He risked his neck. When Edward Snowden chose to expose the US    National Security Agency (NSA)s mass surveillance, Leviathan,    and that of its British counterpart, GCHQ, 10 years ago, he put    his life on the line. And he has always declared he has never    regretted it.  
    But years after his act of extraordinary courage, the Snowden    archive remains largely unpublished. He trusted in journalists    to decide what to publish. In an     article published in June 2023, by Guardian    Pulitzer Prize winner Ewen MacAskill  who flew to Hong Kong    with Glenn Greenwald and Laura Poitras to meet Edward Snowden     McAskill confirmed most of the archive has not been made    public. In the end, we published only about 1% of the    document, he wrote.  
    What does the remaining 99% of the Snowden archive contain? A    decade on, it remains shrouded in secrecy.  
    A     doctoral thesis by American investigative journalist and    post-doctoral researcher Jacob Appelbaum has now revealed    unpublished information from the Snowden archive. These    revelations go back a decade, but remain of indisputable public    interest:  
      These revelations have surfaced for the first time thanks to      a doctoral thesis authored by Appelbaum towards earning a      degree in applied cryptography from the Eindhoven University      of Technology in the Netherlands.    
      Communication in a world of pervasive      surveillanceis a public document and has been      downloaded over 18,000 times since March 2022 when it was      first published.    
      Appelbaums work, supervised by professors Tanja Lange and      Daniel J Bernstein, is among the top 10 most popular PhD      theses at the Eindhoven University.    
      When we asked whether the US authorities had contacted the      Eindhoven University of Technology to object to the      publication of some of the revelations from the Snowden      files, a university spokesperson replied that they had not.    
      In 2013, Jacob Appelbaum published a remarkable scoop for      Der Spiegel, revealing the NSA had spied on Angela      Merkels mobile phone. This scoop won him the highest      journalistic award in Germany, the Nannen Prize (later known      as the Stern Award).    
      Nevertheless, his work on the NSA revelations, and his      advocacy for Julian Assange and WikiLeaks, as well as other      high-profile whistleblowers, has put him in a precarious      condition. As a result of this, he has resettled in Berlin,      where he has spent the past decade.    
      In June 2020, when the United States issued a second      superseding indictment against Julian Assange, it was clear      Appelbaums concerns were not a matter of paranoia; the      indictment criminalises political speeches given by Assange      as well as by former WikiLeaks journalist Sarah Harrison and      by Jacob Appelbaum himself, identified under the codename,      WLA-3.    
      Public speeches made by Appelbaum taking a humorous and      provocative tone and with titles like Sysadmins of      the World, Unite! were interpreted as an attempt to      recruit sources and as incitement to steal classified      documents. To this day, however, there are no publicly known      charges against Appelbaum or Harrison.    
      We asked Jacob Appelbaum, currently a post-doctoral      researcher at the Eindhoven University of Technology, why he      chose to publish those revelations in a technically written      thesis rather than a mass-circulation newspaper.    
      He replied: As an academic, I see that the details included      are in the public interest, and highly relevant for the topic      covered in my thesis, as it covers the topic of large-scale      adversaries engaging in targeted and mass surveillance.    
      One of the most important unpublished revelations from the      Snowden archive regards American semiconductor supplier      Cavium. According to Appelbaum, the Snowden files list Cavium      as a successful SIGINT enabled CPUs vendor.    
      The NSAs successful cryptographic enabling is by definition      the introduction of intentional security vulnerabilities that      they are then able to exploit, and they do exploit them often      in an automated fashion to spy, he said. One such method is      sabotaging a secure random generator.    
      A random number generator that is unpredictable to everyone      is an essential requirement for meaningful cryptographic      security. In most cases, the NSA sabotage happens in a way      where the owners, developers, and users are unaware of the      sabotage as a core goal.    
      The purpose of this sabotage is to allow the NSA to breach      the security offered by a given company, device and/or other      services.    
      At no point does Appelbaum write or even suggest that Cavium      was complicit in these sabotage activities or was aware of      them.    
