{"id":35456,"date":"2020-06-10T22:45:00","date_gmt":"2020-06-10T22:45:00","guid":{"rendered":"http:\/\/2ce63294-7ee0-4ab4-9c39-30146f8092be"},"modified":"2020-06-10T22:45:00","modified_gmt":"2020-06-10T22:45:00","slug":"senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\/","title":{"rendered":"Senators ask Juniper for the results of its 2015 NSA backdoor investigation"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2020\/06\/10\/8a383720-3431-497d-8ae2-3dd1926e491f\/juniper.png\" class alt=\"Juniper NetScaler\"><\/span><span class=\"credit\">Image: Juniper, ZDNet<\/span> <\/p>\n<p>A group of 13 US senators has sent <a href=\"https:\/\/www.documentcloud.org\/documents\/6940833-Wyden-House-Juniper-Letter.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">an open letter<\/a> today to networking equipment vendor Juniper Networks, asking the company to publish the results of its internal investigation into the origins of a suspected NSA backdoor mechanism discovered in its firewall products in late 2015.<\/p>\n<p>&#8220;It has now been over four years since Juniper announced it was conducting an investigation, but your company has still not revealed what, if anything, it uncovered,&#8221; the senators wrote.<\/p>\n<p>The group is seeking answers about what happened at Juniper behind closed doors and what made the company skip on publishing a public report, as it initially promised.<\/p>\n<p>Their inquiry and letter come amid actions from Attorney General William Barr and other senior US government officials who&#8217;ve been seeking to pressure US technology companies to weaken their encryption and assist US government surveillance efforts.<\/p>\n<p>&#8220;Juniper&#8217;s experiences can provide a valuable case study about the dangers of backdoors, as well as the apparent ease with which government backdoors can be covertly subverted by a sophisticated actor,&#8221; the senators said.<\/p>\n<h3>Recap of the 2015 Juniper-NSA backdoor scandal<\/h3>\n<p>Details about a backdoor in Juniper products <a href=\"https:\/\/www.zdnet.com\/article\/juniper-screenos-devices-had-default-backdoor-password-rapid7\/\" target=\"_blank\" rel=\"noopener noreferrer\">first came to light in December 2015<\/a>. Members of the cyber-security community discovered what looked like a change of a secret access key inside the source code of ScreenOS, an operating system running on NetScreen, Juniper&#8217;s line of firewall and VPN products.<\/p>\n<p>Following public pressure, Juniper later admitted that &#8220;unauthorized code&#8221; made its way into the ScreenOS source code, and that the unauthorized code could have allowed attackers to take over devices and decrypt VPN traffic.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>While Juniper initially shied away from providing any details, members of the public cyber-security community <a href=\"https:\/\/www.zdnet.com\/article\/nsa-suspected-in-juniper-firewall-backdoor-mystery-but-questions-remain\/\" target=\"_blank\" rel=\"noopener noreferrer\">later discovered<\/a> that the unauthorized code referred to the use of Dual Elliptic Curve Deterministic Random Bit Generator (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Dual_EC_DRBG\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Dual_EC_DRBG<\/a>) algorithm as the random number generator (RNG) component inside ScreenOS.<\/p>\n<p>Dual_EC_DRBG is a lesser-known algorithm that was developed by the US National Security Agency (NSA) in 2006 and which received almost an immediate FIPS (Federal Information Processing Standards) certification despite some security experts warning that initial audits revealed signs of a potential backdoor mechanism.<\/p>\n<p>However, despite criticism, Dual_EC_DRBG remained certified until 2013, until the Edward Snowden revelations, when the US National Institute of Standards and Technology (NIST) intervened to withdraw its FIPS certification.<\/p>\n<p>But investigators discovered that Juniper quietly added support for Dual_EC_DRBG in 2008, and did not publicly disclose it in any subsequent audits and promotional material.<\/p>\n<p>It was only after members of the public discovered that an unknown individual changed an access key associated with the Dual_EC_DRBG algorithm that Juniper admitted to the issue and promised to investigate the unauthorized code. But the company never published any in-depth report on the matter, despite the severity of the original accusations levied against it.<\/p>\n<p>Now, senators want answers. They want to know:<\/p>\n<ul>\n<li>Why didn&#8217;t Juniper publicly disclose that it was using Dual_EC_DRBG, as the company usually did with all the FIPS-certified algorithms?<\/li>\n<li>If the company was aware of the potential backdoor mechanism in Dual_EC_DRBG?<\/li>\n<li>Who were the Juniper employees who approved the addition and subsequent changes made in relation to the Dual_EC_DRBG?<\/li>\n<li>Who led the company&#8217;s investigation?<\/li>\n<li>What were the results of the investigation and if a written report was put together?<\/li>\n<li>If the report made any recommendations and if the company implemented any of them?<\/li>\n<\/ul>\n<p>The senator group requested that Juniper provide answers to these questions by July 10, this year.<\/p>\n<p>&#8220;The American people &#8211; and the companies and U.S. government agencies that trusted Juniper&#8217;s products with their sensitive data &#8211; still have no information about why Juniper quietly added an NSA-designed, likely-backdoored encryption algorithm, or how, years later, the keys to that probable backdoor were changed by an unknown entity, likely to the detriment of U.S. national security,&#8221; the senators said.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thirteen US senators ask Juniper to publish the findings of its 2015 investigation.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35457,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-35456","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Senators ask Juniper for the results of its 2015 NSA backdoor investigation 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Senators ask Juniper for the results of its 2015 NSA backdoor investigation 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-10T22:45:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Senators ask Juniper for the results of its 2015 NSA backdoor investigation\",\"datePublished\":\"2020-06-10T22:45:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\\\/\"},\"wordCount\":664,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\\\/\",\"name\":\"Senators ask Juniper for the results of its 2015 NSA backdoor investigation 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation.png\",\"datePublished\":\"2020-06-10T22:45:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation.png\",\"width\":1000,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Senators ask Juniper for the results of its 2015 NSA backdoor investigation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Senators ask Juniper for the results of its 2015 NSA backdoor investigation 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\/","og_locale":"en_US","og_type":"article","og_title":"Senators ask Juniper for the results of its 2015 NSA backdoor investigation 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-06-10T22:45:00+00:00","og_image":[{"width":1000,"height":500,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Senators ask Juniper for the results of its 2015 NSA backdoor investigation","datePublished":"2020-06-10T22:45:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\/"},"wordCount":664,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\/","url":"https:\/\/www.threatshub.org\/blog\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\/","name":"Senators ask Juniper for the results of its 2015 NSA backdoor investigation 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation.png","datePublished":"2020-06-10T22:45:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation.png","width":1000,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Senators ask Juniper for the results of its 2015 NSA backdoor investigation"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35456"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35456\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35457"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35456"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35456"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}