{"id":55466,"date":"2020-10-29T05:59:00","date_gmt":"2020-10-29T10:59:00","guid":{"rendered":"https:\/\/olduvai.ca\/?p=55466"},"modified":"2020-10-29T05:59:00","modified_gmt":"2020-10-29T10:59:00","slug":"nsa-dodges-questions-about-controversial-backdoors-in-tech-products","status":"publish","type":"post","link":"https:\/\/olduvai.ca\/?p=55466","title":{"rendered":"NSA Dodges Questions About Controversial &#8220;Backdoors&#8221; In Tech Products"},"content":{"rendered":"<div id=\"block-zerohedge-page-title\" class=\"block block-core block-page-title-block\">\n<h3 class=\"page-title\"><span class=\"field field--name-title field--type-string field--label-hidden\"><a href=\"https:\/\/www.zerohedge.com\/technology\/nsa-dodges-questions-about-controversial-backdoors-tech-products\">NSA Dodges Questions About Controversial &#8220;Backdoors&#8221; In Tech Products<\/a>\u00a0<\/span><\/h3>\n<\/div>\n<div id=\"block-zerohedge-content\" class=\"block block-system block-system-main-block\">\n<article class=\"node node--type-article node--view-mode-full\" role=\"article\">\n<footer class=\"node__meta\">\n<div class=\"submission-wrapper\"><\/div>\n<\/footer>\n<div class=\"node__content\">\n<div class=\"clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item\">\n<p>Edward Snowden&#8217;s whistleblowing campaign exposed the National Security Agency in 2013 for having &#8220;<a href=\"https:\/\/www.zerohedge.com\/news\/2013-12-29\/nsas-50-page-catalog-back-door-penetration-techniques-revealed\">backdoors<\/a>&#8221; into commercial technology products. The US spy agency worked with some Silicon Valley tech firms to develop covert methods of bypassing the standard authentication or encryption process of a network device so it could scan internet traffic without a warrant.<\/p>\n<p>Snowden revealed the NSA&#8217;s special sauce in how it conducted domestic and foreign backdoor operations to collect vital intelligence, resulted in the agency reforming its spying process, and had to formulate new rules to limit future breaches and how it conducts spy operations, three former intelligence officials told\u00a0<a href=\"https:\/\/www.reuters.com\/article\/us-usa-security-congress-insight\/spy-agency-ducks-questions-about-back-doors-in-tech-products-idUSKBN27D1CS\">Reuters<\/a>.<\/p>\n<p><a href=\"https:\/\/www.zerohedge.com\/s3\/files\/inline-images\/backdoor.jpg?itok=Rqny3eRN\" data-image-external-href=\"\" data-image-href=\"\/s3\/files\/inline-images\/backdoor.jpg?itok=Rqny3eRN\" data-link-option=\"0\"><picture><source srcset=\"https:\/\/zh-prod-1cc738ca-7d3b-4a72-b792-20bd8d8fa069.storage.googleapis.com\/s3fs-public\/styles\/inline_image_desktop\/public\/inline-images\/backdoor.jpg?itok=ydtHLvKT 1x\" type=\"image\/jpeg\" media=\"all and (min-width: 1280px)\" \/><source srcset=\"https:\/\/zh-prod-1cc738ca-7d3b-4a72-b792-20bd8d8fa069.storage.googleapis.com\/s3fs-public\/styles\/inline_image_desktop\/public\/inline-images\/backdoor.jpg?itok=ydtHLvKT 1x\" type=\"image\/jpeg\" media=\"all and (min-width: 480px)\" \/><source srcset=\"https:\/\/zh-prod-1cc738ca-7d3b-4a72-b792-20bd8d8fa069.storage.googleapis.com\/s3fs-public\/styles\/inline_image_desktop\/public\/inline-images\/backdoor.jpg?itok=ydtHLvKT 1x, https:\/\/zh-prod-1cc738ca-7d3b-4a72-b792-20bd8d8fa069.storage.googleapis.com\/s3fs-public\/styles\/inline_image_desktop\/public\/inline-images\/backdoor.jpg?itok=ydtHLvKT 2x\" type=\"image\/jpeg\" media=\"all and (min-width: 1024px)\" \/><source srcset=\"https:\/\/zh-prod-1cc738ca-7d3b-4a72-b792-20bd8d8fa069.storage.googleapis.com\/s3fs-public\/styles\/inline_image_desktop\/public\/inline-images\/backdoor.jpg?itok=ydtHLvKT 