reply to post by Zaphod58
A quote like this .....
"Cannot boot from CD" and "searching the registry stopped working"
tells me this company HAS NO CLUE about ANYTHING to do with computers.
You create a bootable Boot.BIN partition and boot over the network using Wake-on-LAN
packets which boots a LOCAL ram-disk partition which allows to use Linux/DOS NTFS
low-level file system readers/writers to scan the windows registry WITHOUT interference from
a COMPLEX running operating system. Then you run a software (or a hardware debugger)
to scan the UEFI/BIOS for key phrases or specific signatures and if necessary RE-FLASH the
BIOS from your over-the-network boot partition. Some virii are polymorphic and/or encrypted
and thus you MUST using a debugger and slow down their code execution on a line-by-line basis
to UNWRAP the web scripts and or microcode instructions that are being constructed on-the-fly!
Of course, I do have DECADES of Assembler coding and debugging expertise
so this is somewhat trivial to check for on my side...unfortunately my pontification
doesn't help this guy.
In terms of hardware, I HAVE actually shaved microchips layer-by-layer to create
and debug a complex chip mask AND try to find hardware-based backdoors using
an Expert System to find and narrow down non-essential circuit paths
(Which WE HAVE FOUND in certain commercial CPU's!)
The most common HARDWARE EXPLOIT is pseudo-random or true random number generator
poisoning which lowers the dispersed bit-width of any given random number sequence created
on a CPU. The SECOND most common issue are EXTRA banks of memory cells on a chip.
say on a 4 gigabyte ram stick which actually has 5-to-8 gigs (You didn't think I would FIND THAT?)
but reports only 4 gigs and has an data splitter/copy circuit to enable incoming data shadowing!
Another big one is on USB sticks AND Network or Graphics cards that have embedded fractal
Antennae and RF/Zigbee/Bluetooth/Wifi communications circuits embedded onto them.
One series of circuits I encountered had LONG-RANGE RF devices embedded onto the
Graphics Card that used a custom WRAPPED HDMI/DVI cable as an RF antennae.
Protocol was WiMAX which meant 20 km (12 mile) range!!!!
Based on some of the unmangled C-code prototypes, I saw some typical programmer
North American (i.e. USA) slang and Euro-slang which means a combined country effort.
Another version of the circuits looked to be a BAD/Sloppy almost identical copy of the
first version which had English/Mandarin slang in the demangled microcode which means China!
The 3rd circuit was OBVIOUSLY German and another particularly DEVIOUS and
MUCH SMALLER circuit embedded into a USB stick was in fact VERY RECOGNIZABLE
as being from France...!!!! So it looks like EVERYONE is spying on each other!
And based on the INSTALLATION ORIGIN of the circuits, a LOT of the spying
is purely economic in nature --- Simple Greed!
So Hardware Tampering is the NEW king of tech spying!
And if you REALLY want to get technical, some of the hardware tampering is GETTING VICIOUS!!!!!
By embedding a small VERY MILDLY radioactive emitter into a chip mask NEAR
the data (not executable code) registers/pipelines of a general purpose CPU
or embedded microcontroller, you can randomly flip bits over a given
period of time so that ...say....distance, power-level, or time measurement
units are randomized to give off subtle and nearly unnoticeable changes
which MAY damage sensitive equipment or cause UNDERLOADING or OVERLOADING
of industrial machines and/or manufacturing processes. You can even use a shielding
around the radiation emitter that breaks down ONLY AFTER A SET PERIOD of time or
AFTER a specific series of temperature plateaus have been reached before
allowing the emitter to randomly flip bits in the data areas of a RAM or CPU chip.
This allows agencies to take into account shipping and install times when targeting
a specific adversary for hardware-based tampering efforts.
THIS IS NASTY, NASTY STUFF --- BUT IT'S HERE TODAY IN THE WORLD OF SPOOKS!!!!!
edit on 2013/11/5 by StargateSG7 because: sp.