agency, a government think-tank, highlights a secret front in high-tech warfare: turning enemy assets into liabilities.

The internet and the growing complexity of electronic circuitry have made it much easier to install what are known as “kill switches” and “back doors”, which may disable, betray or blow up the devices in which they are installed. Chips can easily contain 2 billion transistors, leaving plenty of scope to design a few that operate secretly. Testing even a handful of them for anomalies requires weeks of work.

Kill switches and other remote controls are on the minds of Western governments pondering whether to send weapons such as sophisticated anti-tank missiles, normally tightly policed, to rebels in Libya. Keeping tabs on when and where they are fired will allay fears that they could end up in terrorist hands. Such efforts would not even need to be kept secret. A former CIA official says the rebels could be told: “Look, we’re going to give you this, but we want to be able to control it.”

That lesson was first learned in Afghanistan in the 1980s, when America supplied Stinger missiles to help Afghan fighters against Soviet helicopter gunships, only to have to comb the region’s arms bazaars in later years to buy them back (some were then booby-trapped and sold again, to deter anyone tempted to use them).

America worries about becoming the victim of kill switches itself. Six years ago a report by America’s Defence Science Board, an official advisory body, said “unauthorised design inclusions” in foreign-made chips could help an outside power gain a measure of control over critical American hardware.

Chips off the home block

In response, America has launched schemes such as the Trusted Foundry Programme, which certifies “secure, domestic” facilities for the manufacture of the most critical microchips. The Defence Advanced Research Projects Agency (DARPA), a Pentagon outfit devoted to expanding the military’s technological abilities, will spend at least $20m this year on ways to identify rogue microchips. The Army Research Office is holding a closed conference on kill switches in mid-April.

Farinaz Koushanfar, a DARPA-funded expert at Texas’s Rice University, says microchip designers would like to be able to switch off their products “in the wild”, in case the contractors that make the chips produce some extra ones to sell on the sly. She designs “active hardware metering” chips that, in devices connected to the internet, can remotely identify them and if necessary switch them off.

An obvious countermeasure is to keep critical defence equipment off the net. But that is only a partial solution. Chips can be designed to break down at a certain date. An innocent-looking component or even a bit of soldering can be a disguised antenna. When it receives the right radio signal, from, say, a mobile-phone network, aircraft or satellite, the device may blow up, shut down, or work differently.

Old-fashioned spying can reveal technological weaknesses too. Mr Lindahl says Sweden obtained detailed information on circuitry in a heat-seeking missile that at least one potential adversary might, in wartime, shoot at one of its eight C-130 Hercules military-transport planes. A slight but precise change in the ejection tempo of the decoy flares would direct those missiles towards the flame, not the aircraft.

Such tricks may be handy in dealing with unreliable allies as well as foes, but they can also hamper Western efforts to contain risk in unstable countries. Pakistan has blocked American efforts to safeguard its nuclear facilities. The country’s former ambassador to the United Nations, Munir Akram, cites fears that such measures will include secret remote controls to shut the nuclear programme down. A European defence official says even video surveillance cameras can intercept or disrupt communications. To avoid such threats, Pakistani engineers laboriously disassemble foreign components and replicate them.

Wesley Clark, a retired general who once headed NATO’s forces, says that “rampant” fears of kill switches make American-backed defence co-operation agreements a harder sell. David Kay, a notable United Nations weapons inspector in Iraq, bemoans “scepticism and paranoia”. You just can’t trust anybody these days, even in the weapons business.

from the print edition | International
/*********************************************/
 
.
On chip programming is abundantly done in India,both in ,military and civilian spheres. I hope Pakistan can do it aswell.
An electronics geek will define it in detail,but a chip is more of a small solid state memory with a small peogram stored in it. Or it may be a processor plus memory. Its not the chip itself which will be the 'kill switch' it will be the program inside.
In case of jf-17 Pakistan opted to do all the programming in the widely used and understood 'C' language instead of the specialized language used in military hardware. For that reason,the source code on any chips inside jf-17 can be verified line by line and any milacious software embedded can be sussed out.
 