      The Snowden documents date back to 2013. In 2018, Cavium was      acquired by US company Marvell Technology, one of the two      firms which, according to financial services giant JP Morgan,      will dominate the custom-designed semiconductors market      driven by artificial intelligence.    
      We contacted Marvell to ask a series of questions, including      whether Caviums CPUs have basically remained the same in the      past decade, and whether its certain Cavium CPUs, which,      according to the 2013 Snowden files, were backdoored, are      no longer marketed and in use.    
      We also asked Marvell whether the company conducted any      internal investigations after we informed them about      Appelbaums revelation. One of the co-founders of Cavium,      Raghib Hussain, is currently one of the presidents of      Marvell.    
      Marvell has not provided answers to our specific questions.      Its vice-president for corporate marketing, Stacey Keegan,      said it did not implement backdoors for any government.    
      Marvell places the highest priority on the security of its      products, she said. Marvell does not implement backdoors      for any government. Marvell supports a wide variety of      protocols and standards including IPsec, SSL, TLS 1.x, DTLS      and ECC Suite B.    
      Marvell also supports a wide variety of standard algorithms      including several variants of AES, 3DES, SHA-2, SHA-3, RSA      2048, RSA 4096, RSA 8192, ECC p256/p384/p521, Kasumi, ZUC and      SNOW 3G.    
      All Marvell implementations are based on published security      algorithm standards, Keegan continued. Marvells market      leading NITROX family delivers unprecedented performance for      security in the enterprise and virtualised cloud datacentres.    
      The NITROX product line is the industry leading security      processor family designed into cloud datacentre servers and      networking equipment, enterprise and service provider      equipment including servers, Application Delivery      Controllers, UTM Gateways WAN Optimization Appliances,      routers, and switches.    
      Appelbaum said that as the new owner of Cavium, Marvell      should conduct a serious and transparent technical security      investigation into the matter and make the result available      to the public.    
      He said that he wrote to the company, including to their      security response email address, and set this forth in      extreme detail, but has never heard back from them.    
      The two other important and yet-unpublished revelations from      the Snowden files concern the compromise of foreign      government infrastructure by the NSA.    
      Appelbaum writes in his thesis that the Snowden archive      includes largely unpublished internal NSA documents and      presentations that discuss targeting and exploiting not only      deployed, live interception infrastructure.    
      The documents also discuss targeting and exploiting suppliers      of the hardware and software used to build the      infrastructure.    
      Primarily these documents remain unpublished because the      journalists who hold them fear they will be considered      disloyal or even that they will be legally punished, he      said.     
      Appelbaum added that targeting lawful interception equipment      is a known goal of the NSA.    
      Unpublished NSA documents specifically list their compromise      of the Russian SORM LI infrastructure as an NSA success story      of compromising civilian telecommunications infrastructure to      spy on targets within reach of the Russian SORM system, he      said.    
      Though Appelbaum did not publish the NSA slides on SORM in      his thesis, he reported that they show two Russian officers      wearing jackets bearing the slogan, You talk, we listen.    
      He said it is not unreasonable to assume that parts, if not      the entire American lawful interception system, known as      CALEA, have been compromised.    
      In his doctoral thesis, he says key European lawful      interception systems have been compromised by NSA and/or      GCHQ. Appelbaum said the Snowden archive contained many      named target systems, companies, and other countries that      had been impacted.    
      According to Appelbaum, compromise means different things:      sometimes it is a matter of technical hacking, others it is a      matter of wilful complicity from inside the company by order      of some executives after being approached by the NSA.    
      Woe to those who do not comply immediately, he added.    
      Some of the most important revelations published from the      Snowden archive concerned PRISM, a mass surveillance program      which allowed the NSA to access emails, calls, chats, file      transfers, web search histories.    
