<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Technology Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<atom:link href="https://goodshepherdmedia.net/tag/technology/feed/" rel="self" type="application/rss+xml" />
	<link>https://goodshepherdmedia.net/tag/technology/</link>
	<description>Christian, Political, ‎‏‏‎Social &#38; Legal Free Speech News &#124; Ⓒ2024 Good News Media LLC &#124; Shepherd for the Herd! God 1st Programming</description>
	<lastBuildDate>Sun, 05 Jan 2025 08:15:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.3</generator>

<image>
	<url>https://goodshepherdmedia.net/wp-content/uploads/2023/08/Good-Shepherd-News-Logo-150x150.png</url>
	<title>Technology Archives - Good Shepherd News - Fastest Growing Religious, Free Speech &amp; Political Content</title>
	<link>https://goodshepherdmedia.net/tag/technology/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>NSA ANT Catalog &#8211; Access Network Technology &#8211; ANT Technology</title>
		<link>https://goodshepherdmedia.net/nsa-ant-catalog-access-network-technology-ant-technology/</link>
		
		<dc:creator><![CDATA[The Truth News]]></dc:creator>
		<pubDate>Thu, 09 Jan 2025 23:29:10 +0000</pubDate>
				<category><![CDATA[Government Spying]]></category>
		<category><![CDATA[North America]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[Top Stories]]></category>
		<category><![CDATA[United States 🇺🇸]]></category>
		<category><![CDATA[Zee Truthful News]]></category>
		<category><![CDATA[🌍World Stage🌍]]></category>
		<category><![CDATA[💻Tech History]]></category>
		<category><![CDATA[🔐Cybersecurity]]></category>
		<category><![CDATA[Access Network]]></category>
		<category><![CDATA[Access Network Technology]]></category>
		<category><![CDATA[ANT Catalog]]></category>
		<category><![CDATA[ANT Technology]]></category>
		<category><![CDATA[Government Equipment]]></category>
		<category><![CDATA[Government Spy]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[NSA ANT Catalog]]></category>
		<category><![CDATA[spy]]></category>
		<category><![CDATA[Spy Catalog]]></category>
		<category><![CDATA[Spy Equipment]]></category>
		<category><![CDATA[Spy Hardware]]></category>
		<category><![CDATA[Spy Software]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://goodshepherdmedia.net/?p=9563</guid>

					<description><![CDATA[NSA ANT Catalog &#8211; Access Network Technology &#8211; ANT Technology Advanced Network Technologies (ANT) is a department of the US National Security Agency (NSA), that provides tools for the NSA&#8216;s Tailored Access Operations (TAO) 1 unit and other internal and external clients. With the tools it is possible to eavesdrop on conversations (room bugging), personal computers, networks, video displays, [&#8230;]]]></description>
										<content:encoded><![CDATA[<h1>NSA ANT Catalog &#8211; Access Network Technology &#8211; ANT Technology</h1>
<p><iframe title="Who Stole the NSA&#039;s Top Secret Hacking Tools?&#x1f399;Darknet Diaries Ep. 53: Shadow Brokers" width="640" height="360" src="https://www.youtube.com/embed/Zje2Pqmh-I0?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Advanced Network Technologies (ANT) is a department of the US <a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: National Security Agency (NSA)">National Security Agency (NSA)</span></a>, that provides tools for the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span>&#8216;s Tailored Access Operations (TAO) <sup><span style="color: #ff8800;">1</span></sup> unit and other internal and external clients. With the tools it is possible to eavesdrop on conversations (room bugging), personal computers, networks, video displays, and a lot more, using covertly installed hard- and software implants (covert ware). Most of it is built from commercial off-the-shelf parts (COTS).</p>
<p>Some of these products are listed in the <span class="short tooltip-red" data-balloon-pos="up" aria-label="Access Network Technology (NSA)">ANT</span> <a href="https://goodshepherdmedia.net/wp-content/uploads/2023/01/NSA_ANT_20070108.pdf" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: Product Catalogue">Product Catalogue</span></a>, an internal <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span> document that was intended for the US intelligence and law-enforcement community, and that was disclosed to the press on 29 December 2013 by an unknown source. It is believed that this source is <u>not</u> <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span> whistleblower <a href="https://goodshepherdmedia.net/edward-snowden-nsa-whistleblower/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: Edward Swowden">Edward Swowden</span></a>, which means there is at least one other whistleblower [3][5].</p>
<h3><span style="color: #ff0000;">➤</span> <span style="color: #0000ff;"><a style="color: #0000ff;" href="https://goodshepherdmedia.net/wp-content/uploads/2023/01/NSA_ANT_20070108.pdf">Browse the NSA ANT catalog Here</a></span></h3>
<p>&nbsp;</p>
<hr />
<p><b>LOUDAUTO<img fetchpriority="high" decoding="async" class="size-full wp-image-9565 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/loudauto_1_small.jpg" alt="" width="298" height="199" /></b> is the codename or <i>cryptonym</i> of a <a href="https://www.cryptomuseum.com/covert/bugs/index.htm" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: covert listening device (bug)">covert listening device (bug)</span></a>, developed around 2007 by the US <a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: National Security Agency (NSA)">National Security Agency (NSA)</span></a> as part of their <a href="https://goodshepherdmedia.net/wp-content/uploads/2023/01/NSA_ANT_20070108.pdf"><span data-balloon-pos="up" aria-label="More about: ANT product portfolio">ANT product portfolio</span></a>. The device is an audio-based RF retro reflector that should be activited (illuminated) by a strong continuous wave (CW) 1 GHz <sup><span style="color: #ff8800;">1</span></sup> radio frequency (RF) signal, beamed at it from a nearby listening post (LP).</p>
<p>&nbsp;</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">Although the device is activated by an external illumination signal, it should also be powered by local 3V DC source – typically provided by two button cells – from which it draws just 15µA. In this respect, it is a semi-passive element (SPE).</span></p>
<p>Room audio is picked up and amplified by a Knowles miniature microphone, that modulates the re-radiated illumination signal by means of Pulse Position Modulation (PPM). The re-emitted signal is received at the listening post – typically by a <span style="color: #f52e00;">CTX-4000</span> or <span style="color: #f52e00;">PHOTOANGLO</span> system – and further processed by means of <span class="short tooltip-red" data-balloon-pos="up" aria-label="Commercial Off-The-Shelf">COTS</span> equipment.</p>
<p>LOUDAUTO is part of the <span data-balloon-pos="up" aria-label="More about: ANGRYNEIGHBOR">ANGRYNEIGHBOR</span> family of <b>radar retro-reflectors</b>. In this context, the term <i>radar</i> refers to the continuous wave activation beam from the listening post, that operates in the 1-2 GHz frequency band. The processing and demodulation of the returned signal is typically done by means of a commercial spectrum analyser, such as the <span data-balloon-pos="up" aria-label="More about: Rohde &amp; Schwarz FSH-series">Rohde &amp; Schwarz FSH-series</span>, that has been enhanced with FM demodulating capabilities. In many respects, LOUDAUTO can be seen as a further development of the <span data-balloon-pos="up" aria-label="More about: CIA">CIA</span>&#8216;s <span data-balloon-pos="up" aria-label="More about: EASY CHAIR passive elements">EASY CHAIR passive elements</span>, combined with later active bugging devices, like the <span data-balloon-pos="up" aria-label="More about: SRT-52">SRT-52</span> and <span data-balloon-pos="up" aria-label="More about: SRT-56">SRT-56</span>, which also used Pulse Position Modulation (PPM).</p>
