Click to Skip Ad
Closing in...
  1. Amazon Gift Card Promotion
    14:41 Deals

    Amazon’s giving away $15 credits, but this is your last chance to get one

  2. Self-Emptying Robot Vacuum
    16:11 Deals

    Amazon coupon slashes our favorite self-emptying robot vacuum to its lowest price ever

  3. Control Garage Door With iPhone
    08:10 Deals

    Unreal deal gets you Amazon’s hottest smart home gadget for $23 – plus a $40 c…

  4. Amazon Deals
    07:58 Deals

    10 deals you don’t want to miss on Saturday: $5 Alexa smart plugs, $110 electric sta…

  5. Amazon Echo Auto Price
    11:41 Deals

    Last chance to add hands-free Alexa to your car for $19.99 with this Amazon deal

Bombshell report reveals the NSA has stolen encryption keys for millions of SIM cards

February 20th, 2015 at 7:15 AM
NSA SIM Card Hacking

In a bombshell report published on Thursday, Jeremy Scahill and Josh Begley of The Intercept detail how the NSA and British Intelligence operatives managed to steal encryption keys from Gemalto, a Netherlands-based firm which produces a huge percentage of SIM cards used across the globe.

DON’T MISS: One of NSA’s most precious spying tools was just uncovered

With encryption keys in tow, it was rather trivial for the NSA and its English counterparts from GCHQ to monitor voice calls and data transmissions. Equally as important, possessing the encryption keys enabled eavesdropping without requiring any cooperation from wireless providers. What’s more, access to encryption keys enabled previously captured and encrypted data to be decrypted after the fact.

As for how it all went down, the NSA and GCHQ infiltrated Gemalto’s internal network. From there, they began keeping a close watch on employee emails and even Facebook accounts in an effort to discover and subsequently target potentially key targets worthy of enhanced monitoring:

In effect, GCHQ clandestinely cyberstalked Gemalto employees, scouring their emails in an effort to find people who may have had access to the company’s core networks and Ki-generating systems. The intelligence agency’s goal was to find information that would aid in breaching Gemalto’s systems, making it possible to steal large quantities of encryption keys. The agency hoped to intercept the files containing the keys as they were transmitted between Gemalto and its wireless network provider customers.

GCHQ operatives identified key individuals and their positions within Gemalto and then dug into their emails. In one instance, GCHQ zeroed in on a Gemalto employee in Thailand who they observed sending PGP-encrypted files, noting that if GCHQ wanted to expand its Gemalto operations, “he would certainly be a good place to start.” They did not claim to have decrypted the employee’s communications, but noted that the use of PGP could mean the contents were potentially valuable.

All in all, this latest report on NSA related activities certainly represents a black eye for those inclined to believe that our mobile communications are somewhat safe. If anything, the report actually bolsters the increasingly credible notion that everything we do on any type of electronic device can be tracked and monitored with ease, security mechanisms be damned. Just this week, for example, we highlighted how the NSA long ran a secretive spy program which involved the installation of an undetectable virus onto a hard drive’s firmware.

The full report from The Intercept is extremely detailed and well worth a read in its entirety.

A life long Mac user and Apple enthusiast, Yoni Heisler has been writing about Apple and the tech industry at large for over 6 years. His writing has appeared in Edible Apple, Network World, MacLife, Macworld UK, and most recently, TUAW. When not writing about and analyzing the latest happenings with Apple, Yoni enjoys catching Improv shows in Chicago, playing soccer, and cultivating new TV show addictions, the most recent examples being The Walking Dead and Broad City.

Popular News