![]() |
|
THE HANDSTAND | NOVEMBER 2005 |
![]() steve bell big brother's Trapdoor, spyware on the Internet: I used to be a computer expert - I was Principal EDP Auditor at the federal Department of Finance in Canberra - and a number of people on this list, including Peter Wakefield Sault, and Max in Kuala Lumpur, are. Let me see anyone talk his way around the following; and, at the end of it, if he is still happy to trust encryption, that's his folly. The Windows OS is bugged - it contains an NSA trapdoor: http://lists.indymedia.org/pipermail/imc-ontario-stories/2002-March/000360.html I was told by John Skeates, a Mac expert in Canberra, that Mac OS versions 9 & 10 have such a trapdoor too. That's one reason I use an old version of the Mac OS (7.6.1). It's not that I'm doing anything secret, but that I don't like Big Brother snooping around. Max <Max@mailstar.net>, a Unix expert, informed me that Unix is probably bugged too - even Open Source Unix. It would be possible to bug it because it's so complex, and written in the cryptic language "C". The NSA has a software "key" to these trapdoors. By this means it can, if it wishes, read your data, prior to any encryption you apply. In effect, your keystrokes would be stored in hidden files on your computer, before the encrypting software gets hold of them. A computer is like an onion: the outer layers are user-friendly applications, built on inner layers which are more technical. Your encryption applies at one layer, but the NSA has access to a lower layer. How would the NSA access that data? Via the internet - when users are online. Do a search for "nsa key" in Google - it finds 1,680,000 hits. Ari Ben Menashe was the first to warn about software "trapdoors". These were initially on IBM mainframes, and developed by the CIA and Mossad for use in the Cold War: http://users.cyberone.com.au/myers/bugs.html. As an indication of what the NSA/CIA get up to, President Jiang of China,whose plane had been specially fitted out in the US, was furious about bugs being fitted to it whilst there: China Finds Bugs on Jet Equipped in U.S. By John Pomfret Washington Post Foreign Service Saturday, January 19, 2002; Page A01 http://www.washingtonpost.com/wp-dyn/articles/A5176-2002Jan18.html There is a secret military pact binding the US and the British Empire - which includes Canada, Australia, New Zealand, and probably some other countries too - called UKUSA. Do a search for it. Its surveillance system - called Echelon - operates through spy (signals-interception) bases in Australia (eg Pine Gap), New Zealand etc. These intercept all phone calls, emails etc. The European Parliament did an investigation into Echelon, after claims by European companies that their business secrets had "leaked", causing them to lose contracts to US firms. Results 1 - 10 of about 243,000 for European parliament echelon. (0.34 seconds) European Parliament Investigation of Echelon http://cryptome.org/echelon-ep.htm European Parliament Motion for Resolution on Echelon http://cryptome.org/echelon-epmr.htm EUROPARL: Committees of the European Parliament http://www.europarl.eu.int/committees/echelon_home.htm European Parliament: Echelon Lives! http://www.thestandard.com/article/0,1902,28890,00.html Remember that all these reports were out BEFORE 911 and the "War on Terror". You know how frenzied the spooks have become since, the vast expansion of agencies and activities. If you're doing politically sensitive work - and I remind you that a name "Don" (like "Max") is a pseudonym: unlike me, you don't want to reveal your true identity - then don't trust encryption. False confidence will lead you to tell Big Brother everything, without you being aware of it. Hardware key-loggers would take software key-logging one step further. If Microsoft and Apple have agreed to let the NSA bug their own Operating Systems - as the price for continuing in business - then it's not implausible that hardware manufacturers would do the same. However, whereas the control of Operating Systems is restricted to Bill Gates, the Chairman of Apple, and chiefs of various versions of Unix, ownership & management of hardware manufacturers is much more diffuse. At Toyota car-plants in the US, the key hi-tech components are imported from Japan. During the dock strike some years ago, Toyota plants in the US ad to shut because these key components were held up at the wharves. In the same way, computer hardware manufacturers use