{"id":164324,"date":"2014-12-05T13:05:38","date_gmt":"2014-12-05T18:05:38","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/operation-auroragold-how-the-nsa-poked-holes-in-cellular-networks-to-spy-on-countries-organizations-people.php"},"modified":"2014-12-05T13:05:38","modified_gmt":"2014-12-05T18:05:38","slug":"operation-auroragold-how-the-nsa-poked-holes-in-cellular-networks-to-spy-on-countries-organizations-people","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/operation-auroragold-how-the-nsa-poked-holes-in-cellular-networks-to-spy-on-countries-organizations-people.php","title":{"rendered":"Operation Auroragold: How The NSA Poked Holes In Cellular Networks To Spy On Countries, Organizations, People"},"content":{"rendered":"<p><p>    While many upcoming technologies promise to grant privacy and    keep sensitive information safe in a world that is becoming    increasingly more connected, the National Security Agency (NSA)    has ways of bypassing even the most protected systems in order    to have constant access to the inner workings of countries,    organizations and even peoples lives.  <\/p>\n<p>    Dubbed Operation Auroragold, the NSA has developed methods of    accessing phone records, emails and texts by hacking into    cellphone networks the Intercept learned    exclusively from whistleblower Edward Snowden. The operation    may have been established as early as 2010, but there are no    indications that it has slowed down. Documents provided by Snowden show that    through Operation Auroragold the NSA intended to poke holes    into cellular communication systems so they can be hacked at    will to access information.  <\/p>\n<p>    The organization has already spied on hundreds of companies and    organizations around the world in order to learn about any    security vulnerabilities within their communication systems    that can be used to collect intelligence. The NSA has    reportedly acquired correspondence from over 1,200 email    accounts through Operation Auroragold, while countries targeted    through the program include Libya and organizations include the    GSM Association.  <\/p>\n<p>    The NSA supposedly gained internal access to 4G data    connections in 2010, years before the technology would become    global standard of communication. The NSA has stated that it    does not target ordinary people, but observers have said the    program could create problems for everyday citizens. Channels    opened by the NSA could be accessed by hackers.  <\/p>\n<p>    If there are vulnerabilities on those systems known to the NSA    that are not being patched on purpose, its quite likely they    are being misused by completely other kinds of attackers,    Mikko Hypponen, a security expert at Finland-based firm    F-Secure told the Intercept. When they start to    introduce new vulnerabilities, it affects everybody who uses    that technology; it makes all of us less secure.  <\/p>\n<p>    Many security bugs were discovered in 2014, including the        Heartbleed security flaw, which was discovered in April,    and affected a considerable amount of business and commercial    accounts. The NSA may have     known about Heartbleed for at least two years before it was    discovered, Bloomberg has previously reported, and may have    used the vulnerability to collect intelligence from 66 percent    of websites globally.  <\/p>\n<p>    Though the White House denied the NSAs involvement in    Heartbleed, President Obama also announced in April that the    agency would have to report to the government any security    flaws that it discovers. In December 2013, an NSA review, which    included the president, determined that the NSA didnt have the    right to create vulnerabilities in    commercial technologies for the purpose of collecting    surveillance.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.ibtimes.com\/operation-auroragold-how-nsa-poked-holes-cellular-networks-spy-countries-1736263\/RK=0\/RS=1weAwpTFiQ2R1bb_OUN0G8peVOw-\" title=\"Operation Auroragold: How The NSA Poked Holes In Cellular Networks To Spy On Countries, Organizations, People\">Operation Auroragold: How The NSA Poked Holes In Cellular Networks To Spy On Countries, Organizations, People<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> While many upcoming technologies promise to grant privacy and keep sensitive information safe in a world that is becoming increasingly more connected, the National Security Agency (NSA) has ways of bypassing even the most protected systems in order to have constant access to the inner workings of countries, organizations and even peoples lives. Dubbed Operation Auroragold, the NSA has developed methods of accessing phone records, emails and texts by hacking into cellphone networks the Intercept learned exclusively from whistleblower Edward Snowden. The operation may have been established as early as 2010, but there are no indications that it has slowed down <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/operation-auroragold-how-the-nsa-poked-holes-in-cellular-networks-to-spy-on-countries-organizations-people.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-164324","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/164324"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=164324"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/164324\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=164324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=164324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=164324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}