<p>Information about LOUDAUTO was first published in an internal Top Secret (TS) NSA document on 1 August 2007, that was available to the so-called five eyes countries (FVEY) <sup><span style="color: #ff8800;">2</span></sup> only. Although it was scheduled for declassification on 1 August 2032 (25 years after its inception), it was revealed to the public on 29 December 2013 by the German magazine <i>Der Spiegel</i>. The source of this leak is still unknown. <sup><span style="color: #ff8800;">3</span></sup> According to a product datasheet of 7 April 2009, the price of a single LOUDAUTO device was just US$ 30. According to that document, the <i>end processing</i> — presumably the demodulation — was still under development in 2009 [1].</p>
<hr />
<p><b>FiREWALK</b></p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;"><b><img decoding="async" class="size-full wp-image-9567 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/rj45_2usb_small.jpg" alt="" width="298" height="273" />FIREWALK</b> is the codename or <i>cryptonym</i> of a covert implant, developed around 2007 by or on behalf of the US <a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: National Security Agency (NSA)">National Security Agency (NSA)</span></a> as part of their <a href="https://goodshepherdmedia.net/wp-content/uploads/2023/01/NSA_ANT_20070108.pdf"><span data-balloon-pos="up" aria-label="More about: ANT product portfolio">ANT product portfolio</span></a>. The device is implanted into the RJ45 socket of the Ethernet interface of a <span class="short tooltip-red" data-balloon-pos="up" aria-label="Personal Computer">PC</span> or a network peripheral, and can intercept bidirectional gigabit ethernet traffic and inject data packets into the target network.</span></p>
<p>&nbsp;</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">The implant is housed inside a regular stacked RJ45/twin-<span class="short tooltip-red" data-balloon-pos="up" aria-label="Universal Serial Bus">USB</span> socket, such as the one shown in the image on the right. At the top are two <span class="short tooltip-red" data-balloon-pos="up" aria-label="Light Emitting Diode">LED</span>s and inside are the ethernet transformer and in some cases even an Ethernet Phy (eg. Broadcom).</span></p>
<p><span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span> was able to manipulate this standard off-the-shelf computer part – probably somewhere in the supply chain or directly at the factory where the product was assembled – and replace the internal electronics by a miniature ARM9 / <span class="short tooltip-red" data-balloon-pos="up" aria-label="Field-Programmable Gate Array">FPGA</span> computer platform, named TRINITY [2].</p>
<p>Also implanted inside the socket, is a miniature wideband radio frequency (RF) tranceiver, named HOWLERMONKEY. It allows the implant to bypass an existing firewall or air gap protection [3].</p>
<p>The implant is suitable for 10/100/1000 Mb (gigabit) networks and intercepts all network traffic, with is then sent through a <span class="short tooltip-red" data-balloon-pos="up" aria-label="Virtual Private Network">VPN</span> tunnel, using the HOWLERMONKEY <span class="short tooltip-red" data-balloon-pos="up" aria-label="Radio Frequency">RF</span> module. If the distance between the target network and the node to the Remote Operations Center (ROC) is too large, other implants in the same building may be used to relay the signal. The implant can also be used to insert data packets into the target network. The diagram below shows the construction.</p>
<div class="tooltip-red" data-balloon-pos="up" aria-label="Artist impression of the NSA's FIREWALK network implant. Copyright Crypto Museum." data-balloon-length="large"><img decoding="async" class=" wp-image-9566 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2023/01/nsa-spy-gear.png" alt="" width="476" height="325" srcset="https://goodshepherdmedia.net/wp-content/uploads/2023/01/nsa-spy-gear.png 744w, https://goodshepherdmedia.net/wp-content/uploads/2023/01/nsa-spy-gear-300x205.png 300w" sizes="(max-width: 476px) 100vw, 476px" /></div>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">At the left are the RJ45 and twin-<span class="short tooltip-red" data-balloon-pos="up" aria-label="Universal Serial Bus">USB</span> sockets, with two <span class="short tooltip-red" data-balloon-pos="up" aria-label="Light Emitting Diode">LED</span> indicators at the top. Immediately behind the sockets is a <span class="short tooltip-red" data-balloon-pos="up" aria-label="Printed Circuit Board">PCB</span> with the power circuitry. At the back is the actual <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span> FIREWALK implant, which is built around a TRINITY multi-chip module, consisting of an 180 MHz <span class="short tooltip-red" data-balloon-pos="up" aria-label="Advanced RISC Machines">ARM</span>9 microcontroller, an <span class="short tooltip-red" data-balloon-pos="up" aria-label="Field-Programmable Gate Array">FPGA</span> with 1 million gates, 96 MB <span class="short tooltip-red" data-balloon-pos="up" aria-label="Synchronous Dynamic Random-Access Memory">SDRAM</span> and 4 MB Flash memory. The latter contains the firmware, which can be tailored for a specific application or operation. In practice, the firmware would filter the network packets and relay the desired ones to the NSA&#8217;s <span class="short tooltip-red" data-balloon-pos="up" aria-label="Remote Operations Center">ROC</span>, using a nearby <span class="short tooltip-red" data-balloon-pos="up" aria-label="Radio Frequency">RF</span> node (outside the building) and the internet to transport the intercepted data <a href="https://www.cryptomuseum.com/covert/bugs/nsaant/firewalk/index.htm#ref_1">[1]</a>.</span></p>
<p>The above information was taken from original <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span> datasheets from January 2007, that were disclosed to the press in 2013 by former <span class="short" aria-label="Central Intelligence Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener">CIA </a></span>/ <a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener"><span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up">NSA</span> </a>contractor <a href="https://goodshepherdmedia.net/edward-snowden-nsa-whistleblower/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: Edward Snowden">Edward Snowden</span></a>. The items were developed by, or on behalf of, the cyber-warfare intelligence-gathering unit of the <a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener"><span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up">NSA</span></a>, known as The Office of Tailored Access Operations (TAO), since renamed Computer Network Operations <a href="https://www.cryptomuseum.com/covert/bugs/nsaant/firewalk/index.htm#ref_4">[4]</a>.</p>
<p>&nbsp;</p>
<hr />
<p><b>Cryptonyms</b></p>
<p>All products in the ANT catalogue are identified by a codeword or <i>cryptonym</i>, which is sometimes abbreviated. At present, the following ANT cryptonyms are known:</p>
<h3>NSA Spy Gear</h3>
<ul>
<li>ANGRYNEIGHBOR</li>
<li>CANDYGRAM</li>
<li>CROSSBEAM</li>
<li>CTX4000</li>
<li>CYCLONE Hx9</li>
<li>DEITYBOUNCE</li>
<li>DROPOUTJEEP</li>
<li>EBSR</li>
<li>ENTOURAGE</li>
<li>FEEDTROUGH</li>
<li>GENESIS</li>
<li>GINSU</li>
<li>GODSURGE</li>
<li>GOPHERSET</li>
<li>COTTONMOUTH-I</li>
<li>COTTONMOUTH-II</li>
<li>COTTONMOUTH-III</li>
</ul>
<ul>
<li>FIREWALK</li>
<li>GOURMETTROUGH</li>
<li>HALLUXWATER</li>
<li>HEADWATER</li>
<li>HOWLERMONKEY</li>
<li>IRATEMONK</li>
<li>IRONCHEF</li>
<li>JETPLOW</li>
<li>JUNIORMINT</li>
<li>LOUDAUTO</li>
<li>MAESTRO-II</li>
<li>MONKEYCALENDAR</li>
<li>NEBULA</li>
<li>NIGHTSTAND</li>
<li>NIGHTWATCH</li>
<li>PHOTOANGLO</li>
<li>PICASSO</li>
</ul>
<ul>
<li>RAGEMASTER</li>
<li>SCHOOLMONTANA</li>
<li>SIERRAMONTANA</li>
<li>SOMBERKNAVE</li>
<li>SOUFFLETROUGH</li>
