The latest edition of Joseph Farah's G2 Bulletin has raised a series of question marks and controversies regarding the connection between the NSA (National Security Agency) and popular operating system Windows. Although such connections were thought to exist long ago, no one has actually managed to come up with any obvious proof and details. Until now.
According to the G2 Bulletin, it seems that the NSA has a direct backdoor access to absolutely all the versions of Windows on the market, regardless of the country. Moreover, this access has been granted since the first release of Windows 95, which hit the market almost two decades ago. The same bulletin claims that the information comes from official sources that used to work in the development process. Plus, the access was granted at the insistence of the NSA and the government. Therefore, the backdoor access keys were given to absolutely any form of encryption.
Taking advantage of these keys is crucial for the release of any type of encryption supported by the United States export laws, especially when it comes to foreigners. The access was also given mostly because the National Security Agency plays an extremely important role over the exporting decision. Practically, it has the right to accept or reject some demands. Other than that, most requests higher than a particular level of megabytes will be rejected. After all, the NSA has a certain capacity to decrypt data and the respective information must be easily accessed. Such rules were left intact for many years and not only for the NSA, but also for more departments.
According to multiple specialists in computer security, the secret stays in the driver installed for the Windows security. The same rule applies to the encryption functions. If properly decrypted, it is not hard to spot the particular features or lines that give NSA the required access. Unsurprisingly enough, the same functions are also available in the latest versions of Windows. Identifying them was hard a decade ago, but the modern specialists have never been more experienced.
The specialists have spotted the problematic driver to carry the ADVAPI.DLL name. Its primary mission is to turn on, but also control a wide diversity of security features. It is practically located in the C:\Windows\system directory, which can be found on any computer that relies on Windows to run. The file is marked as hidden in all the versions available on the market, so newbies may encounter slight difficulties in spotting it. Therefore, the option to see hidden files must be enabled as well.
According to Nicko van Someren, the details are still raising a lot of question marks. It is still hard to tell precisely how the backdoor is actually accessed. However, the specialist claims that the respective driver comprises two keys. One of them is operated by Microsoft and gives the company the possibility to deal with cryptographic features in the operating system. On the other hand, the second key is still a mystery. However, it seems to be a matter of time until all these mysteries are properly resolved.