Archive for the ‘NSA’ Category

NSA has VPNs in Vulcan death gripno, really, thats what they call it

This is what NSA's VPN Exploit Team does when it decrypts a VPN.

The National Security Agencys Office of Target Pursuit (OTP) maintains a team of engineers dedicated to cracking the encrypted traffic of virtual private networks (VPNs) and has developed tools that could potentially uncloak the traffic in the majority of VPNs used to secure traffic passing over the Internet today, according to documents published this week by the German news magazine Der Speigel. A slide deck from a presentation by a member of OTPs VPN Exploitation Team, dated September 13, 2010, details the process the NSA used at that time to attack VPNsincluding tools with names drawn from Star Trek and other bits of popular culture.

OTPs VPN exploit team had members assigned to branches focused on specific regional teams, as well as a Cross-Target Support Branch and a custom development team for building specialized VPN exploits. At the regional level, the VPN team representatives acted as liaisons to analysts, providing information on new VPN attacks and gathering requirements for specific targets to be used in developing new ones.

While some VPN technologiesspecifically, those based on the Point-to-Point Protocol (PPTP)have previously been identified as being vulnerable because of the way they exchange keys at the beginning of a VPN session, others have generally been assumed to be safer from scrutiny. But in 2010, the NSA had already developed tools to attack the most commonly used VPN encryption schemes: Secure Shell (SSH), Internet Protocol Security (IPSec), and Secure Socket Layer (SSL) encryption.

The NSA has a specific repository for capturing VPN metadata called TOYGRIPPE. The repository stores information on VPN sessions between systems of interest, including their fingerprints for specific machines and which VPN services theyve connected to, their key exchanges, and other connection data. VPN fingerprints can also be extracted from XKEYSCORE, the NSAs distributed big data store of all recently captured Internet traffic, to be used in identifying targets and developing an attack. Because XKEYSCORE includes data from untasked sourcespeople and systems not designated as under surveillancethe OTP VPN Exploitation Teams presentation requested, Try to avoid relying on (XKEYSCORE) workflows due to legal and logistical issues. But XKEYSCORE, it was noted, is best for attacks on SSH traffic.

Analysis of TOYGRIPPE and XKEYSCORE data, as well as from daily VPN exploits, is fed into BLEAKINQUIRYa metadata database of potentially exploitable VPNs. This database can be searched by NSA analysts for addresses matching targeted individuals or systems and to generate requests for the VPN Exploit crew to convert the "potentially" into an actuality.

When an IPSec VPN is identified and tasked by NSA analysts, according to the presentation, a full take of its traffic is stored in VULCANDEATHGRIP, a VPN data repository. There are similar, separate repositories for PPTP and SSL VPN traffic dubbed FOURSCORE and VULCANMINDMELD, respectively.

The data is then replayed from the repositories through a set of attack scripts, which use sets of preshared keys (PSKs) harvested from sources such as exploited routers and stored in a key database called CORALREEF. Other attack methods are used to attempt to recover the PSK for each VPN session. If the traffic is of interest, successfully cracked VPNs are then processed by a system called TURTLEPOWER and sorted into the NSAs XKEYSCORE full-traffic database, and extracted content is pushed to the PINWALE digital network intelligence content database.

But for those that arent successfully cracked, the VPN Exploit Teams presentation noted, the team works to turn that frown upside down by doing more data collectiontrying to capture IPSec Internet Key Exchange (IKE) and Encapsulating Security Payload (ESP) traffic during VPN handshakes to help build better attacks. In cases where the keys just cant be recovered, the VPN Exploit Team will contact our friends for help gathering more information on the systems of interest from other data collection sites or doing an end-run by calling on Tailored Access Operations to create access points through exploits of one of the endpoints of the VPN connection.

More:
NSA has VPNs in Vulcan death gripno, really, thats what they call it

NSA Blackmailing Obama? | Interview with Whistleblower Russ Tice – Video


NSA Blackmailing Obama? | Interview with Whistleblower Russ Tice
whistleblower Confidential - Official Launch. Alex Jones interviews William Binney about the police state and what he sees coming down the pipe. Alex talks with NSA whistleblower William...

By: Global War3

Link:
NSA Blackmailing Obama? | Interview with Whistleblower Russ Tice - Video

The NSA chose Christmas to detail 12 years of accidental spying – Video


The NSA chose Christmas to detail 12 years of accidental spying
The NSA chose Christmas to detail 12 years of accidental spying.

By: Deherrera

Read more:
The NSA chose Christmas to detail 12 years of accidental spying - Video

Ho, ho, ho! NSA reports on its spying naughtiness – CNET – Video


Ho, ho, ho! NSA reports on its spying naughtiness - CNET
Ho, ho, ho! NSA reports on its spying naughtiness - CNET.

By: Sun Shine2

More:
Ho, ho, ho! NSA reports on its spying naughtiness - CNET - Video

NSA reveals how many times youve been spied on (sort of)

Nate Swanner

While you and I were enjoying time with our families and suffering through Grandmas stories, the NSA decided to let loose some of their family secrets. On Christmas Eve, long after wed all checked out mentally in anticipation of Christmas, the NSA gifted us with a file dump of all the times theyve illegally spied on us. If youre thinking oh, good, Ill command-F for my name, think again. The files are heavily redacted, and only discuss the instances of erroneous spying.

The files were in response to a lawsuit brought by the tenacious Americans Civil Liberties Union (ACLU) filed under the Freedom of Information Act. Some of whats in the files youve already heard of here and there, so not all of it is revelatory. In fact, you probably know most of what the NSA is unveiling (or not unveiling) today.

Heres how the NSA explains away their grabbing info on the everyman:

NSA goes to great lengths to ensure compliance with the Constitution, laws and regulations. As conveyed in the released materials, an array of technical and human-based checks attempt to identify and correct errors, some amount of which occur naturally in any large, complex system. Nevertheless, as the IOB reports make clear, NSA takes even unintentional errors seriously and institutes corrective action, typically involving at a minimum a combination of training and technical measures designed to prevent recurrences. Data incorrectly acquired is almost always deleted, referred to as the purge process.

With statements like that and redacted documents, its clear the NSA is intent on forging ahead as usual. If they grabbed your info unwittingly, you should just trust theyll purge it, right? I mean, theres an array of stopgaps to keep it from happening.

Indeed, their complex system is imperfect, too. Data being stored on servers not authorized to house it, searches bringing info back on citizens not on the watch list, and stalking of significant others so rampant it warranted its own moniker.

The redacted documents reach back to 2007, so at least we get a rough idea of how many times the NSA screwed up in grabbing info on us.

Source: NSA

The rest is here:
NSA reveals how many times youve been spied on (sort of)