.
about stuntex,it workd on semens scada under microsoft widows shell. Even pakistan's civilian companies are wise enough to take measures to avoid this. For example ufone uses all equipment from semens but the system is controlled via sun solaris not ms windows,and stuntex doesnt work on sun solaris. Rest assured,Pakistan military admins are careful,they may have their own bespoke versions of linux/Unix on which few or none of the known viruses will work and Pakistan wont find itself in same situation as Iran.
 
.
Hi, this was very interesting article in the Economist. Kindly please pay special attention to the bottom part of the article. Not to digress, but notice how careful Pakistan is with its nuke program, and why they have not been in the situation that Iran is with the Stuntex virus.

High-tech warfare: Something wrong with our **** chips today | The Economist

However, the purpose of this post is to wonder if the new F-16s Block50/52 and upgraded MLUed F-16s have this potential fatal flaw in them of “kill switches”. I know this has been debated before, but this is the first time I have read an article that specifically mentions this point.

I wanted to know if Pakistan has the capacity to fabricate its own chips and circuits? I also hope the JF-17 chips come from China.

/*********************************************/
Something wrong with our **** chips today
Kill switches are changing the conduct and politics of war
Apr 7th 2011 | from the print edition

IN THE 1991 Gulf war Iraq’s armed forces used American-made colour photocopiers to produce their battle plans. That was a mistake. The circuitry in some of them contained concealed transmitters that revealed their position to American electronic-warfare aircraft, making bomb and missile strikes more precise. The operation, described by David Lindahl, a specialist at the Swedish Defence Research Agency, a government think-tank, highlights a secret front in high-tech warfare: turning enemy assets into liabilities.

The internet and the growing complexity of electronic circuitry have made it much easier to install what are known as “kill switches” and “back doors”, which may disable, betray or blow up the devices in which they are installed. Chips can easily contain 2 billion transistors, leaving plenty of scope to design a few that operate secretly. Testing even a handful of them for anomalies requires weeks of work.

Kill switches and other remote controls are on the minds of Western governments pondering whether to send weapons such as sophisticated anti-tank missiles, normally tightly policed, to rebels in Libya. Keeping tabs on when and where they are fired will allay fears that they could end up in terrorist hands. Such efforts would not even need to be kept secret. A former CIA official says the rebels could be told: “Look, we’re going to give you this, but we want to be able to control it.”

That lesson was first learned in Afghanistan in the 1980s, when America supplied Stinger missiles to help Afghan fighters against Soviet helicopter gunships, only to have to comb the region’s arms bazaars in later years to buy them back (some were then booby-trapped and sold again, to deter anyone tempted to use them).

America worries about becoming the victim of kill switches itself. Six years ago a report by America’s Defence Science Board, an official advisory body, said “unauthorised design inclusions” in foreign-made chips could help an outside power gain a measure of control over critical American hardware.

Chips off the home block

In response, America has launched schemes such as the Trusted Foundry Programme, which certifies “secure, domestic” facilities for the manufacture of the most critical microchips. The Defence Advanced Research Projects Agency (DARPA), a Pentagon outfit devoted to expanding the military’s technological abilities, will spend at least $20m this year on ways to identify rogue microchips. The Army Research Office is holding a closed conference on kill switches in mid-April.

Farinaz Koushanfar, a DARPA-funded expert at Texas’s Rice University, says microchip designers would like to be able to switch off their products “in the wild”, in case the contractors that make the chips produce some extra ones to sell on the sly. She designs “active hardware metering” chips that, in devices connected to the internet, can remotely identify them and if necessary switch them off.

An obvious countermeasure is to keep critical defence equipment off the net. But that is only a partial solution. Chips can be designed to break down at a certain date. An innocent-looking component or even a bit of soldering can be a disguised antenna. When it receives the right radio signal, from, say, a mobile-phone network, aircraft or satellite, the device may blow up, shut down, or work differently.

