Conspiracy Planet

CONSPIRACY PLANET

THE ALTERNATIVE NEWS & HISTORY NETWORK

YOUR ANTIDOTE TO GOVERNMENT-MEDIA PROPAGANDA

There's No "Theory" in Criminal Conspiracy

Monday, September 1, 2014
almartinraw.com conspiracydigest.com newimprovedmemoirs.com insiderintelligence.com
uridowbenko.com conspiracydigest.com newimprovedart.com


Home | Cyber Warfare Channel
Channels
#1 Public Enemy
9-11: Conspiracy
9-11: Coverup
9-11: Crime
9-11: Enemy Within
9-11: Unanswered Questions
9-11: Who Benefits?
Abortion Industry/ Human Organ Trade
AIDS
Al Martin
Alan Cantwell
Astrology
Avian Flu/ Anthrax Scam
Bad Law, Bad Judges
Beyond the Beyond
Bilderbergers
Biowarfare
Bush/ Clinton Crime Family
Celebrity Conspiracy
Chemtrails
Cheney/Halliburton Fraud
CIA (Criminals In Action)
CIA Drug Trafficking
CIA-Bush-Nazis
Cops Gone Wild
Corporate-Govt Fraud
Criminal Government
Crop Circle Mystery
Culture (sic)
Cyber Warfare
DoJ (sic)
Drone Wars
Dyncorp Crimes
Enron Money Laundry
FDA-Big Pharma Fraud-Conspiracy
Federal Reserve Scam
Fraud (Financial)
Fraud (Military)
Globalism
GMO-Genetic Engineering/ Genetically Modified Food
Google Frauds, Scams & Conspiracy
Google Lawsuit Archives
Gulf Oil Disaster
Guns/Control
Happy News
History Recovered
Humor
Illuminati
Income Tax Slavery
Iran-Contra
Iraq (Nam)
Israel/ Zionism
Japan Nuclear Disaster
Jewish Heroes
Julian Robertson Lawsuit Archives
Killer Spooks
Media Liars
Media Whores
Michael Riconosciuto
Military Guinea Pigs
Military Tech
Mind Control
Moon Landing Scam
National ID Cards/ Microchips/ RFID
Native American
New World Order
Osama bin Scapegoat
Pentagon Fraud
Phony "Conservatives"
Phony "Progressives"
Phony Global War on Terror (GWOT)
Phony Religion
Phony War on Drugs
Phony War on 'Terrorism'
Princess Diana: Murder-Coverup
Prison/ Slave Labor Industry
PsyOps
Resist War
Ron Paul
Schwarzenegger
Suppressed Science
TSA: Govt Sex Offenders
UFO Disclosure
US Police State
USA PATRIOT Act (Treason)
Vaccination Scam
Voodoo Science
Vote Fraud - USA
War on Gold
Weather Warfare
Whistleblower: James Casbolt
Whistleblower: Oswald LeWinter
Whistleblower: Rodney Stich
Whistleblower: Sue Arrigo, M.D.
News   Links   Forum  

NSA Backdoor in Every Microsoft Operating System  (continued)
    by DUNCAN CAMPBELL

NSA Backdoor in Every Microsoft Operating System

The driver, called ADVAPI.DLL, enables and controls a range of security functions. If you use Windows, you will find it in the C:\Windows\system directory of your computer.

ADVAPI.DLL works closely with Microsoft Internet Explorer, but will only run crypographic functions that the US governments allows Microsoft to export. That information is bad enough news, from a European point of view. Now, it turns out that ADVAPI will run special programmes inserted and controlled by NSA. As yet, no-one knows what these programmes are, or what they do.

Dr Nicko van Someren reported at last year's Crypto 98 conference that he had disassembled the ADVADPI driver. He found it contained two different keys.

One was used by Microsoft to control the cryptographic functions enabled in Windows, in compliance with US export regulations. But the reason for building in a second key, or who owned it, remained a mystery.

A SECOND KEY

Two weeks ago, a US security company came up with conclusive evidence that the second key belongs to NSA. Like Dr van Someren, Andrew Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had been probing the presence and significance of the two keys. Then he checked the latest Service Pack release for Windows NT4,
Service Pack 5. He found that Microsoft's developers had failed to remove or "strip" the debugging symbols used to test this software before they released it.

Inside the code were the labels for the two keys. One was called "KEY". The other was called "NSAKEY".

Fernandes reported his re-discovery of the two CAPI keys, and their secret meaning, to "Advances in Cryptology, Crypto'99" conference held in Santa Barbara.

According to those present at the conference, Windows developers attending the conference did not deny that the "NSA" key was built into their software. But they refused to talk about what the key did, or why it had been put there without users' knowledge.

