-Caveat Lector-

from:
http://www.zdnet.co.uk/news/2000/38/ns-18077.html
Click Here: <A HREF="http://www.zdnet.co.uk/news/2000/38/ns-18077.html">
Ex-NSA expert warns of concealed backdoors</A>
-----
Ex-NSA expert warns of concealed backdoors


Mon, 25 Sep 2000 10:51:57 GMT

Will Knight
Ex-spook believes that software backdoors are out there, fuelling conspiracy
theories
Former NSA (National Security Agency) analyst and representative of Internet
rights watchdog EPIC (Electronic Privacy Information Centre) Wayne Madsen
warned privacy groups Friday that a growing number of proprietary commercial
software applications may have backdoors allowing the security services to
carry out surveillance activities.
Speaking to privacy groups as well as cryptography and security experts at
the International Forum on Surveillance by Design at the London School of
Economics, Madsen warned that this is an area of growing interest for
security services such as the NSA. "A lot of manufacturers play ball with the
NSA," said Madsen. "This is an area that the NSA is moving into a lot and we
have to be really careful about it."
Until recently the US government strictly controlled the strength of
cryptography in software exported to different countries, in order to protect
the government's ability to access and monitor communications data. The
regulations were relaxed after pressure from industry but Madsen believes
that this may have driven the NSA to find ways to carry out surveillance.
"They're not going to give in over exporting strong cryptography without
getting something in return," he says.
The NSA carries out the US government's intelligence gathering operations. It
is known to gather information from Internet traffic. It is possible for
programmers to put secret capabilities into the code used to build programs
that are difficult to detect. Software companies including Microsoft have in
the past been accused of colluding with the NSA to provide backdoors into
their applications.
Open source software, which publishes the underlying source code with a
finished application, is by contrast entirely transparent. This has caused
some foreign governments including the French administration to take an
interest in open source solutions.
According to Madsen, evidence of the FBI's controversial Carnivore email
surveillance tool shows that NSA technology is finding its way into other law
enforcement departments. He predicts that similar surveillance tools may be
applied to other technologies including biometrics and smart cards and used
track the movements of individuals. "These are new intelligence targets," he
says. Madsen warns that government agencies often have a significant role in
the development of standards for new technologies.
The London forum saw presentations from a host of experts on government
surveillance technology including Duncan Campbell, famous for his work on
Echelon, and Tony Bunyan of Statewatch.
Take me to Surveillance.
Is commercial software at risk? To have your say online click on the TalkBack
button and go to the ZDNet News forum.
Let the editors know what you think in the Mailroom. And read what others
have said.
Search for similar stories
Mail this story to a friend
Print this story


 Related news stories:

 ·  Carnivore clone goes open source
 ·  Anti-snooping gurus converge on London
 ·  Top-secret agency reports computer problem
 ·  Privacy group sues NSA over spy net
 ·  Hacktivists battle against Big Brother
  Other stories from: Mon, 25 Sep 2000



 Today's top stories
·   Dell cuts prices

·   Regulator: Irish mobile phone market growing fast

·   EU plans clearing AOL/Time Warner, not EMI/Warner

·   WorldCom to appeal EU's blocking of Sprint deal

 News Specials
 ·  Specials home
 ·  Unmetered access
 ·  Broadband Access Guide
 ·  Bluetooth
 ·  Echelon
 ·  techTrader
 ·  MP3 Newsroom
 ·  Linux Lounge
 ·  e-Commerce
 ·  Hackers
 ·  WAP - Access guide
    Free Newsletter

The best in tech news - emailed daily!



 Sitewide
·   Broadband Britain -- a clickable map. Zoom in on your town?

·   Mobile Technology -- all the gadgets, all the news

·   ZDNet e-Commerce. News for e-business people




Free Newsletters |  Free Email |  Free Stuff |  ZDNet Webograms |  TalkBack
 |  Broadband Britain |  ZDNet on WAP |  Terms |  MyZDNet

Contact Us |  Your Privacy |  ZDNet International |  Advertise |  ZDNet Jobs
Copyright ©2000 ZD Inc. All rights reserved.
-----
Aloha, He'Ping,
Om, Shalom, Salaam.
Em Hotep, Peace Be,
All My Relations.
Omnia Bona Bonis,
Adieu, Adios, Aloha.
Amen.
Roads End

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to