Difference between revisions of "NIST"

From Wikispooks
Jump to navigation Jump to search
(Added: num_staff.)
m (reference tidy)
 
(2 intermediate revisions by one other user not shown)
Line 4: Line 4:
 
|headquarters=Gaithersburg, Maryland, U.S.
 
|headquarters=Gaithersburg, Maryland, U.S.
 
|website=http://www.nist.gov
 
|website=http://www.nist.gov
 +
|titular_logo=1
 
|historycommons=http://www.historycommons.org/entity.jsp?entity=national_institute_of_standards_and_technology
 
|historycommons=http://www.historycommons.org/entity.jsp?entity=national_institute_of_standards_and_technology
 
|logo=NIST.png
 
|logo=NIST.png
Line 9: Line 10:
 
|num_staff=2900
 
|num_staff=2900
 
}}
 
}}
 +
The '''National Institute of Standards and Technology''' ('''NIST''') is a [[physical sciences]] laboratory and non-regulatory agency of the [[United States Department of Commerce]]. Its mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into laboratory programs that include [[Nanotechnology|nanoscale science and technology]], engineering, [[information technology]], [[neutron]] research, material measurement, and physical measurement.
 +
 
==September 11th, 2001==
 
==September 11th, 2001==
In 2002 the [[National Construction Safety Team Act]] mandated NIST to conduct an investigation into the [[collapse of the World Trade Center]] buildings 1 and 2 and the 47-storey [[9-11/WTC7|7 World Trade Center]]. The point man for the  "World Trade Center Collapse Investigation" has been named as [[Stephen Cauffman‎]] and the lead investigator WAS [[Shyam Sunder]],<ref name="Lipton">{{cite news|author=Eric Lipton|journal=New York Times|date=August 22, 2008|title=Fire, Not Explosives, Felled 3rd Tower on 9/11, Report Says|url=http://www.nytimes.com/2008/08/22/nyregion/22wtccnd.html}}</ref> covered three aspects, including a technical building and [[fire safety]] investigation to study the factors contributing to the probable cause of the collapses of the WTC Towers (WTC 1 and 2) and WTC 7.  
+
In 2002 the [[National Construction Safety Team Act]] mandated NIST to conduct an investigation into the [[collapse of the World Trade Center]] buildings 1 and 2 and the 47-storey [[9-11/WTC7|7 World Trade Center]]. The point man for the  "World Trade Center Collapse Investigation" has been named as [[Stephen Cauffman‎]] and the lead investigator WAS [[Shyam Sunder]],<ref name="Lipton">http://www.nytimes.com/2008/08/22/nyregion/22wtccnd.html</ref> covered three aspects, including a technical building and [[fire safety]] investigation to study the factors contributing to the probable cause of the collapses of the WTC Towers (WTC 1 and 2) and WTC 7.
 +
 
 +
NIST blocked release of various videos about 9/11. In response to [[FOIA]] requests they later released videos, including video about firefighters discussing explosives in the WTC.<ref>http://www.youtube.com/watch?v=IO1ps1mzU8o</ref> They also released video{{why}} in 2010 showing [[Michael Hess]] calling from the 8th floor of [[WTC7]].
  
NIST blocked release of various videos about 9/11. In response to [[FOIA]] requests they later released videos, including video about firefighters discusing explosives in the WTC.<ref>http://www.youtube.com/watch?v=IO1ps1mzU8o</ref> They also released video{{why}} in 2010 showing [[Michael Hess]] calling from the 8th floor of [[WTC7]].
+
===Models===
 +
NIST reportedly created models of the WTC, used to conclude that the buildings were destroyed by fire, not explosives. However, it refuses to release much information about them, citing "[[national security]]".<ref>http://cryptome.org/nist070709.pdf</ref> What little information they did release has been termed "perturbing and inexplicable".<ref>https://off-guardian.org/2016/09/17/why-did-nist-decide-wtc-steel-could-not-conduct-heat/</ref>
  
