Tom Burghardt
Global Research
November 12, 2013

Back in the 1990s, security researchers and privacy watchdogs were alarmed by government demands that hardware and software firms build âbackdoorsâ into their products, the millions of personal computers and cell phones propelling communication flows along the now-quaint âinformation superhighway.â
Never mind that the same factory-installed kit that allowed secret state agencies to troll through private communications also served as a discrete portal for criminal gangs to loot your bank account or steal your identity.
To make matters worse, instead of the accountability promised the American people by Congress in the wake of the Watergate scandal, successive US administrations have worked assiduously to erect an impenetrable secrecy regime backstopped by secret laws overseen by secret courts which operate on the basis of secret administrative subpoenas, latter day lettres de cachet.
But now that all their dirty secrets are popping out of Edward Snowdenâs âbottomless briefcase,â we also know the âCrypto Warsâ of the 1990s never ended.
Documents published by The Guardian and The New York Times revealed that the National Security Agency âactively engages the US and IT industriesâ and has âbroadly compromised the guarantees that internet companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments.â
âThose methods include covert measures to ensure NSA control over setting of international encryption standards,â The Guardian disclosed, along with âthe use of supercomputers to break encryption with âbrute forceâ, andâthe most closely guarded secret of allâcollaboration with technology companies and internet service providers themselves.â
According to The New York Times, NSA âhad found ways inside some of the encryption chips that scramble information for businesses and governments, either by working with chipmakers to insert back doors or by surreptitiously exploiting existing security flaws, according to the documents.â
In fact, âvulnerabilitiesâ inserted âinto commercial encryption systemsâ would be known to NSA alone. Everyone else, including commercial customers, are referred to in the documents as âadversaries.â
The cover name for this program is Project BULLRUN. An agency classification guide asserts that âProject BULLRUN deals with NSAâs abilities to defeat the encryption used in specific network communication technologies. BULLRUN involves multiple sources, all of which are extremely sensitive. They include CNE [computer network exploitation], interdiction, industry relationships, collaboration with other IC entities, and advanced mathematical techniques.â
In furtherance of those goals, the agency created a âCommercial Solutions Center (NCSC) to leverage sensitive, cooperative relationships with industry partnersâ that will âfurther NSA/CSS capabilities against encryption used in network communications technologies,â and already âhas some capabilities against the encryption used in TLS/SSL. HTTPS, SSH, VPNs, VoIP, WEBMAIL, and other network communications technologies.â
Time and again, beginning in the 1970s with the publication of perhaps the earliest NSA exposĂ© by Ramparts Magazine, we learned that when agency schemes came to light, if they couldnât convince they resorted to threats, bribery or the outright subversion of the standard setting process itself, which destroyed trust and rendered all our electronic interactions far less safe.
Tunneling underground, NSA, telcos and corporate tech giants worked hand-in-glove to sabotage what could have been a free and open system of global communications, creating instead the Frankenstein monster which AT&T whistleblower Mark Klein denounced as a âBig Brother machine.â
The Secret State and the Internet
Five years after British engineer Tim Berners-Lee, Belgian computer scientist Robert Cailliau and their team at CERN developed a system for assembling, and sharing, hypertext documents via the internet, which they dubbed the World Wide Web, in 1994 the Clinton administration announced it would compel software and hardware developers to install what came to known as the âClipper Chipâ into their products.
The veritable explosion of networked communication systems spawned by the mass marketing of easy-to-use personal computers equipped with newly-invented internet browsers, set off a panic amongst political elites.
How to control these seemingly anarchic information flows operating outside ânormalâ channels?
In theory at least, those doing the communicatingâacademics, dissidents, journalists, economic rivals, even other spies, hackers or âterroristsâ (a fungible term generally meaning outsider groups not on board with Americaâs imperial goals)âwere the least amenable users of the new technology and would not look kindly on state efforts to corral them.
As new communication systems spread like wildfire, especially among the great unwashed mass of âlittle people,â so too came a stream of dire pronouncements that the internet was now a âcritical national assetâ which required close attention and guidance.
President Clintonâs Commission on Critical Infrastructure Protection released a report that called for a vast increase in funding to protect US infrastructure along with one of the first of many âcyberwarâ tropes that would come to dominate the media landscape.
