Daily Archives: February 18, 2015

The NSA has reportedly found ways to avoid even the strongest security measures

Posted: February 18, 2015 at 12:47 am

The U.S. intelligence community has found ways to avoid even the strongest of security measures and practices, a new report from Moscow-based Kaspersky Lab suggests, demonstrating a range of technological accomplishments that place the nation's hackers as among the most sophisticated and well resourced in the world.

Hackers who are part of what the cybersecurity researchers call "Equation Group" have been operating under the radar for at least 14years, deploying a range of malware that could infect hard drives in a wayalmost impossible to remove and cold hide code in USB storage devicesto infiltratenetworks kept separate from the Internet for security purposes.

Kaspersky's report did not say the U.S. government wasbehind the group. But it did say the group was closely linked to Stuxnet -- malware widely reported to have been developed by the National Security Agency and Israel that was used in an attack against Iran's uranium enrichment program -- along with other bits of data that appear to align with previous disclosures. Reuters further linked the NSA to the Kaspersky report, citing anonymous former employees of the agency who confirmed Kaspersky's analysis.

NSA spokesperson Vanee Vines said in a statement that the agency was aware of the report, but would not comment publicly on any allegations it raises.

The Kaspersky report shows a highly sophisticated adversarythat has found ways to worm itself into computers with even the strongest of security measures in place. This matches up with what we know about other NSA efforts from documents leaked by former NSA contractor Edward Snowden, which showed efforts to undermine encryption and evade the protections major tech companies used to guard user data.

But the new report paints a more detailed picture of the breadth of the agency's reported offensive cyber arsenal. And unlike other recent revelations about U.S. government snooping, which have largely come from Snowden, the insights from Kaspersky came from examining attacks found in the digital wild. Victims were observed in more than 30 countries, withIran, Russia, Pakistan and Afghanistan having among the highest infection rates, according to the report.

One of the most sophisticatedattacks launched by theEquation Group lodged malware deep into hard drives, according to Kaspersky. It worked by reprogramming the proprietary code, called firmware, built into the hard drives themselves. That allowed for persistent storage hidden inside a target system that could survive the hard drive being reformatted or an operating system being reinstalled, the report says.

The code uncovered by Kaspersky suggests the malware was designed to work ondisk drives of more than a dozen major manufacturers -- including those from Seagate, Western Digital, Toshiba, IBM and Samsung. But the report also notes that this particular technique seemed to be rarely deployed, suggesting that it was used only on the most valuable victims or in unusual circumstances.

The Kaspersky report also said the group found ways to hide malicious files within aWindows operating system database on the targets' computer known as the registry -- encrypting and stashing the files so that they would be impossible to detect using antivirus software.

Equation Group also found ways to infiltratesystemsthat were kept off the Internet for security purposes -- commonly known as "air-gapped" networks. Malware used by the hackers relied on infected USB sticks to map out such networks -- or even remotely deploy code on them, according to the report.

Originally posted here:
The NSA has reportedly found ways to avoid even the strongest security measures

Posted in NSA | Comments Off on The NSA has reportedly found ways to avoid even the strongest security measures

Is the NSA putting spyware in hard drives?

Posted: at 12:47 am

The NSA may be implanting spying software in hard drives from a dozen major manufacturers including Toshiba, Western Digital, IBM, Samsung and Seagate, a report from cybersecurity firm Kaspersky Lab revealed Monday.

Though Kaspersky did not come out and point the finger directly at the National Security Agency -- instead calling out the Equation group, who have been perpetrating high-level attacks for almost 20 years -- but they said that there are "solid links indicating that the Equation group has interacted with" the actors behind Stuxnet, a virus the NSA used to attack Iranian nuclear weapons development in 2012.

A former NSA employee told Reuters that Kaspersky's analysis was correct, and "another former intelligence operative confirmed that the NSA had developed the prized technique of concealing spyware in hard drives."

The Kaspersky paper calls the software "perhaps the most powerful tool" in the Equation group's impressive arsenal, and "the first known malware capable of infecting the hard drives." It reprograms the drives and creates a hidden space where it can save stolen information to be retrieved later.

