Daily Archives: February 20, 2015

NSA helped British steal cellphone codes

Posted: February 20, 2015 at 12:51 am

WASHINGTON -- Britain's electronic spying agency, in cooperation with the U.S. National Security Agency, hacked into the networks of a Dutch company to steal codes that allow both governments to seamlessly eavesdrop on mobile phones worldwide, according to the documents given to journalists by Edward Snowden.

A story about the documents posted Thursday on the website The Intercept offered no details on how the intelligence agencies employed the eavesdropping capability -- providing no evidence, for example, that they misused it to spy on people who weren't valid intelligence targets. But the surreptitious operation against the world's largest manufacturer of mobile phone data chips is bound to stoke anger around the world. It fuels an impression that the NSA and its British counterpart will do whatever they deem necessary to further their surveillance prowess, even if it means stealing information from law-abiding Western companies.

The targeted company, Netherlands-based Gemalto, makes "subscriber identity modules," or SIM cards, used in mobile phones and credit cards. One of the company's three global headquarters is in Austin, Texas. Its clients include AT&T, T-Mobile, Verizon and Sprint, the Intercept reported.

The Intercept offered no evidence of any eavesdropping against American customers of those providers, and company officials told the website they had no idea their networks had been penetrated. Experts called it a major compromise of mobile phone security.

The NSA did not immediately respond to a request for comment. In the past, former agency officials have defended using extra-legal techniques to further surveillance capabilities, saying the U.S. needs to be able to eavesdrop on terrorists and U.S. adversaries who communicate on the same networks as everyone else. The NSA, like the CIA, breaks the espionage and hacking laws of other countries to get information that helps American interests.

Still, the methods in this case may prove controversial, as did earlier Snowden revelations that the NSA was hacking transmissions among Google's data centers. The Intercept reported that British government hackers targeted Gemalto engineers around the world much as the U.S. often accuses Chinese government hackers of targeting Western companies -- stealing credentials that got the hackers into the company's networks. Once inside, the British spies stole encryption keys that allow them to decode the data that passes between mobile phones and cell towers. That allows them to ungarble calls, texts or emails intercepted out of the air.

At one point in June 2010, Britain's Government Communications Headquarters, or GCHQ, as its signals intelligence agency is known, intercepted nearly 300,000 keys for mobile phone users in Somalia, The Intercept reported. "Somali providers are not on GCHQ's list of interest," the document noted, according to the Intercept. "(H)owever, this was usefully shared with NSA."

Earlier in 2010, GCHQ successfully intercepted keys used by wireless network providers in Iran, Afghanistan, Yemen, India, Serbia, Iceland and Tajikistan, according to the documents provided to The Intercept. But the agency noted trouble breaking into Pakistan networks.

Read the original:
NSA helped British steal cellphone codes

Posted in NSA | Comments Off on NSA helped British steal cellphone codes

SIM card makers hacked by NSA and GCHQ leaving cell networks wide open

Posted: at 12:51 am

The NSA could be able to listen in on your lols.

Christian Rivera

In a new report on some of the confidential documents leaked by former NSA contractor Edward Snowden, The Intercept wrote that operatives from both the National Security Administration (NSA) and the British Government Communications Headquarters (GCHQ) joined forces in April 2010 to crack mobile phone encryption. The Mobile Handset Exploitation Team (MHET) succeeded in stealing untold numbers of encryption keys from SIM card makers and mobile networks, specifically Dutch SIM card maker Gemalto, one ofthe largest SIM manufacturers in the world. Gemalto produces 2 billion SIM cards a year, which are used all over the world.

Although the SIM card in a cell phone was originally usedto verify billing to mobile phone users, today a SIM also stores the encryption keys that protect a user's voice, text, and data-based communications and make them difficult for spies to listen in on. The mobile carrier holds the corresponding key that allows the phone to connect to the mobile carrier's network. Each SIM card is manufactured with an encryption key (called a Ki) that is physically burned into the chip. When you go to use the phone, it conducts a secret 'handshake' that validates that the Ki on the SIM matches the Ki held by the mobile company, The Intercept explains. Once that happens, the communications between the phone and the network are encrypted.

To steal the SIM encryption keys, MHET exploited a weakness in SIM manufacturers' business routinethat SIM card manufacturers tend to deliver the corresponding Kis to mobile carriers via e-mail or File Transfer Protocol. By doing basic cyberstalking of Gemalto employees, the NSA and GCHQ were able to pilfer millions of SIM Kis, which have a slow turnover rate (your phone's Ki will likely remain the same as long as you keep the SIM in the phone) and can be used to decrypt data that has been stored for months or even years.

Gemalto not only makes SIM cards, but it also makes chips that are placed into EMV credit cards as well as the chips built into next-generation United States passports. Paul Beverly, a Gemalto executive vice president, told The Intercept that the company's security team began an audit on Wednesday and could find no evidence of the hacks. The most important thing for me is to understand exactly how this was done, so we can take every measure to ensure that it doesnt happen again, and also to make sure that theres no impact on the telecom operators that we have served in a very trusted manner for many years, Beverly said. Gemalto's clients include hundreds of wireless networks around the world, including all four major carriers in the US.

According to the documents procured by The Intercept, MHET was able to use the NSA's XKeyscore to mine the e-mail accounts and Facebook profiles of engineers at major telecom companies and SIM card manufacturing companies, looking for clues that would get them into the SIM Ki trove. (XKeyscore is a program designed by the NSA to reassemble and analyse the data packets it finds traveling over a network. XKeyscore is powerful enough to be able to pull up the full content of users' Web browser sessions, and it can even generate a full replay of a network session between two Internet addresses, as Ars reported in 2013.) Eventually, MHET learned enough to be able to plant malware on several of Gemalto's internal servers.

In the course of trying to break into Gemalto's internal network, the NSA and GCHQ looked for employees using encryption as preferred targets. The spy agencies also expanded their surveillance to include mobile phone companies and networks, as well as other SIM manufacturers. The Intercept explained:

In one instance, GCHQ zeroed in on a Gemalto employee in Thailand who they observed sending PGP-encrypted files, noting that if GCHQ wanted to expand its Gemalto operations, he would certainly be a good place to start. They did not claim to have decrypted the employees communications, but noted that the use of PGP could mean the contents were potentially valuable.

View original post here:
SIM card makers hacked by NSA and GCHQ leaving cell networks wide open

Posted in NSA | Comments Off on SIM card makers hacked by NSA and GCHQ leaving cell networks wide open

Google strongly opposes plans to let ANY US COURT authorise digi-snoops

Posted: at 12:50 am

Google has strongly opposed US government plans to expand federal powers to authorise remote searches of digital data - claiming in a letter the powers will weaken citizens' fourth amendment rights.

The right is the part of the US Constitution that prohibits unreasonable searches and seizures and requires any warrant to be judicially sanctioned and supported by probable cause.

In a letter to the Washington committee considering the proposed changes to the Federal Rule of Criminal Procedure 41, Google said the amendments raise a number of "monumental and highly complex constitutional, legal, and geopolitical concerns."

"Google urges the committee to reject the proposed amendment and leave the expansion of the government's investigative and technological tools, if any are necessary or appropriate, to Congress," it said.

The changes would permit any court within any district to issue a warrant authorising remote access searches of electronic information.

The company said a magistrate judge in the Southern District of Texas recently denied an application for a Rule 41 Warrant to permit US law enforcement agents to hack a computer whose location was unknown, but whose IP address was most recently associated with a country in South-East Asia. "Such searches clearly violate the extraterritorial limitations of Rule 41," it said.

It added: "The nature of today's technology is such that warrants issued under the proposed amendment will in many cases end up authorising the government to conduct searches outside the United States.

"Although the proposed amendment disclaims association with any constitutional questions, it invariably expands the scope of law enforcement searches, weakens the Fourth Amendment's particularity and notice requirements, opens the door to potentially unreasonable searches and seizures and expands the practice of covert entry warrants."

Richard Salgado, Google's director for law enforcement and information security, said the proposed change "raises a number of monumental and highly complex constitutional, legal, and geopolitical concerns that should be left to Congress to decide".

Google raised its objections as part of a public consultation that ended on Tuesday.

Read the original here:
Google strongly opposes plans to let ANY US COURT authorise digi-snoops

Posted in Fourth Amendment | Comments Off on Google strongly opposes plans to let ANY US COURT authorise digi-snoops

Hovdey: Success may win over Pain and Misery

Posted: at 12:50 am

Email

On the face of it, Pain and Misery is just about the worst name you could give a racehorse. This is not to trample on an owners first amendment rights to freedom of speech and its more creative expressions (as upheld in The Jockey Club vs. Mike Pegram in the naming of Isitingood). But this is 2015, for Petes sake, and the tolerance for any whiff of a cold-hearted attitude toward the welfare of the animal has pretty much evaporated.

Furthermore, its not as if Pain and Misery is going away anytime soon. In his first race as a 3-year-old last weekend, which was also his first race for trainer Richard Mandella, the racy brown gelding just missed winning the $75,000 Baffle Stakes at about 6 1/2 furlongs down the hillside course at Santa Anita. He was caught in the last jumps by Bench Warrant, who was coming off a pretty good effort to Lord Nelson and Texas Red in the San Vicente, in a race that put some life in a quiet Sunday afternoon.

Pain and Misery was ridden by young Flavien Prat, who did not as Trevor Denman suggested at one point during his call of the race drop his whip in the heat of the battle. To Mandella it didnt matter much, since his expectations were modest, and he was pleased with both horse and rider.

He came here from New Mexico during the fall meet at Del Mar, Mandella said. But he needed to back off a little before he could go forward. After that he came along really good. I needed to get a race into him, and the 6 1/2 on the turf was the only thing around. He did it really well, so now we can think about something like the San Felipe with him.

The San Felipe Stakes, on March 7, is the next major West Coast stop on the Kentucky Derby Express. Pain and Miserys pedigree by Bob and John out of a Running Stag mare suggests that the 1 1/16 miles of the San Felipe should be no sweat, and if he can handle the dirt at Zia Park he will love the stuff at Santa Anita.

