THE HANDSTAND

NOVEMBER 2005


steve bell
big brother's Trapdoor, spyware on the Internet:

I used to be a computer expert - I was Principal EDP Auditor at the federal Department of Finance in Canberra - and a number of people on this list, including Peter Wakefield Sault, and Max in Kuala Lumpur, are.

Let me see anyone talk his way around the following; and, at the end of it, if he is still happy to trust encryption, that's his folly.

The Windows OS is bugged - it contains an NSA trapdoor:
http://lists.indymedia.org/pipermail/imc-ontario-stories/2002-March/000360.html

I was told by John Skeates, a Mac expert in Canberra, that Mac OS versions 9 & 10 have such a trapdoor too. That's one reason I use an old version of the Mac OS (7.6.1). It's not that I'm doing anything secret, but that I don't like Big Brother snooping around.

Max <Max@mailstar.net>, a Unix expert, informed me that Unix is probably bugged too - even Open Source Unix. It would be possible to bug it because it's so complex, and written in the cryptic language "C".

The NSA has a software "key" to these trapdoors. By this means it can, if it wishes, read your data, prior to any encryption you apply. In effect, your keystrokes would be stored in hidden files on your computer, before the encrypting software gets hold of them.

A computer is like an onion: the outer layers are user-friendly applications, built on inner layers which are more technical. Your encryption applies at one layer, but the NSA has access to a lower layer. How would the NSA access that data? Via the internet - when users are online.

Do a search for "nsa key" in Google - it finds 1,680,000 hits. Ari Ben Menashe was the first to warn about software "trapdoors". These were initially on IBM mainframes, and developed by the CIA and Mossad for use in the Cold War: http://users.cyberone.com.au/myers/bugs.html.

As an indication of what the NSA/CIA get up to, President Jiang of China,whose plane had been specially fitted out in the US, was furious about bugs being fitted to it whilst there: China Finds Bugs on Jet Equipped in U.S. By John Pomfret Washington Post Foreign Service Saturday, January 19, 2002; Page A01 http://www.washingtonpost.com/wp-dyn/articles/A5176-2002Jan18.html

There is a secret military pact binding the US and the British Empire - which includes Canada, Australia, New Zealand, and probably some other countries too - called UKUSA. Do a search for it. Its surveillance system - called Echelon - operates through spy (signals-interception) bases in Australia (eg Pine Gap), New Zealand etc. These intercept all phone calls, emails etc.

The European Parliament did an investigation into Echelon, after claims by European companies that their business secrets had "leaked", causing them to lose contracts to US firms. Results 1 - 10 of about 243,000 for European parliament echelon. (0.34 seconds)
European Parliament Investigation of Echelon http://cryptome.org/echelon-ep.htm

European Parliament Motion for Resolution on Echelon http://cryptome.org/echelon-epmr.htm

EUROPARL: Committees of the European Parliament
http://www.europarl.eu.int/committees/echelon_home.htm

European Parliament: Echelon Lives!
http://www.thestandard.com/article/0,1902,28890,00.html

Remember that all these reports were out BEFORE 911 and the "War on Terror". You know how frenzied the spooks have become since, the vast expansion of agencies and activities. If you're doing politically sensitive work - and I remind you that a name "Don" (like "Max") is a pseudonym: unlike me, you don't want to reveal your true identity - then don't trust encryption. False confidence will lead you to tell Big Brother everything, without you being aware of it.

Hardware key-loggers would take software key-logging one step further.

If Microsoft and Apple have agreed to let the NSA bug their own Operating Systems - as the price for continuing in business - then it's not implausible that hardware manufacturers would do the same. However, whereas the control of Operating Systems is restricted to Bill Gates, the Chairman of Apple, and chiefs of various versions of Unix, ownership & management of hardware manufacturers is much more diffuse. At Toyota car-plants in the US, the key hi-tech components are imported from Japan. During the dock strike some years ago, Toyota plants in the US ad to
shut because these key components were held up at the wharves. In the same way, computer hardware manufacturers use certain hi-tech components sourced from just a few manufacturers - Intel, AMD etc. It's those companies the NSA would target, not Mum & Dad companies.

Don't expect the news to be splashed around on the front pages; part of the deal would be keeping quiet about it. Mum & Dad owners of hardware companies would not be aware of it - they may be
told they need to add a certain card, or a certain chip (made offsite by a compliant manufacturer), which has multiple functions, some of which they are unaware of.

Look at it another way. If YOU were running the NSA, wouldn't YOU regard keystroke-loggers - whether software or hardware - as too tempting to resist? I would. They offer direct access to the mind of the person being watched.  They could be used to help catch criminals of all kinds, foreign agents, people who want to overthrow the system, etc. Only a small fraction of those kept-track-of would one day receive a knock on the door, and the impounding of their equipment. But your data would be kept, in huge data caches bigger than Google's, just in case, one day, it's your turn.
Look at how the "War on Terror" has freaked out the public; what if there's a "War on Hate" next?

The story about Windows having an NSA trapdoor seems reliable. I have no reason to doubt the report that new versions of the Mac OS are similarly bugged. That would mean that the Hard Word has been put on top managers of those companies: comply or lose US Government contracts. If they took the money, would you be surprised? I wouldn't.