As CNET's Bridget Carey told CBS News, getting that deep into a piece of firmware (the core software of the drives), is very hard to do and requires the source code from the manufacturer.

One of the companies whose hard drives were infected with the spyware, Western Digital, said that it did not give its source code to the government. "But other sources in cybersecurity say that the government can get this because all it takes is for you to sell a computer to the Pentagon or another agency and they have to say, 'You know what, for security reasons we need that source code,'" Carey explained.

In other words, the government may have only had to ask for what it wanted in order to send spying-capable hard drives all over the world.

2015 CBS Interactive Inc. All Rights Reserved.

See the original post:
Is the NSA putting spyware in hard drives?

Posted in NSA | Comments Off on Is the NSA putting spyware in hard drives?

Not Only the NSA Knows How to Make Unerasable Malware

Posted: at 12:47 am

Hacking tools linked to U.S. intelligence that burrow inside hard disk drives could also be made by nongovernment hackers.

Over the weekend Russian security company Kaspersky described a suite of extremely sophisticated hacking tools that since 2008 have been used to infiltrate government, military, and corporate computers in 30 countries around the world. Reuters reports that it was the work of the U.S. National Security Agency.

Kasperskys most striking finding was that the toolkit of what it calls the Equation Group could inject malware into the software embedded inside hard disk drives. Not only is that firmware invisible to conventional security software, but malicious code hidden inside it can emerge to take over a computer even after its hard disk has been carefully erased. Costin Raiu, a researcher with Kaspersky, told the New York Times that the technique rendered investigators like him practically blind.

That impressive trick sets a new bar for the sophistication in malware caught in the wild. And it has led to speculation that the NSA had assistance from hard drive manufacturers, for example by getting access to details on how their firmware worked.

But despite suggestions it would be just about impossible for even the NSA to reverse-engineer hard drive firmware without such help, it appears to be well within its reachand that of many others, too. In recent years hackers and researchers with budgets far smaller than the NSAs have reverse-engineered the firmware of hard drives and other devices and demonstrated their own invisible malware.

That raises the prospect that multiple national intelligence agenciesand perhaps even groups without government backingcould be using the technique. Few, if any, security researchers are on the lookout for such attacks because they are essentially invisible.

Anyone looking to get started hacking hard drive firmware would be well advised to start with this page on the subject from prolific hacker Jereom Domburg. In 2013 he gave several talks on his research and showed how it enabled him to remotely take over a server with a hard disk made by Western Digital, a leading manufacturer whose drives were also targeted by Equation Group.

Also in 2013, academic researchers independently went even further and developed several proof-of-concept attacks against a hard disk from a different manufacturer. They showed how a disks firmware could be infected remotely, and made a system to communicate over the Internet with the unerasable malware to send commands and copy data such as encryption keys. This line from the academic papers summary has gained new plausibility after what we learned over the weekend:

The difficulty of implementing such an attack is not limited to the area of government cyber-warfare; rather, it is well within the reach of moderately funded criminals, botnet herders and academic researchers.

At the Black Hat security conference last summer, two researchers described how they had reverse engineered the firmware of USB sticks to hide code inside that can silently take over a computer.

Read the original here:
Not Only the NSA Knows How to Make Unerasable Malware

Posted in NSA | Comments Off on Not Only the NSA Knows How to Make Unerasable Malware

NSA planted surveillance software on hard drives, report says

Posted: at 12:47 am

Security vendor Kaspersky outs a group capable of inserting spying software onto hard drives around the world, while Reuters fingers the NSA as the culprit.

Is the NSA behind a sophsticated way of implanting spyware on hard drives?

The National Security Agency is able to infect hard drives with surveillance software to spy on computers, Reuters said on Tuesday, citing information from cyber researchers and former NSA operatives.

