NSA Built Back Door In All Windows Software by 1999

Government Built Spy-Access Into Most Popular Consumer Program Before 9/11

In researching the stunning pervasiveness of spying by the government (it’s much more wide spread than you’ve heard even now), we ran across the fact that the FBI wants software programmers to install a backdoor in all software.

Digging a little further, we found a 1999 article by leading European computer publication Heise which noted that the NSA had already built a backdoor into all Windows software:

A careless mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA “help information” trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled.

The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren [an expert in computer security]. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.


Two weeks ago, a US security company came up with conclusive evidence that the second key belongs to NSA. Like Dr van Someren, Andrew Fernandez, chief scientist with Cryptonym of Morrisville, North Carolina, had been probing the presence and significance of the two keys. Then he checked the latest Service Pack release for Windows NT4, Service Pack 5. He found that Microsoft’s developers had failed to remove or “strip” the debugging symbols used to test this software before they released it. Inside the code were the labels for the two keys. One was called “KEY”. The other was called “NSAKEY”.

Fernandes reported his re-discovery of the two CAPI keys, and their secret meaning, to “Advances in Cryptology, Crypto’99” conference held in Santa Barbara. According to those present at the conference, Windows developers attending the conference did not deny that the “NSA” key was built into their software. But they refused to talk about what the key did, or why it had been put there without users’ knowledge.

A third key?!

But according to two witnesses attending the conference, even Microsoft’s top crypto programmers were astonished to learn that the version of ADVAPI.DLL shipping with Windows 2000 contains not two, but three keys. Brian LaMachia, head of CAPI development at Microsoft was “stunned” to learn of these discoveries, by outsiders. The latest discovery by Dr van Someren is based on advanced search methods which test and report on the “entropy” of programming code.

Within the Microsoft organisation, access to Windows source code is said to be highly compartmentalized, making it easy for modifications to be inserted without the knowledge of even the respective product managers.

Researchers are divided about whether the NSA key could be intended to let US government users of Windows run classified cryptosystems on their machines or whether it is intended to open up anyone’s and everyone’s Windows computer to intelligence gathering techniques deployed by NSA’s burgeoning corps of “information warriors”.

According to Fernandez of Cryptonym, the result of having the secret key inside your Windows operating system “is that it is tremendously easier for the NSA to load unauthorized security services on all copies of Microsoft Windows, and once these security services are loaded, they can effectively compromise your entire operating system“. The NSA key is contained inside all versions of Windows from Windows 95 OSR2 onwards.


“How is an IT manager to feel when they learn that in every copy of Windows sold, Microsoft has a ‘back door’ for NSA – making it orders of magnitude easier for the US government to access your computer?” he asked.

(Updates here and here)

We have repeatedly pointed out that widespread spying on Americans began prior to 9/11.

This entry was posted in Politics / World News. Bookmark the permalink.
  • Washington76

    MONDAY, DECEMBER 14, 2009 Slavery: Alive, Well, And Perfectly Legal In Modern America


    • Drdetroitdanchap

      Any government that will torture, will ENSLAVE. They are one and the same thing, using pain to get Humans to do what you want them to do.

      • Washington76

        Our government here in the U.S. has a distinct history of this!

      • Carl Pham

        Oh nonsense. Modern governments don’t enslave you by using force and pain. They do it by offering you pleasure and ease without your having to work for it. They promise to take away from you the routine adult burdens of defending yourself and your interests, of making intelligence consumer choices, of figuring out who to trust and who not to, of coping with bad luck, and of paying the consequences of your own dumb decisions.

        They tell you they’ll take away all that ordinary bad stuff that makes living a good and successful life no easy thing, and in exchange all you need to do it…give up your liberty, your power over your own affairs. Of course, when they’re trying to sell you this exchange, you can be sure they’ll emphasize the benefits and put the costs in the fine print, hoping you don’t read it. They’ll take advantage of your stupid childish wish to get something for nothing. But that’s not force. That’s just allowing you to enslave yourself.

  • Mark



    even better, torproject.org, and use tails.

    • amerikagulag

      I tried Linux for a while. I liked it, but it’s a whole different ball game. Until it becomes more user friendly, i’m afraid it’ll never catch on with mainstream users. The commands alone….

      • Jakeukalane Milegum Firisse

        for my is more user friendly ubuntu, i can’t do anything on windows it is so rigid….

      • Carl Pham

        A computer is a complex and powerful tool. If you want it to be under your command, it takes time and patience to learn how to drive it right. Anyone who tells you differently — who tells you your computer can be “user friendly” but also completely under your command, and doing nothing you don’t understand or know about — is selling you a load of delusional BS. If you buy it, you’re just as gullible (and doomed) as those who believe you can read a few breathless articles about “beating the market” and get rich day trading on Wall Street.