1x\" type=\"image\/jpeg\" media=\"all and (min-width: 768px)\" \/><source srcset=\"https:\/\/zh-prod-1cc738ca-7d3b-4a72-b792-20bd8d8fa069.storage.googleapis.com\/s3fs-public\/styles\/inline_image_mobile\/public\/inline-images\/backdoor.jpg?itok=Rqny3eRN 1x\" type=\"image\/jpeg\" \/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/zh-prod-1cc738ca-7d3b-4a72-b792-20bd8d8fa069.storage.googleapis.com\/s3fs-public\/inline-images\/backdoor.jpg\" alt=\"\" width=\"500\" height=\"333\" data-entity-type=\"file\" data-entity-uuid=\"aca6d378-98d3-4726-83bb-40a31a71e8cb\" data-responsive-image-style=\"inline_images\" \/><\/picture><\/a><\/p>\n<p>However, a recent inquiry into the new guidelines by Senator Ron Wyden, a top Democrat on the Senate Intelligence Committee, yielded absolutely nothing as the spy agency dodged questions.<\/p>\n<p>&#8220;Secret encryption back doors are a threat to national security and the safety of our families \u2013 it&#8217;s only a matter of time before foreign hackers or criminals exploit them in ways that undermine American national security,&#8221; Wyden told Reuters.<\/p>\n<blockquote><p>&#8220;The government shouldn&#8217;t have any role in planting secret back doors in encryption technology used by Americans,&#8221;\u00a0he continued:<\/p><\/blockquote>\n<p>The agency refused to comment on its updated policies on current backdoor processes.\u00a0NSA officials did say they were in the rebuilding trust phase with the private sector.<\/p>\n<blockquote><p>&#8220;At NSA, it&#8217;s common practice to constantly assess processes to identify and determine best practices,&#8221; said Anne Neuberger, who heads NSA&#8217;s year-old Cybersecurity Directorate. &#8220;We don&#8217;t share specific processes and procedures.&#8221;<\/p><\/blockquote>\n<p>Three former senior intelligence agency officials told Reuters that before a backdoor operation is conducted, the agency must &#8220;weigh the potential fallout and arrange for some kind of warning if the back door gets discovered and manipulated by adversaries.&#8221;<\/p>\n<p>\u2026click on the above link to read the rest of the article\u2026<\/p>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>NSA Dodges Questions About Controversial &#8220;Backdoors&#8221; In Tech Products\u00a0 Edward Snowden&#8217;s whistleblowing campaign exposed the National Security Agency in 2013 for having &#8220;backdoors&#8221; into commercial technology products. The US spy agency worked with some Silicon Valley tech firms to develop covert methods of bypassing the standard authentication or encryption process of a network device so [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[6],"tags":[3975,9336,249,551,577,786,827,4318],"class_list":["post-55466","post","type-post","status-publish","format-standard","hentry","category-liberty","tag-backdoor-access","tag-big-tech","tag-edward-snowden","tag-national-security-agency","tag-nsa","tag-technology","tag-united-states","tag-zerohedge"],"_links":{"self":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/55466","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=55466"}],"version-history":[{"count":1,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/55466\/revisions"}],"predecessor-version":[{"id":55467,"href":"https:\/\/olduvai.ca\/index.php?rest_route=\/wp\/v2\/posts\/55466\/revisions\/55467"}],"wp:attachment":[{"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=55466"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=55466"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/olduvai.ca\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=55466"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}