[Show all top banners]

rid
Replies to this thread:

More by rid
What people are reading
Subscribers
Subscribers
[Total Subscribers 1]

stopthewar
:: Subscribe
Back to: Kurakani General Refresh page to view new replies
 Full NSA access built into every Windows OS since 1997
[VIEWED 2441 TIMES]
SAVE! for ease of future access.
Posted on 06-18-13 9:15 PM     Reply [Subscribe]
Login in to Rate this Post:     0       ?    
 

From  Heise.de

 How NSA access was built into Windows - Duncan Campbell

Careless mistake reveals subversion of Windows by NSA.

 A CARELESS mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA "help information" trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled.

 The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.

 Computer security specialists have been aware for two years that unusual features are contained inside a standard Windows software "driver" used for security and encryption functions. The driver, called ADVAPI.DLL, enables and controls a range of security functions. If you use Windows, you will find it in the C:\Windows\system directory of your computer.

 ADVAPI.DLL works closely with Microsoft Internet Explorer, but will only run cryptographic functions that the US governments allows Microsoft to export. That information is bad enough news, from a European point of view. Now, it turns out that ADVAPI will run special programmes inserted and controlled by NSA. As yet, no-one knows what these programmes are, or what they do.

 Dr Nicko van Someren reported at last year's Crypto 98 conference that he had disassembled the ADVADPI driver. He found it contained two different keys. One was used by Microsoft to control the cryptographic functions enabled in Windows, in compliance with US export regulations. But the reason for building in a second key, or who owned it, remained a mystery.

A second key

 Two weeks ago, a US security company came up with conclusive evidence that the second key belongs to NSA. Like Dr van Someren, Andrew Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had been probing the presence and significance of the two keys. Then he checked the latest Service Pack release for Windows NT4, Service Pack 5. He found that Microsoft's developers had failed to remove or "strip" the debugging symbols used to test this software before they released it. Inside the code were the labels for the two keys. One was called "KEY". The other was called "NSAKEY".

 Fernandes reported his re-discovery of the two CAPI keys, and their secret meaning, to "Advances in Cryptology, Crypto'99" conference held in Santa Barbara. According to those present at the conference, Windows developers attending the conference did not deny that the "NSA" key was built into their software. But they refused to talk about what the key did, or why it had been put there without users' knowledge.

A third key?!

 But according to two witnesses attending the conference, even Microsoft's top crypto programmers were astonished to learn that the version of ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys. Brian LaMachia, head of CAPI development at Microsoft was "stunned" to learn of these discoveries, by outsiders. The latest discovery by Dr van Someren is based on advanced search methods which test and report on the "entropy" of programming code.

 Within the Microsoft organisation, access to Windows source code is said to be highly compartmentalized, making it easy for modifications to be inserted without the knowledge of even the respective product managers.

 Researchers are divided about whether the NSA key could be intended to let US government users of Windows run classified cryptosystems on their machines or whether it is intended to open up anyone's and everyone's Windows computer to intelligence gathering techniques deployed by NSA's burgeoning corps of "information warriors".
Last edited: 08-Jul-13 08:47 PM

 
Posted on 07-08-13 8:48 PM     [Snapshot: 147]     Reply [Subscribe]
Login in to Rate this Post:     0       ?    
 

According to Fernandez of Cryptonym, the result of having the secret key inside your Windows operating system "is that it is tremendously easier for the NSA to load unauthorized security services on all copies of Microsoft Windows, and once these security services are loaded, they can effectively compromise your entire operating system". The NSA key is contained inside all versions of Windows from Windows 95 OSR2 onwards.

 "For non-American IT managers relying on Windows NT to operate highly secure data centres, this find is worrying", he added. "The US government is currently making it as difficult as possible for "strong" crypto to be used outside of the US. That they have also installed a cryptographic back-door in the world's most abundant operating system should send a strong message to foreign IT managers". "How is an IT manager to feel when they learn that in every copy of Windows sold, Microsoft has a 'back door' for NSA - making it orders of magnitude easier for the US government to access your computer?" he asked. Can the loophole be turned round against the snoopers?


 Last summer I got contacted by a Microsoft programmer, who blew the whistle on Microsoft intentionally sabotaging the operating system, and then running closed code to conceal to the majority just how penetrable the operating system is for a chosen few. This programmer went on to say that for a price, if one Jewish corporation was in a battle against a non Jewish corporation, Microsoft would provide information about intentional back doors built into the competitor's computers, so that the zionist company could go in and entirely rape their data.


 He also went further, and said that both McCaffee and Norton work closely with Microsoft, and build additional back doors competitors can exploit the same way and that these security suites do nothing to plug Microsoft's back doors and instead provide a different flavor of method for raping data, (the difference being like your preference for either Word or Wordperfect). In the same way Microsoft will allow a system rape, these additional paid for back doors can be used to destroy individuals by allowing ordinary priviledged people full access to your system, even if they are not an intelligence agency at all. Bottom line? The only secure system is a small fully open source Linux system that you can read through yourself and verify secure. Any Microsoft O.S. is as intentionally penetrable as your cell phone, which is also inevitably the product of a zionist corporation.

 I had asked this programmer for the specifics, but then, as usual, all contact got cut and I received no further info, and this communication took place through a fresh mailbox for as long as it lasted (he was able to respond ONCE).


