General Discussion
Related: Editorials & Other Articles, Issue Forums, Alliance Forums, Region ForumsSCAHILL: THE GREAT SIM HEIST: HOW NSA SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE
THIS is our "Democratic POTUS's" NSA spying agency at work, operating above the law, committing felonious crimes in broad daylight, to spy on ALL OF US, at will. I'm still trying to wrap my mind around the scope of this revelation, but so far, it's a painful 'fit'.
~~~~~ * ~~~~~ *~~~~~ * ~~~~~ *~~~~~ * ~~~~~ *~~~~~ * ~~~~~ *
THE GREAT SIM HEIST: HOW SPIES STOLE THE KEYS TO THE ENCRYPTION CASTLE
BY JEREMY SCAHILL AND JOSH BEGLEY * Feb. 19, 2015 * The Intercept
AMERICAN AND BRITISH spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world, stealing encryption keys used to protect the privacy of cellphone communications across the globe, according to top-secret documents provided to The Intercept by National Security Agency whistleblower Edward Snowden.
The hack was perpetrated by a joint unit consisting of operatives from the NSA and its British counterpart Government Communications Headquarters, or GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the surveillance agencies the potential to secretly monitor a large portion of the worlds cellular communications, including both voice and data.
The company targeted by the intelligence agencies, Gemalto, is a multinational firm incorporated in the Netherlands that makes the chips used in mobile phones and next-generation credit cards. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. The company operates in 85 countries and has more than 40 manufacturing facilities. One of its three global headquarters is in Austin, Texas and it has a large factory in Pennsylvania.
In all, Gemalto produces some 2 billion SIM cards a year. Its motto is Security to be Free.
With these stolen encryption keys, intelligence agencies can monitor mobile communications without seeking or receiving approval from telecom companies and foreign governments. Possessing the keys also sidesteps the need to get a warrant or a wiretap, while leaving no trace on the wireless providers network that the communications were intercepted. Bulk key theft additionally enables the intelligence agencies to unlock any previously encrypted communications they had already intercepted, but did not yet have the ability to decrypt.
As part of the covert operations against Gemalto, spies from GCHQ with support from the NSA mined the private communications of unwitting engineers and other company employees in multiple countries.
Gemalto was totally oblivious to the penetration of its systems and the spying on its employees. Im disturbed, quite concerned that this has happened, Paul Beverly, a Gemalto executive vice president, told The Intercept. The most important thing for me is to understand exactly how this was done, so we can take every measure to ensure that it doesnt happen again, and also to make sure that theres no impact on the telecom operators that we have served in a very trusted manner for many years. What I want to understand is what sort of ramifications it has, or could have, on any of our customers. He added that the most important thing for us now is to understand the degree of the breach.
https://firstlook.org/theintercept/2015/02/19/great-sim-heist/
johnnyreb
(915 posts)Newsjock
(11,733 posts)I guess we've all become so numb to these things that nobody feels the need to -- or any point to -- comment further.
99th_Monkey
(19,326 posts)to pay attention too closely to what is really going on behind the curtain.