FT商学院

Exploding pagers and spy chips: the rising risk of hardware tampering

Unreliable suppliers can modify devices, yet companies devote few resources to verifying the origin of components
The writer is the author of ‘Chip War’

The explosives that Mossad slipped into thousands of Hizbollah pager batteries and detonated last month in Lebanon should send a jolt of fear through the otherwise staid world of global supply chain management. Surely adversaries of the west will have their own tactics to compromise our electronics hardware. Most companies think only about cyber and software vulnerabilities. It is time they take hardware security more seriously.

The Russians are already so nervous that complex electronics can be manipulated by opponents that they have created a special institute to test the veracity of western chips smuggled in for use in missile and drone manufacturing. History shows that they are probably right to worry. Though many cold war-era spy games are still concealed by classification, Politico recently uncovered a 1980s FBI scheme designed to tamper with chipmaking tools that the Soviets were illegally importing.

However, western security agencies may no longer have the opportunity to repeat such practices — even if they are as skilled today as they were during the cold war. The epicentre of electronics manufacturing has shifted from the US to Asia — in particular to China and in the case of chipmaking to Taiwan. The more products a country assembles, the more opportunities for malfeasance.

您已阅读29%(1341字),剩余71%(3344字)包含更多重要信息,订阅以继续探索完整内容,并享受更多专属服务。
版权声明:本文版权归manbetx20客户端下载 所有,未经允许任何单位或个人不得转载,复制或以任何其他方式使用本文全部或部分,侵权必究。
设置字号×
最小
较小
默认
较大
最大
分享×