Tuesday, February 24, 2015

NSA, GCHQ colluded to steal SIM encryption keys for millions of phones


GCHQ
Edward Snowden’s data trove continues bearing fruit — and the implications of the latest release are dark for anyone who cares even slightly about mobile privacy. According to the once-secret documents, the NSA and its British counterpart, the GCHQ, engaged in a massive operation against one of the world’s largest mobile SIM card manufacturers, Gemalto. To understand the significance of this release it helps to know a bit about how SIMs are used. When you use 3G or 4G connections, the connection between your device and your cell phone carrier is encrypted. That encryption isn’t perfect, but cracking it is still time-consuming, particularly if the goal is to monitor millions of people simultaneously.
Each SIM card has its own unique encryption sequence, known as a “Ki.” Carriers are provided with a copy of each Ki on their networks, which enables them to track and authenticate each device. Cracking the communication between your phone and the network is difficult. If you already have the Ki, however, it’s simple. As The Intercept notes, the SIM card manufacturing and distribution pipeline was never designed to withstand government surveillance attacks.
CNE1
The scale of the attack against Gemalto has to be read to be believed. The US and British intelligence agencies went after individual employees directly, monitored Facebook accounts, and carefully selected targets for hacking — not because they’d allegedly done anything wrong, but because they were likely to possess information that would facilitate blatantly illegal activity. At the same time, the GCHQ successfully infiltrated Gemalto’s corporate network, stealing additional information and Ki data.
The result? Millions of SIM card keys intended for various countries across the world were leaked to the NSA and GCHQ. Dozens, perhaps hundreds of individuals had their email and social media accounts cracked for the purpose of facilitating further espionage.
The intelligence agencies themselves are firmly insisting that these activities are moral, legal, and valid, but it’s unlikely that targeted countries will agree. Again, the companies and individuals targeted in this manner were not accused, charged, or even suspected of having committed a crime. The sole reason given for such egregious violations is “Well, you had information that we wanted.”
key-slide1
There have always been legal distinctions made between state-sanctioned and unlawful behavior, but the gap between draconian punishments for relatively minor hacking crimes and the dizzying display of government behavior is widening rapidly. As Sophie in’t Veld, a Dutch member of the European Parliament observed, “If you are not a government and you are a student doing this, you will end up in jail for 30 years.”
Gemalto’s security keys and products are used in hundreds of millions of devices, from passports to cell phones. It has huge customers in every first world nation — and according to company executives, was utterly unaware that it had been so thoroughly penetrated by foreign intelligence services. The company is investigating, but securing any international supply chain or network will take time given the scope and nature of the alleged theft. This isn’t the first GCHQ – NSA collaboration, either. The two agencies worked together togather webcam data on Yahoo users, and the NSA tapped data cables between the US and the United Kingdom in order to tap Google’s internal, encryption-free links.

No comments:

