Backdoors and Regulations 2

Dustin Lee
2 min readDec 11, 2016

Another account that proves the need for regulations on the providers as well as the users regards the questionable backdoor implemented in the softwares from Juniper Network. Juniper Network reported two of the backdoors found, and they attributed them to an unknown individual for placing a malicious code. However, there were doubts raised against their prevention method, as initial algorithm implemented and their description differed. Apart from the backdoors, the algorithms by Dual_EC, reported by the authorities to be hackable, are implemented into their software. The explanation from Jupiter Network claimed that the faults on Dual_EC are compensated by the use of a second, more secure number generator, ANSI X9.31. Nonetheless, this proved to be false after all. Stephen Checkoway, professor who teaches computer science at University of Illinois, found that the use Dual_EC rather enhanced the performance of the hacking process, specifically the ones that utilize the backdoors. The size of nonce, a outcome of the encryption process, was also determined to be at a level that hackers can efficiently hack through the backdoors. Checkoway concluded that all the changes made to the software by Juniper Networks provided as an environment for the most optimal hacking performance. Considering that one of the biggest clients for Juniper Networks is the US government, the neutrality of the government in this case became questionable as well.

The backdoors are of sensitive materials to members of IT security industry. They affect countless important matters regarding sensitive information stored and transacted over Internet. However, if the administrators in charge of these matters are not under strict regulation, the regulations on those using the services will be nothing more than fruitless implementation of code. While there are various doubtful backdoors discovered in companies, this specific incident stands out in that this also may lead to some doubts on the government. At the very base, the fact that the government issued no official response to the situation, and the increasingly credible hypothesis that the government implemented such backdoor to access personal information on US citizens serves as an element more problematic than that of individual hackers that may be breaking few regulations online.

As Lessig states, code and regulation is different from laws in its essence(Lessig, 3). They are there to provide motivation for those who keep them than to punish those do not follow. However, I believe this should not be the case. As Internet becomes a second world with ever-increasing functionalities and population, laws to protect those within should be strictly implemented. While in real life, an effective form of this is a law, more effective form of law in the virtual world is, by no doubt, codes. While there are more and more doubtful incidents occurring regarding backdoors and the protection system, it is urgent to implement stricter regulations on the system as well.

Works Cited:

Lessig, Lawrence. “Chapter 1.” Code: Version 2.0. Place of Publication Not Identified: SoHo, 2010. N. pag. Print.

“New Discovery Around Juniper Backdoor Raises More Questions About the Company.” Wired. Conde Nast, n.d. Web. 11 Dec. 2016. <https://www.wired.com/2016/01/new-discovery-around-juniper-backdoor-raises-more-questions-about-the-company/>.

--

--