NSA Docs Reveal Spy-Proof Encryption Tools

New material leaked by Edward Snowden shows which Internet security protocols the NSA had beaten as of 2012 and which encryption tools were still stymying cyber spies.

Digital spies in the National Security Administration cracked Skype's encryption back in 2011 and can make quick work of the VPNs many businesses believe make their communications secure.

But more robust security protocols and encryption techniques may still be secure from prying NSA eyes, according to documents revealed by former NSA contractor Edward Snowden.

Der Spiegel has the rundown on the NSA's battle against what its training documents described as the "threat" of secure Internet communication. Snowden's documentation is several years old now, of course. Whether or not U.S. cyber spies have managed to crack some of the toughest nuts in the intervening years, like Tor network communications, isn't known.

First, the security layers that the NSA considered to be "trivial," "minor," or "moderate" challenges to get through as of 2012. These include such tasks as simply monitoring a document as it travels across the Internet, spying on Facebook chats, and decrypting mail.ru emails, according to the Snowden documents.

But there are others that NSA cryptologists have had a much tougher time defeating, Der Spiegel noted, as documented in their sorting of threats "into five levels corresponding to the degree of the difficulty of the attack and the outcome, ranging from 'trivial' to a 'catastrophic.'"

"Things first become troublesome at the fourth level," according to Der Spiegel, which culled its report from a specific NSA presentation on Internet security.

As of 2012, the agency was having "major problems in its attempts to decrypt messages sent through heavily encrypted email service providers like Zoho or in monitoring users of the Tor network," the newspaper reported. Other "major," or fourth-level challenges included open-source protocols like Truecrypt and OTR instant-messaging encryption.

"Experts agree it is far more difficult for intelligence agencies to manipulate open source software programs than many of the closed systems developed by companies like Apple and Microsoft. Since anyone can view free and open source software, it becomes difficult to insert secret back doors without it being noticed," Der Spiegel noted.

The toughest method of Internet communication for the NSA to crack? It's not any one dark Internet tool but rather a bunch of them layered on top of each other, according to the Snowden documents.

See the original post:
NSA Docs Reveal Spy-Proof Encryption Tools

Revealed: the encryption tools spies can (and can’t) crack

The NSA has been cracking encryption for years. Photo: Reuters

Australia's electronic espionage agency is a partner in a massive United States-led assault on internet security and privacy, according to top secret documents disclosed by former US intelligence contractor Edward Snowden.

The GermanDer Spiegelmagazine has published new disclosures of signals intelligence cooperation between the United States and its "5-eyes" partners the United Kingdom, Canada, Australia and New Zealand revealing that the secret agencies have broken most widely-used forms of internet encryption.

Many of the leaked documents are classified top secret, "COMINT" (communications intelligence) and releasable only to "5-eyes" agencies the US National Security Agency (NSA), the Australian Signals Directorate (ASD), the United Kingdom's Government Communications Headquarters, Canada's Communications Security Establishment and New Zealand's Government Communications Security Bureau.

Intensive efforts to overcome what is described as the "major threat" of "ubiquitous encryption" on the internet have been regularly discussed at top secret "SIGDEV" signals intelligence development conferences between the "5-eyes" agencies.

Advertisement

The leaked documents show the NSA and its allies routinely intercept supposedly secure Hypertext Transfer Protocol (Https) connections used for internet applications including banking and financial services, e-commerce or accessing webmail accounts. According to one top secret document, the NSA planned to crack 10 million intercepted https connections a day by late 2012 with a particular focus on "password based encryption systems".

Other priority intelligence targets are virtual private networks (VPN) which are used by companies and organisations operating from multiple offices and locations. NSA and its partners operate a large-scale VPN exploitation project to intercept the data exchanged inside VPNs. Examples of successful interception cited in the leaked documents include government networks in Afghanistan, Greece, Pakistan and Turkey as well as a Russian telecommunications company.

According to a 2013 NSA document leaked by Mr Snowden and previously revealed byThe New York Times, the ASD obtained nearly 1.8 million encrypted master keys, used to protect private communications, from the Telkomsel Mobile network in Indonesia, and developed a way to decrypt almost all of them.

