Yahoo scanning emails for the Government, the NSA has had Back Doors in Windows Since Windows 95

The software Yahoo created to scan emails, sounds like modified spam filter.  That software doesn’t sound that special.

In case are scared the U.S. government is scanning your Yahoo emails, the NSA has had Back Doors into your Windows computer since Windows 95 OSR2.  A “Back Door” is an way for someone other than the user to get access to a computer.  Note that this Back Door gives the NSA unlimited access to the computer to do and see whatever they want.

The NSA also reportly helped with the development of Windows 7.  Apple probably has something like this too in there OS. Linus Torvalds, creater of the Linux operating system, was asked if there was a back door in Linux and he didn’t say yes or no.

http://www.heise.de/tp/artikel/5/5263/1.html

http://www.washingtonsblog.com/2013/06/microsoft-programmed-in-nsa-backdoor-in-windows-by-1999.html

http://www.wnd.com/2013/06/nsa-has-total-access-via-microsoft-windows/

http://www.computerworld.com/article/2521809/government-it/nsa-helped-with-windows-7-development.html

NSA Built Back Door In All Windows Software by 1999

Government Built Spy-Access Into Most Popular Consumer Program Before 9/11

In researching the stunning pervasiveness of spying by the government (it’s much more wide spread than you’ve heard even now), we ran across the fact that the FBI wants software programmers to install a backdoor in all software.

Digging a little further, we found a 1999 article by leading European computer publication Heise which noted that the NSA had already built a backdoor into all Windows software:

A careless mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA “help information” trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled.

The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren [an expert in computer security]. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.

***

Two weeks ago, a US security company came up with conclusive evidence that the second key belongs to NSA. Like Dr van Someren, Andrew Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had been probing the presence and significance of the two keys. Then he checked the latest Service Pack release for Windows NT4, Service Pack 5. He found that Microsoft’s developers had failed to remove or “strip” the debugging symbols used to test this software before they released it. Inside the code were the labels for the two keys. One was called “KEY”. The other was called “NSAKEY”.

Fernandes reported his re-discovery of the two CAPI keys, and their secret meaning, to “Advances in Cryptology, Crypto’99” conference held in Santa Barbara. According to those present at the conference, Windows developers attending the conference did not deny that the “NSA” key was built into their software. But they refused to talk about what the key did, or why it had been put there without users’ knowledge.

A third key?!

But according to two witnesses attending the conference, even Microsoft’s top crypto programmers were astonished to learn that the version of ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys. Brian LaMachia, head of CAPI development at Microsoft was “stunned” to learn of these discoveries, by outsiders. The latest discovery by Dr van Someren is based on advanced search methods which test and report on the “entropy” of programming code.

Within the Microsoft organisation, access to Windows source code is said to be highly compartmentalized, making it easy for modifications to be inserted without the knowledge of even the respective product managers.

Researchers are divided about whether the NSA key could be intended to let US government users of Windows run classified cryptosystems on their machines or whether it is intended to open up anyone’s and everyone’s Windows computer to intelligence gathering techniques deployed by NSA’s burgeoning corps of “information warriors”.

According to Fernandez of Cryptonym, the result of having the secret key inside your Windows operating system “is that it is tremendously easier for the NSA to load unauthorized security services on all copies of Microsoft Windows, and once these security services are loaded, they can effectively compromise your entire operating system“. The NSA key is contained inside all versions of Windows from Windows 95 OSR2 onwards.

***

“How is an IT manager to feel when they learn that in every copy of Windows sold, Microsoft has a ‘back door’ for NSA – making it orders of magnitude easier for the US government to access your computer?” he asked.

(Updates here and here)

We have repeatedly pointed out that widespread spying on Americans began prior to 9/11.

Editor’s Note: The following report is excerpted from Joseph Farah’s G2 Bulletin, the premium online newsletter published by the founder of WND. Subscriptions are $99 a year or, for monthly trials, just $9.95 per month for credit card users, and provide instant access for the complete reports.

WASHINGTON – The National Security Agency has backdoor access to all Windows software since the release of Windows 95, according to informed sources, a development that follows the insistence by the agency and federal law enforcement for backdoor “keys” to any encryption, according to Joseph Farah’s G2 Bulletin.

Having such “keys” is essential for the export of any encryption under U.S. export control laws.

The NSA plays a prominent role in deliberations over whether such products can be exported. It routinely turns down any requests above a megabyte level that exceeds NSA’s technical capacity to decrypt it. That’s been the standard for years for NSA, as well as the departments of Defense, Commerce and State.