<li>SPARROW II</li>
<li>STUCCOMONTANA</li>
<li>SURLYSPAWN</li>
<li>SWAP</li>
<li>TOTECHASER</li>
<li>TOTEGHOSTLY</li>
<li>TAWDRYYARD</li>
<li>TRINITY</li>
<li>TYPHON HX</li>
<li>WATERWITCH</li>
<li>WISTFULTOLL</li>
</ul>
<h3>Room surveillance</h3>
<ul>
<li>CTX-4000</li>
<li><a href="https://www.cryptomuseum.com/covert/bugs/nsaant/loudauto/index.htm">LOUDAUTO</a></li>
<li>NIGHTWATCH</li>
<li>PHOTOANGLO</li>
<li>TAWDRYYARD</li>
</ul>
<p><b>Documentation</b><img loading="lazy" decoding="async" src="https://www.cryptomuseum.com/img/blank.gif" width="1" height="1" /><img loading="lazy" decoding="async" src="https://www.cryptomuseum.com/img/blank.gif" width="1" height="4" /></p>
<ol type="A">
<li><a href="https://goodshepherdmedia.net/wp-content/uploads/2023/01/NSA_ANT_20070108.pdf" target="_blank" rel="noopener">NSA, ANT Product catalog</a><br />
8 January 2007. Obtained from <a href="https://www.cryptomuseum.com/covert/bugs/nsaant/index.htm#ref_2">[2]</a>.</li>
</ol>
<p><b>References</b></p>
<ol>
<li><a href="https://nsa.gov1.info/dni/index.htm">IC off the Record, <i>The NSA Toolbox: ANT Product Catalog</i></a><br />
29-30 December 2013.</li>
<li><a href="https://tinyurl.com/qa9vwzm">Jacob Appelbaum, Judith Horchert, Christian Stöcker, <i>Catalogue Advertises NSA Toolbox</i></a><br />
Spiegel Online. 29 December 2013.</li>
<li><a href="https://en.wikipedia.org/wiki/NSA_ANT_catalog" target="_blank" rel="noopener">Wikipedia, <i>NSA ANT catalog</i></a><br />
Retrieved November 2020.</li>
<li><a href="https://en.wikipedia.org/wiki/Tailored_Access_Operations" target="_blank" rel="noopener">Wikipedia, <i>Tailored Access Operations</i></a><br />
Retrieved November 2020.</li>
<li><a href="https://www.reuters.com/article/us-intelligence-commentary-idUSKCN10X01P" target="_blank" rel="noopener">James Bamford, <i>Commentary: Evidence points to another Snowden at the NSA</i></a><br />
Reuters, 22 August 2016.</li>
</ol>
<p><b>Further information</b></p>
<ul>
<li><a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">About the NSA</a></li>
<li><a href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener">About the CIA</a></li>
<li><a href="https://www.cryptomuseum.com/covert/bugs/index.htm" target="_blank" rel="noopener">Other bugs</a></li>
</ul>
<p><a href="https://www.cryptomuseum.com/covert/bugs/nsaant/index.htm" target="_blank" rel="noopener">source</a></p>
<hr />
<h2>Backdoors &#8211; <b>Exploitable weaknesses in a cipher system</b></h2>
<p><iframe title="Exposing the NSA’s Mass Surveillance of Americans | CYBERWAR" width="640" height="360" src="https://www.youtube.com/embed/tYVm62oEyWA?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Deliberate weakening of a <a href="https://www.cryptomuseum.com/crypto/index.htm"><span data-balloon-pos="up" aria-label="More about: cipher system">cipher system</span></a>, commonly known as a <i>backdoor</i>, is a technique that is used by, or on behalf of, <a href="https://www.cryptomuseum.com/intel/index.htm"><span data-balloon-pos="up" aria-label="More about: intelligence agencies">intelligence agencies</span></a> like the US <a href="https://www.cryptomuseum.com/intel/nsa/index.htm"><span data-balloon-pos="up" aria-label="More about: National Security Agency (NSA)">National Security Agency (NSA)</span></a> – and others – to make it easier for them to break the cipher and access the data. It is often thought that intelligence services have a <i><a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm#master"><span data-balloon-pos="up" aria-label="Jump to: Master Key">Master Key</span></a></i> that gives them instant access to the data, but in reality it is often much more complicated, and requires the use of sophisticated computing skills.</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">In the past, intelligence services like the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> weakened the ciphers just enough to allow it to be barely broken with the computing power that was available to them (e.g. by using their vast array of Cray super computers), assuming that other parties did not have that capability. Implementing a <i>backdoor</i> is difficult and dangerous, as it might be discovered by the user — after which it can no longer be used — or by another party, in which case it can be exploited by an adversary.</span></p>
<p><iframe title="Exposed: Secret Government Surveillance Tools They DON&#039;T Want You to Know About!" width="640" height="360" src="https://www.youtube.com/embed/iRYji0Q2K30?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></p>
<p>Below is a non-exhaustive overview of known backdoor constructions and examples:</p>
<ul>
<li>Weakening of the encryption algorithm</li>
<li>Weakening the KEY</li>
<li>Hiding the KEY in the cipher text</li>
<li>Manipulation of user instructions (manual)</li>
<li>Key generator with predictive output</li>
<li>Implementation of a hidden &#8216;unlock&#8217; key (master key)</li>
<li>Key escrow</li>
<li>Side channel attack (TEMPEST)</li>
<li>Unintended backdoors</li>
<li>Covertly installed hard- and/or software (spyware)</li>
</ul>
<h3>Weakening of the algorithm</h3>
<p>One of the most widely used types of backdoor, is weakening of the algorithm. This was done with mechanical cipher machines – such as the <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: CX-52">CX-52</span></a> – electronic ones – such as the <a href="https://www.cryptomuseum.com/crypto/hagelin/h460/index.htm"><span data-balloon-pos="up" aria-label="More about: H-460">H-460</span></a> – and <a href="https://www.cryptomuseum.com/crypto/algo/index.htm"><span data-balloon-pos="up" aria-label="More about: software-based encryption">software-based encryption</span></a>. <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> often weakened the algorithm just enough to break it with the help from a super computer (e.g. Cray), assuming that adversaries did not have that capacity.</p>
<p>This solution is universal. It can be applied to mechanical, electronic and computer-based encryption systems. One of the first known examples is the weakening of the <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: Hagelin CX-52">Hagelin CX-52</span></a> by <a href="https://www.cryptomuseum.com/people/jenks/peter.htm"><span data-balloon-pos="up" aria-label="More about: Peter Jenks">Peter Jenks</span></a> of the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>, in the early 1960s <a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm#ref_1">[1]</a>.</p>
<p>The <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: Hagelin CX-52">Hagelin CX-52</span></a> had the problem that it was theoretically safe when used correctly. It was possible however to configure the device in such a way that it produced a short cycle, as a result of which it became easy to break. <a href="https://www.cryptomuseum.com/people/jenks/peter.htm"><span data-balloon-pos="up" aria-label="More about: Jenks">Jenks</span></a> modified the <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52"><span data-balloon-pos="up" aria-label="More about: CX-52">CX-52</span></a> in such a way that it always produced a long cycle, albeit one that he could predict.</p>
<div data-balloon-pos="up" aria-label="CX-52 with open lid"><img loading="lazy" decoding="async" class=" wp-image-9589 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/1small.jpg" alt="" width="277" height="186" /></div>
<p>&nbsp;</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">The modified product was designated <b>CX-52M</b> and was marketed by <a href="https://www.cryptomuseum.com/manuf/crypto/index.htm"><span data-balloon-pos="up" aria-label="More about: Crypto AG">Crypto AG</span></a> as a new version with improved security, which customers immediately started ordering in quantities. He repeated the exercise in the mid-1960s, when <a href="https://www.cryptomuseum.com/manuf/crypto/index.htm"><span data-balloon-pos="up" aria-label="More about: Crypto AG">Crypto AG</span></a> moved from mechanical to electronic designs.</span></p>