      The NSA slides claimed that this collection was conducted      from the servers of internet giants like Google, Apple,      Facebook, Microsoft, AOL, Skype, PalTalk and YouTube, but      when the existence of this program was exposed by Glenn      Greenwald and Ewen MacAskill inThe Guardian and      by Laura Poitras and Barton Gellmann in      TheWashington Post, the internet giants      denied any knowledge of the program and denied that they had      granted direct access to their servers.    
      Though PRISM was one of the very first revelations from the      Snowden archive, Appelbaum reveals that the PRISM slide deck      was not published in full and several pages of the PRISM      slide list targets and related surveillance data, and a      majority of them appear to be a matter of political      surveillance rather than defense against terrorism.    
      He said one such example of PRISMs targets being a matter of      political surveillance rather than anti-terrorism shows a      suggestion for targeting the Tibetan Government in Exile      through their primary domain name.    
      In 1950, the Peoples Republic of China took control of Tibet      and were met with considerable resistance from the Tibetan      people. In 1959, the Fourteenth Dalai Lama left Tibet to seek      political asylum in India, and there was a major exodus of      Tibetans into the country. The Dalai Lama set up the Tibetan      Government in Exile in India and exiled Tibetans have accused      China of cruelty and repression for decades.    
      Appelbaum reveals that the main domain of the Tibetan      Government in Exile (tibet.net) is named as an      unconventional example that analysts should be aware of as      also falling under the purview of PRISM. He explains that      the email domain was hosted by Google Mail, a PRISM partner,      at the time of the slide deck creation and it is currently      hosted by Google Mail as of early 2022. At the time of this      writing, it still is.    
      According to him, tibet.net exemplifies the political reality      of accepting aid from the US. The system administrators      wanted to be protected from Chinese hacking and surveillance.      To fight Chinese surveillance, the technical team opted to      host with Google for email and Cloudfare for web hosting. The      reason Google appealed to the technical team behind tibet.net      was the excellent reputation of Googles security team at      that time.    
      What was unknown at the time of this decision was that      Google would, willing or unwillingly, give up the data to the      US government in secret, said Appelbaum. Thus in seeking to      prevent surveillance by the Chinese government some of the      time when the Chinese government successfully hack their      servers, they unknowingly accepted aid that ensured their      data will be under surveillance all of the time.    
      As a result, to fight the well-known devil of Chinese      surveillance, the Tibetan Government in Exile put itself in      the hands of the NSA.    
      How many important revelations like these do the unpublished      documents still contain? It is impossible to say so long as      the archive remains unpublished. It is also unclear how many      copies of the full archive remain available and who has      access to them.    
      Appelbaum says: There was a discussion among many of the      journalists who worked on the archive about opening access to      the Snowden archive for academics to discuss, study, and of      course to publish. This is a reasonable idea and it should      happen, as it is clearly in the public interest.    
      He said it was a terrible day when The Guardian      allowed GCHQ to destroy the copy of the archive in the UK.      However, according to Ewen MacAskill for The      Atlantic, A copy of the Snowden documents remains      locked in an office at The Times, as far as I know.    
      According to Jacob Appelbaum, The Intercept  the      media outlet co-founded by Glenn Greenwald and Laura Poitras      to publish the Snowden files  is no longer in possession of      the documents. I was informed that they destroyed their copy      of the archive, Appelbaum told us.    
      In 2013, the author of this article worked with Glenn      Greenwald on the Snowden files regarding Italy, publishing      all the documents that Greenwald shared with us in her      newspaper at the time, the Italian      newsmagazinel'Espresso.    
      After that journalistic work, we were contacted again to work      on additional files, but unfortunately after some preliminary      contacts, we never heard fromThe      Interceptagain. All of our attempts to work on the      files came to nothing, though we never learned what the      problem was.    
      We asked The Intercept whether the publication is      still in possession of the Snowden file. A spokesperson      replied: The Intercept does not discuss      confidential news-gathering materials.    
      Appelbaum is highly critical of those who destroyed the      Snowden files. Even if the privacy violating intercepts are      excluded from publication, there is an entire parallel      history in that archive, he said.    
See the original post here:
New revelations from the Snowden archive surface - ComputerWeekly.com