New Intercept article based on Snowden release shows that cell phone communication protection by encryption between your device and the cell network has been compromised for years.
Just like I tell people, email is like a postcard; cell phones are glorified
walkie-talkies. The days that you had a single circuit from your phone to
your caller’s is long gone with land lines, why would you expect it with
cell phones? And considering the usage of cell phones for ALL sorts of
activities, the desire to be able to listen in would be great.
Our “adversaries” already knew we listen to their cell phones; thus the word
codes and burn phones, and the TLAs are applauded for their technical
wizardry. Why is anyone surprised they can listen in to cell phones in
other parts of the globe?
This just illustrates Snowden’s comments to Schneier about having the keys
to decyrpt traffic in real time instead of having to crack keys on an
individual basis.
Stingrays, SIM keys, …. why in the world would anyone think a radio is secure communications without real effort?
More and Link below. Good article with excellent explanations.
Ridge
————–excerpt—————
AMERICAN AND BRITISH spies hacked into the internal computer network of the
largest manufacturer of SIM cards in the world, stealing encryption keys
used to protect the privacy of cellphone communications across the globe,
according to top-secret documents provided to The Intercept by National
Security Agency whistleblower Edward Snowden.
The hack was perpetrated by a joint unit consisting of operatives from the
NSA and its British counterpart Government Communications Headquarters, or
GCHQ. The breach, detailed in a secret 2010 GCHQ document, gave the
surveillance agencies the potential to secretly monitor a large portion of
the world’s cellular communications, including both voice and data.
The company targeted by the intelligence agencies, Gemalto, is a
multinational firm incorporated in the Netherlands that makes the chips used
in mobile phones and next-generation credit cards. Among its clients are
AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers
around the world. The company operates in 85 countries and has more than 40
manufacturing facilities. One of its three global headquarters is in Austin,
Texas and it has a large factory in Pennsylvania.
In all, Gemalto produces some 2 billion SIM cards a year. Its motto is
“Security to be Free.”
With these stolen encryption keys, intelligence agencies can monitor mobile
communications without seeking or receiving approval from telecom companies
and foreign governments. Possessing the keys also sidesteps the need to get
a warrant or a wiretap, while leaving no trace on the wireless provider’s
network that the communications were intercepted. Bulk key theft
additionally enables the intelligence agencies to unlock any previously
encrypted communications they had already intercepted, but did not yet have
the ability to decrypt.
As part of the covert operations against Gemalto, spies from GCHQ — with
support from the NSA — mined the private communications of unwitting
engineers and other company employees in multiple countries…….
https:/firstlook.org…
Recent articles add substance to this subject.
This site, which specializes in insider perspectives on both hardware and software of communications security, thinks the Sim Card Caper was directed toward military targets in the world’s trouble spots-
http://electrospaces.blogspot.com/2015/02/nsa-and-gchq-stealing-sim-card-keys-few.html
This article details how US police departments and prosecutors use “Stingray” type cell tower simulators to pinpoint cell phone locations and (perhaps illegally) sweep neighborhoods. However all local LEAs are under a gag order from the FBI about usage detaisl of these devices, so they barganed down a violent felony charge to a misdemeanor to avoid discussing them with a judge. Law and Order indeed.
Included in the article is a brief explanation of what it is and links to local police depts. that the ACLU thinks has bought into
the program.
http://www.washingtonpost.com/world/national-security/secrecy-around-police-surveillance-equipment-p
roves-a-cases-undoing/2015/02/22/ce72308a-b7ac-11e4-aa05-1ce812b3fdd2_story.html
https://www.aclu.org/maps/stingray-tracking-devices-whos-got-them
Be careful what you say on your cell; and where you say it.
R