background preloader

Catalog Reveals NSA Has Back Doors for Numerous Devices

Catalog Reveals NSA Has Back Doors for Numerous Devices
Editor's note: This article accompanies our main feature story on the NSA's Tailored Access Operations unit. You can read it here. When it comes to modern firewalls for corporate computer networks, the world's second largest network equipment manufacturer doesn't skimp on praising its own work. According to Juniper Networks' online PR copy, the company's products are "ideal" for protecting large companies and computing centers from unwanted access from outside. They claim the performance of the company's special computers is "unmatched" and their firewalls are the "best-in-class." A 50-Page Catalog These NSA agents, who specialize in secret back doors, are able to keep an eye on all levels of our digital lives -- from computing centers to individual computers, and from laptops to mobile phones. This, at least, is the impression gained from flipping through the 50-page document. In the case of Juniper, the name of this particular digital lock pick is "FEEDTROUGH." Master Carpenters Related:  NSA / Prism

La machine à décrypter universelle bientôt dans les mains de la NSA? L'alpha et l'oméga de l'espionnage pour les Etats-Unis? L'Agence nationale de sécurité américaine (NSA) est tout près de créer un «ordinateur quantum» à même de décrypter presque n'importe quel encodage, selon le Washington Post jeudi qui cite des documents divulgués par l'ancien consultant Edward Snowden. Selon ces documents, l'ordinateur sur lequel travaille la NSA lui permettrait de briser les codes informatiques protégeant des secrets bancaires, médicaux, des informations gouvernementales ou du monde des affaires. Les grandes entreprises informatiques comme IBM poursuivent depuis longtemps l'objectif de créer des ordinateurs quantum, qui permettraient d'exploiter la puissance des atomes et des molécules, accroissant ainsi de manière considérable la rapidité et la sécurité des ordinateurs. «Cages de Faraday» Cependant, des experts estiment peu probable que la NSAsoit sur le point de créer une telle machine sans que la communauté scientifique soit au courant. N'importe quel code brisé

NSA reportedly intercepting laptops purchased online to install spy malware According to a new report from Der Spiegel based on internal NSA documents, the signals intelligence agency's elite hacking unit (TAO) is able to conduct sophisticated wiretaps in ways that make Hollywood fantasy look more like reality. The report indicates that the NSA, in collaboration with the CIA and FBI, routinely and secretly intercepts shipping deliveries for laptops or other computer accessories in order to implant bugs before they reach their destinations. According to Der Spiegel, the NSA's TAO group is able to divert shipping deliveries to its own "secret workshops" in a method called interdiction, where agents load malware onto the electronics or install malicious hardware that can give US intelligence agencies remote access. This tool, among others, is available to NSA agents through what Der Spiegel describes as a mail-order spy catalog. Sometimes the NSA hops on an FBI jet for high-tech raids

Tout savoir sur tous (2 Au prix de sa liberté, Edward Snowden a révélé au monde le programme monstrueux de la NSA. Mais depuis des années, à l’intérieur même de la NSA, des chercheurs tentaient de dénoncer ces dérives. C’est le cas de KIRK WIEBE et de de BILL BINNEY que nous rencontrons aujourd’hui. Ils ont préféré démissionner pour mieux dénoncer ce BIG BROTHER. Inquiets de la baisse de confiance, les géants comme GOOGLE, FACEBOOK, TWITTER, etc., font pression sur le gouvernement américain . Le second volet d’un reportage aux États-Unis de Giv Anquetil et Daniel Mermet. (image : Edward Snowden) Programmation musicale : NSA, par Curdbump Hello, NSA, par Roy Zimmerman

How the NSA (may have) put a backdoor in RSA’s cryptography: A technical primer There has been a lot of news lately about nefarious-sounding backdoors being inserted into cryptographic standards and toolkits. One algorithm, a pseudo-random bit generator, Dual_EC_DRBG, was ratified by the National Institute of Standards and Technology (NIST) in 2007 and is attracting a lot of attention for having a potential backdoor. This is the algorithm into which the NSA allegedly inserted a backdoor and then paid RSA to use. So how is that possible? This is a technical primer that explains what a backdoor is, how easy it can be to create your own, and the dangerous consequences of using a random number generator that was designed to have a backdoor. This is necessarily a long technical discussion, but hopefully by the end it should be clear why Dual_EC_DRBG has such a bad reputation. Backdoors The concept of a backdoor has cast a shadow over the security industry for a long time. In theory, a well-designed cryptographic system does not include a backdoor. Random weakness