Another supposedly secure system accessed by the NSA and its partners is Skype, which is widely used to conduct internet video chat. The newly leaked documents show Skype has been successfully intercepted since at least February 2011.

Read more here:
Revealed: the encryption tools spies can (and can't) crack

Revealed: the encryption tools spies can’t crack

The NSA has been cracking encryption for years. Photo: Reuters

Australia's electronic espionage agency is a partner in a massive United States-led assault on internet security and privacy, according to top secret documents disclosed by former US intelligence contractor Edward Snowden.

The GermanDer Spiegelmagazine has published new disclosures of signals intelligence cooperation between the United States and its "5-eyes" partners the United Kingdom, Canada, Australia and New Zealand revealing that the secret agencies have broken most widely-used forms of internet encryption.

Many of the leaked documents are classified top secret, "COMINT" (communications intelligence) and releasable only to "5-eyes" agencies the US National Security Agency (NSA), the Australian Signals Directorate (ASD), the United Kingdom's Government Communications Headquarters, Canada's Communications Security Establishment and New Zealand's Government Communications Security Bureau.

Intensive efforts to overcome what is described as the "major threat" of "ubiquitous encryption" on the internet have been regularly discussed at top secret "SIGDEV" signals intelligence development conferences between the "5-eyes" agencies.

Advertisement

The leaked documents show the NSA and its allies routinely intercept supposedly secure Hypertext Transfer Protocol (Https) connections used for internet applications including banking and financial services, e-commerce or accessing webmail accounts. According to one top secret document, the NSA planned to crack 10 million intercepted https connections a day by late 2012 with a particular focus on "password based encryption systems".

Other priority intelligence targets are virtual private networks (VPN) which are used by companies and organisations operating from multiple offices and locations. NSA and its partners operate a large-scale VPN exploitation project to intercept the data exchanged inside VPNs. Examples of successful interception cited in the leaked documents include government networks in Afghanistan, Greece, Pakistan and Turkey as well as a Russian telecommunications company.

According to a 2013 NSA document leaked by Mr Snowden and previously revealed byThe New York Times, the ASD obtained nearly 1.8 million encrypted master keys, used to protect private communications, from the Telkomsel Mobile network in Indonesia, and developed a way to decrypt almost all of them.

Another supposedly secure system accessed by the NSA and its partners is Skype, which is widely used to conduct internet video chat. The newly leaked documents show Skype has been successfully intercepted since at least February 2011.

See the rest here:
Revealed: the encryption tools spies can't crack

The Encryption Tools the NSA Still Can’t Crack Revealed in New Leaks

Most of usat least the cynical onesassume that the NSA has probably beaten most of the encryption technologies out there. But a new report from Der Spiegel that draws on documents from Edward Snowden's archive shows that this simply isn't true. There are some tools that the NSA, as recently as two years ago, couldn't crack.

"[Some users] think the intelligence agency experts are already so many steps ahead of them that they can crack any encryption program," explains the report. "This isn't true." In fact, there are several encryption technologies that gave the NSA trouble. First of all, the documents show that the NSA had "major" issues trying to break the encryption on both Tor and Zoho, the email service. Truecrypt, the now-defunct freeware service for encrypting files on your computer, was another thorn in the NSA's side, along with Off-the-Record, which encrypts instant messages.

Another good tool mentioned is Pretty Good Privacy, which is shocking given that the protocol is two decades old, originally written in 1991. But there are also combinations of tools that the NSA describes as "catastrophic" when attempting to crack. Here's how Der Spiegel describes the special sauce:

Things become "catastrophic" for the NSA at level five - when, for example, a subject uses a combination of Tor, another anonymization service, the instant messaging system CSpace and a system for Internet telephony (voice over IP) called ZRTP. This type of combination results in a "near-total loss/lack of insight to target communications, presence," the NSA document states.

There are also plenty of seemingly secure services that the report shows are easy for the NSA to monitor, just as you might already assumeincluding VPNs and the HTTPS connections that many of us see on a daily basis when logging into banking sites and other supposedly "secure" websites. According to the report, the NSA intercepted 10 million of those https connections every day in 2012.

