logo
What's in your router? Compromised hardware threatens our national security.

What's in your router? Compromised hardware threatens our national security.

The Hill10-05-2025
Threats to national security are constantly changing. While cyberattacks and AI weaknesses often make the news, another hidden danger is compromised computer and network hardware. Bad actors may tamper with the equipment that runs U.S. defense and essential services.
Most cybersecurity efforts focus on fixing software problems, but a serious threat lies in the hardware itself. Countries like Russia, China and Iran might carry out long-term 'subtle sabotage' plans by adding hidden weaknesses into key parts like computer boards, microchips and network devices. These hidden changes can stay inactive for years, avoiding regular security checks until they are turned on to cause significant disruptions. This secret risk shows that our hardware can be a weak spot that enemies use whenever they choose.
Last fall's Israeli pager attack shows how dangerous this can be. In that case, explosive devices secretly placed by Israel resulted in the deaths and injuries of thousands of Hezbollah terrorists. This event shows how hidden, compromised hardware can be activated remotely to cause massive damage when a determined enemy uses it.
The way global supply chains work makes this threat possible. The manufacture of computer chips and boards involves many suppliers worldwide, a complex distribution process, and ongoing maintenance. Every step offers a chance for bad actors to introduce compromised hardware.
Enemies can take advantage of many points along the supply chain. Small changes made during design or chip production can hide dangerous flaws. These changes might be further hidden when parts are assembled and tested. As products pass through many hands and locations, it becomes increasingly difficult to check whether they are genuine and safe. This complex process allows fake or tampered hardware to sneak into systems — a 'ticking time bomb' waiting to go off.
Fake and unauthorized parts have been found in sensitive systems: Fraudulent electronics sold to the Defense Logistics Agency, for example, were meant for a nuclear submarine and a missile system. Counterfeit Cisco gear was discovered in equipment for F-18s, F- 22s, Apache helicopters and B-52 bombers. These cases reveal a clear risk — if these were found, many more unsafe parts might be hidden in critical systems.
The heart of this threat is the deliberate tampering with hardware components using advanced techniques. Bad actors can add hidden circuits, often called 'hardware trojans,' during the design or manufacturing stages, letting them stay hidden until activated to cause a breakdown. Counterfeit microchips that look normal but carry secret backdoors or weakened circuits are equally worrying. And harmful code can be placed in the device's firmware, remaining unseen until it is turned on remotely. All these tricks are designed to pass regular tests and checks, keeping the dangerous features hidden until they are deliberately exploited.
Compromised hardware is very dangerous because it stays inactive until remote signals, timers or environmental changes deliberately turn it on. This hidden power can be used to disrupt key systems — to make missiles fail, to change controls in aircraft and submarines, to mess with data flows, and to upset satellites and GPS. Computer networks and data centers are also at risk of attack, which can lead to widespread failures across connected systems.
Moreover, these issues break the trust in global supply chains and may create long-term instability in our security. Basically, dealing with compromised hardware forces expensive changes and makes us worry.
The fight against this threat requires a strong, multi-layered plan.
First, we must secure our supply chain by carefully checking suppliers, tracing every part from start to finish and using trusted manufacturing programs. Better testing methods — such as non-invasive imaging and side-channel analysis — and ongoing checks can ensure every component is safe before it is used. It is also essential for the government and private companies to work together, share information and develop new technology while cooperating with other countries. New rules are needed to enforce strict standards for buying hardware and to support local manufacturing. Finally, we must prepare by setting up dedicated response teams and building strong backup systems to lessen future problems.
Compromised hardware is a serious and ever-growing threat to our national security. Its ability to hide in important systems puts us at great risk, and every moment we wait makes the danger worse. We must recognize the full extent of this threat and act now. By taking strong, proactive steps, we can only protect our essential systems and build a defense ready for relentless and smart attacks.
Roei Ganzarski is the CEO of Alitheon, an optical-AI technology company focused on ensuring and securing supply chains.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

The future of air combat: How long will the US military still need pilots?
The future of air combat: How long will the US military still need pilots?

Fox News

time5 hours ago

  • Fox News

The future of air combat: How long will the US military still need pilots?

