Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

General Discussion

Showing Original Post only (View all)

Catherina

(35,568 posts)
Sat Jun 15, 2013, 01:56 AM Jun 2013

A trip down memory lane - How NSA access was built into Windows (1999) [View all]

I am not a techie but I remember lots of talk in the tech crowd about this but didn't pay much attention. I'm posting this without comment.

How NSA access was built into Windows
Duncan Campbell 04.09.1999
Careless mistake reveals subversion of Windows by NSA.

A CARELESS mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA "help information" trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled.

The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.

...

A second key

Two weeks ago, a US security company came up with conclusive evidence that the second key belongs to NSA. Like Dr van Someren, Andrew Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had been probing the presence and significance of the two keys. Then he checked the latest Service Pack release for Windows NT4, Service Pack 5. He found that Microsoft's developers had failed to remove or "strip" the debugging symbols used to test this software before they released it. Inside the code were the labels for the two keys. One was called "KEY". The other was called "NSAKEY".

Fernandes reported his re-discovery of the two CAPI keys, and their secret meaning, to "Advances in Cryptology, Crypto'99" conference held in Santa Barbara. According to those present at the conference, Windows developers attending the conference did not deny that the "NSA" key was built into their software. But they refused to talk about what the key did, or why it had been put there without users' knowledge.

A third key?!

...

Researchers are divided about whether the NSA key could be intended to let US government users of Windows run classified cryptosystems on their machines or whether it is intended to open up anyone's and everyone's Windows computer to intelligence gathering techniques deployed by NSA's burgeoning corps of "information warriors".

...


http://www.heise.de/tp/artikel/5/5263/1.html


There's also a quote in the article "For non-American IT managers relying on Windows NT to operate highly secure data centres, this find is worrying. The US government is currently making it as difficult as possible for "strong" crypto to be used outside of the US. That they have also installed a cryptographic back-door in the world's most abundant operating system should send a strong message to foreign IT managers".

Van Someren holds a doctorate and First Class degree in computer science from Cambridge University in the UK. He is a fellow of both the Royal Academy of Engineering and the British Computer Society



FOR IMMEDIATE RELEASE

Microsoft Installs US Spy Agency with Windows

Research Triangle Park, NC - 31 August 1999 - Between Hotmail hacks and
browser bugs, Microsoft has a dismal track record in computer security.
Most of us accept these minor security flaws and go on with life. But
how is an IT manager to feel when they learn that in every copy of
Windows sold, Microsoft may have installed a 'back door' for the
National Security Agency (NSA - the USA's spy agency) making it orders
of magnitude easier for the US government to access their computers?

While investigating the security subsystems of WindowsNT4, Cryptonym's
Chief Scientist Andrew Fernandes discovered exactly that - a back door
for the NSA in every copy of Win95/98/NT4 and Windows2000. Building on
the work of Nicko van Someren (NCipher), and Adi Shamir (the 'S' in
'RSA'), Andrew was investigating Microsoft's "CryptoAPI" architecture
for security flaws. Since the CryptoAPI is the fundamental building
block of cryptographic security in Windows, any flaw in it would open
Windows to electronic attack.

...

Then came WindowsNT4's Service Pack 5. In this service release of software
from Microsoft, the company crucially forgot to remove the symbolic
information identifying the security components. It turns out that there are
really two keys used by Windows; the first belongs to Microsoft, and it allows
them to securely load CryptoAPI services; the second belongs to the NSA. That
means that the NSA can also securely load CryptoAPI services... on your
machine, and without your authorization.

The result is that it is tremendously easier for the NSA to load unauthorized
security services on all copies of Microsoft Windows, and once these security
services are loaded, they can effectively compromise your entire operating
system. For non-American IT managers relying on WinNT to operate highly secure
data centers, this find is worrying. The US government is currently making it
as difficult as possible for "strong" crypto to be used outside of the US;
that they have also installed a cryptographic back-door in the world's most
abundant operating system should send a strong message to foreign IT managers.

