{"id":47873,"date":"2014-12-04T20:51:52","date_gmt":"2014-12-05T01:51:52","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/exposed-nsa-program-for-hacking-any-cellphone-network-no-matter-where-it-is\/"},"modified":"2014-12-04T20:51:52","modified_gmt":"2014-12-05T01:51:52","slug":"exposed-nsa-program-for-hacking-any-cellphone-network-no-matter-where-it-is","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/exposed-nsa-program-for-hacking-any-cellphone-network-no-matter-where-it-is\/","title":{"rendered":"Exposed: NSA program for hacking any cellphone network, no matter where it is"},"content":{"rendered":"<p><p>    The Intercept  <\/p>\n<p>    The National Security Agency has spied on hundreds of companies    and groups around the world, including in countries allied with    the US government, as part of an effort designed to allow    agents to hack into any cellphone network, no matter where it's    located, according to a report published Thursday.  <\/p>\n<p>    Armed with technical details of a specific provider's current    or planned networks, agents secretly attempt to identify or    introduce flaws that will make it possible for communications    to be covertly tapped, according to anarticle    published by The Intercept. Security experts warned that    programs that introduce security flaws or suppress fixes for    existing vulnerabilities could cause widespread harm, since the    bugs can also be exploited by criminal hackers or governments    of nations around the world.  <\/p>\n<p>    \"Even if you love the NSA and you say you have nothing to hide,    you should be against a policy that introduces security    vulnerabilities,\" Karsten Nohl, a cryptographer and smartphone    security expert, told The Intercept. \"Because once NSA    introduces a weakness, a vulnerability, it's not only the NSA    that can exploit it.\"  <\/p>\n<p>    The program reported Thursday, codenamed AURORAGOLD, has    monitored messages sent and received by more than 1,200 email    accounts associated with large cellphone operators around the    world. One surveillance target is the GSM Association (GSMA), a    UK-based group that works with Microsoft, Facebook, AT&T,    Cisco Systems, and many other companies to ensure their    hardware and software related to cellular technology is    compatible. At the same time the NSA has been monitoring the    group, other arms of the US government has funded GSMA programs    designed to boost privacy on mobile networks. According to The    Intercept:  <\/p>\n<p>      The NSA focuses on intercepting obscure but important      technical documents circulated among the GSMAs members known      as IR.21s.    <\/p>\n<p>      Most cellphone network operators share IR.21 documents among      each other as part of agreements that allow their customers      to connect to foreign networks when they are roaming      overseas on a vacation or a business trip. An IR.21,      according to the NSA documents, contains information      necessary for targeting and exploitation.    <\/p>\n<p>      The details in the IR.21s serve as a warning mechanism that      flag new technology used by network operators, the NSAs      documents state. This allows the agency to identify security      vulnerabilities in the latest communication systems that can      be exploited, and helps efforts to introduce new      vulnerabilities where they do not yet exist.    <\/p>\n<p>      The IR.21s also contain details about the encryption used by      cellphone companies to protect the privacy of their      customers communications as they are transmitted across      networks. These details are highly sought after by the NSA,      as they can aid its efforts to crack the encryption and      eavesdrop on conversations.    <\/p>\n<p>      Last year, The Washington Post reported that the NSA      had already managed to break the most commonly used cellphone      encryption algorithm in the world, known as A5\/1. But the      information collected under AURORAGOLD allows the agency to      focus on circumventing newer and stronger versions of A5      cellphone encryption, such as A5\/3.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Continue reading here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/arstechnica.com\/tech-policy\/2014\/12\/exposed-nsa-program-for-hacking-any-cellphone-network-no-matter-where-it-is\" title=\"Exposed: NSA program for hacking any cellphone network, no matter where it is\">Exposed: NSA program for hacking any cellphone network, no matter where it is<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The Intercept The National Security Agency has spied on hundreds of companies and groups around the world, including in countries allied with the US government, as part of an effort designed to allow agents to hack into any cellphone network, no matter where it's located, according to a report published Thursday. Armed with technical details of a specific provider's current or planned networks, agents secretly attempt to identify or introduce flaws that will make it possible for communications to be covertly tapped, according to anarticle published by The Intercept. Security experts warned that programs that introduce security flaws or suppress fixes for existing vulnerabilities could cause widespread harm, since the bugs can also be exploited by criminal hackers or governments of nations around the world.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/exposed-nsa-program-for-hacking-any-cellphone-network-no-matter-where-it-is\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-47873","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/47873"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=47873"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/47873\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=47873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=47873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=47873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}