 
==Compromised cryptography==
 
==Compromised cryptography==
NIST is responsible for standardising cryptographic algorithms and standardised [[Dual_EC_DRBG]], which already by 2004 was understood by some researchers to have a possible kleptographic [[backdoor (computing)|backdoor]] in its design, with the unusual property that it was theoretically impossible for anyone but Dual_EC_DRBG's designers (NSA) to confirm the backdoor's existence. [[Bruce Schneier]] concluded shortly after standardization that the "rather obvious" backdoor (along with other deficiencies) would mean that nobody would use Dual_EC_DRBG.<ref name="wired-schneier">{{cite news | url=http://archive.wired.com/politics/security/commentary/securitymatters/2007/11/securitymatters_1115 | title=Did NSA Put a Secret Backdoor in New Encryption Standard? | work=[[Wired News]] | date=2007-11-15 | author=[[Bruce Schneier]] | archiveurl=https://web.archive.org/web/20140621062515/http://archive.wired.com/politics/security/commentary/securitymatters/2007/11/securitymatters_1115 | archivedate=2014-06-21 | deadurl=no}}</ref>  The backdoor would allow NSA to decrypt for example [[Transport Layer Security|SSL/TLS]] encryption which used Dual_EC_DRBG as a CSPRNG.<ref name="green_flaws">{{cite web|url=http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html|title=The Many Flaws of Dual_EC_DRBG|author=Matthew Green}}</ref>
+
NIST is responsible for standardising cryptographic algorithms and standardised [[Dual_EC_DRBG]], which already by 2004 was understood by some researchers to have a possible kleptographic [[backdoor (computing)|backdoor]] in its design, with the unusual property that it was theoretically impossible for anyone but Dual_EC_DRBG's designers (NSA) to confirm the [[backdoor]]'s existence. [[Bruce Schneier]] concluded shortly after standardization that the "rather obvious" [[backdoor]] (along with other deficiencies) would mean that nobody would use Dual_EC_DRBG.<ref name="wired-schneier">https://web.archive.org/web/20140621062515/http://archive.wired.com/politics/security/commentary/securitymatters/2007/11/securitymatters_1115 </ref>  The [[backdoor]] would allow NSA to decrypt for example [[Transport Layer Security|SSL/TLS]] encryption which used Dual_EC_DRBG as a CSPRNG.<ref name="green_flaws">{http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</ref>
  
 
===Snowden's revelations===
 
===Snowden's revelations===
In December 2013, a [[Reuters]] news article alleged that in 2004, before NIST had standardized Dual_EC_DRBG, NSA paid [[RSA Security]] $10 million in a secret deal to use Dual_EC_DRBG as the default in the [[RSA BSAFE]] cryptography library, which resulted in RSA Security becoming the most important distributor of the insecure algorithm.<ref name="NSApaid">{{cite news | url=http://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220 | title=Exclusive: Secret contract tied NSA and security industry pioneer | date=December 20, 2013 | agency=Reuters | accessdate=December 20, 2013 | author=Menn, Joseph | location=San Francisco}}</ref>  RSA denied ever knowingly colluded with the NSA to adopt an algorithm that was known to be flawed, saying "we have never kept [our] relationship [with the NSA] a secret".<ref name="RSA Company Statements">{{cite web|last=The Security Division of EMC|first=RSA,|title=RSA Response to Media Claims Regarding NSA Relationship|url=https://blogs.rsa.com/news-media-2/rsa-response/|publisher=RSA|accessdate=22 December 2013}}</ref>
+
In December 2013, a [[Reuters]] news article alleged that in 2004, before NIST had standardized Dual_EC_DRBG, NSA paid [[RSA Security]] $10 million in a secret deal to use Dual_EC_DRBG as the default in the [[RSA BSAFE]] cryptography library, which resulted in RSA Security becoming the most important distributor of the insecure algorithm.<ref name="NSApaid">http://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220</ref>  RSA denied ever knowingly colluded with the NSA to adopt an algorithm that was known to be flawed, saying "we have never kept [our] relationship [with the NSA] a secret".<ref name="RSA Company Statements">https://blogs.rsa.com/news-media-2/rsa-response/</ref>
  