A THIRD KEY?

But according to two witnesses attending the conference, even Microsoft's top crypto programmers were astonished to learn that the version of ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys.

Brian LaMachia, head of CAPI development at Microsoft was "stunned" to learn of these discoveries, by outsiders. The latest discovery by Dr van Someren is based on advanced search methods which test and report on the "entropy" of programming code.

Within the Microsoft organisation, access to Windows source code is said to be highly compartmentalized, making it easy for modifications to be inserted without the knowledge of even the respective product managers.

Researchers are divided about whether the NSA key could be intended to let US government users of Windows run classified cryptosystems on their machines or whether it is intended to open up anyone's and everyone's Windows computer to intelligence gathering techniques deployed by NSA's burgeoning corps of "information warriors".

According to Fernandez of Cryptonym, the result of having the secret key inside your Windows operating system "is that it is tremendously easier for the NSA to load unauthorized security services on all copies of Microsoft Windows, and once these security services are loaded, they can effectively compromise your entire operating system". The NSA key is contained inside all versions of Windows from Windows 95 OSR2 onwards.

"For non-American IT managers relying on Windows NT to operate highly secure data centres, this find is worrying", he added. "The US government is currently making it as difficult as possible for "strong" crypto to be used outside of the US. That they have also installed a cryptographic back-door in the world's most abundant operating system should send a strong message to foreign IT managers".

"How is an IT manager to feel when they learn that in every copy of Windows sold, Microsoft has a 'back door' for NSA - making it orders of magnitude easier for the US government to access your computer?" he asked.

CAN THE LOOPHOLE BE TURNED ROUND AGAINST THE SNOOPERS?

Dr van Someren feels that the primary purpose of the NSA key inside Windows may be for legitimate US government use. But he says that there cannot be a legitimate explanation for the third key in Windows 2000 CAPI. "It looks more fishy", he said.

Fernandez believes that NSA's built-in loophole can be turned round against the snoopers. The NSA key inside CAPI can be replaced by your own key, and used to sign cryptographic security modules from overseas or unauthorised third parties, unapproved by Microsoft or the NSA.

This is exactly what the US government has been trying to prevent. A demonstration "how to do it" program that replaces the NSA key can be found on Cryptonym's website.

According to one leading US cryptographer, the IT world should be thankful that the subversion of Windows by NSA has come to light before the arrival of CPUs that handles encrypted instruction sets.

These would make the type of discoveries made this month impossible. "Had the next-generation CPU's with encrypted instruction sets already been deployed, we would have never found out about NSAKEY."

ORIGINALLY PUBLISHED
http://www.voxfux.com/archives/00000059.htm


Other Top Stories

Cryptome Attacked & Censored by Network Solutions by JOHN YOUNG (CRYPTOME.ORG)
US Tortures Americans with Cell Tower Neuroweapon by VIC LIVINGSTON
Free NSA-Proof Email Finally Available To Public by HOLLIE SLADE
Protect Your Privacy by RANDOLPH JACK SOLO
NSA Backdoor in Every Microsoft Operating System by DUNCAN CAMPBELL
Don't Use PayPal: PayPal Steals... Again by JIM STONE FREELANCE
Reviews
Book: AIDS &The Doctors of Death by Alan Cantwell
Book: All Tomorrows Parties by William Gibson
Book: 'Bible Fraud' by Tony Bushby
Book: 'Bushwhacked' by Uri Dowbenko
Book: 'Conspirators' by Al Martin
Book: Death in the Air by Leonard Horowitz
Book: 'Future War' by John Alexander
Book: Healing Codes for the Biological Apocalypse
Book: 'Judaism's Strange Gods'
Book: 'Not In His Image' by John Lash
Book: Not in His Image/ Video: Avatar
Book: 'Paperclip Dolls' by Annie McKenna
Book: 'Rule by Secrecy' by Jim Marrs
Book: Rulers of Evil by Tupper Saussy
Book: 'Secret Weapons' by Ted Schwarz
Book: Thanks for the Memories
Book: 'The Templars and the Assassins'
Book: 'Windswept House' by Malachi Martin
Book:'Defrauding America'by Rodney Stich
Books:'The Lexus & The Olive Tree by Tom Friedman
Video: 'Arlington Road'
Video: 'Avatar'
Video: 'Collateral Damage'
Video: 'Confidence'
Video: 'Fight Club'
Video: Passion of the Christ
Video: 'The Manchurian Candidate'
Video: Traffic
Videos: AntiTrust
Videos: 'The Patriot'
Wanted: Gen-X Spooks



Click Here!
Click Here!
Click Here!
 
 

Copyright ©2013 Conspiracy Planet; All Rights Reserved