{"id":32815,"date":"2016-03-03T07:38:51","date_gmt":"2016-03-03T11:38:51","guid":{"rendered":"https:\/\/stateofthenation2012.com\/?p=32815"},"modified":"2016-03-03T07:40:11","modified_gmt":"2016-03-03T11:40:11","slug":"john-mcafee-the-nsas-back-door-has-given-every-us-secret-to-our-enemies","status":"publish","type":"post","link":"https:\/\/stateofthenation2012.com\/?p=32815","title":{"rendered":"JOHN MCAFEE: The NSA&#8217;s back door has given every US secret to our enemies"},"content":{"rendered":"<p><!--more-->by John McAfee, Business Insider<\/p>\n<p><a href=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2016\/03\/rtr3b7s4.png\" rel=\"attachment wp-att-32816\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-32816 alignright\" src=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2016\/03\/rtr3b7s4.png\" alt=\"rtr3b7s4\" width=\"300\" height=\"225\" srcset=\"https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2016\/03\/rtr3b7s4.png 3112w, https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2016\/03\/rtr3b7s4-300x225.png 300w, https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2016\/03\/rtr3b7s4-768x576.png 768w, https:\/\/stateofthenation2012.com\/wp-content\/uploads\/2016\/03\/rtr3b7s4-1024x768.png 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Deng Xiaoping, in 1979 &#8211; his second year as supreme leader of China &#8211; perceived a\u00a0fundamental truth that has yet to be fully grasped by most Western leaders: Software, if properly\u00a0weaponized, could be far more destructive than any nuclear arsenal.<\/p>\n<p>Under Deng\u2019s leadership, China began one of the most ambitious and sophisticated meta-\u00a0software development programs ever undertaken.<\/p>\n<p>And what is meta-software? It&#8217;s the one science that the entire Western World has entirely\u00a0overlooked. It is a high level set of principles for developing software that are imperative if a\u00a0nation is to survive in a cyberwar.<\/p>\n<p>For example, programmers must constantly be audited. Every line of code written by every\u00a0programmer is audited by two senior programmers, and these auditors are rotated each month\u00a0and the same two are never paired more than once. You will see very clearly, later in this article,\u00a0why such a principle is vital to a society\u2019s survival.<\/p>\n<p>Another principal is that back doors into software can never, under any circumstances, be\u00a0allowed. Under Deng Xiaoping, the penalty for back doors, and for violating any of the meta-\u00a0software principles, was death.<\/p>\n<p>I will give an example of what happens in the real world when back doors are put into software.\u00a0On December 17th of last year, Juniper Networks &#8211; a major provider of secure network systems,\u00a0who&#8217;s customers include nearly every US government agency, announced that it had <a href=\"http:\/\/www.marketwatch.com\/story\/juniper-networks-security-issue-raises-more-questions-about-backdoors-2015-12-28\" rel=\"nofollow\">discovered two \u201cunauthorized\u201d back doors in its systems<\/a>.<\/p>\n<p>For those of my readers who do not understand how back doors are created &#8211; they can only be\u00a0created by the manufacturers of the software. There is, absolutely, no other way.<\/p>\n<p>So, the company had to have a rogue employee in the software development department. This\u00a0much is clear.<\/p>\n<p>It will also be clear, if you continue reading, who placed the rogue employee within Juniper\u00a0Networks and why.<\/p>\n<p>First, a little background: Juniper Networks has operations in more than 100 countries. Around\u00a050% of its revenue is from the United States, 30% are from EMEA and 20% are from Asia. Over\u00a0half of Juniper\u2019s customers are in parts of the world in which the NSA has extreme interest.<\/p>\n<p><span class=\"KonaFilter image-container display-table\"><span class=\"image on-image\" data-post-image=\"\"><img decoding=\"async\" src=\"http:\/\/static6.businessinsider.com\/image\/56748cb55afbd315048b456c-800-526\/fbi-probes-breach-at-juniper-networks-cnn.jpg\" alt=\"A woman walks past a banner with the logo of Juniper Networks Inc. covering the facade of the New York Stock Exchange, October 29, 2009. REUTERS\/Brendan McDermid \" data-mce-source=\"Thomson Reuters\" data-mce-caption=\"A woman walks past a banner with the logo of Juniper Networks Inc. covering the facade of the New York Stock Exchange\" \/><span class=\"source\">Thomson Reuters<\/span><span class=\"caption\">A woman walks past a banner with the logo of Juniper Networks Inc. covering the facade of the New York Stock Exchange<\/span><\/span><\/span><\/p>\n<p>Now, a legitimate TOP-SECRET document. Released by Anonymous and dated February 2011\u00a0reveals that the British spy agency GCHQ, with the knowledge and apparent cooperation of the\u00a0NSA, acquired the capability to covertly <a href=\"http:\/\/theintercept.com\/2015\/12\/23\/juniper-firewalls-successfully-targeted-by-nsa-and-gchq\/\" rel=\"nofollow\">exploit security vulnerabilities<\/a> in 13 different models of\u00a0firewalls made by Juniper Networks.