Full NSA access built into every Windows OS since 1997June 15 2013
How NSA access was built into Windows
Duncan Campbell 04.09.1999
Careless mistake reveals subversion of Windows by NSA.
A CARELESS mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA "help information" trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled.
The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.
Computer security specialists have been aware for two years that unusual features are contained inside a standard Windows software "driver" used for security and encryption functions. The driver, called ADVAPI.DLL, enables and controls a range of security functions. If you use Windows, you will find it in the C:\Windows\system directory of your computer.
ADVAPI.DLL works closely with Microsoft Internet Explorer, but will only run cryptographic functions that the US governments allows Microsoft to export. That information is bad enough news, from a European point of view. Now, it turns out that ADVAPI will run special programmes inserted and controlled by NSA. As yet, no-one knows what these programmes are, or what they do.
Dr Nicko van Someren reported at last year's Crypto 98 conference that he had disassembled the ADVADPI driver. He found it contained two different keys. One was used by Microsoft to control the cryptographic functions enabled in Windows, in compliance with US export regulations. But the reason for building in a second key, or who owned it, remained a mystery.
A second key
Two weeks ago, a US security company came up with conclusive evidence that the second key belongs to NSA. Like Dr van Someren, Andrew Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had been probing the presence and significance of the two keys. Then he checked the latest Service Pack release for Windows NT4, Service Pack 5. He found that Microsoft's developers had failed to remove or "strip" the debugging symbols used to test this software before they released it. Inside the code were the labels for the two keys. One was called "KEY". The other was called "NSAKEY".
Fernandes reported his re-discovery of the two CAPI keys, and their secret meaning, to "Advances in Cryptology, Crypto'99" conference held in Santa Barbara. According to those present at the conference, Windows developers attending the conference did not deny that the "NSA" key was built into their software. But they refused to talk about what the key did, or why it had been put there without users' knowledge.
A third key?!
But according to two witnesses attending the conference, even Microsoft's top crypto programmers were astonished to learn that the version of ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys. Brian LaMachia, head of CAPI development at Microsoft was "stunned" to learn of these discoveries, by outsiders. The latest discovery by Dr van Someren is based on advanced search methods which test and report on the "entropy" of programming code.
Within the Microsoft organisation, access to Windows source code is said to be highly compartmentalized, making it easy for modifications to be inserted without the knowledge of even the respective product managers.
Researchers are divided about whether the NSA key could be intended to let US government users of Windows run classified cryptosystems on their machines or whether it is intended to open up anyone's and everyone's Windows computer to intelligence gathering techniques deployed by NSA's burgeoning corps of "information warriors".
According to Fernandez of Cryptonym, the result of having the secret key inside your Windows operating system "is that it is tremendously easier for the NSA to load unauthorized security services on all copies of Microsoft Windows, and once these security services are loaded, they can effectively compromise your entire operating system". The NSA key is contained inside all versions of Windows from Windows 95 OSR2 onwards.
"For non-American IT managers relying on Windows NT to operate highly secure data centres, this find is worrying", he added. "The US government is currently making it as difficult as possible for "strong" crypto to be used outside of the US. That they have also installed a cryptographic back-door in the world's most abundant operating system should send a strong message to foreign IT managers". "How is an IT manager to feel when they learn that in every copy of Windows sold, Microsoft has a 'back door' for NSA - making it orders of magnitude easier for the US government to access your computer?" he asked. Can the loophole be turned round against the snoopers?
Read More HERE. My comments follow:Last summer I got contacted by a Microsoft programmer, who blew the whistle on Microsoft intentionally sabotaging the operating system, and then running closed code to conceal to the majority just how penetrable the operating system is for a chosen few. This programmer went on to say that for a price, if one Jewish corporation was in a battle against a non Jewish corporation, Microsoft would provide information about intentional back doors built into the competitor's computers, so that the zionist company could go in and entirely rape their data.
