February 23, 2015 archive

Even Encrypted Phones Are Not Safe from Spy Agencies

According to documents given to The Intercept by whistleblower Edward Snowden, even the newest cell phones (3G, 4G and LTE0 are not safe from the spies of the NSA and it British counterpart, GCHQ. According to the article, one of the largest manufacturers of SIM cards, which all cell phones depend on for communications, were hacked by these agencies spies who stole the encryption keys. This has given them access to even to billions of cell phones all over the world. As usual, Intercept contributors, Jeremy Scahill and Josh Begley are very thorough in their extensive article but here is the core or the report:

The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania.

In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”

With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt. [..]

GCHQ and the NSA could have taken any number of routes to steal SIM encryption keys and other data. They could have physically broken into a manufacturing plant. They could have broken into a wireless carrier’s office. They could have bribed, blackmailed or coerced an employee of the manufacturer or cellphone provider. But all of that comes with substantial risk of exposure. In the case of Gemalto, hackers working for GCHQ remotely penetrated the company’s computer network in order to steal the keys in bulk as they were en route to the wireless network providers. [..]

TOP-SECRET GCHQ documents reveal that the intelligence agencies accessed the email and Facebook accounts of engineers and other employees of major telecom corporations and SIM card manufacturers in an effort to secretly obtain information that could give them access to millions of encryption keys. They did this by utilizing the NSA’s X-KEYSCORE program, which allowed them access to private emails hosted by the SIM card and mobile companies’ servers, as well as those of major tech corporations, including Yahoo and Google.

In effect, GCHQ clandestinely cyberstalked Gemalto employees, scouring their emails in an effort to find people who may have had access to the company’s core networks and Ki-generating systems. The intelligence agency’s goal was to find information that would aid in breaching Gemalto’s systems, making it possible to steal large quantities of encryption keys. The agency hoped to intercept the files containing the keys as they were transmitted between Gemalto and its wireless network provider customers.

GCHQ operatives identified key individuals and their positions within Gemalto and then dug into their emails. In one instance, GCHQ zeroed in on a Gemalto employee in Thailand who they observed sending PGP-encrypted files, noting that if GCHQ wanted to expand its Gemalto operations, “he would certainly be a good place to start.” They did not claim to have decrypted the employee’s communications, but noted that the use of PGP could mean the contents were potentially valuable.

The cyberstalking was not limited to Gemalto. GCHQ operatives wrote a script that allowed the agency to mine the private communications of employees of major telecommunications and SIM “personalization” companies for technical terms used in the assigning of secret keys to mobile phone customers. Employees for the SIM card manufacturers and wireless network providers were labeled as “known individuals and operators targeted” in a top-secret GCHQ document.

According to experts who were interviewed by The Guardain, this is a huge invasive breach and may still be continuing:

Gemalto, the company targeted by the spy agencies, produces 2bn sim cards per year for clients including AT&T, Sprint, T-Mobile and Verizon. The Netherlands-based company operates in 85 countries around the world and provides cards to some 450 wireless network providers globally.

The stolen encryption keys would allow intelligence agencies to monitor mobile communications without the approval or knowledge of telecom companies and foreign governments.

Chris Soghoian, principal technologist at the American Civil Liberties Union, told the Guardian the hack would allow spies to “put an aerial up on the embassy in Berlin and listen in to anyone’s calls in the area”.

Calls made on 3G and 4G mobile networks are encrypted. But with the keys, which a GCHQ slide described as living “in the phone”, spies could access any communication made on a device unless its owner uses an extra layer of encryption.

Soghoian said the latest Snowden revelations meant that it was difficult for anyone to trust the security of a mobile phone. “It is very unlikely that this is an issue that is going to be fixed anytime soon,” he said. “There is no reason for people to trust AT&T, Verizon or anyone at this point. Their systems are hopelessly insecure.”

“The real value of this is that it allows bulk surveillance of telecoms without anyone getting caught,” Soghoian said of hacks like the one at Gemalto, which he said would allow the spy agencies to target “whoever they wanted”.

“In countries where the government will not cooperate, that’s very useful,” he said. “It’s also very useful in countries where the government would help. Germany would allow spy on a suspected terrorist but not on [Angela] Merkel.”