Then there are the details about how the NSA proactively fights encryption online, including attending meetings of groups that create the standards for encryption, like the Internet Engineering Task Force. This way, the NSA can influenceand water downthe internet-wide standards for privacy in a much longer-term way. In one of the more ironic sections of the new documents, we learn that while the NSA is responsible for recommending the best security standards to the US National Institute of Standards and Technology, at the same time it is looking for ways to break the tools it recommends.

It's a harrowing new look at the NSA's encryption-breaking prowess, but at the same time, a heartening glimpse of the freely available tools that still provide a modicum of privacy. More than anything, it's a reminder that the NSA is throwing all its weight into cracking these protocolsand none of us can ever assume that a single encryption tool is truly private. The entire report is well worth a read. [Der Spiegel]

The rest is here:
The Encryption Tools the NSA Still Can't Crack Revealed in New Leaks

Snowden leaks reveal encryption programs that NSA couldn’t break

A military no trespassing sign shown in front of Utah's NSA Data Center in Bluffdale, Utah.

Image: Rick Bowmer/Associated Press

By Rex Santus2014-12-29 21:13:57 UTC

A new report on documents leaked to the press by whistleblower Edward Snowden highlights some security tools the National Security Agency has cracked and those it hasn't in its widespread surveillance of digital communication.

The NSA had trouble breaking some forms of encryption, according to a report in the German newsmagazine Der Spiegel that listed seven coauthors, including Laura Poitras, who directed the Snowden documentary Citizenfour. The encryption and security-breaking problems the NSA encountered were ranked on a scale of 1 to 5, from "trivial" to "catastrophic." Facebook chat, for example, was considered "trivial."

The NSA had "major" problems (the fourth level) with Zoho, an encrypted email service, as well as Tor, the network and software that helps users browse the Internet anonymously. Tor sends information through a variety of a relay nodes, managed by volunteers, that make it difficult to tell who or where the web traffic originated from.

Government security specialists also had trouble with Truecrypt, a software program used for file encryption that was shuttered earlier this year. PGP, an early encryption program for email that was founded in 1991, still proved a formidable opponent to the NSA.

The situation only became "catastrophic" when a user constructed a sort of Frankenstein's monster of privacy protection: The Tor network atop other anonymizing services, certain instant messengers and phone encryption apps like RedPhone, for example.

Some combinations rendered a "near-total loss/lack of insight to target communications, presence," according to Der Spiegel's review of the NSA documents, which was also presented at Berlin-based hacking group Chaos Computer Club's annual conference this weekend in Germany.

Nothing is bulletproof, of course. The government has found its way into Tor before, and malicious hackers targeted the anonymity network just last week. Using a combination of privacy methods is the best way to avoid NSA surveillance.

Read more:
Snowden leaks reveal encryption programs that NSA couldn't break

The 5 Most Dangerous Software Bugs of 2014

Dealing with the discovery of new software flaws, even those that leave users open to serious security exploits, has long been a part of everyday life online. But few years have seen quite so many bugs, or ones quite so massive. Throughout 2014, one Mothra-sized megabug after another sent systems administrators and users scrambling to remediate security crises that affected millions of machines.

Several of the bugs that shook the Internet this year blindsided the security community in part because they werent found in new software, the usual place to find hackable flaws. Instead, they were often in code thats years or even decades old. In several cases the phenomenon was a kind of perverse tragedy of the commons: Major vulnerabilities in software used for so long by so many people that it was assumed they had long ago been audited it for vulnerabilities.

The sentiment was that if something is so widely deployed by companies that have huge security budgets, it must have been checked a million times before, says Karsten Nohl, a Berlin-based security researcher with SR Labs who has repeatedly found critical bugs in major software. Everyone was relying on someone else to do the testing.

Each of those major bug finds in commonly used tool, he says, inspired more hackers to start combing through legacy code for more long-dormant flaws. And in many cases, the results were chilling. Heres a look at the biggest hacker exploits that spread through the research community and the worlds networks in 2014.