      • Cade Halvorson

        Windows use to be the hard os if your familier with DOS back in windows 95 or 98 linux is no harder there are commands that have to be learned and once you remember them you can get somewhere with it the longer the more problems you resolve on a linux os the better you become with the os it didn’t even take me two years to learn all the commands for slackware, ubuntu, red hat and fedora.

      • steven page

        it seems difficult at first but the reality is that you have adopted something and simply need to change your habits. most people refuse to do this, lashing out at supporters or their products, and others deny this, assuming it is difficult.

        windows is not “user-friendly”. it took me several years, since I was a child, to figure out how to do all the very technical things with Windows which i know how to do today.

        for example, if i put my windows 7 laptop in front of my Mum, and asked her do any complex task, it wouldn’t be long before she was calling for my help. same goes for all those strange-hour’ed phone calls i receive from Mum, friends, and family: “how do i do X?”

        it’s en-grained into our routines.

        however, try to write a script to automate a task! you need to learn several proprietary commands, with a plethora of different framework’s, with different versions, written in different proprietary languages… the registry can be confusing, access to drivers can be incredibly difficult..

        resources, databases and libraries are sometimes handled in strange ways.. the tools often are buggy poorly ported LINUX applications, are shareware trial applications, or are expensive and out of the each of anybody with a small budget or as a hobbyist.. and i could go on and on- but I digress;

        on modern distributions of Linux, EVERY application is maintained, and phased out when support is dropped, usually following by a replacement. a vast majority of applications come from a centralized repository, securely stamped (to prevent virus’, malware, or rootkits), and placed in a “server near you”.

        alot of people think that Linux is without many active virus’ because of a different in platform, which is not true. IMO, considering a compiler is on most every platform, it has less to do with the platform or architecture, but rather, the very simple fact that each system use the fairly sophisticated package management system and software repositories. this not only keeps things up to date, but ensure (a great deal of the time) that the application you are installing is indeed what you think it is

        applications can be installed and removed with one simple command using the package manager. each one has a localized manual available offline for personal usage. each application typically has an open source community, so that you may receive support in numerous locations.

        finally, with drivers for hardware being directly supported by Linux and produced by many vendors, this means that the Desktop Experience certainly caught up with windows, if not already surpassed it… see 3D Desktops for Linux

        anyways… my point is that being user-friendly does not me being more like Windows… user friendly means providing many avenues for support, working drivers for your most common hardware, having offline help pages, and a consistently way of downloading, installing, using, updating, and removing software for the typical user…

        All of which, Linux provides!

    • flek

      forget ubuntu…


      “Ubuntu, a widely used and influential GNU/Linux distribution, has
      installed surveillance code,” Stallman wrote in a post titled “Ubuntu
      Spyware: What to Do?” “When the user searches her own local files for a
      string using the Ubuntu desktop, Ubuntu sends that string to one of
      Canonical’s servers. …

      Insane surveillance society.


      • Carl Pham

        There’s a huge difference between Canonical trying to make money off of your shopping habits by targeting ads based on your Internet search history — which you can turn off any time, which isn’t hidden at all, which all your “free” smartphone apps already do in exchange for being free — and Canonical feeding your data to the NSA. (If it goes from Amazon to the NSA, that isn’t Canonical’s fault, of course.)

        I agree with Stallman, actually, that Canonical would serve Ubuntu users better by forcing you to opt-in to Internet searches using their servers each and every time you search.

        The problem is that you’ll notice I didn’t say Canonical would serve its customers better that way. Because Ubuntu users are not Canonical’s customers here. Amazon is. Why? Golden rule. (“He who pays the gold, rules.”) Amazon pays Canonical money. Ubuntu users don’t. TANSTAAFL.

        Or, in other words, if you want control, and if you want companies, firms, and even government to pay attention to what you want, be the customer — the one who sends over that sweet delicious money, and who therefore can turn it on or off as he pleases, depending on his satisfaction. Insist on paying for what you get — no freebies, no “because I deserve it,” no welfare, no charity — and you won’t have the problem of being treated like a child whose wishes can be ignored. It’s that simple.

        • Alfonso E.M.

          With Canonical gathering user info, NSA (or UK equivalent) does not need to install spyware on Ubuntu: they will just sniff that traffic! 😀

        • Someone

          I’m sorry but have you understood what Google runs on?
          Yeah, they store searches, just like Canonical, and serve advertisements accordingly to their contents.
          If Google lets NSA play at their servers I can’t image that Canonical hasn’t allowed them as well or soon will, or NSA has just invited themself.

        • Matt

          Well that whole “the customer rules” idea is working out so well for the paid operating system Windows, is it not?

      • t1oracle

        You can disable that.

      • jason

        what about backtrack5

    • Luke

      openSUSE. a very underrated operating system with indefinite capabilities.

      • Carl Collins

        openSUSE = Crash City… I tried at least 5 different versions of openSUSE and they were all Buggy as Hell!

        • Casey

          Gentoo, Arch, Slackware…..