<p>The first electronic cipher machines were built around (non)linear feedback shift registers – LFSR or NLFSR – built with the (then) newest generation of integrated circuits (ICs). This part is commonly known as the <i>crypto heart</i> or the <i>cryptologic</i>. <a href="https://www.cryptomuseum.com/people/jenks/peter.htm"><span data-balloon-pos="up" aria-label="More about: Jenks">Jenks</span></a> manipulated the shift registers in such as way that it seemed robust from the outside. Nevertheless <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> could break it, as they knew the exact nature of the built-in weakness.</p>
<p>Manipulating the cryptologic, or actually the cryptographic algorithm, requires quite some mathematical ingenuity, and is not trivial at all.<img loading="lazy" decoding="async" class=" wp-image-9590 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/2small.jpg" alt="" width="273" height="183" /></p>
<p>During the 1970s, the weaknesses were discovered by several (unwitting) <span class="short" aria-label="Crypto AG (Hagelin)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/manuf.crypto/index.htm">Crypto AG</a></span> employees and even by customers. <span class="short" aria-label="Crypto AG (Hagelin)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/manuf.crypto/index.htm">Crypto AG</a></span> usually fended them off with the excuse that the algorithm had been developed a long time ago, and that an improved version would be released soon. It should be no surprise that hiding the weaknesses became increasingly difficult over the years.</p>
<p>The same principle can be applied to software-implementations of cryptographic algorithms as well, but it has become extremely difficult to do that in such a way that it passes existing tests, such as NIST entropy-tests, and can with­stand the peer review of the academic community.</p>
<p>Another popular method for weakening a cipher system, is by shortening the effective length of the crypto KEY. The length is typically specified in <i>bits</i>, and in the 1980s, the keys of military cipher systems were typically 128 bits long, which was about twice the length that was needed.</p>
<p>&nbsp;</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">The <a href="https://www.cryptomuseum.com/crypto/algo/des/index.htm"><span data-balloon-pos="up" aria-label="More about: DES encryption algorithm">DES encryption algorithm</span></a> – that was used for bank transactions – had a key length of 56 bits. It had been developed by Horst Feistel at IBM as <i>Lucifer</i> and had been improved by <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>.</span></p>
<p>In 1983, the small Dutch company <a href="https://www.cryptomuseum.com/manuf/texttell/index.htm"><span data-balloon-pos="up" aria-label="More about: Text Lite">Text Lite</span></a>, introduced the small <a href="https://www.cryptomuseum.com/crypto/philips/px1000/index.htm"><span data-balloon-pos="up" aria-label="More about: PX-1000 pocket terminal">PX-1000 pocket terminal</span></a> shown in the image on the right. It had a built-in text editor and an acoustic modem, by which texts could be uploaded in seconds. The device used <a href="https://www.cryptomuseum.com/crypto/algo/des/index.htm"><span data-balloon-pos="up" aria-label="More about: DES encryption">DES encryption</span></a> for the protection of the text messages, which was thought to be useful for journalists and business men on the move.</p>
<div data-balloon-pos="up" aria-label="Original PX-1000 made in 1983"><img loading="lazy" decoding="async" class=" wp-image-9591 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/3small.jpg" alt="" width="272" height="183" /></div>
<p><a href="https://www.cryptomuseum.com/crypto/algo/des/index.htm"><span data-balloon-pos="up" aria-label="More about: DES">DES</span></a> was considered secure at the time. Although it might have been breakable by <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>, doing so would cost a lot of resources (i.e. computing power). With <span class="short" aria-label="Data Encryption Standard" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/crypto/algo/des/index.htm">DES</a></span> available in a consumer product for an affordable price, <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> faced a serious problem, and turned to <a href="https://www.cryptomuseum.com/crypto/philips/usfa.htm"><span data-balloon-pos="up" aria-label="More about: Philips Usfa">Philips Usfa</span></a></p>
<p>for assistence.<a href="https://www.cryptomuseum.com/crypto/philips/index.htm"><span data-balloon-pos="up" aria-label="More about: Philips">Philips</span></a> bought the entire stock of</p>
<p><a class="short" href="https://www.cryptomuseum.com/crypto/algo/des/index.htm">DES</a>-enabled devices and shipped it to the US. The product was then re-released under the Philips brand, with an algorithm that was supplied by <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>.</p>
<p>The new algorithm was a stream cipher with a key-length of no less than 64 bits. This is more than the 56 bits of <span class="short" aria-label="Data Encryption Standard" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/crypto/algo/des/index.htm">DES</a></span>, and suggested that it was a least a strong as <span class="short" aria-label="Data Encryption Standard" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/crypto/algo/des/index.htm">DES</a></span>, and probably even stronger. By reverse engineering the algorithm, Crypto Museum has meanwhile concluded that of the 64 key bits, only 32 are significant. This means that the key has effectively been halved.</p>
<div data-balloon-pos="up" aria-label="Original ROM (with DES) and replacement EPROM (with NSA algorithm)" data-balloon-length="large"><img loading="lazy" decoding="async" class=" wp-image-9588 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/4small.jpg" alt="" width="264" height="177" /></div>
<p>Does this mean that it takes only half the time to break the key? No, as each key-bit doubles the number of combinations, removing 32 bits means that it has become 4,294,967,296 times easier to break the key (2<sup>32</sup>). For example: if we assume that it takes one full year to break a 64-bit key, breaking a 32-bit key would take just 0.007 seconds. A piece of cake for <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>&#8216;s super computers.</p>
<p>Hide the KEY in the ciphertext</p>
<p>It is sometimes suggested that the cryptographic key might be hidden in the output stream (i.e. in the cipher text). Not in a readable form, of course, but when you known where to look, the key will reveal itself. Although this method is prone to discovery it has in fact been used in the past.</p>
<p>A good example of this technique is the <a href="https://www.cryptomuseum.com/crypto/hagelin/cse280/index.htm"><span data-balloon-pos="up" aria-label="More about: Hagelin CSE-280 voice encryptor">Hagelin CSE-280 voice encryptor</span></a>, that was introduced by <span class="short" aria-label="Crypto AG (Hagelin)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/manuf.crypto/index.htm">Crypto AG</a></span> in the early 1970s. The product had been developed in cooperation with the German cipher authority <span class="short" aria-label="Centralstelle für das Chiffrierwesen (Germany)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/zfch/index.htm">ZfCh</a></span> (part of the <span class="short" aria-label="Bundesnachrichtendienst (Germany)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/bnd/index.htm">BND</a></span>), and used forward synchro­nisation, to allow <i>late entry sync</i>.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class=" wp-image-9593 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/5small.jpg" alt="" width="273" height="183" />The key was hidden in the preample that was inserted at the beginning of each transmission. If one knew where to look, the entire key could be reconstructed. A few years after the device had been introduced, <span class="short" aria-label="Crypto AG (Hagelin)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/manuf.crypto/index.htm">Crypto AG</a></span>&#8216;s chief developer Peter Frutiger suddenly realised how it was done.</p>