This was the second revelation in what Mike Masnick at Techdirt called “This Week In ‘The NSA Knows F**king Everything’“:

Thought that the revelations of NSA/GCHQ spying were dying out? Having some “surveillance fatigue” from all the stories that have been coming out? Have no fear — or, rather, be very very very fearful — because two big new revelations this week show just how far the NSA will go to make sure it collects everything. First up: your hard drives. Earlier this week, Kaspersky Lab revealed that the NSA (likely) has figured out ways to hide its own spyware deep in pretty much any hard drive made by the most popular hard drive manufacturers: Western Digital, Seagate and Toshiba. [..]

As the report notes, it appears that this is a kind of “sleeper” software, that is buried inside tons of hard drives, but only “turned on” when necessary. The report notes that it’s unclear as to how the NSA was getting this software in there, but that it couldn’t do it without knowing the source code of the hard drive firmware — information that is not easily accessible. A few of the hard drive manufacturers have denied working with the government on this and/or giving them access to the firmware. It’s possible they’re lying/misleading — but it’s also possible that the NSA figured out other ways to get that information.

Scahill and Begley quoted President Barack Obama who just a little over a year ago said when he addressed the NSA spying scandal: “The bottom line is that people around the world, regardless of their nationality, should know that the United States is not spying on ordinary people who don’t threaten our national security and that we take their privacy concerns into account in our policies and procedures.”

Obama again has lied and Congress has failed to rein in the excesses of the NSA and the CIA.

Cartnoon

>

TBC: Morning Musing 2.23.15

I’m going mostly light this Monday morning cuz, let’s be honest, who wants to think too hard on a Monday morning?

First, now you can find out whether you’ve been spied on:

Find Out if You’ve Been Spied on-and Join the Fight for Privacy

Because of the ruling, there is an opportunity for people to try to find out if their communications were among those shared by NSA with GCHQ. Intelligence agencies use information like ip addresses and email addresses as “selectors” when sifting through the massive quantities of data they collect. GCHQ will comply with the IPT’s ruling by searching “selectors” it received from the NSA prior to December 2014.

But this won’t happen automatically. People need to actually file requests with the IPT. To help people do so, PI is collecting people’s names, numbers, and emails in order to assist them in asserting their rights and finding out whether those selectors were subject to unlawful sharing. If they were, PI will help individuals seek a declaration that that person’s privacy rights have been violated under Article 8 and Article 10 of the UK Human Rights Act, the law that codified the European Convention on Human Rights into UK law. Once the IPT issues a declaration for an individual, that individual can also request that their records be deleted. There’s no need to be a UK citizen-anyone can participate.

Jump!

On This Day In History February 23

This is your morning Open Thread. Pour your favorite beverage and review the past and comment on the future.

Find the past “On This Day in History” here.

February 23 is the 54th day of the year in the Gregorian calendar. There are 311 days remaining until the end of the year (312 in leap years).

On this day in 1954, a group of children from Arsenal Elementary School in Pittsburgh, Pennsylvania, receive the first injections of the new polio vaccine developed by Dr. Jonas Salk.

Though not as devastating as the plague or influenza, poliomyelitis was a highly contagious disease that emerged in terrifying outbreaks and seemed impossible to stop. Attacking the nerve cells and sometimes the central nervous system, polio caused muscle deterioration, paralysis and even death. Even as medicine vastly improved in the first half of the 20th century in the Western world, polio still struck, affecting mostly children but sometimes adults as well. The most famous victim of a 1921 outbreak in America was future President Franklin Delano Roosevelt, then a young politician. The disease spread quickly, leaving his legs permanently paralyzed.

Poliomyelitis, often called polio or infantile paralysis, is an acute viral infectious disease spread from person to person, primarily via the fecal-oral route The term derives from the Greek polios, meaning “grey”, myelos, referring to the “spinal cord”, and the suffix -itis, which denotes inflammation.

Although around 90% of polio infections cause no symptoms at all, affected individuals can exhibit a range of symptoms if the virus enters the blood stream. In about 1% of cases the virus enters the central nervous system, preferentially infecting and destroying motor neurons, leading to muscle weakness and acute flaccid paralysis. Different types of paralysis may occur, depending on the nerves involved. Spinal polio is the most common form, characterized by asymmetric paralysis that most often involves the legs. Bulbar polio leads to weakness of muscles innervated by cranial nerves. Bulbospinal polio is a combination of bulbar and spinal paralysis.

