<div dir="ltr"><div><div class="gmail_signature"><div dir="ltr"><div style="text-align:start"><span style="text-align:justify;background-color:rgb(253,254,255)"><span style="background-color:rgb(253,254,255)"><span style="background-color:rgb(253,254,255)">Thinking about the Safaricom Surveillance system...</span></span></span></div><div style="text-align:start"><span style="text-align:justify;background-color:rgb(253,254,255)"><span style="background-color:rgb(253,254,255)"><span style="background-color:rgb(253,254,255)"><br></span></span></span></div><div style="text-align:start"><span style="text-align:justify;background-color:rgb(253,254,255)"><span style="background-color:rgb(253,254,255)"><span style="background-color:rgb(253,254,255)"><a href="http://www.theregister.co.uk/2014/12/04/snowden_files_show_nsas_auroragold_pwned_70_of_worlds_mobile_networks/">http://www.theregister.co.uk/2014/12/04/snowden_files_show_nsas_auroragold_pwned_70_of_worlds_mobile_networks/</a><br></span></span></span></div><div style="text-align:start"><span style="text-align:justify;background-color:rgb(253,254,255)"><span style="background-color:rgb(253,254,255)"><span style="background-color:rgb(253,254,255)"><br></span></span></span></div><div style="text-align:start"><span style="text-align:justify;background-color:rgb(253,254,255)"><span style="background-color:rgb(253,254,255)"><span style="background-color:rgb(253,254,255)"><div style="text-align:start"><h1 style="margin:0px 0px 10px;color:rgb(0,0,0);font-family:Arial,FreeSans,Helvetica,sans-serif;background-color:rgb(255,255,255)">Snowden files show NSA's AURORAGOLD pwned 70% of world's mobile networks</h1><h2 class="" style="font-size:1.4em;margin:0px 0px 5px;color:rgb(255,0,0);font-family:Arial,FreeSans,Helvetica,sans-serif;background-color:rgb(255,255,255)">Brits and Yanks snoop on security standards bods</h2><div class="" style="margin:10px 0px 0px;color:rgb(0,0,0);font-family:Arial,FreeSans,Helvetica,sans-serif;font-size:14px;line-height:16.7999992370605px;background-color:rgb(255,255,255)">By <a href="http://www.theregister.co.uk/Author/2395" title="Read more by this author" style="text-decoration:none;color:rgb(153,153,153)">Iain Thomson</a>, <span class="" style="font-size:0.9em;margin:0.5em 0px">4 Dec 2014 </span></div></div><div><p style="color:rgb(0,0,0);font-family:Arial,FreeSans,Helvetica,sans-serif;font-size:14px;line-height:21px;text-align:start;background-color:rgb(255,255,255)">The NSA, and its British counterpart GCHQ, spied on innocent telco employees and standards bodies to tap into mobile phone networks worldwide, according to the latest leak from the Edward Snowden archive.</p><p style="color:rgb(0,0,0);font-family:Arial,FreeSans,Helvetica,sans-serif;font-size:14px;line-height:21px;text-align:start;background-color:rgb(255,255,255)">The mobile tapping system, dubbed AURORAGOLD, successfully cracked 701 of an estimated 985 cellular networks worldwide, according to the leaked NSA presentation <a target="_blank" href="https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones/" style="text-decoration:none;color:rgb(221,0,0)">released by The Intercept</a>.</p><p style="color:rgb(0,0,0);font-family:Arial,FreeSans,Helvetica,sans-serif;font-size:14px;line-height:21px;text-align:start;background-color:rgb(255,255,255)">This was done by snooping on the private communications of key workers within the industry to capture technical documentation and encryption keys that allowed the agency access to mobile calls. Between November 2011 to April 2012, computers used by somewhere between 363 and 1,354 staff were infiltrated to get the data the NSA required.</p><p style="color:rgb(0,0,0);font-family:Arial,FreeSans,Helvetica,sans-serif;font-size:14px;line-height:21px;text-align:start;background-color:rgb(255,255,255)">AURORAGOLD is managed by the NSA's Wireless Portfolio Management Office, and the agency appears to have cracked more advanced forms of encryption used on the networks – sometimes even before it was rolled out for commercial use.