As sixth-generation fighter programs ramp up, military insiders are divided over whether future warplanes need pilots at all. The Pentagon is pouring billions into next-generation aircraft, pushing the boundaries of stealth and speed. But as America eyes a future of air dominance, one question looms large: Should Americans still be risking their lives in the cockpit? Autonomous drones backed by AI are progressing faster than many expected, and that has some defense leaders rethinking the role of the pilot. Some are of the mindset that the F-35 should be the last manned aircraft. Many pilots, however, do not agree. "It's highly controversial," one former senior defense official told Fox News Digital. "There's a whole cohort of people who think we should not be thinking about building a manned fighter for the last half of this century." "Inside the Air Force, there are hard-line air dominance people. They're on cloud nine this week, after what the B-2s did in Iran… but in my mind, I say, why would we put men in that loop? Why wouldn't we fly those things in 2050 unmanned, completely?" Air Force pilots flew B-2 bombers on a 36-hour round trip to strike three Iranian nuclear facilities last weekend. Trump said the strikes left Iran's nuclear sites "obliterated like nobody's ever seen before." He praised the "brave" pilots who crewed the planes as "the best shots in the world." But the most rapid technological advancements in U.S. history have left defense officials stumped about how to plan for the future. "To date, the services are just scratching the surface on what manned versus unmanned TACAIR (tactical air) of the future might look like," the former official went on. "If AI technologies continue to evolve in five years, right when you're just in the infancy of beginning to make a decision about what F-47 would be, well, you're on exactly the wrong path." Others insist unmanned systems still lack the decision-making reliability and network resilience needed for high-stakes combat. "It's critically important that President Trump proceeded with the manned platform for the Air Force – obviously, F-47 being the solution," said former Rep. Mike Garcia, R-Calif., a former F/A 18 naval aviator. "This academic debate about unmanned-only platforms is aspirational – but the networks just aren't there yet. You need low latency, high-bandwidth, distributed networks with critical nodes, and we don't have that." But, he urged Boeing to move quickly. "Boeing needs to execute. They can't afford to have this turn into a tanker program. This is absolutely critical to get done correctly." With the famously lengthy acquisition timelines of the Pentagon, some worry sixth-generation aircraft won't make it to the battlefield before their autonomous counterparts match them in capability, with less risk to humans. Garcia emphasized that aircrews play a unique role in orchestrating combat operations. "You still need a quarterback in the air to manage unmanned aircraft and the situational awareness feeding back into the entire advanced battle management system," he said. At the core of this debate is America's ability to project power while preparing for near-peer conflict. Yet financial limitations are shaping what's possible. "We've ended up in a situation where the Air Force today is the oldest and the smallest and the least ready it's ever been in its entire history," said retired U.S. Air Force Lt. Gen. David Deptula, dean of the Mitchell Institute for Aerospace Studies. Deptula told Fox News Digital the "only" debate about the F-47 was about money, because of "arbitrary budgets that aren't tied in any way, shape or form to our national defense strategy." Those who think drones will be ready to take the job of pilots anytime soon believe in "science fiction," he said. "It may be at some point in the future, but we're just not there yet." Others warn that both the Air Force and Navy may be taking different bets on how unmanned technology will factor into the need for their prized fighter jets. "To date, the services are just scratching the surface on what manned versus unmanned tactical air might look like," another former defense official said. "The Air Force wants to rush F-47 to IOC to beat unmanned advocates to the trough," referring to initial operational capacity (IOC). "The Navy seems to be taking a more measured path to F/A-XX than they were a couple of years ago. Perhaps part of that is to see where the unmanned technology goes."

Tamron Announces 16-30mm F2.8 Wide-Angle Zoom, Tamron Completes G2 Lens Trinity with the new 16-30mm Lens - Preorder and More Info at B&H Photo
Tamron Announces 16-30mm F2.8 Wide-Angle Zoom, Tamron Completes G2 Lens Trinity with the new 16-30mm Lens - Preorder and More Info at B&H Photo

Yahoo

time7 hours ago

  • Yahoo

Tamron Announces 16-30mm F2.8 Wide-Angle Zoom, Tamron Completes G2 Lens Trinity with the new 16-30mm Lens - Preorder and More Info at B&H Photo