Heartbleed

When encryption software fails, the worst that usually happens is that some communications are left vulnerable. What makes the hacker exploit known as Heartbleed so dangerous is that it goes further. When Heartbleed was first exposed in April, it allowed a hacker to attack any of the two-thirds of Web servers that used the open source software OpenSSL and not merely strip its encryption, but force it to cough random data from its memory. That could allow the direct theft of passwords, private cryptographic keys, and other sensitive user data. Even after systems administrators implemented the patch created by Google engineer Neal Mehta and the security Codenomiconwho together discovered the flawusers couldnt be sure that their passwords hadnt been stolen. As a result, Heartbleed also required one of the biggest mass password resets of all time.

Even today, many vulnerable OpenSSL devices still havent been patched: An analysis by John Matherly, the creator of the scanning tool Shodan, found that 300,000 machines remain unpatched. Many of them are likely so-called embedded devices like webcams, printers, storage servers, routers and firewalls.

Shellshock

The flaw in OpenSSL that made Heartbleed possible existed for more than two years. But the bug in Unixs bash feature may win the prize for the oldest megabug to plague the worlds computers: It went undiscovered, at least in public, for 25 years. Any Linux or Mac server that included that shell tool could be tricked into obeying commands sent after a certain series of characters in an HTTP request. The result, within hours of the bug being revealed by the US Computer Emergency Readiness Team in September, was that thousands of machines were infected with malware that made them part of botnets used for denial of service attacks. And if that werent enough of a security debacle, US CERTs initial patch was quickly found to have a bug itself that allowed it to be circumvented. Security researcher Robert David Graham, who first scanned the Internet to find vulnerable Shellshock devices, called it slightly worse than Heartbleed.

POODLE

Read the original here:
The 5 Most Dangerous Software Bugs of 2014

NSA, GCHQ spied on WikiLeaks, says Julian Assange

"The NSA and its UK accomplices show no respect for the rule of law": Julian Assange. Photo: AFP

Britain's intelligence-gathering agency spied on people who contacted WikiLeaks, the whistleblowing website's founder Julian Assange claims.

Assange says new documents reveal the Government Communications Headquarters (GCHQ) was engaged in "hostile monitoring" of the publisher's website.

Information from national security whistleblower Edward Snowden detailed the spying efforts against WikiLeaks undertaken by GCHQ and the US National Security Agency (NSA), he said.

A document dated 2012 revealed GCHQ spied on WikiLeaks and its readers, said Assange, who has been living at the Ecuadorean Embassy in London since the summer of 2012 for fear of being extradited to the US.

Advertisement

"WikiLeaks strongly condemns the reckless and unlawful behaviour of the National Security Agency," Assange said. "We call on the Obama administration to appoint a special prosecutor to investigate the extent of the NSA's criminal activity against the media including WikiLeaks and its extended network.

"News that the NSA planned these operations at the level of its Office of the General Counsel is especially troubling. No less concerning are revelations that the US government deployed 'elements of state power' to pressure European nations into abusing their own legal systems, and that the British spy agency GCHQ is engaged in extensive hostile monitoring of a popular publisher's website and its readers.

"The NSA and its UK accomplices show no respect for the rule of law."

WikiLeaks said it was surprised at the "sweeping" scale of the monitoring as well as the "blatant" way information was gathered.

See more here:
NSA, GCHQ spied on WikiLeaks, says Julian Assange

Chelsea Manning – Malaysia Forex

Chelsea manning sues transgender medical treatment, Chelsea manning, convicted of espionage, filed a lawsuit claiming she "has been denied access to medically necessary treatment" for her gender disorder.. Chelsea manning - imdb, Chelsea manning. chelsea manning was born on december 17, 1987 in crescent, oklahoma, usa as bradley edward manning.. Chelsea manning .. military media freedom, I was shocked by our militarys complicity in the corruption of that election. yet these deeply troubling details flew under the american medias radar..