Here are Google's Results 1 - 10 of about 1,680,000 for nsa key:

CNN - NSA key to Windows: an open question - September 3, 1999 Fernandes said the NSA key would allow the intelligence agency to load services ... The alleged NSA key came to light just days after Microsoft squelched a ...
http://www.cnn.com/TECH/computing/9909/03/windows.nsa.02/ - 28k - 10 Oct 2005 -
Cached - Similar pages

Crypto-Gram: September 15, 1999 In this issue: Open Source and Security; NSA Key in Microsoft Crypto API?; Counterpane -- Featured Research; News; Extra Scary News; Counterpane News; ... http://www.schneier.com/crypto-gram-9909.html - 51k
- Cached - Similar pages

Microsoft "NSAKEY" security advisory - Privacy Software Corporation NSA nsa key microsoft security flaw crypt32.dll. ... However, we do not accept Microsoft's explanation that the "nsakey" is a "backup" key in the event of ... www.nsclean.com/nsakey.html - 19k - Cached - Similar pages

Microsoft Stonewalls NSA_key Questions Meantime, I do want to answer the "NSA key" questions right away. ... That includes the CSP signing keys, and the so-called "NSA key" in particular. ... http://cryptome.org/nsakey-ms-dc.htm - 42k - Cached - Similar pages

TP: How NSA access was built into Windows The NSA key is contained inside all versions of Windows from Windows 95 OSR2 ... A demonstration "how to do it" program that replaces the NSA key can be ... http://www.heise.de/tp/r4/artikel/5/5263/1.html - 28k - 10 Oct 2005 - Cached - Similar pages

MS denies giving NSA key | Tech News on ZDNet MS denies giving NSA key | A second key in Microsoft Windows is only to comply with federal rules governing software export, company says. |
http://news.zdnet.com/2100-9595_22-515610.html?legacy=zdnn - 33k - Cached - Similar pages

NSA Backdoor Key from Lotus-Notes In doing this I discovered that the NSA public key had an organizational name of ... The NSA's Public Key. I put this together some years after the ...
http://www.cypherspace.org/adam/hacks/lotus-nsa-key.html - 5k - Cached - Similar pages

TechWeb: The Business Technology Network The NSA key is contained inside all versions of Windows from Windows 95 OSR2 ... Van Someren said he felt the primary purpose of the NSA key might be for ... http://www.techweb.com/wire/story/TWB19990903S0014 - 73k - Cached - Similar pages

[FYI] /. Articles:Microsoft NSA key Follow-Up Articles:Microsoft NSA key Follow-Up; From: Kristian Köhntopp <kk@netuse.de>;

Date: Fri, 10 Sep 1999 09:06:34 +0200; Comment: This message comes from the ... http://www.fitug.de/debate/9909/msg00109.html - 15k - Cached - Similar pages

[PDF] How NSA access was built into Windows T File Format: PDF/Adobe Acrobat - View as HTML deny that the "NSA" key was built into their software. But they ... Researchers are divided about whether the NSA key could be ... http://www.owlriver.com/privacy/windows-backdoor-keying.pdf - Similar pages
from P.Myers.

Sub-$100 laptop design unveiled

Date: Fri, 30 Sep 2005 21:22:36 -0400 (EDT) From:
rainesco@earthlink.net

http://news.bbc.co.uk/2/hi/technology/4292854.stm

Sub-$100 laptop design unveiled

Nicholas Negroponte, chairman and founder of the Massachusetts Institute of Technology Media Labs, has been outlining designs for a sub-$100 PC. The laptop will be tough and foldable in different ways, with a hand crank for when there is no power supply.

Professor Negroponte came up with the idea for a cheap computer for all after visiting a Cambodian village. His non-profit One Laptop Per Child group plans to have up to 15 million
machines in production within a year. A prototype of the machine should be ready in November at the World Summit on he Information Society (WSIS) in Tunisia.

Children in Brazil, China, Egypt, Thailand, and South Africa will be among the first to get the under-$100 (£57) computer, said Professor Negroponte at the Emerging Technologies conference at MIT. The following year, Massachusetts governor Mitt Romney plans to start buying them for all 500,000 middle and high school pupils in the state. Professor Negroponte predicts there could be 100 million to 150 million shipped every year by 2007.

Virtually indestructible

The laptops will be encased in rubber to make them more durable, and their AC adaptors will also act as carrying straps. The Linux-based machines are expected to have a 500MHz processor, with flash memory instead of a hard drive which has more delicate moving parts. They will have four USB ports, and will be able to connect to the net through wi-fi - wireless net technology - and will be able to share data easily. It will also have a dual-mode display so that it can still be used in varying light conditions outside. It will be a colour display, but users will be able to switch easily to monochrome mode so that it can be viewed in bright sunlight, at four times normal resolution.

When Professor Negroponte saw the benefits of donated notebook PCs that Cambodian children could carry around with them, he immediately set about planning the sub-$100 machines. The project has some big-name supporters on board, including Google, which is working on thin-client applications. Thin client computing means several machines can share programs when linked up to a central "brain", or server.

Making them so cheap would mean that developing nations would be able to afford to bulk-buy them, although Professor Negroponte thinks that even $100 remains too expensive for some.
He said he is committed to the idea that children all over the world should be equipped with technology so that they can tap into the educational and communications benefits of the net.

Power is a big issue for developing nations in particular when it comes to technology, which is why the hand crank will be fitted to supply extra juice when it is needed. By using innovative technologies, such as electronic ink displays, the MIT team thinks it can reduce power consumption even further on the computers. Such displays require very little power to work.

There have been several projects to build and distribute cheap computers for developing nations in order to close the digital divide. A sub-£100 box, called Nivo, has been developed by UK not-for-profit group, Ndiyo. It runs on open source software and works as a thin client.
The Simputer has also been developed for developing nations. It is a cheap handheld computer designed by Indian scientists.