          • Carl Collins

            I tried them also and they were just as buggy as openSUSE. Especially Gentoo! All I wanted was to have a stable distro that could function as a media center comparable to Windows Media Center but NOOOOOOOOOOO…. Linux was not up to the task. Microsoft is no angel but at least Windows Media Center is world class when it comes to TV tuner cards

          • AnonymousCoward2

            openSUSE buggy as hell?
            The problem doesn’t seem to be the Distro itself, but on you.

          • Carl Collins

            Well I don’t use openSUSE. You gotta be a freaking LOSER to use that buggy crap. Hah! Hah! Hah! You freaking Loser!

          • steven page

            @carl_collins:disqus unfortunately, you are so wrong my friend. not to mention snarly and a bit rude. not sure how long its been since you tried it, but along with any other piece of open source software: it takes time to perfect.

            regardless of this, most Linux Operating Systems are based off of upstream Kernels and Package Developers.. they do not write all the software you insall on the operating system? and with that said, not only is OpenSUSE and its code base in pretty good condition these days, its developed a large community.

            they have made a few counter intuitive design decisions mind you, i.e. software version porting (running new or unstable code), package management, and requiring root access too much (which linus himself addressed), but they are not enough to consider the operating system “buggy crap”.

            you can simply use older versions or back ports where needed. you can also very easily compile the stable version of any applkication from source.

            lemme guess… you are used to .deb and apt-get, and have no real understanding of the difference within regard to Yast? you have no command-line terminal knowledge?

            anybody who says Windows isn’t a good client or workstation operating system is simply just ignorant the reasons for this. but now-a-days just about any linux operating system can compete.

            but this takes understanding, the willing-ness to learn, and time. and you will be rewarded with better understanding of the operating system & computers in general.

          • Cade Halvorson

            Have you ever actually learned to use linux ? I made such bold claims myself before I knew how to fully use the os linux doesn’t work right off the cd right out of the box or right off the download it has to be configured things have to be set up fixes have to be applied to watch a movie on another screen flash player has to be edited in a hex editor its not the os it is the lack of support from other companies for the os most of the bugs and glitches are not linux they are drivers.

          • Dante H

            Slackware is VERY solid.

  • amerikagulag

    so 911 was just the FALSE FLAG they needed to legalize the unlawful spying. Dots Connect!

    If our “brave men and women in uniform” are “fighting for our freedom” then why is the Congress, the Senate and the Supreme Court taking it away? Perhaps our “brave men and women in uniform” are fighting the wrong enemy.

    • TruthHawk

      It was a false flag for many, many reasons. Most mil, gov, and john/jane doe citizens too dumbed-down and indoctrinated to smell the true enemies, both foreign and domestic. But the awakening continues….

    • TruthHawk

      It was a false flag for many, many reasons. Most mil, gov, and john/jane doe citizens too dumbed-down and indoctrinated to smell the true enemies, both foreign and domestic. But the awakening continues….

    • warriorkh1

      True!! everything that the elite try to feed into the Heads of the Masses is BullSHit… The ground realities r totally different… they destroyed 2 countries taking 911 as their only cover…
      Now the world knows that it Was an Inside job.

    • ofnature indawoods

      The fact that they capitalized on the mess, is not proof that they caused it. If you are a student of history you know that governments always capitalize on tragedies. Churchill said it best “Never let a good crisis go to waste”.

    • DarkwarrioR

      You twoofers are delusional.

      • Bev

        The opposite of truth is lie. The opposite of truthers is liers. You are a lier and proud of it, or perhaps just paid to do so.


        Wasn’t it Samsung (and perhaps now others) whose TVs included a camera unknown to buyers unless they read all the manual and then the option was to turn it upward. There were stories that they also sold apps to 3rd parties wanting to access the cameras. Many people put tvs in their bedrooms. This can only have been done for reasons of blackmail or perversion. Other electronic devices such as dvds where there is no need for any camera, were or are considering or doing the same thing.

        Seems like there could be a business model to disable such cameras, audio in equipment to preserve more of your privacy. Perhaps back doors also.

        • DarkwarrioR

          You aren’t truthers, you are twoofers and your delusional concept of “truth” is a lie. You are right with that one you are liars, perhaps paid to do so. If you are not, then I really feel bad for you.

          Oh and TL;DR

  • flek

    Apart from the fact that this is completely unacceptable,

    can someone please make a patch to deactivate their backdoor?


    • Jakeukalane Milegum Firisse

      No. Is because the arquitecture of the operating system: the sources are cloused. Even in Mocosoft decides to remove that NSA backdoors can implement others.

  • Drdetroitdanchap

    Why didn’t all their ILLEGAL surveillance stop the Boston bombing? Those 2 were so dumb they did not know about street corner cameras or even plan a getaway, so don’t try to say they were phone-aware.

    • gigel

      Maybe the “Boston bombing” was just an exercise on shutting down an entire city, impose curfew and perform house-to-house searches by the army.

    • gigel

      Maybe the “Boston bombing” was just an exercise on shutting down an entire city, impose curfew and perform house-to-house searches by the army.