certain hi-tech components sourced from just a few manufacturers - Intel, AMD etc. It's those companies the NSA would target, not Mum & Dad companies. Don't expect the news to be splashed around on the front pages; part of the deal would be keeping quiet about it. Mum & Dad owners of hardware companies would not be aware of it - they may be told they need to add a certain card, or a certain chip (made offsite by a compliant manufacturer), which has multiple functions, some of which they are unaware of. Look at it another way. If YOU were running the NSA, wouldn't YOU regard keystroke-loggers - whether software or hardware - as too tempting to resist? I would. They offer direct access to the mind of the person being watched. They could be used to help catch criminals of all kinds, foreign agents, people who want to overthrow the system, etc. Only a small fraction of those kept-track-of would one day receive a knock on the door, and the impounding of their equipment. But your data would be kept, in huge data caches bigger than Google's, just in case, one day, it's your turn. Look at how the "War on Terror" has freaked out the public; what if there's a "War on Hate" next? The story about Windows having an NSA trapdoor seems reliable. I have no reason to doubt the report that new versions of the Mac OS are similarly bugged. That would mean that the Hard Word has been put on top managers of those companies: comply or lose US Government contracts. If they took the money, would you be surprised? I wouldn't. Here are Google's Results 1 - 10 of about 1,680,000 for nsa key: CNN - NSA key to Windows: an open question - September 3, 1999 Fernandes said the NSA key would allow the intelligence agency to load services ... The alleged NSA key came to light just days after Microsoft squelched a ... http://www.cnn.com/TECH/computing/9909/03/windows.nsa.02/ - 28k - 10 Oct 2005 - Cached - Similar pages Crypto-Gram: September 15, 1999 In this issue: Open Source and Security; NSA Key in Microsoft Crypto API?; Counterpane -- Featured Research; News; Extra Scary News; Counterpane News; ... http://www.schneier.com/crypto-gram-9909.html - 51k - Cached - Similar pages Microsoft "NSAKEY" security advisory - Privacy Software Corporation NSA nsa key microsoft security flaw crypt32.dll. ... However, we do not accept Microsoft's explanation that the "nsakey" is a "backup" key in the event of ... www.nsclean.com/nsakey.html - 19k - Cached - Similar pages Microsoft Stonewalls NSA_key Questions Meantime, I do want to answer the "NSA key" questions right away. ... That includes the CSP signing keys, and the so-called "NSA key" in particular. ... http://cryptome.org/nsakey-ms-dc.htm - 42k - Cached - Similar pages TP: How NSA access was built into Windows The NSA key is contained inside all versions of Windows from Windows 95 OSR2 ... A demonstration "how to do it" program that replaces the NSA key can be ... http://www.heise.de/tp/r4/artikel/5/5263/1.html - 28k - 10 Oct 2005 - Cached - Similar pages MS denies giving NSA key | Tech News on ZDNet MS denies giving NSA key | A second key in Microsoft Windows is only to comply with federal rules governing software export, company says. | http://news.zdnet.com/2100-9595_22-515610.html?legacy=zdnn - 33k - Cached - Similar pages NSA Backdoor Key from Lotus-Notes In doing this I discovered that the NSA public key had an organizational name of ... The NSA's Public Key. I put this together some years after the ... http://www.cypherspace.org/adam/hacks/lotus-nsa-key.html - 5k - Cached - Similar pages TechWeb: The Business Technology Network The NSA key is contained inside all versions of Windows from Windows 95 OSR2 ... Van Someren said he felt the primary purpose of the NSA key might be for ... http://www.techweb.com/wire/story/TWB19990903S0014 - 73k - Cached - Similar pages [FYI] /. Articles:Microsoft NSA key Follow-Up Articles:Microsoft NSA key Follow-Up; From: Kristian Köhntopp <kk@netuse.de>; Date: Fri, 10 Sep 1999 09:06:34 +0200; Comment: This message comes from the ... http://www.fitug.de/debate/9909/msg00109.html - 15k - Cached - Similar pages [PDF] How NSA access was built into Windows T File Format: PDF/Adobe Acrobat - View as HTML deny that the "NSA" key was built into their software. But they ... Researchers are divided about whether the NSA key could be ... http://www.owlriver.com/privacy/windows-backdoor-keying.pdf - Similar pages ![]() from P.Myers. Sub-$100 laptop design
unveiled
|