âIn the cyber dimension,â the report breathlessly averred, âthere are no boundaries. Our infrastructures are exposed to new vulnerabilitiesâcyber vulnerabilitiesâand new threatsâcyber threats. And perhaps most difficult of all, the defenses that served us so well in the past offer little protection from the cyber threat. Our infrastructures can now be struck directly by a variety of malicious tools.â
And when a commercial market for cheap, accessible encryption software was added to the mix, security mandarins at Ft. Meade and Cheltenham realized the genie would soon be out of the bottle.
After all they reasoned, NSA and GCHQ were the undisputed masters of military-grade cryptography who had cracked secret Soviet codes which helped âwinâ the Cold War. Were they to be out maneuvered by some geeks in a garage who did not share or were perhaps even hostile to the âpost-communistâ triumphalism which had decreed America was now the worldâs âindispensable nationâ?
Technological advances were leveling the playing field, creating new democratic space in the realm of knowledge creation accessible to everyone; a new mode for communicating which threatened to bypass entrenched power centers, especially in government and media circles accustomed to a monopoly over the Official Story.
US spies faced a dilemma. The same technology which created a new business model worth hundreds of billions of dollars for US tech corporations also offered the public and pesky political outliers across the political spectrum, the means to do the same.
How to stay ahead of the curve? Why not control the tempo of product development by crafting regulations, along with steep penalties for noncompliance, that all communications be accessible to our guardians, strictly for âlaw enforcementâ purposes mind you, by including backdoors into commercially available encryption products.
Total Information Awareness 1.0
Who to turn to? Certainly such hush-hush work needed to be in safe hands.
The Clinton administration, in keeping with their goal to âreinvent governmentâ by privatizing everything, turned to Mykotronx, Inc., a California-based company founded in 1983 by former NSA engineers, Robert E. Gottfried and Kikuo Ogawa, mining gold in the emerging information security market.
Indeed, one of the firmâs top players was Ralph OâConnell, was described in a 1993 document published by Computer Professionals for Social Responsibility (CPSR) as âthe father of COMSECâ and the âPrinciple NSA Technical Contactâ on Clipper and related cryptography projects.
A 1993 Business Wire release quoted the firmâs president, Leonard J. Baker, as saying that Clipper was âa good example of the transfer of military technology to the commercial and general government fields with handsome cost benefits. This technology should now pay big dividends to US taxpayers.â
It would certainly pay âbig dividendsâ to Mykotronxâs owners.
Acquired by Rainbow Technologies in 1995, and eventually by Military-Industrial-Surveillance Complex powerhouse Raytheon in 2012, at the time the Los Angeles Times reported that âMykotronx had been privately held, and its owners will receive 1.82 million shares of Rainbow stockâmaking the deal worth $37.9 million.â
The Clipper chip was touted by the administration as a simple device that would protect the private communications of users while also allowing government agents to obtain the keys that unlocked those communications, an early manifestation of what has since become know as law enforcementâs alleged âgoing darkâ problem.
Under color of a vague âlegal authorizationâ that flew in the face of the 1987 Computer Security Act (CSA), which sought to limit the role of the National Security Agency in developing standards for civilian communications systems, the administration tried an end-run around the law through an export ban on Clipper-free encryption devices overseen by the Commerce Department.
This wasnât the first time that NSA was mired in controversy over the watering down of encryption standards. During the development of the Data Encryption Standard (DES) by IBM in the 1970s, the agency was accused of forcing developers to implement changes in the design of its basic cipher. There were strong suspicions these changes had weakened the algorithm to such a degree that one critical component, the S-box, had been altered and that a backdoor was inserted by NSA.
Early on, the agency grasped CSAâs significance and sought to limit damage to global surveillance and economic espionage programs such as ECHELON, exposed by British and New Zealand investigative journalists Duncan Campbell and Nicky Hager.
Before the 1987 law was passed however, Clinton Brooks, a Special Assistant to NSA Director Lieutenant General William Odom, wrote a Top Secret Memorandum which stated: âIn 1984 NSA engineered a National Security Decision Directive, NSDD-145, through the Reagan Administration that gave responsibility for the security of all US information systems to the Director of NSA, removing NBS [National Bureau of Standards] from this.â
Conceived as a follow-on to the Reagan administrationâs infamous 1981 Executive Order 12333, which trashed anemic congressional efforts to rein-in Americaâs out-of-control spy agencies, NSDD-145 handed power back to the National Security Agency and did so to the detriment of civilian communication networks.
Scarcely a decade after Senator Frank Church warned during post-Watergate hearings into government surveillance abuses, that NSAâs âcapability at any time could be turned around on the American people, and no American would have any privacy left, such is the capability to monitor everything: telephone conversations, telegrams, it doesnât matter . . . there would be no place to hide,â the agency was at it with a vengeance.
âThis [NSDD-145] also stated,â Brooks wrote, âthat we would assist the private sector. This was viewed as Big Brother stepping in and generated an adverse reactionâ in Congress that helped facilitate passage of the Act.
Engineered by future Iran-Contra felon, Admiral John Poindexter, President Reaganâs National Security Adviser who would later serve as President George W. Bushâs Director of DARPAâs Information Awareness Office, the Pentagon satrapy that brought us the Total Information Awareness program, NSDD-145 stated that the âDirector, National Security Agency is designated the National Manager for Telecommunications and Automated Information Systems Security.â
NSAâs new mandate meant that the agency would âact as the government focal point for cryptography, telecommunications systems security, and automated information systems security.â
Additionally, NSA would âconduct, approve, or endorse research and development of techniques and equipment for telecommunications and automated information systems security for national security information.â
But it also authorized the agency to do more than that, granting it exclusive authority to âreview and approve all standards, techniques, systems and equipments for telecommunications and automated information systems security.â As well, NSA was directed to âenter into agreements for the procurement of technical security material and other equipment, and their provision to government agencies, where appropriate, to private organizations, including government contractors, and foreign governments.â
In other words, NSA was the final arbiter when it came to setting standards for all government and private information systems; quite a coup for the agency responsible for standing-up Project MINARET, the Cold War-era program that spied on thousands of antiwar protesters, civil rights leaders, journalists and members of Congress, as recently declassified documents published by the National Security Archive disclosed.
NSA Games the System
Although the Computer Security Act passed unanimously by voice vote in both Houses of Congress, NSA immediately set-out to undercut the law and did so by suborning the National Bureau of Standards, now the National Institute of Standards and Technology (NIST).
The battle over the Clipper Chip would be the template for future incursions by the agency for the control, through covert infiltration, of regulatory bodies overseeing civilian communications.
According to the Clinton White House, Clipper âwould provide Americans with secure telecommunications without compromising the ability of law enforcement agencies to carry out legally authorized wiretaps.â
Neither safe nor secure, Clipper instead would have handed government security agencies the means to monitor all communications while giving criminal networks a leg up to do the same.
In fact, as the Electronic Privacy Information Center (EPIC) discovered in documents unearthed through the Freedom of Information Act, the underlying algorithm deployed in Clipper, Skipjack, had been developed by NSA.
Cryptography expert Matt Blaze wrote a now famous 1994 paper on the subject before the algorithm was declassified, Protocol Failure in the Escrowed Encryption Standard: âThe EES cipher algorithm, called âSkipjackâ, is itself classified, and implementations of the cipher are available to the private sector only within tamper-resistant modules supplied by government-approved vendors. Software implementations of the cipher will not be possible. Although Skipjack, which was designed by the US National Security Agency (NSA), was reviewed by a small panel of civilian experts who were granted access to the algorithm, the cipher cannot be subjected to the degree of civilian scrutiny ordinarily given to new encryption systems.â
This was precisely as NSA and the Clinton administration intended.
A partially declassified 1993 NSA memo noted that âthere will be vocal public doubts expressed about having a classified algorithm in the device we propose for the US law enforcement problem, the CLIPPER chip, we recommend the following to address this.â We donât know what those agency recommendations were, however; more than 20 years after the memo was written they remain secret.
The memo continued: âIf such people agree to this clearance and non disclosure process, we could go over the algorithm with them to let them develop confidence in its security, and we could also let them examine the detail design of the CLIPPER chip made for the US law enforcement problem to assure themselves that there were no trapdoors or other techniques built in. This would likely require crypto-mathematicians for the algorithm examination and microelectronics chip design engineers for the chip examination.â
But the extreme secrecy surrounding Skipjackâs proposed deployment in commercial products was the problem. Even if researchers learned that Clipper was indeed the government-mandated backdoor they feared, non-disclosure of these facts, backed-up by the threat of steep fines or imprisonment would hardly assure anyone of the integrity of this so-called review process.
âBy far, the most controversial aspect of the EES system,â Blaze wrote, âis key escrow.â
âAs part of the crypto-synchronization process,â Blaze noted, âEES devices generate and exchange a âLaw Enforcement Access Fieldâ (LEAF). This field contains a copy of the current session key and is intended to enable a government eavesdropper to recover the cleartext.â
âThe LEAF copy of the session key is encrypted with a device-unique key called the âunit key,â assigned at the time the EES device is manufactured. Copies of the unit keys for all EES devices are to be held in âescrowâ jointly by two federal agencies that will be charged with releasing the keys to law enforcement under certain conditions.â
What those conditions were however, was far from clear. In fact, as weâve since learned from Snowdenâs cache of secret documents, even when the government seeks surveillance authorization from the FISA court, the court must rely on government assurances that dragnet spying is critical to the nationâs security. Such assurances, FISA court judge Reggie B. Walton noted, were systematically âmisrepresentedâ by secret state agencies.
Thatâs rather rich considering that Walton presided over the farcical âtrialâ that upheld Bush administration demands to silence FBI whistleblower Sibel Edmonds under the state secrets privilege. Edmonds, a former contract linguist with the Bureau charged that top FBI officials had systematically covered-up wrongdoing at its language division and had obstructed agentsâ attempts to roll-up terrorist networks before and after the 9/11 provocation, facts attested to by FBI whistleblower Coleen Rowley in her 2002 Memo to then-FBI Director Robert Mueller.
In 2009, Walton wrote that âThe minimization procedures proposed by the government in each successive application and approved and adopted as binding by the orders of the FISC have been so frequently and systemically violated that it can fairly be said that this critical element of the overall BR regime has never functioned effectively.â
âThe Court,â Walton averred, âmust have every confidence that the government is doing its utmost to ensure that those responsible for implementation fully comply with the Courtâs orders. The Court no longer has such confidence.â
Predating those critical remarks, a heavily-redacted 1993 Memo to then-Special Assistant to the President and future CIA chief, George Tenet, from FBI Director William Sessions noted that NSA âhas developed a new encryption methodology and computer chip which affords encryption strength vastly superior to DES [Digital Encryption Standard], yet which allows for real time decryption by law enforcement, acting pursuant to legal process. It is referred to as âClipperâ.â
[Two redacted paragraphs] âif the devices are modified to include the âClipperâ chip, they would be of great value to the Federal, state and local law enforcement community, especially in the area of counter narcotics, investigations, where there is a requirement to routinely communicate in a secure fashion.âBut even at the time Sessionsâ memo was written, we now know that AT&T provided the Drug Enforcement Administration âroutine accessâ to âan enormous AT&T database that contains the records of decades of Americansâ phone calls,â The New York Times reported, and had done so since 1987 under the auspices of DEAâs Hemisphere Project.
Furthermore, in the wake of Snowden revelations we also learned that listening in on the conversations of drug capos is low on NSAâs list of priorities. However, programs like X-KEYSCORE and TEMPORA, which copies all data flowing along fiber optic cables, encrypted and unencrypted alike, at petabyte scales, is supremely useful when it comes to building profiles of internet users by intelligence agencies.
This was an implicit goal of Clinton administration maneuvers to compel developers to insert Clipper into their product designs.
According to Sessions, âthe âClipperâ methodology envisions the participation of three distinct types of parties.â [Redacted] It is proposed that the second party, the two custodians of the âsplitâ key infostructure [sic], be comprised of two disinterested and trustworthy non law enforcement Government agencies or entities. Although, such decision and selection are left for the Administration, a list of reccommended [sic] agencies and entities has been prepared (and included in the text), [redacted]. This party would administer and oversee all facets of the âClipperâ program and methodology.â
Based on NSDD-145âČs mandate, one can assume âthis partyâ would be NSA, the agency that designed the underlying algorithm that powered Clipper.
The Sessions memo averred: âThe Clipper chip provides law enforcement access by using a special chip key, unique to each device. In the AT&T TSD 3600, a unique session key is generated, external to the Clipper chip for each call.â
âThis session key,â the memo explained, âis given to the chip to control the encryption algorithm. A device unique âchip keyâ is programmed into each Clipper at the time of manufacture. When two TSD 3600s go to secure operation, the device gives out its identification (ID) number and the session key encrypted in its chip key.â
Underlining a key problem with Clipper technology Sessions noted, âAnyone with access to the chip key for that identified device will be able to recover the session key and listen to the transmission simultaneously with the intended receiver. This design means that the list of chip keys associated with the chip ID number provides access to all Clipper secured devices, and thus the list must be carefully generated and protected. Loss of the list would preclude legitmate [sic] access to the encrypted information and compromise of the list could allow unauthorized access.â
In fact, that âanyoneâ could include fabulously wealthy drug gangs or bent corporations with the wherewithal to buy chip keys from suborned government key escrow agents!
Its ubiquity would be a key selling-point for universal deployment. The memo explained, âthe NSA developed chip based âClipperâ solution works with hardware encryption applications, such as those which might be used with regard to certain telecommunications and computers devices,â which of course would allow unlimited spying by âlaw enforcement.â
Such vulnerabilities built into EES chip keys by design not only enabled widespread government monitoring of internet and voice traffic, but with a few tweaks by encryption-savvy âroguesâ could be exploited by criminal organizations.
In his 1994 paper Blaze wrote that âa rogue system can be constructed with little more than a software modification to a legal system. Furthermore, while some expertise may be required to install and operate a rogue version of an existing system, it is likely that little or no special skill would be required to install and operate the modified software.â
âIn particular,â Blaze noted, âone can imagine âpatchesâ to defeat key escrow in EES-based systems being distributed over networks such as the Internet in much the same way that other software is distributed today.â
In the intervening years since Blaze observed how easy it would be to compromise key escrow systems by various bad actors, governments or criminals take your pick, the proliferation of malware powered botnets that infect hundreds of thousands of computers and smart phones every dayâfor blanket surveillance, fraud, or bothâis a fact of life.
It didnât help matters when it emerged that âescrow agentsâ empowered to unlock encrypted communications would be drawn from the National Institute of Standards and Technology and the Automated Services Division of the Treasury Department, government outposts riddled with âNo Such Agencyâ moles.
As EPIC pointed out, âSince the enactment of the Computer Security Act, the NSA has sought to undercut NISTâs authority. In 1989, NSA signed a Memorandum of Understanding (MOU) which purported to transfer back to NSA the authority given to NIST.â
The MOU required that NIST request NSAâs âassistanceâ on all matters related to civilian cryptography. In fact, were NIST and NSA representatives on the Technical Working Group to disagree on standards, the ultimate authority for resolving disputes would rest solely with the Executive Branch acting through the President, the Secretary of Defense and the National Security Council, thus undercutting the clear intent of Congress when they passed the 1987 Computer Security Act.
EPIC noted:
âThe memorandum effectively returned to NSA many of the powers rejected by the Computer Security Act. The MOU contained several key goals that were to NSAâs benefit, including: NSA providing NIST with âtechnical security guidelines in trusted technology, telecommunications security, and personal identification that may be used in cost-effective systems for protecting sensitive computer data;â NSA âinitiating research and development programs in trusted technology, telecommunications security, cryptographic techniques and personal identification methodsâ; and NSA being responsive to NIST âin all matters related to cryptographic algorithms and cryptographic techniques including but not limited to research, development, evaluation, or endorsementâ.â
A critique of the Memorandum in 1989 congressional testimony by the General Accounting Office (GAO) emphasized: âAt issue is the degree to which responsibilities vested in NIST under the act are being subverted by the role assigned to NSA under the memorandum. The Congress, as a fundamental purpose in passing the act, sought to clearly place responsibility for the computer security of sensitive, unclassified information in a civil agency rather than in the Department of Defense. As we read the MOU, it would appear that NIST has granted NSA more than the consultative role envisioned in the act.â
Five years after the GAOâs critical appraisal, NSAâs coup was complete.
âIn 1994,â EPIC noted,
âPresident Clinton issued Presidential Decision Directive (PDD-29). This directive created the Security Policy Board, which has recommended that all computer security functions for the government be merged under NSA control.â
Since PDD-29 was issued matters have only gotten worse. In fact, NIST is the same outfit exposed in Snowden documents published by The Guardian and The New York Times that allowed NSA to water down encryption and build backdoors into the Dual EC DRBG standard adopted by the Institute in 2006.
âEventually, NSA became the sole editor.â
Besieged by widespread opposition, the Clinton administration was out maneuvered in the court of public opinion and by 1996 had abandoned Clipper. However, this proved to be a pyrrhic victory for security-minded researchers and civil libertarians as we have since learned from Edward Snowdenâs revelations.
Befitting a military-intelligence agency, the dark core of Americaâs deep state, NSA was fighting a long warâand they were playing for keeps.
Daily Stormer The Most Censored Publication in History