This is a sweetheart of a horse, Mandella said. Good-natured. Does everything right. Just a pleasure to be around.

Which begs the question why does such a nice horse have to be burdened with such a terrible name? In a column from his collection This Was Racing, Joe Palmer held forth on the naming of horses for reasons both naughty and nice. He brought up a fellow who called one of his horses Ugly Mary and another Losing Clon.

He approached this on a practical level, Palmer wrote. He said with those names female hunch players would not bet on them, and he would get better odds when they won.

Of course, this is both sexist and wildly incorrect, unless female hunch players make up considerably more of the pari-mutuel pools that weve been led to believe. Pain and Misery went off at 10-1 in the Baffle, but the price could be blamed more on the uncertain 2-year-old form he brought to town from New Mexico, by way of Zia Park, where he won a maiden race and then the Governors Cup last fall for trainer Henry Dominguez.

View post:
Hovdey: Success may win over Pain and Misery

Posted in First Amendment | Comments Off on Hovdey: Success may win over Pain and Misery

Bitcoin- The Top Market to Trade Right Now – Video

Posted: at 12:49 am


Bitcoin- The Top Market to Trade Right Now
Chris Dunn and Anthony Trister on how Bitcoin is becoming the Top Market to Trade Right Now.

By: TradingPub

See the original post:
Bitcoin- The Top Market to Trade Right Now - Video

Posted in Bitcoin | Comments Off on Bitcoin- The Top Market to Trade Right Now – Video

5 Bitcoin Mining – Video

Posted: at 12:49 am


5 Bitcoin Mining
In this channel, I share with you exactly what this advice as, as well as how I put it to use in my own business, and, it is my hope that, after watching this video, you will do two things;...

By: Do It Today ( Business Beginner To Advanced)

Read the original here:
5 Bitcoin Mining - Video

Posted in Bitcoin | Comments Off on 5 Bitcoin Mining – Video

Can Morgan Spurlock live off Bitcoin?

Posted: at 12:49 am

Story highlights What is to be made of digital dollars? How does bitcoin work? Might you be able to eat, live and exist entirely through these mysterious moneys?

Watch CNN's "Morgan Spurlock Inside Man" Thursday nights at 9 p .m. ET/PT

In the next airing of "Morgan Spurlock Inside Man," the host sets out to examine all the essential elements of this most modern form of currency. And, in advance of Thursday's episode, here are the 5 W's of bitcoin.

1. What is bitcoin?

Formal definitions aside, how best to explain money that you can't hold, smell or feel, yet has every bit the purchasing power of paper or plastic?

In short, bitcoin was designed as a less expensive way to buy and sell goods, all around the world, while dodging pre-exisiting financial institutions.

"Its founder wanted to create a global currency that existed outside a central bank or government," notes Spurlock. "Just a person to person system that could be used instantly and internationally."

Void of traditional surcharges and fees, but fluctuating like any other currencies, at the time of Spurlock's quest, one unit of bitcoin was equal to roughly $624 U.S. At present, that value has dropped to $235.85 U.S.

Either way, at least it won't weigh down your pockets with a ton of silver and copper.

2. Who uses bitcoin?

See the original post here:
Can Morgan Spurlock live off Bitcoin?

Posted in Bitcoin | Comments Off on Can Morgan Spurlock live off Bitcoin?

Samantha Cristoforetti for Short Food Movie #Expo2015 – Video

Posted: at 12:48 am


Samantha Cristoforetti for Short Food Movie #Expo2015
Capt. Samantha Cristoforetti #39;s message in support of Short Food Movie for Expo Milano 2015 (www.shortfoodmovie.expo2015.org ). Video created by Samantha Cristoforetti, ESA astronaut and...

By: EXPO MILANO 2015 WORLDS FAIR

See the original post:
Samantha Cristoforetti for Short Food Movie #Expo2015 - Video

Posted in Space Station | Comments Off on Samantha Cristoforetti for Short Food Movie #Expo2015 – Video

ISS Expedition 42 – Progress M-26 (M58) Docks With The Space Station – Video

Posted: at 12:48 am


ISS Expedition 42 - Progress M-26 (M58) Docks With The Space Station
ISS Expedition 42 - Progress M-26 (M58) Docks With The Space Station Video Credit: NASA.

By: Matthew Travis

View original post here:
ISS Expedition 42 - Progress M-26 (M58) Docks With The Space Station - Video

Posted in Space Station | Comments Off on ISS Expedition 42 – Progress M-26 (M58) Docks With The Space Station – Video

INSIDE THE INTERNATIONAL SPACE STATION, part 2 1080p – Video

Posted: at 12:48 am


INSIDE THE INTERNATIONAL SPACE STATION, part 2 1080p
PLAYLIST: PLAYLIST: In her final days as Commander of the International Space Station, Sunita Williams of NASA recorded an extensive tour of the orbital laboratory and. How does an astronaut...

By: Salvatore Manning

See more here:
INSIDE THE INTERNATIONAL SPACE STATION, part 2 1080p - Video

Posted in Space Station | Comments Off on INSIDE THE INTERNATIONAL SPACE STATION, part 2 1080p – Video