{"id":10091,"date":"2015-12-20T15:00:18","date_gmt":"2015-12-20T21:00:18","guid":{"rendered":"http:\/\/hcstx.org\/?p=10091"},"modified":"2015-12-20T15:00:18","modified_gmt":"2015-12-20T21:00:18","slug":"a-case-study-why-government-encryption-back-doors-are-a-bad-ideal","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2015\/12\/20\/a-case-study-why-government-encryption-back-doors-are-a-bad-ideal\/","title":{"rendered":"A Case Study Why Government &#8220;Encryption Back Doors&#8221; are a BAD Ideal"},"content":{"rendered":"<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-large wp-image-10092\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2015\/12\/backdoor.jpg?w=620\" alt=\"backdoor\" width=\"620\" height=\"408\" \/><\/p>\n<p><span class=\"lede\">ENCRYPTION BACKDOORS HAVE <\/span>been a hot topic in the last few years\u2014and the controversial issue got even hotter after the terrorist attacks in Paris and San Bernardino, when it\u00a0<a href=\"http:\/\/www.wired.com\/2015\/11\/paris-attacks-cia-director-john-brennan-what-he-gets-wrong-about-encryption-backdoors\/\">dominated media headlines<\/a>. It even came up during this week\u2019s <a href=\"http:\/\/www.wired.com\/2015\/12\/gop-debate-internet\/\">Republican presidential candidate debate<\/a>. But despite all the attention focused on backdoors lately, no one noticed that someone had quietly installed backdoors three years ago in a core piece of networking equipment used to protect corporate and government systems around the world.<\/p>\n<p>On Thursday, tech giant Juniper Networks revealed in a\u00a0<a href=\"http:\/\/forums.juniper.net\/t5\/Security-Incident-Response\/Important-Announcement-about-ScreenOS\/ba-p\/285554\">startling announcement<\/a> that it had found \u201cunauthorized\u201d code embedded in an operating system running on some of its firewalls.<\/p>\n<p>The code, which appears to have been in multiple versions of the company\u2019s ScreenOS software going back to at least August 2012, would have allowed attackers to take complete control of <a href=\"http:\/\/www.juniper.net\/us\/en\/products-services\/security\/netscreen\/\">Juniper NetScreen firewalls<\/a> running the affected software. It also would allow attackers, if they had ample resources and skills, to separately decrypt encrypted traffic running through the <a href=\"http:\/\/kb.juniper.net\/InfoCenter\/index?page=content&amp;id=KB8402&amp;actp=search\">Virtual Private Network, or VPN, on the firewalls<\/a>.<\/p>\n<p>\u201cDuring a recent internal code review, Juniper discovered unauthorized code in ScreenOS that could allow a knowledgeable attacker to gain administrative access to NetScreen devices and to decrypt VPN connections,\u201d Bob Worrall, the companies\u2019 CIO wrote in a post. \u201cOnce we identified these vulnerabilities, we launched an investigation into the matter, and worked to develop and issue patched releases for the latest versions of Screen OS.&#8221;<\/p>\n<p>Read the Remainder in <strong><a href=\"http:\/\/www.wired.com\/2015\/12\/juniper-networks-hidden-backdoors-show-the-risk-of-government-backdoors\/?mbid=nl_122015\">Wired<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ENCRYPTION BACKDOORS HAVE been a hot topic in the last few years\u2014and the controversial issue got even hotter after the terrorist attacks in Paris and San Bernardino, when it\u00a0dominated media headlines. It even came up during this week\u2019s Republican presidential candidate debate. But despite all the attention focused on backdoors lately, no one noticed that&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[74,1317,883,1814,1132,1189,65],"tags":[3380,3381,3382,3383,3384,3385,1805],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/10091"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=10091"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/10091\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=10091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=10091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=10091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}