By William Blum, Anti-Empire Report | News Analysis
TruthOut, Monday, 01 July 2013 12:19
EXCERPT...
For decades, beginning in the 1950s, the Swiss company Crypto AG sold the worlds most sophisticated and secure encryption technology. The firm staked its reputation and the security concerns of its clients on its neutrality in the Cold War or any other war. The purchasing nations, some 120 of them including prime US intelligence targets such as Iran, Iraq, Libya and Yugoslavia confident that their communications were protected, sent messages from their capitals to their embassies, military missions, trade offices, and espionage dens around the world, via telex, radio, and fax. And all the while, because of a secret agreement between the company and NSA, these governments might as well have been hand delivering the messages to Washington, uncoded. For their Crypto AG machines had been rigged before being sold to them, so that when they used them the random encryption key could be automatically and clandestinely transmitted along with the enciphered message. NSA analysts could read the messages as easily as they could the morning newspaper.
In 1986, because of US public statements concerning the La Belle disco bombing in West Berlin, the Libyans began to suspect that something was rotten with Crypto AGs machines and switched to another Swiss firm, Gretag Data Systems AG. But it appears that NSA had that base covered as well. In 1992, after a series of suspicious circumstances over the previous few years, Iran came to a conclusion similar to Libyas, and arrested a Crypto AG employee who was in Iran on a business trip. He was eventually ransomed, but the incident became well known and the scam began to unravel in earnest.
In September 1999 it was revealed that NSA had arranged with Microsoft to insert special keys into Windows software, in all versions from 95-OSR2 onwards. An American computer scientist, Andrew Fernandez of Cryptonym in North Carolina, had disassembled parts of the Windows instruction code and found the smoking gun Microsofts developers had failed to remove the debugging symbols used to test this software before they released it. Inside the code were the labels for two keys. One was called KEY. The other was called NSAKEY. Fernandez presented his finding at a conference at which some Windows developers were also in attendance. The developers did not deny that the NSA key was built into their software, but they refused to talk about what the key did, or why it had been put there without users knowledge. Fernandez says that NSAs back door in the worlds most commonly used operating system makes it orders of magnitude easier for the US government to access your computer.
In February 2000, it was disclosed that the Strategic Affairs Delegation (DAS), the intelligence arm of the French Defense Ministry, had prepared a report in 1999 which also asserted that NSA had helped to install secret programs in Microsoft software. According to the DAS report, it would seem that the creation of Microsoft was largely supported, not least financially, by the NSA, and that IBM was made to accept the [Microsoft] MS-DOS operating system by the same administration. The report stated that there had been a strong suspicion of a lack of security fed by insistent rumors about the existence of spy programs on Microsoft, and by the presence of NSA personnel in Bill Gates development teams. The Pentagon, said the report, was Microsofts biggest client in the world.
Recent years have seen disclosures that in the countdown to their invasion of Iraq in 2003, the United States had listened in on UN Secretary-General Kofi Annan, UN weapons inspectors in Iraq, and all the members of the UN Security Council during a period when they were deliberating about what action to take in Iraq.
Its as if the American national security establishment feels that it has an inalienable right to listen in; as if there had been a constitutional amendment, applicable to the entire world, stating that Congress shall make no law abridging the freedom of the government to intercept the personal communications of anyone. And the Fourth Amendment had been changed to read: Persons shall be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, except in cases of national security, real or alleged. 2
CONTINUED...
http://www.truth-out.org/speakout/item/17310-eavesdropping-on-the-planet
PS: In an age where association makes one a suspect, I can understand the lack of responses.
PPS: One thing I am certain of: If you're reading DU, they know.