[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

In Case you miss Bad Journalism

Bobby K Jr was Exiled For Saying This:

Quantum Meets AI: Morgan Stanley Maps Out Next Tech Frontier

670,000+ Swept Away as Dams Burst in Canton China, Triggering Deadly Flood!

Senate Version Of Trump Tax Bill Adds $3.3 Trillion To Deficit, $500BN More Than The House; Debt Ceiling Raised By $5 Trillion

Iran Disables GPS, Joins China’s Beidou — The End of U.S. Satellite Dominance?

Ukraine's Withdrawal From Anti-Personnel Landmine Treaty Could Haunt Generations

71 killed in Israeli attack on Iran's Evin Prison

Practice Small, Daily Acts Of Sabotage Against The Imperial Machine

"EVERYONE'S BEEN SHOT UP HERE": Arsonists Set Wildfire In Northern Idaho, Open Fire On Firefighters, Police In Ambush

Trump has Putin trapped, and the Kremlin knows it

Kamala's comeback bid sparks Democrat donor meltdown amid fears she'll sink party in California

Russia's New Grom-A1 100 KM Range Guided Bomb- 600 Kilo

UKRAINIAN CONSULATE IN ITALY CAUGHT TRAFFICKING WEAPONS, ORGANS & CHILDREN WITH THE MAFIA

Andrew Cuomo to stay on ballot for NYC mayor in November general election

The life of the half-immortal who advised CCP (End of CCP in 2026?)

Millions Flee China’s Top Cities

Violence begets violence: IDF troops beaten, choked, rammed by Jewish settlers in West Bank

Netanyahu Says It's Antisemitic For Israeli Soldiers To Describe Their Own Atrocities

China's Economy Spirals With No End In Sight, Says Kyle Bass

American Bread Cannot Be Sold in Most Countries

Woman Spent Her Life To Prove 796 Babies were buried under Catholic Home

Japan Got Rich Without Getting Fat

US Spent $495.3 million to fire 39 THAAD Missiles

Private Mail Back Online

Senior Israeli officials tell Israeli media that they intend to attack Iran after ceasefire.

Palestinian Woman Nails Israeli

Tucker Carlson: Marjorie Taylor Greene:

Diverse Coney Island in New York looks unrecognizable after third world invasion

Corbett Report: Palantir at the Heart of Iran


Science/Tech
See other Science/Tech Articles

Title: Don’t trust your phone, don’t trust your laptop – this is the reality that Snowden has shown us
Source: [None]
URL Source: http://www.theguardian.com/commenti ... n-trust-phone-laptop-sim-cards
Published: Mar 10, 2015
Author: John Naughton
Post Date: 2015-03-10 07:36:14 by Ada
Keywords: None
Views: 25

Edward Snowden’s astute revelations show that no electronic communications device – from hard disks to sim cards – is trustworthy

Back in July 2013, a few weeks after Edward Snowden’s revelations about internet and mobile-phone surveillance began, I wrote a column that began: “Repeat after me: Edward Snowden is not the story. The story is what he has revealed about the hidden wiring of our networked world.”

Edward Snowden's not the story. The fate of the internet is John Naughton Read more The spur for the column was my realisation of the extent and astuteness of Snowden’s choice of what to collect and reveal. His was not some opportunistic smash-and-grab data heist, but a considered, informed selection of cases where he thought that the National Security Agency was violating the US constitution and/or circumventing its laws. Snowden was clearly no stereotypical left-wing dissident; he seemed closer to what US constitutional lawyers called an “originalist” – someone who regards the constitution as a sacred, inviolable document that citizens – and their governments – must continue to respect and adhere to. If Snowden were in the US today, I suspect he would be a supporter of Rand Paul.

What Snowden did was careful and considered: he identified examples of what he regarded were unconstitutional activities on the part of the NSA and then downloaded documentary evidence of these activities that would corroborate his judgment. Given the staggering scale of the activities revealed, I remember thinking that it would take us a long time to realise the full extent of the surveillance mesh in which we are entangled. So it has proved.

Edward Snowden on a livestream from Moscow. Facebook Twitter Pinterest Edward Snowden on a livestream from Moscow in 2014. Photograph: Pontus Lundahl/AP But a few recent revelations suggest that we may now be getting down to bedrock. Two concern the consummate hacking capabilities of the NSA and its overseas franchises. The first – which came not from Snowden but from Kaspersky, a computer security firm – showed that for at least 14 years a unit in the NSA had succeeded in infecting the firmware that controls hard disk drives with malicious software that is able to persist even through reformatting of the disks.

Firmware is computer code embedded in a read-only silicon chip. It’s what transforms a disk from a paperweight into a storage device. The hack is significant: the Kaspersky researchers who uncovered this said its ability to subvert hard-drive firmware “surpasses anything else” they had ever seen. Being able to compromise firmware gives an attacker total control of the system in a way that is stealthy and lasting, even through software updates. Which means that the unsuspecting victim can never get rid of it. If you think this has nothing to do with you, the compromised drives were manufactured by most of the leading companies in the disk-drive business, including Western Digital, Seagate, Toshiba, IBM, Micron and Samsung. Check your laptop specifications to see which one of these companies made the drive.

The second revelation, last month, came from a GCHQ presentation provided by Snowden and reported in online publication the Intercept. Documents showed that a joint NSA/GCHQ team had hacked into the internal computer network of Gemalto, the world’s largest manufacturer of sim cards, stealing, in the process, encryption keys used to protect the privacy of mobile communications internationally.

Sim card database hack gave US and UK spies access to billions of cellphones Read more Gemalto makes the chips used in mobile phones and credit cards and numbers among its customers AT&T, T-Mobile, Verizon, Sprint and 450 other mobile network providers. It currently produces 2bn sim cards a year.

If the attempted breach were successful, it would give security agencies the potential to monitor covertly the mobile phone communications of a large portion of the world’s population. Gemalto has conducted an investigation which concludes that there are “reasonable grounds to believe that an operation by NSA and GCHQ probably happened”, but that the attack “only breached... office networks and could not have resulted in a massive theft of sim encryption keys”. And even if the intruders had stolen encryption keys, the company claims that “the intelligence services would only be able to spy on communications on second generation 2G mobile networks. 3G and 4G networks are not vulnerable to this type of attack.”

Oh yeah? The implication of these latest revelations is stark: the capabilities and ambitions of the intelligence services mean that no electronic communications device can now be regarded as trustworthy. It’s not only your mobile phone that might betray you: your hard disk could harbour a snake in the grass, too.

No wonder Andy Grove, the former boss of Intel, used to say that “only the paranoid survive” in the technology business. Given that we have become totally dependent on his industry’s products, that knowledge may not provide much consolation. But we now know where we stand. And we have Edward Snowden to thank for that.

Post Comment   Private Reply   Ignore Thread  



[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]