<p>&nbsp;</p>
<p>It was only a matter of time before customers would discover it too. In 1976, the Syrians became aware of the (badly hidden) key in the preamble, and notified <span class="short" aria-label="Crypto AG (Hagelin)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/manuf.crypto/index.htm">Crypto AG</a></span>, where Frutiger provided them with a fix that made it instantly unbreakable. <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> was furious and Frutiger got fired for this.</p>
<div data-balloon-pos="up" aria-label="CSE-280 in metal frame"></div>
<p><img loading="lazy" decoding="async" class=" wp-image-9592 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/5mall.jpg" alt="" width="372" height="250" />The exploit was based on redundancy in the enciphered message preamble. It caused a bias which was an unnecessary shortcoming by design. It involved solving a set of binary equasions, an exponentially large number of times, for which the <i>special purpose device</i> was developed.More bout Aroflex<br />
Rigging the manualIn some cases, the cipher can be weakened by manipulating the manual. This was done for example with the manuals of the <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: Hagelin CX-52 machine">Hagelin CX-52 machine</span></a>. Although the <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: CX-52">CX-52</span></a> was in theory a virtually unbreakable machine, it could be set up accidentally in such a way, that it produced a short cycle (period), which was easy to break.By manipulating the manual, guidelines were given for &#8216;proper&#8217; use of the machine, but in reality the user was instructed to configure the machine in such a way that it generated a short cycle, which was easy to break by the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>.</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">Another example of hiding hints in the output stream, is the <a href="https://www.cryptomuseum.com/crypto/philips/aroflex/index.htm"><span data-balloon-pos="up" aria-label="More about: T-1000/CA">T-1000/CA</span></a>, internally known as <i>Beroflex</i>, that was the civil version of the NATO-approved <a href="https://www.cryptomuseum.com/crypto/philips/aroflex/index.htm"><span data-balloon-pos="up" aria-label="More about: Aroflex">Aroflex</span></a>, a joint development of <a href="https://www.cryptomuseum.com/crypto/philips/index.htm"><span data-balloon-pos="up" aria-label="More about: Philips">Philips</span></a> and <a href="https://www.cryptomuseum.com/crypto/siemens/index.htm"><span data-balloon-pos="up" aria-label="More about: Siemens">Siemens</span></a>. It was based on a <a href="https://www.cryptomuseum.com/telex/siemens/t1000/index.htm"><span data-balloon-pos="up" aria-label="More about: T-1000 telex">T-1000 telex</span></a>.</span></p>
<p>Whilst the Aroflex was highly secure, Beroflex (T-1000/CA) was not. With the right means and the right knowledge, it could be broken. This was not a trivial task however, and required the use of a <i>special purpose device</i> – a super chip – that had been co-developed by experts at the codebreaking division of the Royal Dutch Navy.</p>
<p>Key generator with predictive outputMany encryption systems, old and new alike, make use of KEY-generators – commonly <i>pseudo random number generators</i>, or PRNGs – for example for the generation of unique message keys, for generating private and public keys, and for generating the key stream in a stream cipher.By manipulating the key generator, it is theoretically possible to generate predictable keys, weak keys or predicatable cycles. Examples are the mechanical key generator of the <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: Hagelin CX-52M">Hagelin CX-52M</span></a>, but also the software-based random number generators (RNGs) in modern software algorithms.Creating this kind of weaknesses is neither simple nor trivial, as the weakened key generator has to withstand a variety of existing entropy tests, including the ones published by the US National Institute of Standards and Technology (NIST). Nevertheless, various (potential) backdoors based on weakened PRNGs have been reported in the press, some of which are attributed to the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span>.In December 2013, Reuters reported that documents released by <a href="https://www.cryptomuseum.com/people/snowden/index.htm"><span data-balloon-pos="up" aria-label="More about: Edward Snowden">Edward Snowden</span></a> indicated that <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> had payed RSA Security US$ 10 million to make Dual Elliptic Curve Deterministic Random Bit Generator (Dual_EC_DRBG) the default in their encryption software. It had already been proven in 2007, that constants could be constructed in such a way as to create a kleptographic backdoor in the NIST-recommended Dual_EC_DRBG <a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm#ref_3">[3]</a>. It had been deliberately inserted by NSA as part of its BULLRUN decryption program. NIST promptly withdrew Dual_EC_DRBG from its draft guidance <a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm#ref_4">[4]</a>.<span style="color: #e7e;">➤</span> <a href="https://en.wikipedia.org/wiki/Random_number_generator_attack" target="_blank" rel="noopener">Wikipedia: Random number generator attack</a><br />
<span style="color: #e7e;">➤</span> <a href="https://en.wikipedia.org/wiki/Dual_EC_DRBG" target="_blank" rel="noopener">Wikipedia: Dual_EC_DRBG</a><br />
It is often thought by the general public, that intelligence agencies have something like a magic password, or master key, that gives them instant access to secure communications of a subject. Although in most cases the backdoor mechanism is far more complex, it is technically possible.An example of a possible master key, is the so-called_NSAKEY<span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;"> that was found in a Microsoft operating system in 1999. The variable contained a 1024-bit public key, that was similar to the cryptographic keys that are used for encryption and authentication. Although Microsoft firmly denied it, it was widely speculated that the key was there to give the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> access to the system.</span>There are however a few other possible explanations for the presence of this key — including a backup key, a key for installing <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> proprietary crypto suites, and incompetence on the part of Microsoft, <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> or both — all of which seem plausible. In addition, Dr. Nicko van Someren found a third – far more obscure – key in Windows 2000, which he doubted had a legitimate purpose <a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm#ref_5">[5]</a>.<span style="color: #e7e;">➤</span> <a href="https://en.wikipedia.org/wiki/_NSAKEY" target="_blank" rel="noopener">Wikipedia: _NSAKEY</a><br />