In a new report, Kaspersky revealed the existence of a group dubbed The Equation Group capable of directly accessing the firmware of hard drives from Western Digital, Seagate, Toshiba, IBM, Micron, Samsung and other drive makers. As such, the group has been able to implant spyware on hard drives to conduct surveillance on computers around the world.

In a blog posted on Monday, Kaspersky said this threat has been around for almost 20 years and "surpasses anything known in terms of complexity and sophistication of techniques." The security researcher called the group "unique almost in every aspect of their activities: they use tools that are very complicated and expensive to develop, in order to infect victims, retrieve data and hide activity in an outstandingly professional way, and utilize classic spying techniques to deliver malicious payloads to the victims."

Surveillance software implanted on hard drives is especially dangerous as it becomes active each time the PC boots up and thus can infect the computer over and over again without the user's knowledge. Though this type of spyware could have surfaced on a "majority of the world's computers," Kaspersky cited thousands or possibly tens of thousands of infections across 30 different countries.

Infected parties and industries include government and diplomatic institutions, as well as those involved in telecommunications, aerospace, energy, nuclear research, oil and gas, military and nanotechnology. Also, included are Islamic activists and scholars, mass media, the transportation sector, financial institutions and companies developing encryption technologies.

And who's responsible for this sophisticated spyware?

Kaspersky didn't name names but did say that the group has ties to Stuxnet, a virus used to infect Iran's uranium enrichment facility. The NSA has been accused of planting Stuxnet, leading Reuters to finger the agency as the source behind the hard drive spyware, especially based on outside information.

Kaspersky's analysis was right, a former NSA employee told Reuters, adding that the agency valued this type of spyware as highly as Stuxnet. Another "former intelligence operative" said that the NSA developed this method of embedding spyware in hard drives but said he didn't know which surveillance efforts used it.

Read more here:
NSA planted surveillance software on hard drives, report says

Posted in NSA | Comments Off on NSA planted surveillance software on hard drives, report says

Lawmakers Aim To Update Constitution For Data Privacy

Posted: at 12:47 am

ST. PAUL, Minn. (WCCO) State lawmakers are considering a constitutional amendment that would protect personal data from unreasonable search and seizure without a warrant.

The data privacy amendment would expand the current law to protect electronic communications and data,giving it the same protection in the state constitution as papers and other personal property.

Lawmakers in favor of this constitutional amendment say it would ensure that new 21stcentury communications, emails, text messages and photos are protected just as much as your other personal property.

A broad spectrum of political opinion in the state is speaking as one voice: supporters range from the most conservative lawmakers to the most liberal, all believing that further protections are needed forthe electronic communications of Minnesotans.

Minnesotans support our traditional rights to be free from unreasonable searches and seizures, and theyre also saying they support a modest, targeted constitutional amendment to make it clear that these protections still apply in our digital era, Matt Ehling, president of the Minnesota non-profit Public Record Media, said.

Supporters say the amendment will clarify that personal data is covered by the Fourth Amendment.

They also hope it closes loopholes that allow the federal government access to your emails, text messages and photos.

Sen. Branden Peterson, R-Andover, said there was a loophole in federal law over emails and other forms of digital communication.

All forms of electronic communication that are over sixmonths old can be accessed without a warrant, Peterson said.

The bill has passed through the Civil Law Committee and will be taken up in the Government Operations committee on Thursday.

Link:
Lawmakers Aim To Update Constitution For Data Privacy

Posted in Fourth Amendment | Comments Off on Lawmakers Aim To Update Constitution For Data Privacy

PA adopts LG (Amendment) Bill amid JUI-F protest

Posted: at 12:47 am

Wednesday, 18 February 2015 00:15

PESHAWAR: Khyber Pakhtunkhwa Assembly Tuesday passed The Local Government (Second Amendment) Bill, 2015 amid walk-out by JUI-F legislators to pave way for establishing Village and Neighbourhood Councils in all districts of the province.

The legislation namely The Khyber Pakhtunkhwa Local Government (Second Amendment) Bill, 2015 was presented in the house by Senior Minister for Local Government, Inayatullah Khan. After delimitation of the councils by Election Commission of Pakistan, the provincial government by notification in the official Gazette will notify its establishment in all districts.

