Well, it's hard to combat an adversary whose capabilities aren't known.<p>They <i>could</i> have hardware backdoors installed that would theoretically be undetectable unless you opened your case up and physically compared each chip and integrated circuit against a known whitelist.<p>They <i>could</i> have software backdoors installed in the form of firmware or microcode. Auditing these things is also very difficult because most of the time the manufacturers do not provide much (if any) documentation.<p>They <i>could</i> have malicious peripherals installed such as usb cables with hardware keyloggers built in, in which case you'd have to physically cut open all your cables, etc.<p>They <i>could</i> have rootkits installed, though there are tools such as rkhunter and chkrootkit that attempt to discover these.<p>>Intel chips that are known to be sabotaged<p>Check your chip(s) against any known blacklists or whitelists that you might have access to<p>>programs I can run to search for network interference?<p>Depends on your level of paranoia, but a sophisticated rootkit could hide network traffic from any firewalls on your machine, so you'd need to do monitoring with a second machine using something like Ethereal (I think it's called Wireshark these days?)