A good example of KEY ESCROW is the so-called <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm"><span data-balloon-pos="up" aria-label="More about: Clipper Chip">Clipper Chip</span></a>, that was introduced by the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/intel/nsa/index.htm">NSA</a></span> in the early 1990s, in an attempt to control the use of strong encryption by the general public.It was the intention to use this chip in all civil encryption products, such as computers, secure telephones, etc., so that everyone would be able to use strong encryption. By forcing people to surrender their keys to the (US) government, law enforcement agencies had the ability to decrypt the communication, should that prove to be necessary during the course of an investigation.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-9597 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/small-2.jpg" alt="" width="298" height="200" />Encryption systems are often attacked by adversaries, by exploiting information that is hidden in the so-called side channels. This is known as a <i>side channel attack</i>. In most cases, side channels are unintended, but they may have been inserted deliberately to give an eavesdropper a way in.Side channels are often unwanted emanations – such as radio frequency (RF) signals that are emitted by the equipment, or sound generated by a printer or a keyboard – but may also take the form of variations in power consumption (current) that occur when the device is in use (power analysis). In military jargon, unwanted emanations are commonly known as TEMPEST.An early example of a cryptographic device that exhibited exploitable TEMPEST problems, is the <a href="https://www.cryptomuseum.com/crypto/philips/img/300037/000/small.jpg"><span data-balloon-pos="up" aria-label="More about: Philips Ecolex IV mixer">Philips Ecolex IV mixer</span></a> shown in the image on the right, which was approved for use by NATO.As it was based on the <a href="https://www.cryptomuseum.com/crypto/ott.htm"><span data-balloon-pos="up" aria-label="More about: One-Time Tape (OTT)">One-Time Tape (OTT)</span></a> principle, it was theoretically safe. However, in the mid-1960s, the Dutch national physics laboratory TNO, proved that minute glitches in the electric signals on the teleprinter data line, could be exploited to reconstruct the original plaintext. The problem was eventually soved by adding filters between the device and the teleprinter line.<span style="color: #e7e;">➤</span> <a href="https://en.wikipedia.org/wiki/Side-channel_attack" target="_blank" rel="noopener">Wikipedia: Side-channel attack</a> &lt;<span style="color: #f52e00; font-family: Lucida Grande,Arial,Verdana,sans-serif;">Unintended weaknesses</span>Backdoors can also be based on unintentional weaknesses in the design of an encryption device. For example, the <a href="https://www.cryptomuseum.com/crypto/enigma/index.htm"><span data-balloon-pos="up" aria-label="More about: Enigma machine">Enigma machine</span></a> – used during WWII by the German Army – can not encode a This and other weaknesses greatly helped the codebreakers at <a href="https://www.cryptomuseum.com/bp/index.htm"><span data-balloon-pos="up" aria-label="More about: Bletchley Park">Bletchley Park</span></a>, and allowed the cipher to be broken throughout World War II.Unintended weaknesses were also present in the early mechanical cipher machines of <span class="short" aria-label="Crypto AG (Hagelin)" data-balloon-pos="up"><a class="short" href="https://www.cryptomuseum.com/manuf.crypto/index.htm">Crypto AG</a></span> (Hagelin), such as the <a href="https://www.cryptomuseum.com/crypto/hagelin/c36/index.htm"><span data-balloon-pos="up" aria-label="More about: C-36">C-36</span></a>, <a href="https://www.cryptomuseum.com/crypto/hagelin/m209/index.htm"><span data-balloon-pos="up" aria-label="More about: M-209">M-209</span></a>, <a href="https://www.cryptomuseum.com/crypto/hagelin/c446/index.htm"><span data-balloon-pos="up" aria-label="More about: C-446">C-446</span></a> and <a href="https://www.cryptomuseum.com/crypto/hagelin/cx52/index.htm"><span data-balloon-pos="up" aria-label="More about: CX-52">CX-52</span></a>. Although they were theoretically strong, they could accidentally be setup in such a way that they produced a short cycle, which could be broken much more easily. Similar properties can be found in the first generations of electronic crypto devices that are based on shift-registers.</p>
<div data-balloon-pos="up" aria-label="Close-up of the Clipper Chip inside the TSD-3600"><img loading="lazy" decoding="async" class="size-full wp-image-9598 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/small-3.jpg" alt="" width="298" height="200" /></div>
<p>It had to be assumed that the (US) government could be trusted under all circumstances, and that sufficient mechanisms were in place to avoid unwarranted tapping and other abuse, which was heavily disputed by the Electronic Frontier Foundation (EFF) and other privacy organisations.</p>
<p>The device – which used the <a href="https://www.cryptomuseum.com/crypto/usa/skipjack.htm"><span data-balloon-pos="up" aria-label="More about: Skipjack algorithm">Skipjack algorithm</span></a> – was not embraced by the public. In addition, it contained a serious flaw. In 1994, shortly after its introduction, (then) AT&amp;T researcher Matt Blaze discovered the possibility to tamper the device in such a way that it offered strong encryption whilst disabling the escrow capability. And that was not what the US Government had in mind.</p>
<p><b>Cryptographic Key Escrow</b></p>
<p>The Clipper Chip was a cryptographic chipset developed and promoted by the US Government. It was intended for implementation in <a href="https://www.cryptomuseum.com/crypto/voice.htm"><span data-balloon-pos="up" aria-label="More about: secure voice equipment">secure voice equipment</span></a>, such as <a href="https://www.cryptomuseum.com/crypto/phone.htm"><span data-balloon-pos="up" aria-label="More about: crypto phones">crypto phones</span></a>, and required its users to surrender their cryptographic keys in escrow to the government. This would allow law enforcement agencies (<a href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: CIA">CIA</span></a>, FBI), to decrypt any traffic for surveillance and intelligence  purposes. The controversial Clipper Chip was announced in 1993 and was already defunct by 1996 <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#ref_1">[1]</a>.</p>
<p>The physical chip was designed by <a href="https://www.cryptomuseum.com/crypto/usa/kiv7/index.htm#manuf"><span data-balloon-pos="up" aria-label="More about: Mykotronx">Mykotronx</span></a> (USA) and manufactured by VLSI Technology Inc. (USA). The initial cost for an unprogrammed chip was $16 and a programmed one costed $26.</p>
<p>The image on the right shows the Mykotronx <b>MYK78T</b> chip as it is present inside the AT&amp;T&#8217;s <a href="https://www.cryptomuseum.com/crypto/att/tsd3600/index.htm"><span data-balloon-pos="up" aria-label="More about: TSD-3600-E telephone encryptor">TSD-3600-E telephone encryptor</span></a>. The chip is soldered directly to the board (i.e. not socketed) and was thought to be tamper-proof (<a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#weakness"><span data-balloon-pos="up" aria-label="Jump to: see below">see below</span></a>). The <a href="https://www.cryptomuseum.com/crypto/att/tsd3600/index.htm"><span data-balloon-pos="up" aria-label="More about: AT&amp;T TSD-3600 telephone encryptor">AT&amp;T TSD-3600 telephone encryptor</span></a> was the first and only product that featured the ill-fated Clipper Chip before it was withdrawn.</p>
<p>in order to provide a level of protection against misuse of the key by law enforcement agencies, it was agreed that the Unit Key of each device with a clipper chip, would be held in escrow jointly by two federal agencies. This means that the actual Unit Key was split in two parts, each of which was given to one of the agencies. In order to reconstruct the actual Unit Key, the database of both agencies had to be accessed and the two half-Unit Keys had to be combined by bitwise XOR <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#ref_3">[3]</a>.</p>
<p><b>Skipjack Algorithm</b><br />