...
Cryptonym: Bringing you the Next Generation of Internet Security,
using cryptography, risk management, and public key infrastructure.


Interview Contact:
Andrew Fernandes
Telephone: +#####
email: >>>>@cryptonym.com
Fax: +1 ######

Cryptonym Corporation
1695 Lincolnshire Boulevard
Mississauga, Ontario
Canada L5E 2T2

http://www.cryptonym.com

http://web.archive.org/web/20000617163417/http://www.cryptonym.com/hottopics/msft-nsa/msft-nsa.html


Then there's this, and I'm sure a lot more out there:


Microsoft Denies Windows 7 Has NSA Backdoor
By Marcus YamNovember 20, 2009 11:11 AM - Source: Tom's Hardware US

No backdoor action for Windows 7, assures Microsoft.

Earlier this week we learned that the National Security Agency (NSA) has been working with Microsoft to improve the security measures of Windows 7.

"Working in partnership with Microsoft and (the Department of Defense), NSA leveraged our unique expertise and operational knowledge of system threats and vulnerabilities to enhance Microsoft's operating system security guide without constraining the user's ability to perform their everyday tasks," said Richard Schaeffer, the NSA's Information Assurance Director. "All this was done in coordination with the product release, not months or years later in the product cycle."

...

Marc Rotenberg, the executive director of the Electronics Privacy Information Center (EPIC), expressed his concern as the NSA has an interest in surveillance as as a part of its efforts in security.

...

"The key point is that the NSA is not the right agency to promote computer security in the private sector," Rotenberg argued. "The risks to end users are real -- the original NSA key escrow proposal, 'Clipper,' was a terrible idea -- and there is too little transparency about these arrangements."