He also went further, and said that both McCaffee and Norton work closely with Microsoft, and build additional back doors competitors can exploit the same way and that these security suites do nothing to plug Microsoft's back doors and instead provide a different flavor of method for raping data, (the difference being like your preference for either Word or Wordperfect). In the same way Microsoft will allow a system rape, these additional paid for back doors can be used to destroy individuals by allowing ordinary priviledged people full access to your system, even if they are not an intelligence agency at all. Bottom line? The only secure system is a small fully open source Linux system that you can read through yourself and verify secure. Any Microsoft O.S. is as intentionally penetrable as your cell phone, which is also inevitably the product of a zionist corporation.
I had asked this programmer for the specifics, but then, as usual, all contact got cut and I received no further info, and this communication took place through a fresh mailbox for as long as it lasted (he was able to respond ONCE).
Japan earthquake both man made AND faked to a higher magnitude to justify nuclear tsunami
Permalink This is the first portion of the Fukushima report, which speaks about the physical aspects of the disaster, which was in fact an act of war. There is a lot more to it than that, including the fact that the zionists want all cultures destroyed and smashed into a global monoculture and Japan was having none of it, as well as Japan refusing to do an enormous banker bailout they never owed, and therefore from a globalist perspective Japan had to be destroyed. Read the full report HERE
BUSTED!Permalink What if the entire nuclear waste problem was intentionally created? What if our own government got infiltrated and wanted over 100 nation destroying weapons placed in key locations around the country, all disguised as infrastructure? America's nuclear policy has done exactly that, and this report covers how it happened.This is a must read on this site
Mails from Japan, the real perspectivePermalink There was a brief gap in the censorship on my mail box, and for a week I got e-mails from Japan. They flooded in. You would be surprised by what the people said in these mails. Now, after over 150,000 more visits to the site from Japan, not a single new e-mail from Japan has come in. Why would the elite want these e-mails censored? Read this, and you will know why
The WSA passport has been proven legitimatePERMALINK When the U.S. government detained me without a reason shortly after I published the Fukushima report, I knew my days in America were numbered. After being refused a passport from the FED, I chose an alternate - the WSA passport, with doubts. Those doubts are gone. The WSA passport is indeed 100 percent legitimate, and I believe it saved my life. Read more HERE
Joe did not "Stack" up.Permalink Many of you may remember the story of Joe Stack, who flew his plane into the IRS building. This report proves even THAT to have been a false flag PERMALINK This groundbreaking whistleblower testimony proves that vaccines are the cause of SIDS and the "shaken baby syndrome". This officer provides testimony that parents are prosecuted for damage proven to be from vaccines. Read more here
Digital stepping in the Aurora BorealisPermalink This report is a technical stab at how haarp works to modify weather, and has supporting evidence in an article published by Nasa.
Many people do not realize the fact that Nasa published a report which spoke about Hurricane Katrina, and two other hurricanes that did not have normal electrical readings. In fact, the readings were so far out of character for hurricanes that they broke world records for all previous storms of any type in history, including tornado spawning super cells which are normally very electrically charged. Nasa does not specifically state that Haarp did it, to do so would be suicide for them. This report is linked to in my Haarp report, which can be read HERE
USGS and MSM Busted over phony quake!Permalink I was in Mexico city, and there was an earthquake drill. Because they triggered a real quake in Chiapas during a drill there, which I did feel, I recorded a video of this drill just in case they triggered an earthquake for it as well. They did not, but the next day I found out they called the drill a real quake. See the video and read about it HERE
7.9 in Chiapas Mexico on March 20 2012 proven man madePermalink I was at a Starbucks in the Santa Fe district of Mexico city when an earthquake happened. It swayed the buildings, disoriented drivers and caused everyone to evacuate. I reported it within minutes on my site, and then found out the next day that there was an earthquake drill in Chiapas Mexico, the epicenter, covering the exact same magnitude of quake at the exact same time on the exact same day. Since defense secretary William Cohen has verified the earthquake machine to be a reality in a press briefing in 1997, it's pretty obvious how such a coincidence could have happened.