The Clipper Chip used the <a href="https://www.cryptomuseum.com/crypto/usa/skipjack.htm"><span data-balloon-pos="up" aria-label="More about: Skipjack encryption algorithm">Skipjack encryption algorithm</span></a> for the transmission of information, and the Diffie-Hellman key exchange algorithm for the distribution of the cryptographic session keys between peers. Both algorithms are believed to provide good security.</p>
<p>The Skipjack algorithm was developed by the <a href="https://www.cryptomuseum.com/crypto/usa/nsa.htm"><span data-balloon-pos="up" aria-label="More about: NSA">NSA</span></a> and was classed an NSA <a href="https://www.cryptomuseum.com/crypto/usa/nsa.htm#types"><span data-balloon-pos="up" aria-label="More about: Type 2 encryption product">Type 2 encryption product</span></a>. The algorithm was initially classified as SECRET, so that it could not be examined in the usual manner by the encryption research community. After much debate, the Skipjack algorithm was finally declassified and published by the <a href="https://www.cryptomuseum.com/crypto/usa/nsa.htm"><span data-balloon-pos="up" aria-label="More about: NSA">NSA</span></a> on 24 June 1998 <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#ref_2">[2]</a>. It uses an 80-bit key and a symmetric cipher algorithm, similar to DES.</p>
<p><b>Key Escrow</b><br />
The heart of the concept was <b>Key Escrow</b>. Any device with a Clipper Chip inside (e.g. a <a href="https://www.cryptomuseum.com/crypto/att/tsd3600/index.htm"><span data-balloon-pos="up" aria-label="More about: crypto phone">crypto phone</span></a>) would be assigned a <b>cryptographic key</b>, which would be given to the government in escrow. The user would then assume the government to be the so-called <b>trusted third party</b>. If government agencies &#8220;established their authority&#8221; to intercept a particular communication, the key would be given to that agency, so that all data transmitted by the subject could be decrypted.</p>
<p>The concept of Key Escrow raised much debate and became heavily disputed. The Electronic Frontier Foundation (EFF), established in 1990, preferred the term <i>Key Surrender</i> to stress what, according to them, was actually happening. Together with other public interest organizations, such as the Electronic Privacy Information Center, the EFF challenged the Clipper Chip proposal, saying that it would be illegal and also ineffective, as criminals wouldn&#8217;t use it anyway.</p>
<p>In response to the Clipper Chip initiative by the US Government, a number of very strong <i>public</i> encryption packages were released, such as Nautilus, PGP and PGPfone. It was thought that, if strong cryptography was widely available to the public, the government would be unable to stop its use. This approach appeared to be effective, causing the premature &#8216;death&#8217; of the Clipper Chip, and with it the death of Key Escrow in general.</p>
<p>In 1993, AT&amp;T Bell produced the first and only telephone encryptor based on the Clipper Chip: the <a href="https://www.cryptomuseum.com/crypto/att/tsd3600/index.htm"><span data-balloon-pos="up" aria-label="More about: TSD-3600">TSD-3600</span></a>. A year later, in 1994, Matt Blaze, a researcher at AT&amp;T, published a major design flaw in the Escrowed Encryption System (EES). A malicious party could tamper the software and use the Clipper Chip as an encryption device, whilst disabling the key escrow capability.</p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-9600 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/ees_leaf.png" alt="" width="560" height="276" srcset="https://goodshepherdmedia.net/wp-content/uploads/2021/11/ees_leaf.png 560w, https://goodshepherdmedia.net/wp-content/uploads/2021/11/ees_leaf-300x148.png 300w" sizes="(max-width: 560px) 100vw, 560px" /></p>
<p>When establishing a connection, the Clipper Chip transmits a 128-bit Law Enforcement Access Field (LEAF). The above diagram shows how the LEAF was established. The LEAF contained information needed by the intercepting agency to establish the encryption key.</p>
<p>To prevent the software from tampering with the LEAF, a 16-bit hash code was included. If the hash didn&#8217;t match, the Clipper Chip would not decrypt any messages. The 16-bit hash however, was too short to be safe, and a brute force attack would easily produce the same hash for a fake session key, thus not revealing the actual keys <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#ref">[3]</a> . If a malicious user would tamper the device&#8217;s software in this way, law enforcement agencies would not be able to reproduce the actual session key. As a result, they would not be able to decrypt the traffic.</p>
<p><b>Interior</b><img loading="lazy" decoding="async" src="https://www.cryptomuseum.com/img/blank.gif" width="1" height="1" /><img loading="lazy" decoding="async" src="https://www.cryptomuseum.com/img/blank.gif" width="1" height="4" /></p>
<p>Since the Clipper-project has failed, we think it is safe to show you the contents of the chip. Although this is something we would not normally do, this one is too good to be missed. Below, Travis Goodspeed shows us how easy it is to open the package and reverse-engineer a chip <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#ref_4">[4]</a>. Luckily, according to Kerckhoff&#8217;s principle, the secret is in the key and not in the device <a href="https://www.cryptomuseum.com/crypto/usa/clipper.htm#ref_5">[5]</a>.</p>
<div data-balloon-pos="up" aria-label="Interior of the ill-fated MYK-78 Clipper Chip"><img loading="lazy" decoding="async" class="size-large wp-image-9601 aligncenter" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/myk78_large-1024x969.jpg" alt="" width="640" height="606" srcset="https://goodshepherdmedia.net/wp-content/uploads/2021/11/myk78_large-1024x969.jpg 1024w, https://goodshepherdmedia.net/wp-content/uploads/2021/11/myk78_large-300x284.jpg 300w, https://goodshepherdmedia.net/wp-content/uploads/2021/11/myk78_large-768x726.jpg 768w, https://goodshepherdmedia.net/wp-content/uploads/2021/11/myk78_large.jpg 1200w" sizes="(max-width: 640px) 100vw, 640px" /></div>
<p>&nbsp;</p>
<p><span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;"><br />
The black dots along the four edges are the connection pads of the chip. The image was publised on <a href="http://www.flickr.com/photos/travisgoodspeed/3471087563/"><span data-balloon-pos="up" aria-label="www.flickr.com (off-site)">Travis&#8217; photostream on Flickr</span></a> and is reproduced here with his kind permission. Click the image for a <a href="https://www.cryptomuseum.com/crypto/usa/img/myk78_large.jpg"><span data-balloon-pos="up" aria-label="More about: hi-res version">hi-res version</span></a>. Note that this is a large file (18MB) which may take some time to download.</span></p>
<p><img loading="lazy" decoding="async" class=" wp-image-9596 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/small-1.jpg" alt="" width="286" height="192" />In some cases, the safety doctrine that is intended to make the device more secure, actually makes the cipher weaker. For example: during WWII, the German cipher authority dictated that a particular cipher wheel should not be used in the same position on two successive days. Whilst this may seem like a good idea, it effectively reduces the maximum number of possible settings.</p>
<p>By far the most common of the unintended weaknesses is operator error, such as choosing a simple or easy to guess password, sending multiple messages on the same key, sending the same message on two different keys, etc. Here are some examples of unintended weaknesses</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class=" wp-image-9595 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/small.jpg" alt="" width="344" height="231" /><br />
