View Single Post
Old 10-24-17, 12:02 AM   #5
CaptainHaplo
Silent Hunter
 
CaptainHaplo's Avatar
 
Join Date: Apr 2007
Posts: 4,404
Downloads: 29
Uploads: 0
Default

Board level chip programming is a esoteric art in some ways. Yes, there is cause for great concern should unknown vulnerabilities be "built in" to chips. However, while it is a real threat, it is one that is not only known - but one that has been exploited - as we saw years back with Stuxnet. Most professionals agree that Stuxnet was a joint project between the US and Israel. Even if the US did not play a role in its creation, US intelligence DID see the results. So it is safe to say that the US intelligence apparatus is well aware of how PLC's can be a source of vulnerability.

Does that mean we are secure? No. In the technology world, there is no "guarantee" of security any longer (really never has been - threats have changed and are MUCH more pervasive today though). However, when you know of a vulnerable spot in your armor, you examine it and find ways to "harden" it. Rest assured that PLC firmware revisions across entire industries and sectors are generally examined with a fine tooth comb. Again - no "guarantee" - but IC chips are not the unguarded back door that some people fear.

Skybird's point on the dangers of "suitcases", portable high power technology and ultimately, miniature weaponized items (whether IED's, chemical or bio weapons and small "dirty bombs") are much more serious and infinitely more difficult to control.

After all - to be successful the intelligence arms have to be right 100% of the time - the bad guys only have to "get lucky" once.

With that said - that does not mean that government should put security above the rights of its people.
__________________
Good Hunting!

Captain Haplo
CaptainHaplo is offline   Reply With Quote