Read the full report HERE
Prescribed deletionPermalink I got my hands on 230 megs of classified documents related to antidepressants from GSK. It was a tedious read, but after diving fairly deep into the tens of thousands of pages of studies, results, etc, it was obvious that antidepressants were horrible, the manufacturers knew it, and they false advertised and put knowingly damaging products on the market. A This report will have six segments when complete, "Testimonies of the destroyed" is the first. If you have been ruined or damaged by antidepressants, you are not alone, read what others have been through Here
A tale of two protestsPermalink
I was in Washington DC, so I figured I would go pay a visit to an anti war protest against war with Iran. After that protest ended another started, begging Obama to go to war with Syria. It was obviously phony and I documented that as well. If you want to see what a psy op looks like, just take a look at this report Here
The Evils of CompartmentalizationPermalink In this somewhat open letter to my former peers in the NSA, and also, by default, other top secret agencies, I speak about how they really are unaware of what their work is being used for, and how their compartmentalized security clearances prevent them from really knowing how their efforts will manifest themselves in the real world. Read it Here
Shedding a little light on the darkest of darkPermalink This report about Luciferianism is only about a third of the way finished, but it is massive nonetheless. Take the time to look at what's here, several of the linked items are banned on the web and can only be found internally on this site (as far as I know) and of the greatest interest is the child slave trade. The article which quotes the prices state agencies are awarded for snatching children may have a bit of a sappy start, but it's a simple fact it's probably the most banned report on the web. Definitely worth a look. You can read the Luciferian report Here
My experience with the Jewish CommunityPermalink This report sparked a lot of interest, and it outlines the basics of what happened when I was with the Jewish community, without going into too much detail. It covers their attempts on my life in some detail. I must say, they treat each other well, and treated me VERY well, until I decided to leave. The full report is Here
I would much rather live in a civilized societyPermalink This report, which I pulled off an old Geocities site I once had, was good enough to re-post here. If you want a look at who I am, you will find a pretty good insight Here
Deep Water Horizon likely destroyed by space based laserPermalink Many people were suspicious about the real reason for the disaster in the gulf, and I myself found it to be a highly implausible scenario. So I looked into it, and discovered that the main electrical center, which was well away from anything that burned, had an extremely neat hole burned right through the helipad above it. Was the helipad used for targeting setup of a space based laser? Read the report and decide for yourself HERE
The Post Office has automated mail interceptPermalink Many people think snail mail is more secure than e-mail. Think again! Read why you should be VERY careful with the mail, HERE
Power Grid Tampering to end an EraPermalink The power grid has now been dismantled. The national grid is now running in isolated segments. Though it is true that DC power lines have mitigated the need for full national synchronization in the grid, they did not eliminate it. As a result, clocks such as the one in your microwave or stove, which use the power grid as a time keeping reference now run at different speeds at different places in the nation and they prove that the system is disconnected and America's power is now far more vulnerable to attack during a war. Read the report HERE
Surprisingly reputable Gordon Duff posts ridiculous article on Micro NukesPermalink A reader sent me a link in an e-mail that went to "an amazing article about micro nukes". Since I know a thing or two about nuclear topics, I gave it a look, gasped, and then shredded it. It's a great rip, and recycle bin treasure. Read it HERE
Warning, 2012!Permalink I think I will put this in the 2012 scam section as well, but it's so bad it really belongs in the recycle bin. If you want to see something SILLY, click HERE
U.S. Senator visits Fukushima and says it's worse than stated, DUH??Permalink Senator Wyden ought to be applauded for having the guts to actually go out to Fukushima, and the Duh really does not apply to him, it applies to the media which has done nothing but scam and lie about this. Even still, for lack of a better place, this report goes in the recycle bin. Read it HERE
____________________________ What it looks like when my site gets attacked
ArchivesMy writing did not start with this site. I will fill in history over time by posting previous articles here
Prior to the Fukushima war disaster, this was a photography site.
These were old non-news articles, from the ancient days, originally used to drive traffic to the photos.