Embedded Operatives Turn All Of Our Devices Into Spy Devices

The discovery that a Chinese supplier for Supermicro - a U.S. company - had planted nearly invisible spy devices on computer boards ordered by SuperMicro, should come as no surprise to any competent Cybersecurity professional. Spies operating on behalf of Nation States have been using hardware and software hacks to infiltrate intelligence networks of other Nation States for more than 25 years. More recently, Nation States have been hacking products with the intent of spying on it's own citizens. Their means of choice for these hacks is to plant technologists within software and hardware companies as “Embedded Operatives”. Nothing could be easier.

Technology companies are generally starved for competent technologists and a talented applicant for a job opening is seldom turned away. It is no secret that there is a high probability that every major technology corporation is employing at least one, and more probably, dozens of these embedded operatives. Over time, as these operatives become trusted, they migrate into positions of authority or control to an extent that the hardware or software produced by these companies can be subtly modified without detection. No amount of oversight or monitoring can prevent this problem if the embedded operatives are clever enough, especially if they have arranged to work jointly on specific functions of the product. Discovery of these hacks is largely accidental, as occurred with SuperMicro.

It should also be no surprise that China should be the source of this accidental discovery. China manufactures 75% of the world's smart phones and more than 90% of the world's computers. Statistically, it would be a surprise if the first major discovery of this nearly universal hardware problem had been traced to the U.S., Russia or Europe.

In the area of software, this hacking problem is magnified by a number of issues. Software hacks are virtually invisible, and the complexity of software - orders of magnitude greater than hardware components - allows for greater flexibility in choosing means of insertion and access. It is a sticky problem.

Do not think that this is an isolated example. The chances of discovery of this hardware hack were unbelievably low. The problem went for years undetected before, by near accident it was discovered. Common sense should tell us, given the utter simplicity of inserting embedded operatives into technology companies, that virtually every electronic product that we use is most likely a spy device: built by a foreign nation, by our own government, by cartels, etc.

The irony in all this is that the hardware provided by China to a U.S. company was most certainly used by the U S. government at some point, with added software, as an attempted means of spying on China, and other countries. The twisted nature of this world predicament, will, I predict, reveal itself at an accelerating rate. It should be fun to watch.

John McAfee
John McAfee
John McAfee is a world reknown computer scientist, activist, business leader and cryptocurrency evangelist. McAfee’s career spans nearly the entire history of computing, with McAfee working for industry giants like Xerox, NASA, Univac and Lockheed Martin. In 1987 he founded McAfee Antivirus, and under his leadership the company executed a meteoric rise to the top of the computer security industry.

Always at the cutting edge, McAfee now applies his passion, energy and vision to evangelizing blockchain and cryptocurrency adoption. Speaking to a massive audience, McAfee’s tweets have earned the reputation of moving entire markets. McAfee uses this reach to encourage individuals to look beyond investing at all of the positive social change made possible by the blockchain.

A lifelong advocate of personal freedom, McAfee has been a vocal critic of privacy invasion and encryption backdoors. In 2016 McAfee ran for President of the United States on a platform of Freedom, Privacy and Technology. He has announced plans to run again in 2020, this time to draw public attention to the blockchain and cryptocurrency revolution.