Skip to main content

US and UK Intelligence Agencies: No bounds to the extent of spying

Hacking, illegal access to cloud-based documents and spying, in one form or other, has become ubiquitous.    Now, with more documents released by Edward Snowden, we find that the US and UK spy agencies have infiltrated SIM manufacturers stealing encryption keys.   The ever excellent The // Intercept reports in "The Great Sim Heist - How Spies stole the Keys to the Encryption Castle".

"American AND British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden.

The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the world’s cellular communications, including both voice and data.

The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania.

In all, Gemalto produces some 2 billion SIM cards a year. Its motto is “Security to be Free.”

With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless provider’s network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt."




Comments

Popular posts from this blog

Robert Fisk's predictions for the Middle East in 2013

There is no gain-saying that Robert Fisk, fiercely independent and feisty to boot, is the veteran journalist and author covering the Middle East. Who doesn't he know or hasn't he met over the years in reporting from Beirut - where he lives?  In his latest op-ed piece for The Independent he lays out his predictions for the Middle East for 2013. Read the piece in full, here - well worthwhile - but an extract... "Never make predictions in the Middle East. My crystal ball broke long ago. But predicting the region has an honourable pedigree. “An Arab movement, newly-risen, is looming in the distance,” a French traveller to the Gulf and Baghdad wrote in 1883, “and a race hitherto downtrodden will presently claim its due place in the destinies of Islam.” A year earlier, a British diplomat in Jeddah confided that “it is within my knowledge... that the idea of freedom does at present agitate some minds even in Mecca...” So let’s say this for 2013: the “Arab Awakening” (the t...

#1 Prize for a bizarre story.....and lying!

No comment called for in this piece from CommonDreams: Another young black man: The strange sad case of 21-year-old Chavis Carter. Police in Jonesboro, Arkansas  stopped  him and two friends, found some marijuana, searched put Carter, then put him handcuffed  behind his back  into their patrol car, where they say he  shot himself  in the head with a gun they failed to find. The FBI is investigating. Police Chief Michael Yates, who stands behind his officers' story,  says in an interview  that the death is "definitely bizarre and defies logic at first glance." You think?

Intelligence agencies just can't help themselves

It is insidious and becoming increasingly widespread. Intelligence agencies in countries around the world, in effect, snooping on private exchanges between people not accussed of anything - other than simply using the internet or their mobile phone. The Age newspaper, in Australia, reports on how that country's intelligence operatives now want to widen their powers. It's all a slippery and dangerous slope! The telephone and internet data of every Australian would be retained for up to two years and intelligence agencies would be given increased access to social media sites such as Facebook and Twitter under new proposals from Australia's intelligence community. Revealed in a discussion paper released by the Attorney-General's Department, the more than 40 proposals form a massive ambit claim from the intelligence agencies. If passed, they would be the most significant expansion of the Australian intelligence community's powers since the Howard-era reform...