 
{{SMWDocs}}
 
{{SMWDocs}}
 
==References==
 
==References==
 
{{RefList}}
 
{{RefList}}

Latest revision as of 11:42, 7 August 2021

Group.png NIST   WebsiteRdf-entity.pngRdf-icon.png
NIST.png
HeadquartersGaithersburg, Maryland, U.S.
Leaders• Under Secretary of Commerce for Standards and Technology
• NIST/Director
Staff2,900
SubpageNIST/Director
Now infamous for their attempt to cover-up the truth of the 9-11 controlled demolitions.

The National Institute of Standards and Technology (NIST) is a physical sciences laboratory and non-regulatory agency of the United States Department of Commerce. Its mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into laboratory programs that include nanoscale science and technology, engineering, information technology, neutron research, material measurement, and physical measurement.

September 11th, 2001

In 2002 the National Construction Safety Team Act mandated NIST to conduct an investigation into the collapse of the World Trade Center buildings 1 and 2 and the 47-storey 7 World Trade Center. The point man for the "World Trade Center Collapse Investigation" has been named as Stephen Cauffman‎ and the lead investigator WAS Shyam Sunder,[1] covered three aspects, including a technical building and fire safety investigation to study the factors contributing to the probable cause of the collapses of the WTC Towers (WTC 1 and 2) and WTC 7.

NIST blocked release of various videos about 9/11. In response to FOIA requests they later released videos, including video about firefighters discussing explosives in the WTC.[2] They also released video[Why?] in 2010 showing Michael Hess calling from the 8th floor of WTC7.

Models

NIST reportedly created models of the WTC, used to conclude that the buildings were destroyed by fire, not explosives. However, it refuses to release much information about them, citing "national security".[3] What little information they did release has been termed "perturbing and inexplicable".[4]

Compromised cryptography

NIST is responsible for standardising cryptographic algorithms and standardised Dual_EC_DRBG, which already by 2004 was understood by some researchers to have a possible kleptographic backdoor in its design, with the unusual property that it was theoretically impossible for anyone but Dual_EC_DRBG's designers (NSA) to confirm the backdoor's existence. Bruce Schneier concluded shortly after standardization that the "rather obvious" backdoor (along with other deficiencies) would mean that nobody would use Dual_EC_DRBG.[5] The backdoor would allow NSA to decrypt for example SSL/TLS encryption which used Dual_EC_DRBG as a CSPRNG.[6]

Snowden's revelations

In December 2013, a Reuters news article alleged that in 2004, before NIST had standardized Dual_EC_DRBG, NSA paid RSA Security $10 million in a secret deal to use Dual_EC_DRBG as the default in the RSA BSAFE cryptography library, which resulted in RSA Security becoming the most important distributor of the insecure algorithm.[7] RSA denied ever knowingly colluded with the NSA to adopt an algorithm that was known to be flawed, saying "we have never kept [our] relationship [with the NSA] a secret".[8]


 

Employee on Wikispooks

EmployeeJobAppointed
John GrossResearch Structural EngineerJuly 1983

 

Related Documents

TitleTypePublication dateAuthor(s)Description
File:NIST Analyses Brookman.pdfpaper26 March 2010Ronald Brookman
File:Nanothermite Smoking Gun.pdfarticle18 August 2009Michael SchmidtAn introduction to the nano-thermite issue and how the "investigators" chose to ignore this aspect.
File:The Top Ten Connections Between NIST and Nano-Thermites.pdfpaper2 July 2008Kevin RyanAn examination of NIST's connections to the nano-thermite.
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.


References