-Caveat Lector- from: http://www.zdnet.co.uk/news/2000/38/ns-18077.html Click Here: <A HREF="http://www.zdnet.co.uk/news/2000/38/ns-18077.html"> Ex-NSA expert warns of concealed backdoors</A> ----- Ex-NSA expert warns of concealed backdoors Mon, 25 Sep 2000 10:51:57 GMT Will Knight Ex-spook believes that software backdoors are out there, fuelling conspiracy theories Former NSA (National Security Agency) analyst and representative of Internet rights watchdog EPIC (Electronic Privacy Information Centre) Wayne Madsen warned privacy groups Friday that a growing number of proprietary commercial software applications may have backdoors allowing the security services to carry out surveillance activities. Speaking to privacy groups as well as cryptography and security experts at the International Forum on Surveillance by Design at the London School of Economics, Madsen warned that this is an area of growing interest for security services such as the NSA. "A lot of manufacturers play ball with the NSA," said Madsen. "This is an area that the NSA is moving into a lot and we have to be really careful about it." Until recently the US government strictly controlled the strength of cryptography in software exported to different countries, in order to protect the government's ability to access and monitor communications data. The regulations were relaxed after pressure from industry but Madsen believes that this may have driven the NSA to find ways to carry out surveillance. "They're not going to give in over exporting strong cryptography without getting something in return," he says. The NSA carries out the US government's intelligence gathering operations. It is known to gather information from Internet traffic. It is possible for programmers to put secret capabilities into the code used to build programs that are difficult to detect. Software companies including Microsoft have in the past been accused of colluding with the NSA to provide backdoors into their applications. Open source software, which publishes the underlying source code with a finished application, is by contrast entirely transparent. This has caused some foreign governments including the French administration to take an interest in open source solutions. According to Madsen, evidence of the FBI's controversial Carnivore email surveillance tool shows that NSA technology is finding its way into other law enforcement departments. He predicts that similar surveillance tools may be applied to other technologies including biometrics and smart cards and used track the movements of individuals. "These are new intelligence targets," he says. Madsen warns that government agencies often have a significant role in the development of standards for new technologies. The London forum saw presentations from a host of experts on government surveillance technology including Duncan Campbell, famous for his work on Echelon, and Tony Bunyan of Statewatch. Take me to Surveillance. Is commercial software at risk? To have your say online click on the TalkBack button and go to the ZDNet News forum. Let the editors know what you think in the Mailroom. And read what others have said. Search for similar stories Mail this story to a friend Print this story Related news stories: · Carnivore clone goes open source · Anti-snooping gurus converge on London · Top-secret agency reports computer problem · Privacy group sues NSA over spy net · Hacktivists battle against Big Brother Other stories from: Mon, 25 Sep 2000 Today's top stories · Dell cuts prices · Regulator: Irish mobile phone market growing fast · EU plans clearing AOL/Time Warner, not EMI/Warner · WorldCom to appeal EU's blocking of Sprint deal News Specials · Specials home · Unmetered access · Broadband Access Guide · Bluetooth · Echelon · techTrader · MP3 Newsroom · Linux Lounge · e-Commerce · Hackers · WAP - Access guide Free Newsletter The best in tech news - emailed daily! Sitewide · Broadband Britain -- a clickable map. Zoom in on your town? · Mobile Technology -- all the gadgets, all the news · ZDNet e-Commerce. News for e-business people Free Newsletters | Free Email | Free Stuff | ZDNet Webograms | TalkBack | Broadband Britain | ZDNet on WAP | Terms | MyZDNet Contact Us | Your Privacy | ZDNet International | Advertise | ZDNet Jobs Copyright ©2000 ZD Inc. All rights reserved. ----- Aloha, He'Ping, Om, Shalom, Salaam. Em Hotep, Peace Be, All My Relations. Omnia Bona Bonis, Adieu, Adios, Aloha. Amen. Roads End <A HREF="http://www.ctrl.org/">www.ctrl.org</A> DECLARATION & DISCLAIMER ========== CTRL is a discussion & informational exchange list. Proselytizing propagandic screeds are unwelcomed. Substance—not soap-boxing—please! These are sordid matters and 'conspiracy theory'—with its many half-truths, mis- directions and outright frauds—is used politically by different groups with major and minor effects spread throughout the spectrum of time and thought. That being said, CTRLgives no endorsement to the validity of posts, and always suggests to readers; be wary of what you read. CTRL gives no credence to Holocaust denial and nazi's need not apply. Let us please be civil and as always, Caveat Lector. ======================================================================== Archives Available at: http://peach.ease.lsoft.com/archives/ctrl.html <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of [EMAIL PROTECTED]</A> http:[EMAIL PROTECTED]/ <A HREF="http:[EMAIL PROTECTED]/">ctrl</A> ======================================================================== To subscribe to Conspiracy Theory Research List[CTRL] send email: SUBSCRIBE CTRL [to:] [EMAIL PROTECTED] To UNsubscribe to Conspiracy Theory Research List[CTRL] send email: SIGNOFF CTRL [to:] [EMAIL PROTECTED] Om