Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search
 

FarCenter

(19,429 posts)
Fri Jun 7, 2013, 05:02 PM Jun 2013

Are Reports About The Government Having A Direct Line Into Tech Company Servers A Hoax?

On of the suspicious characteristics of the WaPo and Guardian stories:

Twitter users have noted two inexplicable differences in the PowerPoint slides posted online by the Post and the Guardian. On a slide with the header “Dates When PRISM Collection Began For Each Provider,” there is a red box behind the PRISM logo on the Guardian version that is not present in the Post version. And the green arrow running diagonally across the slide is noticeably different in shape and spacing.


Of course, whoever is in charge of the presentation may make slightly varying copies of the presentation, so that if one leaks, they know who leaked it...

Read more: http://www.businessinsider.com/is-the-nsa-prism-spying-program-a-hoax-2013-6

But I doubt that NSA systems are directly connected with Microsoft et al. NSA would not want to provide such a pathway for attacking its systems.
8 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies

uponit7771

(90,301 posts)
2. Did America's M$M report it?! Then yes, I'll put my money on hoax...US M$M is REALLY sloppy with...
Fri Jun 7, 2013, 05:15 PM
Jun 2013

...stories

 

FarCenter

(19,429 posts)
3. The three reporter would be subject to a large confirmation bias
Fri Jun 7, 2013, 05:28 PM
Jun 2013

This would tend to make them gullible.

notadmblnd

(23,720 posts)
4. Here's an article that claims
Fri Jun 7, 2013, 05:31 PM
Jun 2013

there has been a NSA key on every version of Windows since 1999 from what I have been reading.

Snip: To use cryptographic applications in Windows, users must load its cryptography architecture in a standard called CryptoAPI.

A year ago, researchers discovered there were two keys, or digital signatures, that allowed the loading of CryptoAPI -- Microsoft had one but the identity of the other keyholder was a mystery.

snip: Microsoft denied that the key belongs to the NSA, saying instead that the "_NSAKEY" label simply means the cryptography architecture meets the NSA's standards for export.


snip: "So no, the government cannot spy on your computer using Microsoft software. We don't intentionally leave backdoors. Microsoft has consistently opposed key escrow because we feel it is no good for the consumer, for Microsoft and no good for the government."

Fernandes said the NSA key would allow the intelligence agency to load services on users' machines without their authorization, an option it more likely would use against a corporation than an individual.

Snip: Fernandes posted a "fix" to the key on his Web site Friday, along with a press release announcing his report on the second key. The NSA failed to return comment on the key.

http://www.cnn.com/TECH/computing/9909/03/windows.nsa.02/


The bold is mine I highlighted it because it stood out to me.

 

FarCenter

(19,429 posts)
6. The _NSAKEY is more than likely either for testing or for the export versions
Fri Jun 7, 2013, 05:39 PM
Jun 2013

Recall that during the '90s there was a lot of controversy over what cryptography would be permitted and where, largely controlled by the Commerce Department using the Arms Export Control Act.

http://en.wikipedia.org/wiki/Export_of_cryptography_in_the_United_States

 

Coyotl

(15,262 posts)
5. YES, the story is not true. Is it an intentional false flag? Not necessarily. It is ...
Fri Jun 7, 2013, 05:33 PM
Jun 2013

likelier that the story is more complex and the authors of the idea are not technically sophisticated enough to understand how it is done.

Read this thread:
HELLO WORLD! George W. Bush illegally spied on American citizens. Read all about it.

http://www.democraticunderground.com/10022963663

on point

(2,506 posts)
7. Misunderstanding? You don't need access to the destination if you tap the route
Fri Jun 7, 2013, 05:41 PM
Jun 2013

If they are camping on AT&T, Verizon, Comcast etc lines, they can intercept anything sent to destinations like google, apple, yahoo etc.

The end points don't need to participate if the pipes are compromised......

Latest Discussions»General Discussion»Are Reports About The Gov...