Manchurian Candidate of Chips: Backdoor or IP Challenge?

Instead of brainwashing and grooming a person to become a political leader in a rival country, like in The Manchurian Candidate, a 1959 political thriller by Richard Condon, it is probably easier to try to sell the rival country computer chips with backdoor technology that their military will use. Backdoor technology is an additional undocumented feature deliberately inserted into the device for extra functionality. Military graded chips with a backdoor in missile systems, airplanes or nuclear reactors could be controlled by an external entity from a distance.



(You do not need a backdoor into IP Dragon to influence us, just filling out this ultra short survey will do, thanks!)



Sergei Skorobogatov of the Faculty of Computer Science and Technology, University of Cambridge claims that he developed a “QVL technology” that can detect a backdoor in chips, and that he actually found one in a military graded chip, see here. Robert David Graham of Errata Security, which is a cyber security consulting company,  begs to differ
continue reading…

Cyber attacks: “Biggest Transfer of IP in History” Points To China

After eating a rat, one should stay vigilant.Photo: Tan Fugui Computer security company McAfee discovered that during a 5 year time span 72 organisation were infiltrated via the internet. Jim Finkle reports for Reuters about what Dmitri Alperovitch, McAfee Lab’s vice president of Threat Research calls “the biggest transfer of wealth in terms of intellectual property in […]

TGIF: Intellectual Property Enforcement Coordinator Says The Darndest Things

Online copyright piracy is a serious problem. China has started a campaign of three months to blacklist websites with pirated content so that Chinese telecom operators can take them offline. Now one can question the effectiveness of this temporary measure, see here. But there are even worse solutions… Look at the idea of Brad Sherman, […]

Chinese Counterfeit Cisco Products Because of Profit Seeking Or State Sponsored Cyber Terrorism?

After ‘Cisco Raider/Operation Network Raider‘ about counterfeit Cisco Systems router products which originate from China, Professor Peter Navarro poses the question whether the intention was only profit seeking by unscrupulous Chinese counterfeiters, or whether these products are trojan horses that are designed to make the US defense more vulnerable to state sponsored cyberterrorism. Professor Navarro […]

IPR/Espionage Ping-Pong Case: Fiat Sues Great Wall, Great Wall Sues Fiat

Fiat sued Great Wall, because it alleges that the Great Wall Peri infringes the intellectal property rights of the FIAT Panda. After this Great Wall sued FIAT at the Shijiazhuang People’s Court, based on “evidence” provided by FIAT to the court that they made photo’s of production facilities. Fiat suspected Great Wall to have infringed […]

USCC 2008 Report to Congress: From Visible IPR Infringements To Undectable Cyber Espionage

The US-China Economic and Security Review Commission came up with their 2008 Report to Congress. The conclusion includes: “China continues to violate its WTO commitments to avoid trade distorting measures. Among the trade-related situations in China that are counter to those commitments are restricted market access for foreign financial news services, books, films and other […]