Archive for the ‘NSA’ Category

Exposed: NSA program for hacking any cellphone network, no matter where it is

The Intercept

The National Security Agency has spied on hundreds of companies and groups around the world, including in countries allied with the US government, as part of an effort designed to allow agents to hack into any cellphone network, no matter where it's located, according to a report published Thursday.

Armed with technical details of a specific provider's current or planned networks, agents secretly attempt to identify or introduce flaws that will make it possible for communications to be covertly tapped, according to anarticle published by The Intercept. Security experts warned that programs that introduce security flaws or suppress fixes for existing vulnerabilities could cause widespread harm, since the bugs can also be exploited by criminal hackers or governments of nations around the world.

"Even if you love the NSA and you say you have nothing to hide, you should be against a policy that introduces security vulnerabilities," Karsten Nohl, a cryptographer and smartphone security expert, told The Intercept. "Because once NSA introduces a weakness, a vulnerability, it's not only the NSA that can exploit it."

The program reported Thursday, codenamed AURORAGOLD, has monitored messages sent and received by more than 1,200 email accounts associated with large cellphone operators around the world. One surveillance target is the GSM Association (GSMA), a UK-based group that works with Microsoft, Facebook, AT&T, Cisco Systems, and many other companies to ensure their hardware and software related to cellular technology is compatible. At the same time the NSA has been monitoring the group, other arms of the US government has funded GSMA programs designed to boost privacy on mobile networks. According to The Intercept:

The NSA focuses on intercepting obscure but important technical documents circulated among the GSMAs members known as IR.21s.

Most cellphone network operators share IR.21 documents among each other as part of agreements that allow their customers to connect to foreign networks when they are roaming overseas on a vacation or a business trip. An IR.21, according to the NSA documents, contains information necessary for targeting and exploitation.

The details in the IR.21s serve as a warning mechanism that flag new technology used by network operators, the NSAs documents state. This allows the agency to identify security vulnerabilities in the latest communication systems that can be exploited, and helps efforts to introduce new vulnerabilities where they do not yet exist.

The IR.21s also contain details about the encryption used by cellphone companies to protect the privacy of their customers communications as they are transmitted across networks. These details are highly sought after by the NSA, as they can aid its efforts to crack the encryption and eavesdrop on conversations.

Last year, The Washington Post reported that the NSA had already managed to break the most commonly used cellphone encryption algorithm in the world, known as A5/1. But the information collected under AURORAGOLD allows the agency to focus on circumventing newer and stronger versions of A5 cellphone encryption, such as A5/3.

Visit link:
Exposed: NSA program for hacking any cellphone network, no matter where it is

Judge: Give NSA unlimited access to digital data

The U.S. National Security Agency should have an unlimited ability to collect digital information in the name of protecting the country against terrorism and other threats, an influential federal judge said during a debate on privacy.

I think privacy is actually overvalued, Judge Richard Posner, of the U.S. Court of Appeals for the Seventh Circuit, said during a conference about privacy and cybercrime in Washington, D.C., Thursday.

Much of what passes for the name of privacy is really just trying to conceal the disreputable parts of your conduct, Posner added. Privacy is mainly about trying to improve your social and business opportunities by concealing the sorts of bad activities that would cause other people not to want to deal with you.

Congress should limit the NSAs use of the data it collectsfor example, not giving information about minor crimes to law enforcement agenciesbut it shouldnt limit what information the NSA sweeps up and searches, Posner said. If the NSA wants to vacuum all the trillions of bits of information that are crawling through the electronic worldwide networks, I think thats fine, he said.

In the name of national security, U.S. lawmakers should give the NSA carte blanche, Posner added. Privacy interests should really have very little weight when youre talking about national security, he said. The world is in an extremely turbulent statevery dangerous.

Posner criticized mobile OS companies for enabling end-to-end encryption in their newest software. Im shocked at the thought that a company would be permitted to manufacture an electronic product that the government would not be able to search, he said.

Other speakers at Thursdays event, including Judge Margaret McKeown of the U.S. Court of Appeals for the Ninth Circuit, disagreed with Posner, saying legal limits on government surveillance are necessary. With much of U.S. privacy law based on a reasonable expectation of privacy, its difficult, however, to define what that means when people are voluntarily sharing all kinds of personal information online, she said.

An expectation of privacy is a foundational part of democracies, said Michael Dreeben, deputy solicitor general in the U.S. Department of Justice. Although Dreeben has argued in favor of law enforcement surveillance techniques in a handful of cases before the U.S. Supreme Court, he argued courts should take an active role in protecting personal privacy.

A certain degree of privacy is perhaps a precondition for freedom, political freedom, artistic freedom, personal autonomy, he said. Its kind of baked into the nature of the democratic system.

David Cole, a professor at the Georgetown University Law Center, called for a change in the U.S. law that gives email stored for six months less legal protection than newer messages. The ability of law enforcement agencies to gain access to stored email without a warrant makes no sense when many email users never delete messages.

Visit link:
Judge: Give NSA unlimited access to digital data

5 Intriguing Facts about the NSA – Video


5 Intriguing Facts about the NSA
http://www.plygo.blogspot.com What don #39;t you know about the government agency that spies on you? Subscribe to Dark5 for the greatest mysteries of this world and beyond What don #39;t you...

By: Temple Hachi

The rest is here:
5 Intriguing Facts about the NSA - Video

NSA Shri Ajit doval sir on Kashmiri Pandits – Video


NSA Shri Ajit doval sir on Kashmiri Pandits
NSA Shri Ajit Doval sir views on Kashmiri Pandits. He expressed his views on attitude of previous govt and Media towards Kashmiri Pandits during a semniar on...

By: Ajit Doval

Link:
NSA Shri Ajit doval sir on Kashmiri Pandits - Video

NSA Spying – Video


NSA Spying
How the NSA spies on American citizens.

By: The Ron Picard Show Defending The Constitution

The rest is here:
NSA Spying - Video