Dr van Someren feels that the primary purpose of the NSA key inside Windows may be for legitimate US government use. But he says that there cannot be a legitimate explanation for the third key in Windows 2000 CAPI. "It looks more fishy", he said.

Fernandez believes that NSA's built-in loophole can be turned round against the snoopers. The NSA key inside CAPI can be replaced by your own key, and used to sign cryptographic security modules from overseas or unauthorised third parties, unapproved by Microsoft or the NSA. This is exactly what the US government has been trying to prevent. A demonstration "how to do it" program that replaces the NSA key can be found on Cryptonym's website.

According to one leading US cryptographer, the IT world should be thankful that the subversion of Windows by NSA has come to light before the arrival of CPUs that handles encrypted instruction sets. These would make the type of discoveries made this month impossible. "Had the next-generation CPU's with encrypted instruction sets already been deployed, we would have never found out about NSAKEY."
 
Posted on 07-08-13 10:27 PM     [Snapshot: 239]     Reply [Subscribe]
Login in to Rate this Post:     0       ?    
 

There are two things in this world that amazes me; one is Internet and other is rid.
 
Posted on 07-09-13 11:05 AM     [Snapshot: 407]     Reply [Subscribe]
Login in to Rate this Post:     0       ?    
 

How would it work without internet?
 
Posted on 07-09-13 8:41 PM     [Snapshot: 528]     Reply [Subscribe]
Login in to Rate this Post:     0       ?    
 

They also have hidden wireless connection integrated in processors. No need for Internet :)
 
Posted on 07-09-13 9:16 PM     [Snapshot: 543]     Reply [Subscribe]
Login in to Rate this Post:     0       ?    
 

Also the vaccines that were developed here in us has nano electronics injected into almost 90% of old population. They have petabytes of data generated from each human beings daily feed into their data center. Those who have taken any vaccine in the past has already developed nano organo-electro-cybernetico lenses on their eyes corneas that is continuously taking pictures of what ever you see and continuously feeding into the huge servers hosted in space over publicly hidden electromagnetic waves with Peta bytes per seconds bandwidth. :)
 
Posted on 07-10-13 8:39 AM     [Snapshot: 691]     Reply [Subscribe]
Login in to Rate this Post:     0       ?    
 

the US Government has been storing yotabyte of data since the 1960s in the Moon and also they have been using the moon to scan earthly activities. The moon landings in 60's were the first steps in an attempt to build a large scale moon server and scanner. Why do you think this was a good idea? the moon never revolves in it's axis  so you always have the same side of the moon facing earth therefore making it a giant scanner always recording  what humans do. Second, the moon being as big as it is can still be as stealthy as any spy agent during New moon. The US Government has been using the moon to take pictures of everyone. 

On a separate note The US Government has also been engaged in attempting to reduce human and deer population within it's border by making deer crossings in the middle of highways. The US transportation department delibrately places Deer Crossing signs in the middle of major highways in an attempt to confuse the deer and have it cross the roads from these dangerous deer crossing areas and hit the cars thereby killing itself and any driver/passengers. Hopefully Mr. Rid will keep up his excellent investigative cut and paste journalism from a F grade conspiracy theory websites  and shed some light on the deer crossing conspiracy by US Government in his up coming thread.

 
Last edited: 10-Jul-13 08:44 AM

 


Please Log in! to be able to reply! If you don't have a login, please register here.

YOU CAN ALSO



IN ORDER TO POST!




Within last 90 days
Recommended Popular Threads Controvertial Threads
What are your first memories of when Nepal Television Began?
निगुरो थाहा छ ??
Basnet or Basnyat ??
TPS Re-registration case still pending ..
Sajha has turned into MAGATs nest
NRN card pros and cons?
Will MAGA really start shooting people?
मन भित्र को पत्रै पत्र!
Top 10 Anti-vaxxers Who Got Owned by COVID
काेराेना सङ्क्रमणबाट बच्न Immunity बढाउन के के खाने ?How to increase immunity against COVID - 19?
TPS Work Permit/How long your took?
Breathe in. Breathe out.
3 most corrupt politicians in the world
Guess how many vaccines a one year old baby is given
अमेरिकामा बस्ने प्राय जस्तो नेपालीहरु सबै मध्यम बर्गीय अथवा माथि (higher than middle class)
चितवनको होस्टलमा १३ वर्षीया शालिन पोखरेल झुण्डिएको अवस्था - बलात्कार पछि हत्याको शंका - होस्टेलहरु असुरक्षित
शीर्षक जे पनि हुन सक्छ।
Disinformation for profit - scammers cash in on conspiracy theories
someone please tell me TPS is here to stay :(
Travelling to Nepal - TPS AP- PASSPORT
Nas and The Bokas: Coming to a Night Club near you
NOTE: The opinions here represent the opinions of the individual posters, and not of Sajha.com. It is not possible for sajha.com to monitor all the postings, since sajha.com merely seeks to provide a cyber location for discussing ideas and concerns related to Nepal and the Nepalis. Please send an email to admin@sajha.com using a valid email address if you want any posting to be considered for deletion. Your request will be handled on a one to one basis. Sajha.com is a service please don't abuse it. - Thanks.

Sajha.com Privacy Policy

Like us in Facebook!

↑ Back to Top
free counters