<\/p>\n<p>I hope we all understand now what \u201cacquired the capability\u201d means. The NSA planted a\u00a0programmer within Jupiter Networks. The was no other way to \u201cacquire&#8221; this capability.<\/p>\n<p>Nothing new in this. Black hat hackers have been planting themselves in target agencies for\u00a0years. It was just such a plant that brought down Ashley Madison last year. So it&#8217;s no surprise\u00a0that the NSA uses this technique as well.<\/p>\n<p>Of interest here is that Juniper announced that two back back doors were discovered in its\u00a0system. One of the back doors was code verifiable written by the NSA prior to 2011.<\/p>\n<p><a href=\"http:\/\/www.wired.com\/2015\/12\/the-years-11-biggest-hacks-from-ashley-madison-to-opm\/\" rel=\"nofollow\">Wired magazine<\/a> wrote:<\/p>\n<p>But what makes the Juniper backdoor even more interesting and notable is the fact that it\u00a0appears to be based on another backdoor the NSA allegedly created years ago in the Dual_EC\u00a0algorithm for its own secret use.<\/p>\n<p>So, in 2011 he NSA surreptitiously got their back door into a powerful piece of security software\u00a0used by many enemies of the US. They could now monitor these enemies easily.<\/p>\n<p>The Internet underground knew of these back doors within weeks of their release, and so did\u00a0the Chinese, and so did the Russians. An so did every hacker on the planet. Monitoring\u00a0changes within major software systems is the simplest if all things. Every hacker toolkit contains\u00a0a compare program that will outline all changes made to a piece of software by the\u00a0manufacturer. Disassembly tools tell the hacker what each change does.<\/p>\n<p>So, while the NSA was monitoring our perceived Middle Eastern enemies, the Chinese and\u00a0Russians, and god knows who else, were making off with every important secret in the US,\u00a0courtesy of the NSA\u2019s back door. The NSA failed to notice that 50% of Jupiter Network users were\u00a0American, and the majority of those were within the US Government.<\/p>\n<p>Last year alone, the Defense Department was hacked. Using the NSA\u2019s back door the Chinese\u00a0walked off with 5.6 million fingerprints of critical personnel. The same back door was used to\u00a0hack the Treasury Department on May 27th of last year in which millions of tax returns were\u00a0stolen. And again, our most devastating hack as a nation was the Office of Personnel\u00a0Management hack, in which 22 million sensitive files were stolen. The Chinese gained access\u00a0through the Defense Department\u2019s Juniper Systems and then using inter-operability with the\u00a0Personnel Office, took what they wanted. Again, courtesy if the NSA\u2019s back door.<\/p>\n<p>Whatever gains the NSA has made through the use of their back door, it cannot possibly\u00a0counterbalance the harm done to our nation by everyone else\u2019s use of that same back door.<\/p>\n<p>Now, consider this: if Juniper Networks had the foresight to follow the same procedures that the\u00a0Chinese have been using for 35 years, none of this could have happened. The programmer\u00a0planted within Juniper by the NSA would have been audited by two senior coders. They each\u00a0would have read the code and immediately recognized the back door. Management would be\u00a0notified and the employee charged with a felony, where he would undoubtedly had snitched on\u00a0the NSA. The NSA could not possibly have engaged the assistance of the auditors because\u00a0they would be randomly rotated.<\/p>\n<p>Clever, these Chinese<\/p>\n<p>The moral is this: we are at the very least, 20 years behind the Chinese, and by association with\u00a0the Chinese and by copying them, the Russians as well.<\/p>\n<p>We have to get our act together, and soon. We can no longer act like children in a playground\u00a0playing with real guns. We have to grow up. Our technology has outgrown us, because we have\u00a0failed to grasp it&#8217;s subtle implications.<\/p>\n<p>___<br \/>\n<a href=\"http:\/\/www.businessinsider.com\/john-mcafee-nsa-back-door-gives-every-us-secret-to-enemies-2016-2?IR=T\">http:\/\/www.businessinsider.com\/john-mcafee-nsa-back-door-gives-every-us-secret-to-enemies-2016-2?IR=T<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-32815","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/32815","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=32815"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/32815\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=32815"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=32815"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=32815"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}