Post a Comment

Facebook Friends

Labels

Microsoft Nvidia Security Amd Google Android Apple Samsung Windows 10 Autos Science Smartphones Apps Automobiles Cars Encryption Gpu Intel Ios Iphone Nasa Pc Ps4 Software VW Volkswagen Xbox One 3d Printing Gaming Gtx 980 Hardware Internet Maxwell Mobile Operating Systems PC Gaming Privacy Ps3 Tesla Wearables Windows diesel diesel engines pollution space 3d Printers 4g 8K Apple Car Astrophysics BMW Comcast Cpu Developers Directx 12 Displays Google Fiber Graphics Gtx 970 Holograms How-To ICar Lte Malware Medicine Memory Nanoparticles OLED Oculus Rift PCS Piracy Project Morpheus Quantum Entanglement Robotics Smart Tv Spectrum Tablets Torrents Uhd Valve Virtual Reality Wearable Computing Windows 9 Wireless Communications Xbox 360 clean diesels diesels emissions government ipad lcd lg 1080p 2160p 21:9 34UC87C 3D 3d Photography 4K 4KTv A123 Systems ABP ARM AT&T ATS Acura RDX Ads Aero Air Gap Airmont Alienware Amazon American truck simulator App Apple Pay Apple Watch Apu Astronomy Asus Atmosphere Atom Audi Augmented Reality Auto Show Top Cars Auto Shows Avg Bandwidth Batteries Battery Life Bing Bittorrent Blizzard BlueStacks Bonan Brain Brains Branson Braswell Broadwell Business CALL OF DUTY: BLACK OPS 3 CNNIC Cameras Cancer Car Shows Carrington Event Certificate Authority Charging Chevrolet Equinox Chicago Auto Show Chips Chromebook Pixel Chromebook Pixel 2 Chromebooks Climate Change Console DX11 David Irvine Dci Deals Dell Diablo 3 Directx Dota 2 Downloads Dream Dx12 EPA EVs Eighth Generation Electric Vehicles Electromagnetic Electrons Enterprise Enthusiast Et European Union Exoplanets Female Festival Fiber Firefox 41 Fisker Karma Fitness Tracker Ford Explorer Ford Police Interceptor Formula E Fukushima Fukushima Daiichi Future GRIP Digital GTX Game Streaming Gamers Gchq Google Wireless Gorillapod Grid HDTV Health Heat Holographic Displays Holographic Storage Holographic Universe Holography Hololens Honda Pilot Htc Http Huang IETF ISPs Icera Illumiroom Imagination Technologies Imaging Inkjet Printers Internet Of Things IoT Iphone 6 Iphone 6 Plus Itanic Itanium Keller Kinect Kinectic Energy Kittson LED Laptops Lasers Latency Lenovo Lidar Light Liquid Metal Lithium-Ion Low Latency API MCS Holdings MCV MRI Machine Learning Magnetic Field Man In The Middle Mantle Masturbate Medical Medical Imaging Mercedes Microsoft Access Microsoft Excel Microsoft Office 2016 Microsoft Office 365 Microsoft One Microsoft PowerPoint Microsoft Research Microsoft Word Miscrosoft Mobile Computing Model S Modems Modems 0 Comments Mozilla Muon Tomography Mvno NOx NSA Navigation Net Neutrality Networking Neural Networks Neurology Nexus 6 Noaa Nokia Note Nova Nuclear Nuclear Power Nvidia Shield Office 365 Online Ouya Overclocking Paid Paintings Palmer Particles Performance Photography Physics Pirate Bay Plaintext Plasma PornHub Pornhub Wankband Porsche Poulson Power VR Project Tango ProtocolI Qualcomm Quantum Computing Quantum Mechanics Quantum Physics R9 290X RAM RPV Radeon Richard Branson Russia SCS SEC SLS SOEDESCO SSL/TLS Same-Day Delivery Samsung Galaxy Note SanDisk Scanning Sdk Search Seattle Senate Launch System Servers Setup Sharp Shield Silvermont Siri Slideshow Smartphone Smartwatches Snowden Society Soft Robotics Software As A Service Solar Sony Sound Sound Waves Spacetime Spectroscopy. ESO Spying Stars Steam Stellar Dynamics Observatory SDO SunLock Superfish Swarm TDI THQ TPB TSA TSA locks Tegra Terrible Posture Games Titan Titan Black Titan Z Torrentfreak Tower of Guns Toyota Avalon Toyota Camry Toyota Corolla Travel Sentry Uhdtv Ultra VR Verizon Versioning Very Large Telescope Video Games Virgin Virgin Atlantic Virtualbox Virtualization Viruses Voice Wankband Wide Wifi Windows 10 Technical Preview Windows 8 Windows Nt 6.4 Windows Phone WindowsI Wireless Spectrum World Of Warcraft Xbox Xbox Live Xeon Yahoo Yandex Zen ai apollo artificial intelligence artist backdoor biology bitcoin blender block broadband broadcast car sales chain chrome clean diesel corporate fraude court cpus diesel emissions dreamcast edgeadblock plus electric cars etherium ets ets2 euro truck simultor euro truck simultor 2 exploration fifth amendment fingerprint firefox freedom game development game theory games genetic engineering geometry gtx 980m heed Martin high speed cameras iMo iMove ibm internet explorer k12 konami language learning licenses mars math metal gear solid metal gear solid 5 microSD microsoft office missions mobile gaming model e model x moon nano-optics nanotechnology netflix orion os pHTTP/2 pachinko passcode programming robots rock paper scissors scandinavian security theater sega self-incrimination smart contracts space launch system telecommunications terahertz trucks tv waveguides x86