“According to documents contained in the archive of material provided to The Intercept by whistleblower Edward Snowden, the NSA has spied on hundreds of companies and organizations internationally, including in countries closely allied to the United States, in an effort to find security weaknesses in cellphone technology that it can exploit for surveillance,” Ryan Gallagher reports for The Intercept.
“The documents also reveal how the NSA plans to secretly introduce new flaws into communication systems so that they can be tapped into—a controversial tactic that security experts say could be exposing the general population to criminal hackers,” Gallagher reports. “Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks.”
“Karsten Nohl, a leading cellphone security expert and cryptographer who was consulted by The Intercept about details contained in the AURORAGOLD documents, said that the broad scope of information swept up in the operation appears aimed at ensuring virtually every cellphone network in the world is NSA accessible,” Gallagher reports. ““Collecting an inventory [like this] on world networks has big ramifications,” Nohl said, because it allows the NSA to track and circumvent upgrades in encryption technology used by cellphone companies to shield calls and texts from eavesdropping. Evidence that the agency has deliberately plotted to weaken the security of communication infrastructure, he added, was particularly alarming. ‘Even if you love the NSA and you say you have nothing to hide, you should be against a policy that introduces security vulnerabilities,’ Nohl said, ‘because once NSA introduces a weakness, a vulnerability, it’s not only the NSA that can exploit it.'”
Read more in the full article here.
MacDailyNews Take: United States Constitution, Amendment IV:
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
Those who would give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety. – Benjamin Franklin, Historical Review of Pennsylvania, 1759
Freedom is never more than one generation away from extinction. We didn’t pass it on to our children in the bloodstream. It must be fought for, protected, and handed on for them to do the same, or one day we will spend our sunset years telling our children and our children’s children what it was once like in the United States where men were free. – Ronald Reagan, March 30, 1961
Visit the Apple-backed reformgovernmentsurveillance.com today.
[Thanks to MacDailyNews Reader “David G.” for the heads up.]
U.S. feds want Apple’s help to defeat encrypted phones, invoke 18th-century All Writs Act – December 1, 2014
U.S. DOJ turns to 225-year-old law to force Apple, Google to unlock password-protected devices – November 26, 2014
DOJ warns Apple: iPhone encryption will lead to a child dying – November 19, 2014