- All the games coming to Google Stadia 4 Years Ago
- Google just announced a line of Nest-branded smart home products 4 Years Ago
- ‘Fake news’ is helping conspiracy theorists deny Turkish atrocities Today 10:15 AM
- YouTuber immediately loses gig with Sanders campaign over sexualized MLK video Today 9:59 AM
- John Bolton becomes the most uncomfortable resistance hero yet Today 9:16 AM
- Robert Eggers on the long, hard road to ‘The Lighthouse’ Today 9:10 AM
- How to watch the fourth 2020 Democratic debate Today 9:00 AM
- Is social media normalizing cultural appropriation? Today 7:45 AM
- Zoë Kravitz will play Catwoman after being told she was too ‘urban’ for ‘Dark Knight Rises’ Today 6:36 AM
- The 5 best Spike Lee movies Today 5:00 AM
- Jesse Eisenberg and Imogen Poots visit suburban hell in ‘Vivarium’ Today 4:30 AM
- Spoiler-free review: HBO’s ‘Watchmen’ leans into the comic’s political side Today 3:00 AM
- #DogsAgainstBrexit highlights the negative impact of Brexit on pets Monday 7:44 PM
- Congress investigating whether vaping manufacturers used social media bots Monday 6:34 PM
- Influencer accuses Lisa Frank of stealing apartment design, says that’s why she’s getting evicted (updated) Monday 6:12 PM
House investigates whether U.S. agencies used firewall with possible NSA backdoor
The NSA might have put a backdoor in a popular firewall. Now Congress wants answers.
The House Oversight Committee sent letters to 24 federal departments and agencies on Jan. 21 asking them about their use of firewalls made by Sunnyvale, California-based Juniper Networks, which announced in December that it had found “unauthorized code” in the ScreenOS software that powers those firewalls.
The code, apparently present in ScreenOS since August 2012, exposed the firewalls to potential remote takeover by hackers.
The plot thickened when Juniper revealed that it used a pseudo-random-number generator called Dual Elliptic Curve to power the encryption in ScreenOS. Dual_EC became the subject of scandal when it was discovered that the National Security Agency had secretly inserted a vulnerability into the code before convincing the public and private sectors to adopt it.
The NSA‘s code allowed it to secretly predict Dual_EC’s supposedly random number generation, thus letting it descramble the encryption of any product using Dual_EC.
In an interview with Reuters on Thursday, Rep. Will Hurd (R-Texas), the chairman of the oversight committee’s information-technology subcommittee, said that he wanted to look at both the government’s use of the compromised firewalls and the process that led to Juniper using Dual_EC.
“I don’t think the government should be requesting anything that weakens the security of anything that is used by the federal government or American businesses,” he told Reuters, referring to the possibility that the NSA was responsible.
Shana Teehan, a Hurd spokeswoman, said that it was too early to predict the course of the committee’s work. “Next steps regarding this inquiry will be determined once we hear back from the agencies,” she said in an email.
A spokesman for House Oversight Committee Chairman Jason Chaffetz (R-Utah) did not respond to a request for comment.
Juniper continued using Dual_EC for years after researchers publicly revealed that the NSA had added a so-called “backdoor,” claiming that it relied on an additional piece of code that offset the problem. But earlier in January, a computer science professor found that Juniper added Dual_EC to its firewalls after the other piece of code. Why, researchers wondered, had Juniper bothered implementing an unnecessary algorithm that it knew was fundamentally flawed?
One possibility: That Juniper, like fellow security giant RSA, received money from the NSA to install Dual_EC, thus giving the spy agency a window into the activities of Juniper’s clients.
Hurd argued in a Jan. 26 Wall Street Journal op-ed that the Juniper saga had major implications for the ongoing debate over whether tech companies should add backdoors to their encryption to help government investigators read criminal and terrorist suspects’ communications.
“This incident shows that backdoors to bypass encryption—even those requested by law enforcement or mandated by lawmakers—are extremely dangerous,” Hurd wrote. “There is no way to create a backdoor that is not vulnerable to this kind of breach. Encryption is essential to our national security and economy; we should be focused on strengthening it not weakening it.”
Photo via ChrisDag/Flickr (CC BY 2.0)
Eric Geller is a politics reporter who focuses on cybersecurity, surveillance, encryption, and privacy. A former staff writer at the Daily Dot, Geller joined Politico in June 2016, where he's focused on policymaking at the White House, the Justice Department, the State Department, and the Commerce Department.