Computer security specialists say the Windows software driver used for security and encryption functions contains unusual features the give NSA the backdoor access.

Read more at http://www.wnd.com/2013/06/nsa-has-total-access-via-microsoft-windows/#ZTfHo6oHwEqvhXIa.99

NSA helped with Windows 7 development
Privacy expert voices ‘backdoor’ concerns, security researchers dismiss idea

Microsoft denies it built ‘backdoor’ in Windows 7
NSA helped Microsoft make Vista secure
NSA Helped Microsoft Set Security for Vista

Gregg Keizer By Gregg Keizer Follow

Computerworld | Nov 18, 2009 4:09 PM PT
RELATED TOPICS

Government IT Application Development Security Windows 10 Windows 7

Comments

The National Security Agency (NSA) worked with Microsoft on the development of Windows 7, an agency official acknowledged yesterday during testimony before Congress.

“Working in partnership with Microsoft and elements of the Department of Defense, NSA leveraged our unique expertise and operational knowledge of system threats and vulnerabilities to enhance Microsoft’s operating system security guide without constraining the user to perform their everyday tasks, whether those tasks are being performed in the public or private sector,” Richard Schaeffer, the NSA’s information assurance director, told the Senate’s Subcommittee on Terrorism and Homeland Security yesterday as part of a prepared statement.
windows server download update install
Review: Microsoft Windows Server 2016 steps up security, cloud support

Large shops will find many reasons for making the switch. Businesses of other sizes might have to do a
Read Now

“All this was done in coordination with the product release, not months or years later during the product lifecycle,” Schaeffer added. “This will improve the adoption of security advice, as it can be implemented during installation and then later managed through the emerging SCAP standards.”

Security Content Automation Protocol, or SCAP, is a set of standards for automating chores such as managing vulnerabilities and measuring security compliance. The National Institute of Standards and Technologies (NIST) oversees the SCAP standards.
ADVERTISING

This is not the first time that the NSA has partnered with Microsoft during Windows development. In 2007, the agency confirmed that it had a hand in Windows Vista as part of an initiative to ensure that the operating system was secure from attack and would work with other government software. Before that, the NSA provided guidance on how best to secure Windows XP and Windows 2000.

According to Marc Rotenberg, the executive director of the Electronics Privacy Information Center (EPIC), the NSA’s involvement with operating system development goes back even farther. “This battle goes back to at least the crypto wars of the early ’90s,” said Rotenberg, who remembered testifying about the agency’s role in private sector computer security standards in 1989.

But when the NSA puts hands on Windows, that raises a red flag for Rotenberg, who heads the Washington, D.C.-based public interest research center. “When NSA offers to help the private sector on computer security, the obvious concern is that it will also build in backdoors that enables tracking users and intercepting user communications,” Rotenberg said in an e-mail. “And private sector firms are reluctant to oppose these ‘suggestions’ since the US government is also their biggest customer and opposition to the NSA could mean to loss of sales.”

Rotenberg’s worries stem from the NSA’s reputation as the intelligence agency best known for its eavesdropping of electronic messaging, including cell phone calls and e-mail.

Andrew Storms, the director of security operations at nCircle Security, didn’t put much credence in the idea that Microsoft would allow the NSA to build a hidden entrance to Windows 7. “Would it be surprising to most people that there was a backdoor? No, not with the political agenda of prior administrations,” said Storms. “My gut, though, tells me that Microsoft, as a business, would not want to do that, at least not in a secretive way.”

Roger Thompson, chief research officer at AVG Technologies, agreed. “I can’t imagine NSA and Microsoft would do anything deliberate because the repercussions would be enormous if they got caught,” he said in an interview via instant messaging.

“Having said that, I think we should understand that there is every likelihood that certain foreign governments are constantly looking for vulnerabilities that they can use for targeted attacks,” Thompson continued. “So if they’re poking at us, I think it’s reasonable to assume that we’re doing something similar. But I seriously doubt an official NSA-Microsoft alliance.”

The NSA’s Schaeffer added that his agency is also working on engaging other major software makers, including Apple, Sun and Red Hat, on security standards for their products.

“More and more, we find that protecting national security systems demands teaming with public and private institutions to raise the information assurance level of products and services more broadly,” Schaeffer said.

Microsoft was not immediately available for comment on the NSA’s participation in Windows 7’s development.

Advertisements