Chelsea manning ( bradley manning) | news | , The latest news comment chelsea manning. http://www.theguardian.com/us-news/chelsea-manning Chelsea manning wikipedia, Chelsea elizabeth manning (* 17. dezember 1987 als bradley edward manning crescent , oklahoma ) ist eine -amerikanische -spezialistin und ehemalige angehrige. http://de.wikipedia.org/wiki/Chelsea_Manning Tranny manning: transgender woman , Chelsea manning: told, legal system military, don belong. time trans people world . http://www.theguardian.com/commentisfree/2014/dec/08/chelsea-manning-transgender-rights

chelsea manning isis guardian op-ed, September 16, 2014 by chelsea e manning in fort leavenworth how to make isis fall on its own sword degrade and destroy? the west should try to disrupt the canny. Judge sentence bradley manning today washington post, A military judge on wednesday sentenced pfc. bradley manning to 35 years in prison, bringing to a close the governments determined pursuit of the army intelligence. How isis fall sword | chelsea manning, Chelsea e manning: degrade and destroy? the west should try to disrupt the canny militants into self-destruction, because bombs will only backfire.

See the original post here:
Chelsea Manning - Malaysia Forex

Highlights From Newly Released NSA Oversight Reports Reveal Bumbling Ineptitude But No Evidence Of Systemic Abuse

A few hours before Christmas Eve, the National Security Agency released more than a decades worth of damning reports on its website. The reports, which had been submitted by the NSA to the Presidents Intelligence Oversight Board from 2001 to 2013, purport to cover any activity that could be considered unlawful or contrary to government policy. They included incidents in which individual employees abused their security clearances to target a current or former romantic partner as well as dozens of breaches that resulted from overly broad database queries, along with a lack of rigor in determining whether a foreign intelligence target had entered the United States or held US citizenship or permanent resident status. There were also numerous breaches related to poor data security.

In the documents, which were released in response to a FOIA lawsuit brought by the ACLU, NSA analysts are revealed to be all-too-human bumblers, mistakenly searching on their own information, improperly using colleagues credentials, sending highly classified information to the wrong printer, and mistyping email addresses.

There is no evidence in the reports of systematic lawbreakingnot a surprise considering the reports author. Instead, the NSA attributes most of its lapses to unintentional human error or technical mistakes. In a handful of cases, the agency points out, investigations have led to discipline or administrative action. Even so, the reports raise serious questions about the NSAs ability to protect the vast amount of personal data that is vacuumed up by its surveillance apparatus.

Courtesy: Cory Grenier

I became interested in the NSA spying program almost a decade ago when I learned about a large order AT&T had placed for Narus Semantic Traffic Analyzers. The equipment made it possible to inspect Internet traffic in real time, which made it a great tool for spying. A source had told me that the analyzers had been deployed in secret rooms around the country on behalf of the NSA. I looked into the story, but ultimately my editors chose not to pursue it. Even if I could prove it, they werent sure anyone would be interested in the specific details of how telecoms like AT&T were cooperating with the NSA. It was an era of limited newsroom resources, and we had other stories to pursue.

There was also a key question that I wasnt sure I could answer even if I confirmed my tip. Had any Americans been hurt by NSA spying? This is a concern that comes up again and again. Its raised by judges presiding over lawsuits brought by public advocates and civil libertarians. The lack of an affirmative answer is used to justify ongoing surveillance.

Yet, we still dont know if any individual has been hurt or what potential exists for someone to be hurt in the future. A lot depends on what the NSA does with information it collects on those it refers to as US Persons, or USPs, and most of that information is withheld from the public. The NSA claims it takes great pains to comply with the U.S. Constitution, as well as U.S. laws and regulations. The Christmas Eve reports are interesting because they showed where the agency, in its own opinion, has fallen short.

The agencys reports, which emphasize incidents in which US persons were improperly targeted, dont appear at first to correlate with a cache of 160,000 intercepted communications that the Washington Post obtained via Edward Snowden. The Post reporters claimed ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by theNational Security Agency. The story, published in July, raised new questions about the collateral harm to privacy from NSA surveillance.

Read more here:
Highlights From Newly Released NSA Oversight Reports Reveal Bumbling Ineptitude But No Evidence Of Systemic Abuse