Poliomyelitis was first recognized as a distinct condition by Jakob Heine in 1840. Its causative agent, poliovirus, was identified in 1908 by Karl Landsteiner. Although major polio epidemics were unknown before the late 19th century, polio was one of the most dreaded childhood diseases of the 20th century. Polio epidemics have crippled thousands of people, mostly young children; the disease has caused paralysis and death for much of human history. Polio had existed for thousands of years quietly as an endemic pathogen until the 1880s, when major epidemics began to occur in Europe; soon after, widespread epidemics appeared in the United States.

By 1910, much of the world experienced a dramatic increase in polio cases and frequent epidemics became regular events, primarily in cities during the summer months. These epidemics-which left thousands of children and adults paralyzed-provided the impetus for a “Great Race” towards the development of a vaccine. Developed in the 1950s, polio vaccines are credited with reducing the global number of polio cases per year from many hundreds of thousands to around a thousand. Enhanced vaccination efforts led by the World Health Organization, UNICEF, and Rotary International could result in global eradication of the disease.

Eradication

While now rare in the Western world, polio is still endemic to South Asia and Nigeria. Following the widespread use of poliovirus vaccine in the mid-1950s, the incidence of poliomyelitis declined dramatically in many industrialized countries. A global effort to eradicate polio began in 1988, led by the World Health Organization, UNICEF, and The Rotary Foundation. These efforts have reduced the number of annual diagnosed cases by 99%; from an estimated 350,000 cases in 1988 to a low of 483 cases in 2001, after which it has remained at a level of about 1,000 cases per year (1,606 in 2009). Polio is one of only two diseases currently the subject of a global eradication program, the other being Guinea worm disease. If the global Polio Eradication initiative is successful before that for Guinea worm or any other disease, it would be only the third time humankind has ever completely eradicated a disease, after smallpox in 1979 and rinderpest in 2010. A number of eradication milestones have already been reached, and several regions of the world have been certified polio-free. The Americas were declared polio-free in 1994. In 2000 polio was officially eliminated in 36 Western Pacific countries, including China and Australia. Europe was declared polio-free in 2002. As of 2006, polio remains endemic in only four countries: Nigeria, India (specifically Uttar Pradesh and Bihar), Pakistan, and Afghanistan, although it continues to cause epidemics in other nearby countries born of hidden or reestablished transmission.

“Citizenfour” Wins Documentary Feature Oscar

Tonight the Academy of Motion Picture Arts and Sciences awarded an Oscar for Best Documentary Feature to “Citizenfour” directed by Laura Poitras.

Congratulations to Ms. Poitras. Thanks to Glenn Greenwald and Ewen MacAskill of The Guardian who went to Hong Kong with her. But most of all, thank you to Edward Snowden for his sacrifice that we might know what our government is doing in our name.

"Citizen Four" Wins Oscar photo 1000_zps75519101.jpg

Left to right: Producer Dirk Wilutzky, Director Laura Poitras, Glenn Greenwald, Edward Snowden’s girlfriend, Lindsay Mills and Editor  Mathilde Bonnefoy.

The Intercept’s Laura Poitras Wins Academy Award for ‘Citizenfour’

By Peter Maas, The Intercept

Laura Poitras, a founding editor of The Intercept, won an Academy Award tonight for her documentary “Citizenfour,” an inside look at Edward Snowden, the National Security Agency whistleblower.

“The disclosures that Edward Snowden revealed don’t only expose a threat to our privacy but to our democracy itself,” Poitras said in her acceptance speech. “Thank you to Edward Snowden for his courage and for the many other whistleblowers.” Snowden, in a statement released after the award was announced, said, “My hope is that this award will encourage more people to see the film and be inspired by its message that ordinary citizens, working together, can change the world.”

The film, which has been hailed as a real-life thriller, chronicles Snowden’s effort to securely contact Poitras and Glenn Greenwald in 2013 and meet them in Hong Kong, where Poitras filmed Snowden discussing the thousands of classified NSA documents he was leaking to them, and his motives for doing so. The film takes its title from the pseudonym Snowden used when he contacted Poitras in encrypted emails that were revealed in her documentary.

“Citizenfour” will air on HBO Monday, Feb 23, 9 PM EST. As soon as it’s available, it will be featured here and at our other site, The Stars Hollow Gazette.

Late Night Karaoke

Sunday Night Movie