Tamron's third premium G2 lens, the 16-30mm f/2.8 wide-angle zoom lens, offers premium optical design and is ideal for travel, landscape, astrophotography, and more. NEW YORK, July 1, 2025 /PRNewswire/ -- B&H is pleased to introduce Tamron's latest G2 premium zoom lens, the 16-30mm f/2.8 Di III VXD G2. A fast, wide-angle zoom with high-end optics and a lightweight build, the travel and everyday-friendly lens delivers professional-grade imagery in street, landscape, architecture, and astrophotography applications. The versatile lens is also well-suited for video content creation and will be available for Sony E and Nikon Z lens mounts at the ends of July and August, respectively. The new Tamron 16-30mm f/2.8 Di III VXD G2 lens features an optical design that delivers high resolution and beautiful bokeh. The Voice-coil eXtreme-torque Drive (VXD) autofocus provides fast, quiet, and accurate performance. A close focusing distance of 7.5" on the wide end opens possibilities for creative close-ups and other dynamic compositions. Tamron 16-30mm f/2.8 Di III VXD G2 Lens (Sony E Mount) Tamron 16-30mm f/2.8 Di III VXD G2 Lens (Nikon Z Mount) Product Highlights Full-Frame | f/2.8 to f/16 Aperture Lightweight Wide-Angle Zoom Updated Optical Design | Expanded FOV VXD Linear Motor Focus Mechanism Autofocus Support | 7.5" Close Focus Moisture-Resistance | Fluorine Coating Works with TAMRON Lens Utility Software 67mm Front Filter Thread Weighing just under a pound, the lens sports a moisture-resistant construction with a fluorine coating on the front lens element for further protection against oil and water. Zoom and focus rings offer ergonomic control of focal length and focus. The lens also accepts 67mm filters. The lens is also compatible with the TAMRON Lens Utility that allows users to customize practical functions for both photography and videography. The Tamron 16-30mm f/2.8 joins the Tamron 28-75mm f/2.8 and 70-180mm f/2.8 lenses to complete Tamron's "Daisangen," a winning hand of mahjong made by collecting three sets of dragon tiles, and in the photography world, a set of three zoom lenses—a wide-angle, a standard, and a telephoto—with a consistent f/2.8 maximum aperture. Learn more about the Tamron 16-30mm F/2.8 wide-angle-zoom lens with B&H Explora Additionally Popular Pages Camera Tripods Digital Camerashttps:// ras/ci/9811/N/4288586282 Mirrorless Camerashttps:// Camera Strapshttps:// Point and Shoot Camerashttps:// Film Camerashttps:// Now Trending Brother Laser Printershttps:// 4K Monitorshttps:// Curved Gaming Monitorshttps:// About B&H Photo Video As the world's largest source of photography, video, and audio equipment, as well as computers, drones, and home and portable entertainment, B&H is known worldwide for its attentive, knowledgeable sales force and excellent customer service, including fast, reliable shipping. B&H has been satisfying customers worldwide for over 52 years. Visitors to the website can access a variety of educational videos and enlightening articles. The B&H YouTube Channel has an unmatched wealth of educational content. Our entertaining and informative videos feature product overviews from our in-house specialists. When you're in Manhattan, take a tour of the B&H Photo SuperStore, located at 420 Ninth Avenue. The techno-carousel spins all year round at the counters and kiosks at B&H. With hundreds of products on display, the B&H Photo SuperStore is the place to test-drive and compare all the latest gear. The B&H Payboo Credit Card offers the industry's best instant savings and special financing, subject to credit approval. Visit B&H's Payboo Page to learn more and apply. Contact InformationGeoffrey Ngai B&H Photo Video212-615-8820 View original content to download multimedia: SOURCE B&H Photo Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

Cisco & Wells Fargo to Host Silicon One Tech Talk
Cisco & Wells Fargo to Host Silicon One Tech Talk

Yahoo

time20 hours ago

  • Yahoo

Cisco & Wells Fargo to Host Silicon One Tech Talk

SAN JOSE, Calif., June 30, 2025 /PRNewswire/ -- Cisco (NASDAQ: CSCO) will host a Tech Talk to discuss Silicon One. The session will be led by Martin Lund, EVP, Common Hardware Group, and Rakesh Chopra, SVP & Fellow for Silicon One. Interested parties can find more information on Cisco's Investor Relations website at Date: Friday, July 11, 2025 Time: 8:00 AM (PT); 11:00 AM (ET) Cisco Speakers: Martin Lund, EVP, Common Hardware Group Rakesh Chopra, SVP & Fellow for Silicon One Host: Aaron Rakers, Managing Director, Wells Fargo For the direct link to pre-register for this Tech Talk, please click here. This event will be webcast and a replay will be available shortly after the event, which may be found on Cisco's Investor Relations website at About Cisco Cisco (NASDAQ: CSCO) is the worldwide technology leader that is revolutionizing the way organizations connect and protect in the AI era. For more than 40 years, Cisco has securely connected the world. With its industry leading AI-powered solutions and services, Cisco enables its customers, partners and communities to unlock innovation, enhance productivity and strengthen digital resilience. With purpose at its core, Cisco remains committed to creating a more connected and inclusive future for all. Discover more on The Newsroom and follow us on X at @Cisco. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at Third-party trademarks mentioned are the property of their respective owners. The use of the word 'partner' does not imply a partnership relationship between Cisco and any other company. Investor Relations Contact: Press Contact: Sami Badri Robyn Blum Cisco Cisco 469-420-4834 408-930-8548 sambadri@ rojenkin@ View original content to download multimedia: SOURCE Cisco Systems, Inc.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store