[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

City of Fort Wayne proposing changes to food, alcohol requirements for Riverfront Liquor Licenses

Cash Jordan: Migrant MOB BLOCKS Whitehouse… Demands ‘11 Million Illegals’ Stay

Not much going on that I can find today

In Britain, they are secretly preparing for mass deaths

These Are The Best And Worst Countries For Work (US Last Place)-Life Balance

These Are The World's Most Powerful Cars

Doctor: Trump has 6 to 8 Months TO LIVE?!

Whatever Happened to Robert E. Lee's 7 Children

Is the Wailing Wall Actually a Roman Fort?

Israelis Persecute Americans

Israelis SHOCKED The World Hates Them

Ghost Dancers and Democracy: Tucker Carlson

Amalek (Enemies of Israel) 100,000 Views on Bitchute

ICE agents pull screaming illegal immigrant influencer from car after resisting arrest

Aaron Lewis on Being Blacklisted & Why Record Labels Promote Terrible Music

Connecticut Democratic Party Holds Presser To Cry About Libs of TikTok

Trump wants concealed carry in DC.

Chinese 108m Steel Bridge Collapses in 3s, 16 Workers Fall 130m into Yellow River

COVID-19 mRNA-Induced TURBO CANCERS.

Think Tank Urges Dems To Drop These 45 Terms That Turn Off Normies

Man attempts to carjack a New Yorker

Test post re: IRS

How Managers Are Using AI To Hire And Fire People

Israel's Biggest US Donor Now Owns CBS

14 Million Illegals Entered US in 2023: The Cost to Our Nation

American Taxpayers to Cover $3.5 Billion Pentagon Bill for U.S. Munitions Used Defending Israel

The Great Jonny Quest Documentary

This story About IRS Abuse Did Not Post

CDC Data Exposes Surge in Deaths Among Children of Covid-Vaxxed Mothers

This Interview in Munich in 1992 with Gudrun Himmler. (Heinrich Himmler's daughter)


Science/Tech
See other Science/Tech Articles

Title: Don’t trust your phone, don’t trust your laptop – this is the reality that Snowden has shown us
Source: [None]
URL Source: http://www.theguardian.com/commenti ... n-trust-phone-laptop-sim-cards
Published: Mar 10, 2015
Author: John Naughton
Post Date: 2015-03-10 07:36:14 by Ada
Keywords: None
Views: 28

Edward Snowden’s astute revelations show that no electronic communications device – from hard disks to sim cards – is trustworthy

Back in July 2013, a few weeks after Edward Snowden’s revelations about internet and mobile-phone surveillance began, I wrote a column that began: “Repeat after me: Edward Snowden is not the story. The story is what he has revealed about the hidden wiring of our networked world.”

Edward Snowden's not the story. The fate of the internet is John Naughton Read more The spur for the column was my realisation of the extent and astuteness of Snowden’s choice of what to collect and reveal. His was not some opportunistic smash-and-grab data heist, but a considered, informed selection of cases where he thought that the National Security Agency was violating the US constitution and/or circumventing its laws. Snowden was clearly no stereotypical left-wing dissident; he seemed closer to what US constitutional lawyers called an “originalist” – someone who regards the constitution as a sacred, inviolable document that citizens – and their governments – must continue to respect and adhere to. If Snowden were in the US today, I suspect he would be a supporter of Rand Paul.

What Snowden did was careful and considered: he identified examples of what he regarded were unconstitutional activities on the part of the NSA and then downloaded documentary evidence of these activities that would corroborate his judgment. Given the staggering scale of the activities revealed, I remember thinking that it would take us a long time to realise the full extent of the surveillance mesh in which we are entangled. So it has proved.

Edward Snowden on a livestream from Moscow. Facebook Twitter Pinterest Edward Snowden on a livestream from Moscow in 2014. Photograph: Pontus Lundahl/AP But a few recent revelations suggest that we may now be getting down to bedrock. Two concern the consummate hacking capabilities of the NSA and its overseas franchises. The first – which came not from Snowden but from Kaspersky, a computer security firm – showed that for at least 14 years a unit in the NSA had succeeded in infecting the firmware that controls hard disk drives with malicious software that is able to persist even through reformatting of the disks.

Firmware is computer code embedded in a read-only silicon chip. It’s what transforms a disk from a paperweight into a storage device. The hack is significant: the Kaspersky researchers who uncovered this said its ability to subvert hard-drive firmware “surpasses anything else” they had ever seen. Being able to compromise firmware gives an attacker total control of the system in a way that is stealthy and lasting, even through software updates. Which means that the unsuspecting victim can never get rid of it. If you think this has nothing to do with you, the compromised drives were manufactured by most of the leading companies in the disk-drive business, including Western Digital, Seagate, Toshiba, IBM, Micron and Samsung. Check your laptop specifications to see which one of these companies made the drive.

The second revelation, last month, came from a GCHQ presentation provided by Snowden and reported in online publication the Intercept. Documents showed that a joint NSA/GCHQ team had hacked into the internal computer network of Gemalto, the world’s largest manufacturer of sim cards, stealing, in the process, encryption keys used to protect the privacy of mobile communications internationally.

Sim card database hack gave US and UK spies access to billions of cellphones Read more Gemalto makes the chips used in mobile phones and credit cards and numbers among its customers AT&T, T-Mobile, Verizon, Sprint and 450 other mobile network providers. It currently produces 2bn sim cards a year.

If the attempted breach were successful, it would give security agencies the potential to monitor covertly the mobile phone communications of a large portion of the world’s population. Gemalto has conducted an investigation which concludes that there are “reasonable grounds to believe that an operation by NSA and GCHQ probably happened”, but that the attack “only breached... office networks and could not have resulted in a massive theft of sim encryption keys”. And even if the intruders had stolen encryption keys, the company claims that “the intelligence services would only be able to spy on communications on second generation 2G mobile networks. 3G and 4G networks are not vulnerable to this type of attack.”

Oh yeah? The implication of these latest revelations is stark: the capabilities and ambitions of the intelligence services mean that no electronic communications device can now be regarded as trustworthy. It’s not only your mobile phone that might betray you: your hard disk could harbour a snake in the grass, too.

No wonder Andy Grove, the former boss of Intel, used to say that “only the paranoid survive” in the technology business. Given that we have become totally dependent on his industry’s products, that knowledge may not provide much consolation. But we now know where we stand. And we have Edward Snowden to thank for that.

Post Comment   Private Reply   Ignore Thread  



[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]