</p><p style="color:rgb(0,0,0);font-family:Arial,FreeSans,Helvetica,sans-serif;font-size:14px;line-height:21px;text-align:start;background-color:rgb(255,255,255)">The encryption is supposed to prevent eavesdroppers from listening to private phone conversations. It was assumed intelligence agencies can break the widely used <a target="_blank" href="http://en.wikipedia.org/wiki/A5/1" style="text-decoration:none;color:rgb(221,0,0)">A5/1</a> algorithm; now we know GCHQ and the NSA <a target="_blank" href="https://firstlook.org/theintercept/document/2014/12/04/wolframite-encryption-attack" style="text-decoration:none;color:rgb(221,0,0)">have been working on cracking</a> the supposedly stronger <a target="_blank" href="http://www.theregister.co.uk/2010/01/13/gsm_crypto_crack/" style="text-decoration:none;color:rgb(221,0,0)">A5/3</a> used in 3G. For that, the Brits needed a £4m system to attack the cipher by 2012.</p><p style="color:rgb(0,0,0);font-family:Arial,FreeSans,Helvetica,sans-serif;font-size:14px;line-height:21px;text-align:start;background-color:rgb(255,255,255)">Spies do spying, of course. And to do this, the NSA's Target Technology Trends Center (TTTC) works within standard bodies like the GSM Association to get advanced copies of new security protocols so that it can work out how to break them ahead of deployment. The TTTC even has a nifty little logo of a telescope on a world map and a slogan stating "Predict – Plan – Prevent."</p><p style="color:rgb(0,0,0);font-family:Arial,FreeSans,Helvetica,sans-serif;font-size:14px;line-height:21px;text-align:start;background-color:rgb(255,255,255)"><a target="_blank" href="https://firstlook.org/theintercept/documents/" style="text-decoration:none;color:rgb(221,0,0)">The documents</a> state GSMA members were <a target="_blank" href="https://prod01-cdn02.cdn.firstlook.org/wp-uploads/sites/1/2014/12/working-groups.png" style="text-decoration:none;color:rgb(221,0,0)">specifically targeted</a> for surveillance, but doesn't state explicitly that the intelligence community has actively tried to introduce vulnerabilities into standards so that it would have easier access.</p><p style="color:rgb(0,0,0);font-family:Arial,FreeSans,Helvetica,sans-serif;font-size:14px;line-height:21px;text-align:start;background-color:rgb(255,255,255)">"There's nothing in here that suggests that the NSA has been actively trying to subvert standards from within," said security guru Bruce Schneier. "In fact, it would be pretty difficult to do so. I suspect they are just sitting back and watching others make mistakes, and then exploiting them."</p><p style="color:rgb(0,0,0);font-family:Arial,FreeSans,Helvetica,sans-serif;font-size:14px;line-height:21px;text-align:start;background-color:rgb(255,255,255)">The GSMA declined to comment on the latest Snowden leaks, saying that it would have to consult with its lawyer before making any statement, according to its spokeswomen Claire Cranton.</p><p style="color:rgb(0,0,0);font-family:Arial,FreeSans,Helvetica,sans-serif;font-size:14px;line-height:21px;text-align:start;background-color:rgb(255,255,255)">"If there is something there that is illegal then they will take it up with the police," she said.</p><p style="color:rgb(0,0,0);font-family:Arial,FreeSans,Helvetica,sans-serif;font-size:14px;line-height:21px;text-align:start;background-color:rgb(255,255,255)">Subverting standards from within is certainly within the NSA's playbook. Earlier Snowden leaks <a href="http://www.theregister.co.uk/2013/12/21/nsa_paid_rsa_10_million/" style="text-decoration:none;color:rgb(221,0,0)">suggest</a> RSA was paid $10m to use, by default in its software, the dodgy Dual EC DRBG algorithm the agency <a href="http://www.theregister.co.uk/2014/07/14/nist_looks_to_nip_overdependance_on_nsa_cryptography_with_new_rules/" style="text-decoration:none;color:rgb(221,0,0)">introduced</a> via the US National Institute of Standards and Technology. RSA has consistently denied claims it promoted weak security, and no longer uses Dual EC DRBG in its products.</p><p style="color:rgb(0,0,0);font-family:Arial,FreeSans,Helvetica,sans-serif;font-size:14px;line-height:21px;text-align:start;background-color:rgb(255,255,255)">"NSA collects only those communications that it is authorized by law to collect in response to valid foreign intelligence and counterintelligence requirements - regardless of the technical means used by foreign targets, or the means by which those targets attempt to hide their communications," said the NSA in a statement. ®</p></div><div><br></div></span></span></span></div></div></div></div>
</div>