World's leading authors: state surveillance of personal data is theft | World news More than 500 of the world's leading authors, including five Nobel prize winners, have condemned the scale of state surveillance revealed by the whistleblower Edward Snowden and warned that spy agencies are undermining democracy and must be curbed by a new international charter. The signatories, who come from 81 different countries and include Margaret Atwood, Don DeLillo, Orhan Pamuk, Günter Grass and Arundhati Roy, say the capacity of intelligence agencies to spy on millions of people's digital communications is turning everyone into potential suspects, with worrying implications for the way societies work. They have urged the United Nations to create an international bill of digital rights that would enshrine the protection of civil rights in the internet age. Julian Barnes, Martin Amis, Ian McEwan, Irvine Welsh, Hari Kunzru, Jeanette Winterson and Kazuo Ishiguro are among the British authors on the list. McEwan told the Guardian: "Where Leviathan can, it will.

The NSA's Secret Role in the U.S. Assassination Program Credit: Kirsty Wigglesworth/Associated Press. The National Security Agency is using complex analysis of electronic surveillance, rather than human intelligence, as the primary method to locate targets for lethal drone strikes – an unreliable tactic that results in the deaths of innocent or unidentified people. According to a former drone operator for the military’s Joint Special Operations Command (JSOC) who also worked with the NSA, the agency often identifies targets based on controversial metadata analysis and cell-phone tracking technologies. Rather than confirming a target’s identity with operatives or informants on the ground, the CIA or the U.S. military then orders a strike based on the activity and location of the mobile phone a person is believed to be using. His account is bolstered by top-secret NSA documents previously provided by whistleblower Edward Snowden. “Once the bomb lands or a night raid happens, you know that phone is there,” he says.

Etats-Unis: La NSA a récupéré près de 200 millions de SMS par jour dans le monde L'Agence de sécurité nationale américaine, la NSA, a récupéré près de 200 millions de textos par jour dans le monde, de façon non ciblée, pour en extraire des renseignements, rapporte jeudi le quotidien britannique The Guardian. Ces informations, révélées dans le cadre d'une enquête menée conjointement par le journal et la chaîne Channel 4 News, se basent sur des documents transmis par l'ancien consultant informatique Edward Snowden, réfugié en Russie. Elles sont publiées à la veille d'un discours du président américain Barack Obama, qui doit annoncer vendredi une série de réformes des méthodes de surveillance, en réponse à la controverse sur les programmes américains d'espionnage déclenchée par Snowden. Les projets, contacts et transactions collectés Selon le quotidien, l'agence britannique GCHQ a utilisé ce programme pour chercher des "métadonnées" -informations relatives à ces SMS mais pas leur contenu lui-même- concernant des communications de personnes se trouvant au Royaume-Uni.

The Day We Fight Back - February 11th 2014 NSA: Les téléphones portables aussi ont été espionnés On savait déjà que les grandes oreilles de la NSA interceptaient de larges quantités de données téléphoniques et électroniques. Il faut désormais ajouter à cette liste la géolocalisation des téléphones portables, selon de nouvelles révélations de documents dérobés par Edward Snowden et relayées par le Washington Post. L'agence américaine intercepte les données de géolocalisation de centaines de millions de téléphones portables dans le monde, selon le quotidien. L'agence connectée aux réseaux mobiles Contrairement à ce que certains imaginent, la NSA n'exploite pas le fameux bug en 2011, quand des chercheurs avaient découvert qu'iOS et Android enregistraient à l'insu de l'utilisateur tous ses déplacements –poussant Apple et Google à le corriger. La NSA n'arrive pas à tout analyser Le volume de données enregistrées et stockées par la NSA atteindrait 27 téraoctets (27.000 Go), soit deux fois le volume de l'ensemble du contenu de la Bibliothèque du Congrès, la plus importante du monde.

BREAKING: Maryland Legislators Move To Kill NSA Headquarters NSA National Headquarters ANNAPOLIS, Md., February 10, 2014– It’s lights out for the National Security Agency (NSA). State lawmakers in Maryland have filed emergency status legislation that seeks to cut the NSA’s Ft. Meade headquarters off from all material support stemming from the state. “Maryland has almost become a political subdivision of the NSA,” Tenth Amendment Center Executive Director Michael Boldin said in a statement. “The agency relies heavily on state and local help. House Bill 1074 (HB1074) would ban the NSA facility from all public state utilities, ban the use of NSA collected evidence in court, ban universities from partnering with the NSA and ban all political subdivisions from assisting the NSA from within the state. Any state entity, employee or contractor refusing to comply with the law would be immediately fired and banned from all future contracts within the state. The bill has eight Republican sponsors and has been referred to the House Judiciary Committee.

Related: