Look back to past back door behaviour (Dual EC DRBG for instance) - they attack the RNGs through standards first.
For the 140-2 era, look at the CRNGT
For the 140-3 era (I.E. Today) look the frankly odd and highly suspect SP800-90A DFs. The guy at NIST in pure political speech said "there were too many cooks making that broth" meaning the NSA were all over it.
For entropy extraction, look how the 90B non IID tests over-estimate the entropy when there is very low entropy from the source. Cross correlate that with the very low entropy claimed in Apples ESV submissions for the RNG in all their current products.
Watch as the government stood back and made no attempts to address the brain dead approach to entropy extraction and entropy estimation in the Linux kernel, following the well known principle of not trying to stop the enemy when they are making a mistake.
The back doors are there to be seen if you care to look. They go for the RNGs first, because if they can bork the RNG, the rest of the cryptosystem fails.