{"id":1638,"date":"2014-01-30T05:50:45","date_gmt":"2014-01-30T10:50:45","guid":{"rendered":"http:\/\/www.opensource.im\/?p=1638"},"modified":"2014-01-30T05:50:45","modified_gmt":"2014-01-30T10:50:45","slug":"obama-stays-silent-on-reform-of-nsas-crypto-subversion","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/obama-stays-silent-on-reform-of-nsas-crypto-subversion.php","title":{"rendered":"Obama Stays Silent on Reform of NSA&#8217;s Crypto Subversion"},"content":{"rendered":"<p><p>    President Barack Obama in his State of the Union on Tuesday    failed to address an issue that affects everyone on the    internet  the NSAs subversion of cryptographic standards and    technologies.  <\/p>\n<p>    Privacy advocates and business interests were crossing their    fingers that Obama would announce he was following the    recommendations of a presidential panel that recently urged a    dramatic overhaul of the NSAs efforts to undermine encryption    on a global scale.  <\/p>\n<p>    It was the second public address to the nation this month, and    both times Obama overlooked the cryptography debacle disclosed    by NSA whistleblower Edward Snowden.  <\/p>\n<p>    When Obama outlined a host of reforms to address the Snowden    revelations in a Jan. 17 public address, the 44th president    was also    mum on whether he would accept the crypto recommendations    of the Presidents Review Group on Intelligence and    Communications Technologies.  <\/p>\n<p>    There would have been no better time for Obama to address the    global community about a hot-button issue that has sparked a        cottage industry of crypto-product makersand one that    is     impacting the tech sectors ability to conduct business    overseas.  <\/p>\n<p>    The State of the Union offered President Obama an opportunity    to clear the air on outstanding surveillance issues that were    not addressed in his recent reform speech. Chief among these is    the governments introduction of vulnerabilities in    cryptographic standards and commercial products. Unfortunately,    this did not occur, says Daniel Castro, an analyst with the    Washington, D.C.-based Information Technology and Innovation    Foundation. As long as these questions go unanswered, U.S.    technology companies will face a disadvantage in global markets    and lose market share to foreign competitors.  <\/p>\n<p>    The presidential panels two recommendations in that area were    to fully    support and not undermine efforts to create encryption    standards and to not in any way subvert, undermine,    weaken, or make vulnerable generally available commercial    software.  <\/p>\n<p>    Those recommendations were in response to classified documents    Snowden obtained while an NSA contractor that suggested the    agency     engineered a backdoor into a random number generator standard    promulgated by NIST..  <\/p>\n<p>    The Snowden documents also highlighted that the NSA has worked    with industry partners to covertly influence technology    products. The documents also underlined that the NSA has vast    crypto-cracking resources, a database of secretly held    encryption keys used to decrypt private communications, and an    ability to crack cryptography in certain VPN encryption chips.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/feeds.wired.com\/c\/35185\/f\/661370\/s\/3680c9bd\/sc\/1\/l\/0L0Swired0N0Cthreatlevel0C20A140C0A10Cobama0Esilent0Eon0Ecrypto0Ereforms0C\/story01.htm\" title=\"Obama Stays Silent on Reform of NSA's Crypto Subversion\">Obama Stays Silent on Reform of NSA's Crypto Subversion<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> President Barack Obama in his State of the Union on Tuesday failed to address an issue that affects everyone on the internet the NSAs subversion of cryptographic standards and technologies. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-1638","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/1638"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=1638"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/1638\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=1638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=1638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=1638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}