With a special key combination, the key logger can be turned in a USB memory stick, from which the logged data can be recovered by a malicious party. A more sophisticated example of covert hardware, is the addition of a (miniature) chip on the printed circuit board of an existing device. As many companies today have outsourced the production of their electronics, there is always a possibility that it might be maliciously modified by a foreign party. This is particularly the case with critical infrastructure like routers, switches and telecommunications backbone equipment. This problem is enhanced by the increasing complexity of modern computers, as a result of which virtually no one knows exactly how it works. A good example is the tiny computer that is hidden inside Intel&#8217;s AMT processors, and that has been actively exploited as a spying tool <a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm#ref_6">[6]</a>.</p>
<ul>
<li><a href="https://www.cryptomuseum.com/intel/cia/rubicon.htm">Crypto Museum, <i>Operation RUBICON</i></a><br />
February 2020.<a name="ref_2"></a></li>
<li><a href="https://en.wikipedia.org/wiki/Backdoor_(computing)" target="_blank" rel="noopener">Wikipedia, <i>Backdoor (computing)</i></a><br />
Retrieved February 2020<a name="ref_3"></a></li>
<li><a href="https://en.wikipedia.org/wiki/Random_number_generator_attack" target="_blank" rel="noopener">Wikipedia, <i>Random number generator attack</i></a><br />
Retrieved February 2020<a name="ref_4"></a></li>
<li><a href="https://en.wikipedia.org/wiki/Dual_EC_DRBG" target="_blank" rel="noopener">Wikipedia, <i>Dual_EC_DRBG</i></a><br />
Retrieved February 2020<a name="ref_5"></a></li>
<li><a href="https://en.wikipedia.org/wiki/_NSAKEY" target="_blank" rel="noopener">Wikipedia, <i>_NSAKEY</i></a><br />
Retrieved February 2020<a name="ref_6"></a></li>
<li><a href="https://en.wikipedia.org/wiki/Intel_Active_Management_Technology" target="_blank" rel="noopener">Wikipedia, <i>Intel_Active Management Technology</i></a><br />
Retrieved November 2020.</li>
<li>Adding a small chip to the board (can only be done during production process)</li>
<li>Adding a regular component with a built-in chip <span style="color: #e7e;">➤</span> <a href="https://www.cryptomuseum.com/covert/bugs/nsaant/firewalk/index.htm">e.g. NSA&#8217;s FIREWALK</a></li>
<li>Tiny computer inside a regular processor <span style="color: #e7e;">➤</span> <a href="https://en.wikipedia.org/wiki/Intel_Active_Management_Technology" target="_blank" rel="noopener">e.g. Intel AMT</a></li>
<li>External key logger (USB or PS2)</li>
<li>Key logger (spy) software</li>
<li>Computer viruses</li>
<li>Supply chain attack</li>
<li>Weak keys</li>
<li>A letter can not encode into itself (Enigma)</li>
<li>False security measures</li>
<li>Operator mistakes</li>
<li>Software bugs</li>
</ul>
<p><img loading="lazy" decoding="async" class="size-full wp-image-9594 alignleft" src="https://goodshepherdmedia.net/wp-content/uploads/2021/11/intel_small.jpg" alt="" width="298" height="200" />Another way of getting surreptitious access to a computer system, such as a personal computer, is by covertly installing additional hardware or software that gives an adversary direct or indirect access to the system and its data. Spyware can be visible, but can also be completely invisible.</p>
<p>An example of a hidden-in-plain-sight device is a so-called key logger that can be installed between keyboard and computer. The image on the right shows two variants: one for USB (left) and one for the old PS-2 keyboard interface.</p>
<p>Items like these can easily be installed in an office – for example by the cleaning lady – and are hardly noticed in the tangle of wires below your desk. It registers every key stroke, complete with time/date stamp, including your passwords. If the cleaning lady removes it a few days later, you will never find out that it was ever installed.</p>
<p>Manipulated hardware can be used to eavesdrop on your data, but can also be used as part of a Distributed Denial of Service attack (DDoS), or to disrupt the critical infrastructure of a company or even an entire country. In many cases, such attacks are carried out by (foreign) state actors. <span style="color: #555555; font-family: Lucida Grande,Arial,Verdana,sans-serif;">Manipulation of hardware is also possible by adding a secret chip to a regular inconspicuous component. A good example is the <span data-balloon-pos="up" aria-label="More about: FIREWALK implant">FIREWALK implant</span> of the US National Security Agency (NSA) that is hidden inside a regular RJ45 Ethernet socket of a computer. It is used by the <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span> to spy behind firewalls and was disclosed by former <span class="short" aria-label="Central Intelligence Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener">CIA</a> </span>/ <span class="short" aria-label="National Security Agency (USA)" data-balloon-pos="up"><a class="short" href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">NSA</a></span>-contractor <a href="https://goodshepherdmedia.net/edward-snowden-nsa-whistleblower/" target="_blank" rel="noopener"><span data-balloon-pos="up" aria-label="More about: Edward Snowden">Edward Snowden</span></a> in 2013.</span></p>
<p>This device is particularly dangerous as it can not be found with a visual inspection. Further­more, it transmits the intercepted data via radio waves and effectively bypasses all security.</p>
<div data-balloon-pos="up" aria-label="NSA's FIREWALK network implant. Copyright Crypto Museum. Click for more details." data-balloon-length="large"><img decoding="async" src="https://www.cryptomuseum.com/covert/bugs/nsaant/firewalk/svg/firewalk_bare.svg" alt="NSA's FIREWALK network implant. Copyright Crypto Museum. Click for more details." width="298px" align="left" border="0" vspace="4" /></div>
<p>Is this problem restricted to high-end (computing) devices? Certainly not. Most modern domestic appliances, such as smart thermomenters, smart meters, domotica and in particular devices for the Internet of Things (IoT), are badly built, contain badly written software and are rarely properly protected, as a result of which they are extremely vulnerable to manipulation (hacking).</p>
<p><a href="https://www.cryptomuseum.com/intel/nsa/backdoor.htm" target="_blank" rel="noopener">source</a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<ul>
<li><a href="https://www.cryptomuseum.com/intel/nsa/index.htm#inter" target="_blank" rel="noopener">NSA-backdoored equipment info found OFF this website</a></li>
<li><a href="https://goodshepherdmedia.net/u-s-government-catalogue-of-cellphone-surveillance-devices-used-by-the-military-and-by-cia-nsa-fbi-and-other-intelligence-agencies/" target="_blank" rel="noopener">U.S. Government Catalogue of Cellphone Surveillance Devices</a></li>
<li><a href="https://en.wikipedia.org/wiki/Backdoor_(computing)" target="_blank" rel="noopener">Backdoors on Wikipedia</a></li>
<li><a href="https://goodshepherdmedia.net/nsa-national-security-agency/" target="_blank" rel="noopener">National Security Agency</a></li>
<li><a href="https://goodshepherdmedia.net/cia-central-intelligence-agency/" target="_blank" rel="noopener">Central Intelligence Agency</a></li>
<li><a href="https://nsa.gov1.info/dni/index.html" target="_blank" rel="noopener">NSA EXTRACTED INFO</a></li>
<li><a href="https://www.cryptomuseum.com/" target="_blank" rel="noopener">CRYPTO MUSEUM</a></li>
<li><a href="https://goodshepherdmedia.net/edward-snowden-nsa-whistleblower/" target="_blank" rel="noopener">Edward Snowden</a></li>
<li><a href="https://goodshepherdmedia.net/can-cops-secretly-listen-to-my-phone-how-cops-can-secretly-track-your-phone/" target="_blank" rel="noopener">Stingray</a></li>
<li><a href="https://goodshepherdmedia.net/fbi-vows-not-to-use-pegasus-spyware-after-grilling-from-capitol-hill/" target="_blank" rel="noopener">Pegasus Spyware</a></li>
<li><a href="https://goodshepherdmedia.net/x-keyscore-allows-the-nsa-and-allies-to-monitor-emails-web-browsing-internet-searches-and-social-media/" target="_blank" rel="noopener">X-Keyscore</a></li>
</ul>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
