Feeds

MS denies Win 7 backdoor rumours

Oooh, spooky!

Choosing a cloud hosting partner with confidence

Microsoft has once again denied rumours that it built a backdoor into Windows 7.

Long standing conspiracy theories that Redmond outfits Windows with a covert entry point for law enforcement resurfaced after a senior National Security Agency (NSA) official told Congress it had worked with Redmond on the operating system.

Richard Schaeffer, the NSA's information assurance director, told a Senate homeland security sub-committee on Tuesday that the agency had worked with developers on Windows 7's operating system security guide. He added that the NSA has worked with Microsoft as well as Apple, Sun, and RedHat in the past in developing "secure baselines for their products".

Conspiracy theorists saw any involvement by the NSA in developing the OS as evidence that it made modifications to allow its agents covert access.

Microsoft categorically denied this on Thursday. 'Microsoft has not and will not put 'backdoors' into Windows 7," a spokeswoman told Computerworld. "The work being discussed here is purely in conjunction with our Security Compliance Management Toolkit."

A Windows 7 version of the Toolkit, which provides a guide to hardening Windows-based networks, was released last month.

The NSA main role involves signals intelligence, or spying. Information assurance (i.e. helping to make US IT systems in critical areas of the economy more secure) is a more recent priority.

The agency was the chief backer of the discredited Clipper chip plan back in the '90s, so it's not altogether surprising that sections of the information security community view any of its actions with suspicion.

It's well known that lawful interception (ie. wiretapping) capabilities are a mandatory requirement for telecoms carriers in the US and Britain. However, no credible evidence has ever emerged of a law enforcement backdoor in any operating system. ®

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Whistling Google: PLEASE! Brussels can only hurt Europe, not us
And Commish is VERY pro-Google. Why should we worry?
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.