      • thetawake


      • DarkwarrioR

        haha you conspiracy nuts are delusional

    • pyro777

      Because the Government does not truly care about justice.They scare the public into giving the government more control to “protect” them then its hitler all over again.

    • sunny

      So that their illegal surveillance becomes totally ”legal”

  • Jakeukalane Milegum Firisse

    this is not a surprise. just use linux. fuck micro$oft

    • dau13

      Sigh… when you use $ in place of a s you just look $tupid

      • Jakeukalane Milegum Firisse

        well, normally I use hasefroch instead micro$oft but probably you won’t understand that. It is only to avoid that word in internet, so don’t became a trackable word for web searches.

        • berock212

          It absolutely amazes me how paranoid you are. Microsoft is one of the larges companies in the world, don’t you think they have better things to do than track every single person who uses the word Microsoft. And don’t you think that being a billion dollar company, they wouldn’t be fooled by replacing a S with a dollar sign. If anything, using a $ instead of an S is more suspicious.

          • Jakeukalane Milegum Firisse

            “for web searches”, nor mocosoft. Is just in order to don’t post more the word of the hasefroch company so don’t became more relevant the word.

          • berock212

            Oh I see

      • pyro777

        Makes perfect sense to me. It symbolizes that the company is greedy. RuneScape even changed their own logo to Rune$scape after they banned all free players from the highscores.

  • WrenchMonkey

    I’m running XP Pro, SP3 and ADVAPI.DLL is nowhere to be found on my PC.

    The source for this article, http://www.heise.de/tp/artikel/5/5263/1.html, says:

    “If you use Windows, you will find it in the C:Windowssystem directory of your computer.”

    It’s not there, or anywhere else on my computer. By the way, I have “Windows File Protection” (wfp) turned off and set my folder options to show hidden files.

    I also did a search for any file with “NSAKEY” as part of the file name. Nothing. Of course a search for files with “key” as part of the file name produces a lot of results, 233 actually. The search for “key” does find some folders called “MachineKeys” that make reference to “DataMicrosoftCrypto”. That sounds like something that might warrant a bit more investigation.

    I’m not saying I doubt that the pseudo-government is spying on us bigtime. Maybe that dll file is part of service pack 5, which is mentioned, and I don’t have it because I turned off my automatic updates when I installed the OS, so I never got SP5.

    Anyway, the article seems to be saying that everything since Windows 95 has this backdoor and, since it identifies that ADVAPI.DLL, if it’s there, it should be easy to find. On my PC, it’s simply not there.

    • Jakeukalane Milegum Firisse

      The source is closed. They can changed the back door since that time. The ingenous thinking is believe that there is not back door or that you can easily look for it.
      Come on, Micro$oft operating system is shit but they have millions for investing and make it better, Surely you think that they keep the same method as disclosed in 1999?

      • EnlightenedSelfInterest

        Hey man, I can hear your thoughts. Did you forget your tin-foil hat today?

        • Jakeukalane Milegum Firisse

          didn’t not know what is tin foil. you just insult me but my point is valid. as you don’t know how to get a better explanation than mine you appeal to insults.

          well, I am right yet.

          • EnlightenedSelfInterest

            I’m glad your not too far gone to be able to realize you got flamed. But you’re still a little wacky. Did the little green men do unmentionable things to you in their spaceship?
            still … ROFLMFAO
            Man, this soooooo funny, you can’t make this stuff up. ooooh wait, you do make it up.

          • Jakeukalane Milegum Firisse

            this is serious man, stop babbling and acting like a child

        • Jakeukalane Milegum Firisse

          LOL, so you believe that I believe in crazy conspirations like Haarp? that is bullshit. Mocosoft is crap. Linux FTW. Your entire life depends of linux.

          • EnlightenedSelfInterest

            I don’t know what you believe in, I’m guessing it involves men in black helicopters, little green aliens and the loch ness monster, all sitting around a table playing cards, while spying on you and planning the fake moon landing.
            You’re a JOKE – go check yourself into the loony bin.
            and … STILL ROFLMFAO.

          • Jakeukalane Milegum Firisse

            i am atheist racionalist and i don’t believe in conspirations. This is a fact. They have the time, the resources, the oportunity and the motivation. pure logic. and even you have evidences (read the article)

          • EnlightenedSelfInterest

            You say your don’t believe in conspiracies, yet that’s exactly what you do believe in. You say ‘This is a fact’ – what evidence do you have? You say ‘read the article’ – what evidence does the conspiracy nut who wrote the article have? THERE IS NO EVIDENCE – you and the article author are conspiracy theorists, that’s exactly what you are.
            For whatever reason you have, you hate Microsoft, it seems to be an irrational hatred and absolutely influences your viewpoint, you believe that Microsoft is spying on you, and you want to believe the worst of them because of your hatred.
            Take a really long hard look at yourself, you’re a tin-foil hat, Microsoft hating, certifiable, conspiracy theorist nut.

          • Jakeukalane Milegum Firisse
          • EnlightenedSelfInterest

            You can’t spell Microsoft right, you quote another conspiracy nut website to prove this conspiracy nut website is true. WTF, seriously, are you truly that stupid, or that paranoid, or how about just plain gullible.
            BTW – just because you spell Microsoft as ‘mocosoft’ (ROFL), they can still watch you. BWAAAHAAHAAAHAA.
            Don’t bother to reply to this – I cant stand this stupidity, even though it’s so easy to make fun of you, too much filet mignon is still too much.

          • Jakeukalane Milegum Firisse

            Mocosoft is intended… moco means mucus in spanish. Can you speak in more than a language?

          • Jakeukalane Milegum Firisse

            you seem from USA. nobody would be so crazy like americans… well. It is not problem for me. you still said that I have fear of mocosoft LOL. I’ve nothing with them.

          • luxlucetintenebris

            Astroturfing much?

          • EnlightenedSelfInterest

            Not so much. And I find it kind of interesting you would think so, what have I said that would lead you to that comment? Its not like I was defending Microsoft in this comments section, all I was doing was enjoying making fun of the paranoid delusions of mr firisse. If that looks like astroturfing to you, then you go ahead and have fun with that …

          • luxlucetintenebris

            It’s not a paranoid delusion when it’s right! Whatever your views the NSA and all the other agencies have done the ‘right’ thing from their point of view. If you can put backdoors on pretty much every computer system in the world it’s a no brainer! They do exist, if you’re into computers you’ll know that, if not a little education will soon get you up to speed.

            The Chinese are doing the exact same thing with the hardware they produce.

            That’s why it looks like you’re astroturfing, nobody can be that wilfully ignorant and, sure, there’s always going to the tin foil nutjobs who make everyone else look bad but it doesn’t mean their not right, at least not in this case.

            No further comments will be entered into! :p

          • EnlightenedSelfInterest

            You cant even get the terminology right, dork. From Wikipedia: ‘Astroturfing refers to political, advertising, or public relations campaigns that are designed to mask the sponsors of the message to give the appearance of coming from a disinterested, grassroots participant’. If I was defending Microsoft or anyone else, or attacking anyone, you *might* be able to make a case for your accusation, but you can’t, because I didn’t. I have no political, PR or advertising agenda here. I’m just having fun rattling the cages of the inmates.
            As far as “It’s not a paranoid delusion when it’s right”; nice case of circular logic there. That’s as good as quoting another tin foil hat website to prove that this tin foil hat website is correct.
            ‘If you’re into computer you’ll know that’. Really? Whats your authority on computers? Did you install a *nix on your computer? So impressive!!. And I am completely sure that what I do in my life is of little to no interest to the government, Google on the other hand (oops, sorry I was veering off onto the astroturf there for a second).
            “No further comments will be entered into!” = “I cant defend my position so I’m going to try to sound superior and ignore you.” HAAAAHAAAAHAAAA.
            You elitist snob !!

          • Guest

            All I want to know is: “Who says I’m paranoid?”

          • EnlightenedSelfInterest


          • berock212

            You are soo paranoid. What evidence do you have that the Chinese are putting backdoors in their hardware. Show me a piece of Chinese hardware that is dissected so you can clearly see how it has a backdoor. Also there is no need to put backdoors into Windows, it’s full of holes. And if there was a backdoor in Windows, someone would have noticed by now because millions of people use it and thousands of people developed the software.

          • eruditeknowledge

            Huwaei routers were shown to be hackable recently, so the traffic (including passwords) could easily be read. The German MOD developed their own proprietary OS back in 2001the late nineties because they found comms to Redmond were built into Windows and the NSA keys when they reverse engineered it. http://www.spiegel.de/netzwelt/web/feindliche-software-bundeswehr-verbannt-microsoft-programme-a-123170.html and more towards the bottom of the page at http://www.jacobsm.com/techgripe.htm

          • Jakeukalane Milegum Firisse

            Well, you probably have to read something about NSA and Snowden, seems you didn’t see the news…

            NSA have access to most of the routers that enters USA, they can send a judicial order to do anything they want. And there are proofs that Microsoft have sucking the dicks to the NSA.

            Well, at least you can say “I have nothing to hide” and I could laught even harder at you.

          • EnlightenedSelfInterest

            Umm, what kind of medications are you on? You’re still on this conspiracy theory BS? HAHAHAHAHA. This thread is over a year old – how about you come into the current time and stop with the tin-foil hat conspiracy crap.
            You’re an id-i-ot

            And PLEASE leave me alone, I have no intention of commenting on your BS theories, and how the NSA are looking up your a$$ to see what you had for dinner, I bet they don’t care, and for sure, I don’t.

          • Jakeukalane Milegum Firisse

            You are more crazy that I though possible. Well, stay with a winbug computer. Is all up to you.

