{"id":60471,"date":"2015-03-10T03:50:32","date_gmt":"2015-03-10T07:50:32","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/gemalto-spy-agencies-probably-hacked-us-but-encryption-keys-secure\/"},"modified":"2015-03-10T03:50:32","modified_gmt":"2015-03-10T07:50:32","slug":"gemalto-spy-agencies-probably-hacked-us-but-encryption-keys-secure","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/gemalto-spy-agencies-probably-hacked-us-but-encryption-keys-secure\/","title":{"rendered":"Gemalto: Spy Agencies &#39;Probably&#39; Hacked Us, But Encryption Keys Secure"},"content":{"rendered":"<p><p>  The NSA and GCHQ probably hacked SIM card maker Gemalto, but  didn't nab any encryption keys, the firm said.<\/p>\n<p>    SIM card maker Gemalto today said it believes the NSA and    GCHQ did indeed breach its systems, but the firm found that the    agencies were unable to swipe any encryption keys.  <\/p>\n<p>    The news comes after a recent    report, based on documents leaked by Edward Snowden, said    that the NSA and its U.K. counterpart hacked Gemalto in order    to steal encryption keys and spy on wireless    communications.  <\/p>\n<p>    A multinational chipmaker based in The Netherlands,    Gemalto supplies SIM cards used by all four of the top U.S.    carriers and 450 wireless network providers around the world.    Access by intelligence agencies, therefore, would allow the    monitoring of mobile communications without approval, warrant,    or wiretap.  <\/p>\n<p>    Gemalto's subsequent investigation found that the agencies'    \"intrusions only affected the outer parts of our networksour    office networks,\" Gemalto said. SIM encryption keys and    customer data is stored on other networks.  <\/p>\n<p>    The Dutch tech giant said its networks are frequently    under attack, but that very few efforts actually succeed. Two    sophisticated attacks in 2010 and 2011, however, caught    Gemalto's eye and \"could be related\" to the reported NSA and    GCHQ breaches.  <\/p>\n<p>    One of those attacks focused on suspicious activity on    one of its French sites, while another involved fake emails    sent to mobile operator customers. At the same time, Gemalto    detected numerous attempts to access the employees' PCs.  <\/p>\n<p>    Though unable to identify the intruders at the time, the    company now believes the NSA and GCHQ were behind the breaches.    \"An operation by NSA and GCHQ probably happened,\" it    said.  <\/p>\n<p>    \"It is important to understand that our network    architecture is designed like a cross between an onion and an    orange,\" the report said. \"It has multiple layers and segments    which help to cluster and isolate data.\"  <\/p>\n<p>    The breach was allegedly detailed in a \"secret\" 2010 GCHQ    document, but was only just made public via the Snowden data    dump.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2477363,00.asp?kc=PCRSS03069TX1K0001121\/RK=0\/RS=OtKkTOoysLY2UQvdhB9KoeonmeM-\" title=\"Gemalto: Spy Agencies &#39;Probably&#39; Hacked Us, But Encryption Keys Secure\">Gemalto: Spy Agencies &#39;Probably&#39; Hacked Us, But Encryption Keys Secure<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The NSA and GCHQ probably hacked SIM card maker Gemalto, but didn't nab any encryption keys, the firm said. SIM card maker Gemalto today said it believes the NSA and GCHQ did indeed breach its systems, but the firm found that the agencies were unable to swipe any encryption keys. The news comes after a recent report, based on documents leaked by Edward Snowden, said that the NSA and its U.K.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/gemalto-spy-agencies-probably-hacked-us-but-encryption-keys-secure\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-60471","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/60471"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=60471"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/60471\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=60471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=60471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=60471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}