FacebookTwitterRedditEmail

Volkswagen and the Quandary of Hidden Code

Though the media may be inclined to shine a spotlight on Volkswagen and its systemic rigging of emission control systems the public record shows that the practice of secretly modifying technology to enable questionable features is fairly widespread. For example, accessing computers using hidden code is a mainstay of NSA surveillance and they’ve gotten so adept at it that plans have been drawn up to industrialize attacks against millions of machines at a time. And while federal officials and tech CEOs quibble over cryptographic back doors there are spies currently relying on hidden code to break into networks all over the planet.

Documents provided by Edward Snowden reveal classified intelligence operations like BULLRUN and the SIGINT Enabling project, industry-wide campaigns to undermine cyber security by inserting stealthy technical modifications.

Make no mistake, this is evidence that the tech industry hopes you’ll forget. They’re focused on maintaining earnings after being caught collaborating with security services. The execs would much rather frame themselves as our protectors rather than willing participants who subvert their products and conspire with authorities on a first-name basis. Hence there is a degree of theater to the debate playing itself out in the public arena. The media is, to an extent, complicit.

Tech CEOs may complain vocally to President Xi about the prospect of installing back doors in products destined for markets in China. But, honestly, can you blame Chinese leaders for wanting the same sort of benefits that tech companies have already provided to U.S. spies? The sheer size of the market in China may lead the Silicon Valley crowd to comply. Just ask Boeing, it recently signed a deal to sell 300 aircraft to China for $38 billion.

Rest assured that there is a way forward. Hidden code thrives in the dark. This means that transparency and sunlight are appropriate remedies. Specifically, commercial products should be open source so that anyone can inspect them. As Columbia law professor Eben Moglen astutely observed, “If Volkswagen knew that every customer who buys a vehicle would have a right to read the source code of all the software in the vehicle, they would never even consider the cheat, because the certainty of getting caught would terrify them.”

In addition government subversion programs that implement hidden code need to be outlawed. The tech industry —itself a direct descendent of the defense sector— cannot, or rather will not, fight this battle on its own. The covert arm of U.S. intelligence has a long and storied history of toppling foreign regimes. It doesn’t matter how much ruckus Apple’s CEO makes in public. Do you honestly think Tim Cook could resist this kind of pressure any more than Costas Tsalikidis or Salvador Allende? There are subtle and inexorable currents running under the surface of the body politic. They’re driven by forces much bigger than any one company. Look further and pathways to the American Deep State will emerge.

But even these measures aren’t sufficient. Secret components can masquerade as accidental bugs which are plausibly deniable. For example, it’s been documented that Microsoft had a clandestine arrangement to provide the NSA with early information on zero-day vulnerabilities. Therefore the executives of Silicon Valley need to be held liable for shoddy implementation so that companies have incentives to treat bugs as the catastrophes that they are rather than as a negative externality. Formally verified code, mathematically proven to be free of defects, is an emerging reality.

There is no shortage of talent or resources to tackle this problem. The major impediment preventing engineers from making significant headway on eliminating hidden code is skewed priorities both on behalf of corporate leadership and the political class which serves them. Hidden code represents control, it represents power. We need to take that power back.

More articles by:

Bill Blunden is a journalist whose current areas of inquiry include information security, anti-forensics, and institutional analysis. He is the author of several books, including “The Rootkit Arsenal” andBehold a Pale Farce: Cyberwar, Threat Inflation, and the Malware-Industrial Complex.” Bill is the lead investigator at Below Gotham Labs and a member of the California State University Employees Union, Chapter 305.

bernie-the-sandernistas-cover-344x550
Weekend Edition
September 13, 2019
Friday - Sunday
Paul Street
The Age of Constitutional Coups
Rob Urie
Bernie Sanders and the Realignment of the American Left
Anthony DiMaggio
Teaching the “War on Terror”: Lessons for Contemporary Politics
Jeffrey St. Clair
Roaming Charges: They Are the Walrus
T.J. Coles
Jeremy Corbyn: Electoral “Chicken” or Political Mastermind?
Joseph Natoli
The Vox Populi
Sasan Fayazmanesh
The Pirates of Gibraltar
John Feffer
Hong Kong and the Future of China
David Rosen
The Likely End to Roe v. Wade?
Ishmael Reed
When You Mess With Creation Myths, the Knives Come Out
Michael Hudson
Break Up the Democratic Party?
Paul Tritschler
What If This is as Good as It Gets?
Jonah Raskin
Uncensored Tony Serra: Consummate Criminal Defense Lawyer
Ryan Gunderson
Here’s to the Last Philosophes, the Frankfurt School
Michael T. Klare
The Pompeo Doctrine: How to Seize the Arctic’s Resources, Now Accessible Due to Climate Change (Just Don’t Mention Those Words!)
Luke O'Neil
I Would Want To Drink Their Blood: God Will Punish Them
Louis Proyect
The Intellectual Development of Karl Marx
Tom Clifford
How China Sees the World
Kelsey Hawkins-Johnson – Negin Owliaei
Who’s Burning the Amazon?
Yasin Khan
Rideshare Drivers are Employees, Not Contractors
Ralph Nader
Big Business Lies Taught a Watchful Donald Trump
Binoy Kampmark
The Sacking of John Bolton
Andrea Maki
Wild Love Preserve Founder: Our Path Forward
Jeremy Kuzmarov
The War in Eastern Ukraine May be Coming to an End But Do Any Americans Care?
Tim Davis – Stan Grier
Protect the Sacred Grizzly Bear, Follow Those Who Know Grandmother Earth
Clark T. Scott
Super-Delegated and Relegated
Jim Britell
Lessons From America’s Greatest Grassroots Campaigns 
Howie Hawkins
Workers Need More Rights and Economic Democracy
Ramzy Baroud
‘Justice is Indivisible’: Screams of Israa Ghrayeb Should Be Our Wake-up Call
Jill Richardson
It’s Not About Your Straws and Your Light Bulbs
George Wuerthner
Montana’s Wilderness Deficit
Colin Todhunter
Officials Ignore Pesticides and Blame Alcohol and Biscuits for Rising Rates of Disease
Volker Franke
Me First and the Loss of Compassion
Adolf Alzuphar
Why is the Left Without a Single Elected Official in LA?
Kim C. Domenico
All We Are Saying, Is Give Peace A Chance (Bring It Home!)
Jennifer Matsui
The End of Aquarius and The Dawn of a Death Star: Once Upon a Time in Hollywood
Missy Comley Beattie
Never Forget
James Haught
Prodding ‘Nones’ to Vote
David Swanson
For the First Time in My Life I’m Against Impeaching the President
Nicky Reid
Yemen as Arabian Vietnam
Kenn Orphan – Phil Rockstroh
Bearing Witness at Aeon’s End: the Wound Becomes the Womb
Fred Gardner
Homage to the Tabloids
Yves Engler
RCMP Attempt to Silence Critics of Trudeau Foreign Policy
Stephen Cooper
Hempress Sativa: “Rastafari Should be Protected”
David Yearsley
Joie-de-Job: Staying High, at Work
FacebookTwitterRedditEmail