          • Jakeukalane Milegum Firisse

            I don’t know what BS means. And this is not conspiracy. LOL.

            You have to update yourself.

          • EnlightenedSelfInterest

            Firisse, it seems to me that there are very few types of people who are truly afraid of being watched by the NSA or anyone else 1. Tin-foil hat conspiracy theory whackos 2. Hackers 3. Child molesters. You claim you’re not a conspiracy theorist weirdo, you’re certainly not intelligent enough to be a hacker,
            Therefore, you must be a child molester.
            Jakeukalane Milegum Firisse IS A CHILD MOLESTER.

          • Jakeukalane Milegum Firisse


          • Jakeukalane Milegum Firisse

            I am not afraid to be watched by NSA. Just I don’t see the meaning of defending Windows of a thing they did.

          • Jakeukalane Milegum Firisse
          • EnlightenedSelfInterest

            It seems to me that there are very few types of people who are truly afraid of being watched by the NSA or anyone else 1. Tin-foil hat conspiracy theorists 2. Hackers 3. Child pornographers. You claim you’re not a conspiracy theorist nut, you’re certainly not intelligent enough to be a hacker,
            Therefore, you must be a child molester.
            Jakeukalane Milegum Firisse IS A CHILD PORNOGRAPHER.

          • Jakeukalane the First

            Jakeukalane Milegum Firisse es un pederasta. Ha sido acusado de 17 cargos de agresión a los niños menores de 8 años.

          • Jakeukalane Milegum Firisse

            This profile, “Jakeukalane the First ” was created just for defame me. He doesn’t agree that the NSA is massive spying to everyone of us. And then he say that “why you want privacy?” “if you want privacy is because you are a pederast”.

            Some days ago I found the perfect response.

            As USA citizens say “freedom is precious”. And they carry weapons in order to defend them against the State. ( I don’t agree with that, but you will see my point).

            Well, privacy is necessary to defend you against the State or to defend you against everyone that want to harm you through your data.

            In Sudamerica, USA-supported goverments organized genocides and prosecution of politic ideas.

            One day there were normal people, and the other, the State gathered them in football stadiums and shoot them to death, just because they support non-fascist ideology.

            And that’s why privacy is gold. Our democracies can turn in dictatorships in any moment.

          • Jakeukalane Milegum Firisse

            Mocosoft it is not spying me because I don’t use windows.

          • EnlightenedSelfInterest

            You can’t spell Microsoft right, you quote another conspiracy nut website to prove this conspiracy nut website is true. WTF, seriously, are you truly that stupid, or that paranoid, or how about just plain gullible.
            BTW – just because you spell Microsoft as ‘mocosoft’ (ROFL), they can still watch you. BWAAAHAAHAAAHAA.
            Don’t bother to reply to this – I cant stand this stupidity, even though it’s so easy to make fun of you, too much filet mignon is still too much.

    • premy2u

      try searching for: c:windowssystem32advapi32.dll 🙂

  • jj

    no 9/11 was used to make money off the stock market over 150 thousand people made money on the day of and days leading up to 9/11 on put options…. how many of them are in jail? zero, our own government put and end to all investigations leading /or dealing with put options and 9/11….. and here we are running all over the desert looking for a terrorist leader and yet somehow 150 thousand people knew about it 4 days before 9/11 and our own government didnt lol …..supposedly of course accept when you learn who made the money you know why they stoped searching real quick, heh wanna find the terrorsit, find the names that made money on 9/11 and put options

  • Lerak Mahendu

    Whenever I hear someone use the term “special access codes”, I know I’m dealing with Hollywood-movie informed thinking. It’s the same level as “uploading a virus to an alien space ship to disable it.”

    There are no backdoors in Window that the NSA put there; maybe there are sops to the NSA that MS installed, and certainly there are MS code defects which can be exploited. (Besides, they wouldn’t have left unencrypted text in binaries to be “discovered” if it was expected to be used for spying; it’s so easy to avoid.)

    The reasoning goes something like this: The hatred of MS in the world of hackers is so deep and obsessive, that if such a thing existed, it would be found during a hacker’s debugging session on startup code security, and trumpeted loud and clear across the planet as a warning to those who would use MS products.

    For the uninitiated, this sounds like quantum mechanics. In reality, a motivated hacker without a social life who began programming before age 12 (there are legions of them) would have discovered these “special access codes” with a few tens to hundreds of hours hacking assembly language with a developer’s device driver tool kit.

    There are only so many ways code can start up and be secured. MS’s code security, for those willing to spend the time to understand and manipulate it, isn’t rocket science, and it’s full of holes. To this day and despite many improvements, much of their approach is security through obfuscation, not some sophisticated scheme that requires science fiction quantum computing to solve. This is the domain and expertise of hackers: Unwinding obfuscated code and exploiting it.

    This in no was is to argue that the NSA doesn’t want “special access codes” or backdoors, but it simply is implausible that they exist: We would have to believe that either hackers don’t know about them or are “patriotically” keeping them secret. We are talking about a joint effort between MS and the gubamint, after all.