The Bill also included the proposed establishment of district and tehsil councils for district Kohistan and newly curved out district of Kohistan Lower.

Maulana Asmatullah, a JUI-F legislator from the district said that the proposed amendment is against the 1973 constitution, saying that the area is provincially administered tribal area and no legislation would be made for them without the approval of President of Pakistan. Furthermore, he termed it a subjudice matter.

The leader of opposition, Maulana Lutf-ur-Rehman also stood in support of his colleague and proposed constitution of a committee for carrying out detailed review of the legislation to come up with a unanimous solution of the matter.

The Senior Minister however declined to pay any heed to the proposals of the opposition legislators and said the provincial assembly has mandate of making legislation for districts of the province while districts are made on administrative basis.

He said as the Local Council is responsible for holding elections in all districts and tehsils, therefore, they are bringing the proposed amendment in the Local Government Act. He said that new district in Kohistan had already been made where Deputy Commissioner (DC) and District Police Officer (DPO) are also posted.

Regarding the contentions that the matter is subjudice, he said a petition in this regard has already been rejected by the Abbottabad Bench of Peshawar High Court. He dispelled the impression that the matter is repugnant to the constitution.

He said that after passage of the bill from the provincial assembly, a summary will be sent to the Governor and after his approval it would be sent to the President of Pakistan through the Department of Home and Tribal Affairs.

Follow this link:
PA adopts LG (Amendment) Bill amid JUI-F protest

Posted in Second Amendment | Comments Off on PA adopts LG (Amendment) Bill amid JUI-F protest

Open carry rally slated

Posted: at 12:47 am

REXBURG Dan Roberts and members of the Second Amendment Alliance are staging a march and rally in Rexburg this Saturday Feb. 21, in support of the House Bill 89, or the Constitutional Carry bill.

Roberts said those participating will meet at 3:30 p.m. at the Madison County Courthouse and all participants are welcome to open carry their favorite firearms.

He said those assembled at the courthouse will then march to the Rexburg Tabernacle, where they will listen to a short presentation and be given the opportunity to sign a petition supporting the constitutional carry bill.

Roberts said House bill 89, or the constitutional carry bill, was recently tabled by the State Affairs Committee in the State Legislature. The bill would enable constitutional carry or concealed carry, without a permit in the State of Idaho.

Roberts also said this demonstration is loosely coordinated with another rally in Boise that is calling for the legislature to take another look at House Bill 89.

Roberts said this rally would be almost exactly the same as the pro-Second Amendment rally two years ago, except with a specific focus on the constitutional carry legislation.

Its a little different focus, you know, last time we were just talking about gun rights in general and not wanting to have more restrictions. This time were looking more at being proactive, trying to get rid of some existing regulations; specifically, we would like to see what they call a constitutional carry, which is basically any law abiding citizen in Idaho could carry within the state boundaries concealed without a permit, Roberts said.

Roberts said this years presentation at the tabernacle will be short, with only a few speakers, including Ron Nate, who represents Rexburg in the Idaho legislature.

Roberts said according to current regulations there are two types of concealed carry permits: one requires no training and a $60 fee and the other is an enhanced concealed carry permit that requires a course in addition to a fee.

Roberts said that since the standard concealed carry permit doesnt require any training, merely a fee for a background check, then the permits are useless.

Read the original:
Open carry rally slated

Posted in Second Amendment | Comments Off on Open carry rally slated

Edward Snowden on the First Amendment: Livestream in Hawaii – Video

Posted: at 12:46 am


Edward Snowden on the First Amendment: Livestream in Hawaii
Edward Snowden, the NSA whistleblower on the run, spoke at ACLU Hawaii #39;s Davis Levin First Amendment Conference live, Feb. 14, 2015, via a video link from Moscow, Russia. His attorney, Ben...