Old-fashioned spying can reveal technological weaknesses too. Mr Lindahl says Sweden obtained detailed information on circuitry in a heat-seeking missile that at least one potential adversary might, in wartime, shoot at one of its eight C-130 Hercules military-transport planes. A slight but precise change in the ejection tempo of the decoy flares would direct those missiles towards the flame, not the aircraft.

Such tricks may be handy in dealing with unreliable allies as well as foes, but they can also hamper Western efforts to contain risk in unstable countries. Pakistan has blocked American efforts to safeguard its nuclear facilities. The country’s former ambassador to the United Nations, Munir Akram, cites fears that such measures will include secret remote controls to shut the nuclear programme down. A European defence official says even video surveillance cameras can intercept or disrupt communications. To avoid such threats, Pakistani engineers laboriously disassemble foreign components and replicate them.

Wesley Clark, a retired general who once headed NATO’s forces, says that “rampant” fears of kill switches make American-backed defence co-operation agreements a harder sell. David Kay, a notable United Nations weapons inspector in Iraq, bemoans “scepticism and paranoia”. You just can’t trust anybody these days, even in the weapons business.

from the print edition | International
/*********************************************/

Physically manufacturing is not possible for pakistan not even in 15-20 years.

It takes investment of US$ 3-4 billion to build a foundry. Today even India don't have one we are building 2 foundries in India for the future.
 
.
^^ ISI ans RAW should send a joint venture to Taiwan . They are one of the world leaders in chip manufacturing ;)
 
.
“scepticism and paranoia”. nuff said!!!
 
.
^^ did you know that apple iphone has been recently found to have a hidden software which transmits users current location to the company without user's knowledge? Incorporating simillar capability in a multibillion dollar defence project is very much possible?
There was an invident when chinese presidential jet was sent to Boeing for repairs and came back with micro bugs. The chinese found out .

These things do happen in real life,not just paranoia.
 
.
^^ did you know that apple iphone has been recently found to have a hidden software which transmits users current location to the company without user's knowledge? Incorporating simillar capability in a multibillion dollar defence project is very much possible?
There was an invident when chinese presidential jet was sent to Boeing for repairs and came back with micro bugs. The chinese found out .

These things do happen in real life,not just paranoia.

Bro... u r 200% right our all hardware coming from US is bugged ..without any doubt...A fool can only trust US or NATO....:azn:
smart pplz never trust anybody...not even their wives ...:lol:
so howcome we should trust US...who is full of brutality and treachory....and threatened/tried to send us to stone age...:what:
do u still or US believes we gonna trust them...impossible..man...impossible.....personally speaking ..I wont....:coffee:
The pplz in the Pakistan/world who trust US are living in the fools paradise...:woot:
 
.
Ofcourse this is how intelligence agencies work. If any one remembers they even bugged the Chinese president's plane back in 2002

BBC News | ASIA-PACIFIC | Chinese leader's plane 'bugged'

Chinese intelligence officials are reported to have discovered more than 20 spying devices in a Boeing 767 purchased from the United States for use by President Jiang Zemin
 
.
Ofcourse this is how intelligence agencies work. If any one remembers they even bugged the Chinese president's plane back in 2002

BBC News | ASIA-PACIFIC | Chinese leader's plane 'bugged'

Chinese intelligence officials are reported to have discovered more than 20 spying devices in a Boeing 767 purchased from the United States for use by President Jiang Zemin


Hi,

What they discovered was intended to be discovered----just to shake up the chinese----the problem lies with what the americans didnot want to be discovered.
 
.
Pakistan manufactures IC that is known as integrated circuits. my brother work in such a company but i can't disclose its name. and there is one more thing that there is a company in Pakistan who is involved in design and manufacturing of chips for Intel, and i have seen that room where they fabricate microchips with EUV lithography.
 
.
No surprises here.
Israel always replaces a lot of systems from the aircraft it receives from the US, esp the F-16s and F-15s, with its own. This has always been a source of contention between the US and Israel.

Kill switch maybe a bit far fetched, but compromising critical flight information is nothing new.
 
.
Back
Top Bottom