FacebookTwitterRedditEmail

Volkswagen and the Quandary of Hidden Code

Though the media may be inclined to shine a spotlight on Volkswagen and its systemic rigging of emission control systems the public record shows that the practice of secretly modifying technology to enable questionable features is fairly widespread. For example, accessing computers using hidden code is a mainstay of NSA surveillance and they’ve gotten so adept at it that plans have been drawn up to industrialize attacks against millions of machines at a time. And while federal officials and tech CEOs quibble over cryptographic back doors there are spies currently relying on hidden code to break into networks all over the planet.

Documents provided by Edward Snowden reveal classified intelligence operations like BULLRUN and the SIGINT Enabling project, industry-wide campaigns to undermine cyber security by inserting stealthy technical modifications.

Make no mistake, this is evidence that the tech industry hopes you’ll forget. They’re focused on maintaining earnings after being caught collaborating with security services. The execs would much rather frame themselves as our protectors rather than willing participants who subvert their products and conspire with authorities on a first-name basis. Hence there is a degree of theater to the debate playing itself out in the public arena. The media is, to an extent, complicit.

Tech CEOs may complain vocally to President Xi about the prospect of installing back doors in products destined for markets in China. But, honestly, can you blame Chinese leaders for wanting the same sort of benefits that tech companies have already provided to U.S. spies? The sheer size of the market in China may lead the Silicon Valley crowd to comply. Just ask Boeing, it recently signed a deal to sell 300 aircraft to China for $38 billion.

Rest assured that there is a way forward. Hidden code thrives in the dark. This means that transparency and sunlight are appropriate remedies. Specifically, commercial products should be open source so that anyone can inspect them. As Columbia law professor Eben Moglen astutely observed, “If Volkswagen knew that every customer who buys a vehicle would have a right to read the source code of all the software in the vehicle, they would never even consider the cheat, because the certainty of getting caught would terrify them.”

In addition government subversion programs that implement hidden code need to be outlawed. The tech industry —itself a direct descendent of the defense sector— cannot, or rather will not, fight this battle on its own. The covert arm of U.S. intelligence has a long and storied history of toppling foreign regimes. It doesn’t matter how much ruckus Apple’s CEO makes in public. Do you honestly think Tim Cook could resist this kind of pressure any more than Costas Tsalikidis or Salvador Allende? There are subtle and inexorable currents running under the surface of the body politic. They’re driven by forces much bigger than any one company. Look further and pathways to the American Deep State will emerge.

But even these measures aren’t sufficient. Secret components can masquerade as accidental bugs which are plausibly deniable. For example, it’s been documented that Microsoft had a clandestine arrangement to provide the NSA with early information on zero-day vulnerabilities. Therefore the executives of Silicon Valley need to be held liable for shoddy implementation so that companies have incentives to treat bugs as the catastrophes that they are rather than as a negative externality. Formally verified code, mathematically proven to be free of defects, is an emerging reality.

There is no shortage of talent or resources to tackle this problem. The major impediment preventing engineers from making significant headway on eliminating hidden code is skewed priorities both on behalf of corporate leadership and the political class which serves them. Hidden code represents control, it represents power. We need to take that power back.

More articles by:

Bill Blunden is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including “The Rootkit Arsenal” andBehold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs and a member of the California State University Employees Union, Chapter 305.

March 19, 2019
Paul Street
Socialism Curiously Trumps Fascism in U.S. Political Threat Reporting
Jonah Raskin
Guy Standing on Anxiety, Anger and Alienation: an Interview About “The Pecariat”
Patrick Cockburn
The Brutal Legacy of Bloody Sunday is a Powerful Warning to Those Hoping to Save Brexit
Robert Fisk
Turning Algeria Into a Necrocracy
John Steppling
Day of Wrath
Robin Philpot
Truth, Freedom and Peace Will Prevail in Rwanda
Victor Grossman
Women Marchers and Absentees
Binoy Kampmark
The Dangers of Values: Brenton Tarrant, Fraser Anning and the Christchurch Shootings
Jeff Sher
Let Big Pharma Build the Wall
Jimmy Centeno
Venezuela Beneath the Skin of Imperialism
Jeffrey Sommers – Christopher Fons
Scott Walker’s Failure, Progressive Wisconsin’s Win: Milwaukee’s 2020 Democratic Party Convention
Steve Early
Time for Change at NewsGuild?
March 18, 2019
Scott Poynting
Terrorism Has No Religion
Ipek S. Burnett
Black Lives on Trial
John Feffer
The World’s Most Dangerous Divide
Paul Cochrane
On the Ground in Venezuela vs. the Media Spectacle
Dean Baker
The Fed and the 3.8 Percent Unemployment Rate
Thomas Knapp
Social Media Companies “Struggle” to Help Censors Keep us in the Dark
Binoy Kampmark
Death in New Zealand: The Christchurch Shootings
Mark Weisbrot
The Reality Behind Trump’s Venezuela Regime Change Coalition
Weekend Edition
March 15, 2019
Friday - Sunday
Andrew Levine
Is Ilhan Omar Wrong…About Anything?
Kenn Orphan
Grieving in the Anthropocene
Jeffrey Kaye
On the Death of Guantanamo Detainee 10028
Stan Cox – Paul Cox
In Salinas, Puerto Rico, Vulnerable Americans Are Still Trapped in the Ruins Left by Hurricane Maria
Ben Debney
Christchurch, the White Victim Complex and Savage Capitalism
Eric Draitser
Did Dallas Police and Local Media Collude to Cover Up Terrorist Threats against Journalist Barrett Brown?
Jeffrey St. Clair
Roaming Charges: Straighten Up and Fly Right
Jack Rasmus
Trump’s $34 Trillion Deficit and Debt Bomb
David Rosen
America’s Puppet: Meet Juan Guaidó
Jason Hirthler
Annexing the Stars: Walcott, Rhodes, and Venezuela
Samantha M. - Angelica Perkins
Our Green New Deal
Mel Gurtov
Trump’s Nightmare Budget
Steven Colatrella
The 18th Brumaire of Just About Everybody: the Rise of Authoritarian Strongmen and How to Prevent and Reverse It
Evaggelos Vallianatos
Riding the Wild Bull of Nuclear Power
Michael K. Smith
Thirty Years Gone: Remembering “Cactus Ed”
Dean Baker
In Praise of Budget Deficits
Howard Lisnoff
Want Your Kids to Make it Big in the World of Elite Education in the U.S.?
Brian Cloughley
Trump’s Foreign Policy is Based on Confrontation and Malevolence
John W. Whitehead
Pity the Nation: War Spending is Bankrupting America
Priti Gulati Cox
“Maria! Maria! It Was Maria That Destroyed Us!” The Human Story
Missy Comley Beattie
On Our Knees
Mike Garrity – Carole King
A Landscape Lewis and Clark Would Recognize is Under Threat
Robert Fantina
The Media-Created Front Runners
Tom Clifford
Bloody Sunday and the Charging of Soldier F
Ron Jacobs
All the Livelong Day      
FacebookTwitterRedditEmail