By: Honolulu Civil Beat

Read the original post:
Edward Snowden on the First Amendment: Livestream in Hawaii - Video

Posted in First Amendment | Comments Off on Edward Snowden on the First Amendment: Livestream in Hawaii – Video

'Duck Dynasty' star to CPAC for Breitbart award

Posted: at 12:46 am

The controversial television star who was suspended for controversial remarks in 2013 has become a hero to conservatives supporting freedom of speech.

"In a time where conservative Christians are under attack by the media and pop culture, Phil Robertson continues to courageously stand by Truth and his convictions," said David N. Bossie, President of Citizens United in a release. "I can think of no better person to present the "Andrew Breitbart Defender of the First Amendment Award" to than Mr. Phil Robertson."

The award is named after Breitbart, former editor of the eponymous site who passed away in 2012. Conservative Radio star Mark Levin received the award last year.

Robertson, a devout Christian, was briefly suspended from the show for remarks he made about homosexuality in GQ magazine.

"It seems like, to me, a vaginaas a manwould be more desirable than a man's anus. That's just me. I'm just thinking: There's more there! She's got more to offer," he said. "I mean, come on, dudes! You know what I'm saying? But hey, sin: It's not logical, my man. It's just not logical."

After public protest, A&E Networks lifted the ban and let Robertson continue filming the highly successful show based on their lives in Louisiana.

CNN also learned Citizens United's next Freedom Summit will be held in South Carolina this spring. After the success of their Iowa Summit in January, which launched Wisconsin Gov. Scott Walker's current lead in some polls, the group is aiming to impact the first-in-the-South primary state as well.

The group came into the mainstream during the 2010 Supreme Court case, Citizens United vs. Federal Election Committee, which gave way to the creation of Super Pacs, groups that can take unlimited donations independent of a political candidate or party.

During her run for the Democratic nomination, the group released "Hillary: The Movie", which featured conservative politicians and activists giving their take on Hillary Clinton's record as former first lady and then-senator.

The Supreme Court ruled against the group, which protested bans on advertising it during the 2008 primary season.

Read the rest here:
'Duck Dynasty' star to CPAC for Breitbart award

Posted in First Amendment | Comments Off on 'Duck Dynasty' star to CPAC for Breitbart award

'Duck Dynasty' star to win first amendment award

Posted: at 12:46 am

Tuesday, February 17, 2015 - 10:43am

"Duck Dynasty" Star Phil Robertson will receive Citizens United's first amendment award at the Conservative Political Action Conference, known as CPAC, next weekend in Maryland.

The controversial television star who was suspended for controversial remarks in 2013 has become a hero to conservatives supporting freedom of speech.

"In a time where conservative Christians are under attack by the media and pop culture, Phil Robertson continues to courageously stand by Truth and his convictions," said David N. Bossie, President of Citizens United in a release. "I can think of no better person to present the "Andrew Breitbart Defender of the First Amendment Award" to than Mr. Phil Robertson."

The award is named after Breitbart, former editor of the eponymous site who passed away in 2012. Conservative Radio star Mark Levin received the award last year.

Robertson, a devout Christian, was briefly suspended from the show for remarks he made about homosexuality in GQ magazine.

"It seems like, to me, a vagina---as a man---would be more desirable than a man's anus. That's just me. I'm just thinking: There's more there! She's got more to offer," he said. "I mean, come on, dudes! You know what I'm saying? But hey, sin: It's not logical, my man. It's just not logical."

After public protest, A&E Networks lifted the ban and let Robertson continue filming the highly successful show based on their lives in Louisiana.

CNN also learned Citizens United's next Freedom Summit will be held in South Carolina this spring. After the success of their Iowa Summit in January, which launched Wisconsin Gov. Scott Walker's current lead in some polls, the group is aiming to impact the first-in-the-South primary state as well.

The group came into the mainstream during the 2010 Supreme Court case, Citizens United vs. Federal Election Committee, which gave way to the creation of Super Pacs, groups that can take unlimited donations independent of a political candidate or party.

More here:
'Duck Dynasty' star to win first amendment award

Posted in First Amendment | Comments Off on 'Duck Dynasty' star to win first amendment award