    To get better perspective, check out the code-breaking activities at one of the yearly Black Hat conferences. This is publically acceptable hacking which means it is only the tip of a vast iceberg.

    • Beavis_Bunghole

      Funny how you say it’s just a conspiracy theory, and then justify it with a conspiracy theory.

      Option C: Hackers know about it and kept it quiet because they were using it themselves.

  • John Burt Caylor

    This more than likely is true and was instigated by an incident that I was personally aware of as the Branch Chief for ACS Government Solutions Group at Lyster Army Hospital at Fort Rucker, Alabama, in 1998-99. Being an Unix software developer and Network Specialist involving “Enterprise Networks” means connecting all sorts of Op systems and hardware worldwide – We standardized on a DEC Alpha with windows NT Server – We were connected to our command center at Ft. Detrick and our e-mails were routed through Fort Sam Houston, TX where we also deployed Novell Networks, due to politics back then. Sometime during that first year ACS sent me for MCSE Enterprise Certification to Mobile, Al. during class IO casually took a moment (from a nonsecure computer) and typed in the I.P. address of my Host DEC Alpha Server at Fort Rucker 270 miles away. Bingo – I was in and viewed all the files and directories of critical top secret government data and patient data of TPOCS another Unix system designed to keep everyone out – but doctors and clinic staff. Needless to say “THIS WAS A BIG DAMN DEAL” So I go back to Rucker and tell the Army’s Commanding Officer a little Captain a woman with 6 months experience in IT that we had “Major problems with Windows NT Server” and I demanded that we bring in a Security Team Immediately fix this – well the military has always been for Gravy trainers – like welfare – and unless it promotes their career then screw it she and I fought her over the issue – she wanted to spend the departments money on “new laptops and computers for the ranking military officers” at a time when my doctors were without functional machines and had to go to the library to research medical cases instead of using the internet on their old 486 machines. So a week or so later _ I’m still pissed and complaining and I go past her to the top and demand it – So on a Friday morning a special team of security specialists show up at a cost of $5000 and they go through the systems and give me a the Seal of Credibility and the next Monday they were coming in and implementing the counter-measures and contacting Microsoft. That Sunday night – the nation of Pakistan went through the holes at Fort Sam Houston on the e-mail server connected to Rucker and from my server apparently went into Fort Detrick and mined their servers for India’s nuclear secrets – Placing Pakistan miles ahead in the war game – so instead of making big nukes – Pakistan made Neutron Bombs ( Gamma Radiation Bombs) small like China did a real Pandora’s Box – killing people and preserving real estate. So I marched in and announced to the Captain that I refused to work with her anymore as she did not have the honor or integrity to be an officer of the United States. I went home and refused to go back and ACS sent me to the U.S. E.P.A. Region 4 HQ in Atlanta. So don’t think for one moment that the National Security Agency was up to some sinister plot to spy on everyone – just government employees (rightfully so). The NSA leadership has been the problem and many good people work at the NSA and since Bush those people who blew the whistle when the line was crossed have been systematically prosecuted and purged fro leaking classified information – they are America’s true Patriots. Since Ed Mease was Attorney General Justice stole (PROMIS Software)-(Inslaw Scandal) Prosecutors Management Information System with backdoors Justice supplied it to every state and county in the U.S. and to other nations. PROMIS which I have used has backdoors later built in by PTECH Software a Saudi Firm linked to Muslim Terrorists and funders of 9/11 . The balance of Freedom has to come from close and open inspection in a free society – Government was created to protect and promote the health, Safety of its citizens. Contracting out and privatizing our countries secret information to our enemies and other nations is our downfall. Jeb Bush, George Bush with Tom Feeny gave Yang Enterprises an affiliate of China’s PLA a private contract to manage all of NASA’s computer systems and secrets along with most all Florida Agencies including your health records. As an experienced investigative Journalist – publishing “insider-Magazine.com” I can only judge now that Obama is trying to undo all the harm to the Nation done by Bush family – it’s hard to unravel a complicated mess but to do that you must do some peaking and discover who your friends and allies are, true Americans. John Caylor

  • Mendoza

    And also easily disabled/excised with a dual boot Linux system.

  • EnlightenedSelfInterest

    Guess its time to move off Windows NT 4 then. ROFL.

    Seriously though, what evidence are you offering here, besides unsupported hear-say and a 14 year old document on an OS that hasn’t been current in a very long time (in OS terms)?
    This blog is a joke (as in every one should laugh at it)

  • Daniel

    As many said, better working with Ubuntu or any other Open Source operating system. Even if they have some sort of surveillance system it is just a matter of taking a deep one into the source code and check it.

