{"id":58551,"date":"2015-02-25T00:48:38","date_gmt":"2015-02-25T05:48:38","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/snowden-spy-agencies-screwed-all-of-us-in-hacking-crypto-keys\/"},"modified":"2015-02-25T00:48:38","modified_gmt":"2015-02-25T05:48:38","slug":"snowden-spy-agencies-screwed-all-of-us-in-hacking-crypto-keys","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/snowden-spy-agencies-screwed-all-of-us-in-hacking-crypto-keys\/","title":{"rendered":"Snowden: Spy Agencies Screwed All of Us in Hacking Crypto Keys"},"content":{"rendered":"<p><p>    NSA whistleblower Edward Snowden    didnt mince words during a Reddit Ask Me Anything session on    Monday when he said the NSA and the British spy agency GCHQ had    screwed all of us when it hacked into the Dutch firm Gemalto    to steal cryptographic keys used in billions of mobile SIM    cards worldwide.  <\/p>\n<p>    When the NSA and GCHQ compromised    the security of potentially billions of phones (3g\/4g    encryption relies on the shared secret resident on the sim),    Snowden     wrote in the AMA, they not only screwed the manufacturer,    they screwed all of us, because the only way to address the    security compromise is to recall and replace every SIM sold by    Gemalto.  <\/p>\n<p>    Gemalto is one of the leading    makers of SIM cards used in billions of mobile phones around    the world to secure the communications of telecom customers of    AT&T, T-Mobile, Verizon, Sprint and more than 400 other    wireless carriers in 85 countries. Stealing the crypto keys    essentially allows the spy agencies to wiretap and decipher    encrypted phone communications at will without the assistance    of telecom carriers or the oversight of a court or government.    The keys also allow the agencies to decrypt previously    intercepted messages they hadnt been able to crack.  <\/p>\n<p>    But in stealing the keys with the    aim of targeting the communications of specific customers, the    spy agencies undermine the security of billions of other    customers.  <\/p>\n<p>    Our governments  should never be    weighing the equities in an intelligence gathering operation    such that a temporary benefit to surveillance regarding a few    key targets is seen as more desireable than protecting the    communications of a global system Snowden wrote.  <\/p>\n<p>    As The Intercept reported    last week, the spy agencies     targeted employees of the Dutch firm, reading their    siphoned emails and scouring their Facebook posts to obtain    information that would help the agencies hack the employees.    Once on employee systems, the spy agencies planted backdoors    and other tools to give them a persistent foothold on the    companys network. We believe we have their entire network,    the author of a PowerPoint slide, leaked by Snowden to    journalist Glenn Greenwald, boasted about the hack.  <\/p>\n<p>    Snowden commented on the story    after being asked what he thought about     recent revelations from Kaspersky Lab that it had    uncovered a spy module, believed to belong to the NSA,    designed for hacking the firmware of hard drives. Snowden said    the firmware hacking was significant but even more    significant was the theft of the crypto keys.  <\/p>\n<p>    [A]lthough firmware exploitation    is nasty, Snowden responded, its at least theoretically    reparable:     tools could plausibly be created to detect the bad firmware    hashes and re-flash good ones. This isnt the same for SIMs,    which are flashed at the factory and never touched    again.  <\/p>\n<p>    Julian Sanchez of the Cato    Institute shared Snowdens sentiments about the crypto    theft.  <\/p>\n<p>    We hear a great deal lately about    the value of information sharing in cybersecurity, he wrote in a    blog post about the hack of Gemalto. Well, heres a case    where NSA had information that the technology American citizens    and companies rely on to protect their communications was not    only vulnerable, but had in fact been compromised.[T]his is    one more demonstration that proposals to require    telecommunications providers and device manufacturers to build    law enforcement backdoors in their products are a terrible,    terrible idea. As security experts have rightly insisted all    along, requiring companies to keep a repository of keys to    unlock those backdoors makes the key repository itself a prime    target for the most sophisticated attackerslike NSA and    GCHQ.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the article here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/feeds.wired.com\/c\/35185\/f\/661370\/s\/43be3bfa\/sc\/46\/l\/0M0Swired0N0C20A150C0A20Csnowden0Espy0Eagencies0Escrewed0Eus0Ehacking0Ecrypto0Ekeys0C\/story01.htm\/RK=0\/RS=Ht8hRoZwddhqsyvO43POQxESQLU-\" title=\"Snowden: Spy Agencies Screwed All of Us in Hacking Crypto Keys\">Snowden: Spy Agencies Screwed All of Us in Hacking Crypto Keys<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> NSA whistleblower Edward Snowden didnt mince words during a Reddit Ask Me Anything session on Monday when he said the NSA and the British spy agency GCHQ had screwed all of us when it hacked into the Dutch firm Gemalto to steal cryptographic keys used in billions of mobile SIM cards worldwide. When the NSA and GCHQ compromised the security of potentially billions of phones (3g\/4g encryption relies on the shared secret resident on the sim), Snowden wrote in the AMA, they not only screwed the manufacturer, they screwed all of us, because the only way to address the security compromise is to recall and replace every SIM sold by Gemalto <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/snowden-spy-agencies-screwed-all-of-us-in-hacking-crypto-keys\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-58551","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/58551"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=58551"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/58551\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=58551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=58551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=58551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}