http://www.tomshardware.com/news/microsoft-windows-7-nsa-backdoor,9130.html
90 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
This message was self-deleted by its author denem Jun 2013 #1
. blkmusclmachine Jun 2013 #2
Wow. nt octoberlib Jun 2013 #3
This seems a little conspiratorial Cali_Democrat Jun 2013 #4
Considering that in several versions of MS Office Aerows Jun 2013 #6
+1 Go Vols Jun 2013 #75
Here are some more sources Aerows Jun 2013 #7
Thank you. Cali_Democrat Jun 2013 #11
Precisely Aerows Jun 2013 #13
All the second option says is how secure Windows 7 is. mattclearing Jun 2013 #87
A little!? Major Hogwash Jun 2013 #26
Your handle continues Aerows Jun 2013 #31
k and r nashville_brook Jun 2013 #5
It's very well known Aerows Jun 2013 #8
I remember techie friends in Silicon Valley being angry about it Catherina Jun 2013 #30
I'll let my avatar stand as my reply. n/t TroglodyteScholar Jun 2013 #9
Can you help me out? Catherina Jun 2013 #12
Linux Aerows Jun 2013 #14
Thank you Catherina Jun 2013 #29
That penguin logo represents Linux n/t ljm2002 Jun 2013 #32
Thanks :) n/t Catherina Jun 2013 #34
I'm kind of bad at explaining this at time, but yeah Aerows Jun 2013 #78
Tux is the mascot for Linux n/t TroglodyteScholar Jun 2013 #89
Classified data is stored on computers running windows Progressive dog Jun 2013 #10
Ha ha ha Aerows Jun 2013 #15
So that's funny, it's fact Progressive dog Jun 2013 #17
The best level of security Aerows Jun 2013 #18
Of course it is but it is more costly because you have slower access Progressive dog Jun 2013 #22
But he wasn't Aerows Jun 2013 #25
No answer, but I didn't expect one Aerows Jun 2013 #55
K&R Aerows Jun 2013 #16
I'm not surprised but what bothers me Catherina Jun 2013 #33
You should check out Microsoft's next XBox if you want to see an intrusive spy machine DJ13 Jun 2013 #61
No danger there lol Catherina Jun 2013 #70
Jesus Aerows Jun 2013 #71
The US government restricted export of programs allowing high encryption levels Progressive dog Jun 2013 #19
"Chip reworking" Aerows Jun 2013 #21
I don't understand the question Progressive dog Jun 2013 #23
You can commercially buy Aerows Jun 2013 #24
You couldn't do it at the time of clipper and Progressive dog Jun 2013 #27
No you couldn't Aerows Jun 2013 #28
is that... nebenaube Jun 2013 #62
Probably Aerows Jun 2013 #72
Okay Aerows Jun 2013 #40
That is pretty sick and stupid Progressive dog Jun 2013 #41
LOL Aerows Jun 2013 #42
Couldn't agree more Progressive dog Jun 2013 #43
You win Aerows Jun 2013 #44
Still repeating yourself, I alredy agreed with your self description Progressive dog Jun 2013 #46
LOL Aerows Jun 2013 #47
You aren't worth it Progressive dog Jun 2013 #48
Why not? Aerows Jun 2013 #49
Now that is even funnier Progressive dog Jun 2013 #51
It's as funny as your earlier claims Aerows Jun 2013 #52
Now pretending to be in on the secrets huh Progressive dog Jun 2013 #53
Er, if this is high level knowledge Aerows Jun 2013 #54
Oh are you military now, secrets secrets secrets, and you're going to post Progressive dog Jun 2013 #56
Only if you think that certain chips don't have certain abilities Aerows Jun 2013 #57
They can work miracles and the Chinese make them and install them for us Progressive dog Jun 2013 #63
I prefer that folks like you think everyone else wears a tinfoil hat Aerows Jun 2013 #64
No, maybe one in ten Progressive dog Jun 2013 #66
*wink* Aerows Jun 2013 #68
Think fast Aerows Jun 2013 #73
Don't care Progressive dog Jun 2013 #74
i.e. Aerows Jun 2013 #76
You are not only funny you are strange Progressive dog Jun 2013 #77
You just have no idea what you are talking about Aerows Jun 2013 #59
Saying it don't make it so Progressive dog Jun 2013 #60
No. Aerows Jun 2013 #65
Please explain the chip reworking IDemo Jun 2013 #79
Actually building a new chip would almost certainly be necessary. Progressive dog Jun 2013 #81
I work in R&D for a large memory company IDemo Jun 2013 #83
I agree, Progressive dog Jun 2013 #85
it's a fact that almost any misfit can write a virus to infect your computer markiv Jun 2013 #20
All those *security patches" and malicious software removal etc etc etc etc etc Catherina Jun 2013 #36
Allow me to play the part of the defenders of the faith Savannahmann Jun 2013 #35
I love #5 the best! And this one too... "isn't really a bad thing is it?" Catherina Jun 2013 #37
If you're worried about this there is a simple and cheap solution. longship Jun 2013 #38
Thanks Longship. I'm not really worried, I'm pissed off lol Catherina Jun 2013 #39
Ubuntu is fairly easy. longship Jun 2013 #45
Thanks very much. And then... Catherina Jun 2013 #50
Google is your friend. longship Jun 2013 #58
Thank you. I really appreciate all your help Catherina Jun 2013 #69
A plug for Mint IDemo Jun 2013 #80
On the other hand.. IDemo Jun 2013 #88
SELinux is a secure Linux. longship Jun 2013 #90
Maybe they can blame that burnodo Jun 2013 #67
It was this dude, wasn't it iwillalwayswonderwhy Jun 2013 #82
Ok, that made me laugh! Very good lol. Catherina Jun 2013 #84
Guys, don't miss this thread. Confirmed. They can reach into your computer any time they want Catherina Jun 2013 #86
Latest Discussions»General Discussion»A trip down memory lane -...