  • Andrew
  • Andrew
  • Cornuts

    ADVAPI.DLL is now called ADVAPI32.DLL, it is included in Windows 8 also. It is the Adv API Library – it has authentication, cypher functions and hashing functions as well as Registry Permission controls and a whole list of documented functions – where it gets weird is finding undocumented function – which have been found. Think of it as a function library with hidden easter eggs – the lib is also cyphered and in machine code so back engineering is impossible for a hobby. It has long been thought there are functions calls that can be called by exploit to gain remote access as needed. Looking to buffer exploits to write executable code and call advapi.dll functions to gain “back door” access. Really, hardware firewall on a non-Microsoft OS is the way to go now days – even then you have limits as it is all 1’s and 0’s. Air Gap if you are really worried.

  • Shannon Porter

    Allright everyone..Just go back to your traditional pen and paper,and old fashioned typewriters…Oh but oh no! Now they can read your mind..

  • Heimdall

    For those of you who think open-source is any better than the proprietary stuff, I have one word! BOINC!


  • steven

    Get Linux today..and its always free

  • steven

    Ultimate Edtition..Get it! Totaly free and no NSA

  • rotorhead1871

    things are not as they seem….but you already know that….

  • DoktorThomas

    No government that operates outside of its own accepted fundamental laws and principles can protect the rights and security of the lawful citizens within; such a government is not a republic, nor a democracy. It is more a kin to a dictatorship. The elected leaders of the US have enshrined themselves as Royalty who answer to no one for any reason. For all intent and purpose, the nation founded by the free colonists no longer exists, even in the minds of the proletariat. Freedom and liberty are illusions manipulated by wizards from behind closed doors in secret recesses. “Citizen rule” meant to excluded professional politicians at all levels of government. ©2013 All rights reserved.

  • Logic

    “Highly compartmentalised”. Read: badly disorganised

  • Can’t hackers exploit these backdoors?
    Looks like I am going back to linux.

  • zer0

    youre stupid if you believe this. dont belive everything you see on the internet

  • Kalvin

    People, DO something about it! Protest the NSA, retain from buying any Windows PCs or Macs, anything! If you want all of your privacy back, then the only way to stop this nonsense is to not just complain about it, but to get up and start fight back against this unfairness! Don’t be lazy!

  • TAG

    I hadn’t logged onto Windows for nearly a year but had to because my PCOS was not supportive of Apple and I intended to unbrick an iPhone… absent a carrier; so needed access to my iTunes account (which has never been used except for iOS updates when I did have an iPhone)

    Bottom line: it took half the day for the security updates in Windows to finish downloading just so I could reboot outside Windows let that OS go dark again…hopefully forever.

    Windows is like that bad habit you never knew you had until you kicked it cold turkey!

  • Akash Sharma


    Spy cams are widely used to keep an eye on your
    house helps and employees while you are away.

  • Steve Smith

    Absolute BS, there is no backdoor!
    Post the proof, don’t just parrot unsupported claims.

  • the watcher

    you should be aware that all Windows, Android, and iOS OSs are NSA spy tools. offically partnering with the corporations. so encrypting is totally useless, because the NSA simply reads the data before encrypting or after decrypting. forget Tor, get a safe OS.

  • Bill, please join Steve…

    What’s the big deal? It’s Microsoft, everyone knows it won’t work when they try to use it…

  • What’s the big deal? It’s Microsoft, everyone knows it won’t work when they try to use it

  • Simon

    Surely if the NSA were going to put a key in the Windows OS, they wouldn’t be so stupid as to call it “NSAKEY”?!!!

  • Absolutely this is not a surprise by Microsoft. Just you can
    use linux.

  • i thankful to you for sharing very nice information about window software. I also know, what is best for me. http://www.spycardssort.com

  • DarkwarrioR

    Article full is of bullshit by linsux fanboys, there is no NSA backdoor in windows if it was they would be caught… because all it takes is to monitor a clean windows pc behind a firewall and you will find it doesn’t send/receive any suspicions packets at all.

    • DarkwarrioR

      Btw the last windows 95… windows 95c was released on 26. November 1997 (Win95 OSR2 or win95b – 24. August 1996)… Article says since 1999. Another way to tell that article is full of shit

  • This is not a unique change, not good for me.

  • Yassine Yousfi

    i don’t think changing windows to linux would help at all, as that what
    the debate here
    (http://stopbyte.com/1382/disco… came
    up to

  • Whitehat Seo

    Security problem is one of the emerging issues which everybody is getting worried of. As technology advances, human beings become innovative and crafty. The tools
    that were traditionally used to provide security can no longer be relied upon.

    door access control system

  • Pounraj Ltm


    Esync security systems chennai is the leading commercial

    security systems product dealers especially for security

    camera chennai and cctv systems in chennai.had done cctv camera manufacturers, cctv camera suppliers,

    cctv camera producers,camera exporters,closed circuit Television camera,cctv

    cam,closed circuit television cam production centers. To know cctv camera price in chennai

    call us@ 7299004295.

  • I am glad to come here post, thanks for sharing very information with us. This is not good but I also use Microsoft. http://www.retouchingvisuals.com/