Tag Archive: National Security Agency

NSA has access to all popular smartphonesThe U.S. National Security Agency has the ability to read user data on the three most popular smartphone platforms, including the protected platform BlackBerry, Spiegel reported.

NSA created a special group to work with mobile platforms. Group worked on interception of contact lists, SMS-trafic location data of users, as well as some documents. The article indicates that the NSA has access to at least 38 features of iPhone, and in addition, NSA also has access to computers when users connect their mobile devices to synchronize.

The article did not provide specific details on how exactly the NSA acts, so it is unclear whether they use undocumented features of mobile phones, or get the access from the operator, or NSA use some other methods. Spiegel asked the press service of the BlackBerry for comments, but they said they never build-in any “engineering master keys” to its products; however BlackBerry declined to comment possible cooperation with the NSA. Continue reading

National Security AgencyJohn Gilmore, the creator of the human rights organization Electronic Frontier Foundation and founder of the projects, such as Cygwin, GNU Radio, Gnash, GNU tar, GNU UUCP and IPSEC- stack FreeS / WAN, has published a compilation of his observations about the possible impact of U.S. National Security Agency ( NSA ) on the development of specifications and implementations of IPSEC. His observations are based on the interviews with some of the committee members who participated in the development of standards IPSEC IETF.

As the leader of the project of free IPSEC- stack, John excludes the direct impact of the NSA on the development of FreeS / WAN, but does not exclude the impact in terms of decisions-making on integration the project developments in the Linux core. In particular, John mentions a categorical unwillingness of network subsystem maintainer to include in the core the layer packet processing for IPSEC developed in FreeS / WAN, instead of it the maintainer created its own implementation, which was incomplete and did not refer to the working mind. It is not clear whether such conduct was inspired by the NSA or due to some other reasons. Continue reading

Edward SnowdenU.S. National Security Agency (NSA) that is specialized in electronic intelligence, and its British colleges – the Office of Government Communications (OGS) – have developed special techniques that allow them to break in almost all currently used in Internet encryption standards. The documents that former NSA intelligence officer Edward Snowden sent to the New York Times and the Guardian proved that information.

The New York Times informs that the intelligence agencies have an access to trade secrets and private correspondence on the internet in many companies around the world due to the decryption methods. NSA uses supercomputers to crack the cipher, and the agency hires the highly skilled hackers.

On request from NSA some U.S. and foreign companies produce special computer hardware and software that is vulnerable to hacking by the security services. The New York Times points out that the U.S. spends $250 million annually on the development of methods of deciphering. “Since 2000, when the Internet began to receive widespread encryption, billions of dollars have been spent on these purposes,” – informed the source. Continue reading

PRISM programThe Washington Post reports on a top-secret program, data analysis National Security Agency, which, among other works directly on the servers of Google, Facebook, Microsoft and Apple.

“NSA and FBI are sitting directly on the central servers of nine leading U.S. Internet companies, for extracting video, audio, photos, mail, documents and communication logs that track the movement of people and their contacts with the passage of time” – the newspaper writes.

Details about  the program ‘Project PRISM’ vague, but apparently the NSA appealed to the Attorney General and the Director of National Intelligence for permission to “discover these servers for units Data Intercept Technology Unit FBI.” Continue reading

%d bloggers like this: