Computer Security: Why Yahoo email surveillance is a big deal

Spread the love

Reuters reported yesterday that Yahoo had actioned a secret dictate by a US security agency to search all it’s customers’ incoming emails.

A small excerpt of Reuters report

“…

Yahoo in 2007 had fought a FISA demand that it conduct searches on specific email accounts without a court-approved warrant. Details of the case remain sealed, but a partially redacted published opinion showed Yahoo’s challenge was unsuccessful.

Some Yahoo employees were upset about the decision not to contest the more recent edict and thought the company could have prevailed, the sources said.

They were also upset that Mayer and Yahoo General Counsel Ron Bell did not involve the company’s security team in the process, instead asking Yahoo’s email engineers to write a program to siphon off messages containing the character string the spies sought and store them for remote retrieval, according to the sources.

The sources said the program was discovered by Yahoo’s security team in May 2015, within weeks of its installation. The security team initially thought hackers had broken in.

When Stamos found out that Mayer had authorized the program, he resigned as chief information security officer and told his subordinates that he had been left out of a decision that hurt users’ security, the sources said. Due to a programming flaw, he told them hackers could have accessed the stored emails.

…”

A program was written to search emails “for character strings”.

Yahoo facilitated remote retrieval.

Yahoo’s security team were excluded from the process.

Yahoo’s security team discovered the program in May 2015.

“within weeks of it’s installation”.

Chief Information Security Officer Alex Stamos resigns claiming that he was excluded from a decision that hurts client security.

Stamos says that hackers could have accessed the stored emails due to a programming flaw.

Why it’s a big deal

I’m not at all surprised that Stamos was pissed off. His security team would have their systems watching their networks for the slightest hint that anyone was thinking about hacking them. They would be watching which processes were running and be continually confirming the integrity of their programs. And then his boss allowed the government to root (rootkit) his systems.

In simple terms, the backdoor (remote retrieval) and it’s traffic was hidden, the running process was hidden and file system integrity checking was bypassed to hide the new program. That’s serious shit needing changes to the running system. It needs a rootkit to make a system hide all those things and behave as normal while hiding the rootkit itself. It was Stamos’s job to prevent some evil hackers from installing rootkits and therefore owning his systems and his boss has gone and installed one behind his back – and it may have been an insecure one at that.

There is a problem that the security team can’t really know how long they were pwned once the system is controlled by a rootkit. A competent rootkiter would certainly be able to fix the security archive as it was written to hide it’s existence and activity. This raises further questions: How long were they owned? Was the earlier security breach of late 2014 related in some way? The earlier security breach is attributed to state-sponsored actors.

[Even more: Take for example file integrity checking. The classic example is tripwire. At intervals it will check the integrity of system files. It’s basically enumerating system files checking that there are not more or less without reason and checking the integrity of important files e.g. program that run, to make sure that they haven’t changed.

To list files on Unix, the command ‘ls’ is used. ‘ls -al’ also shows hidden files and their lengths. The action of the ‘ls’ and similar commands are changed so that rootkit files and the new spying program is hidden – everything needs to appear normal and unchanged. The new program and the rootkit hides from everything by altering the running system.]

6/10/16 8am update:

Later reports suggest that the spying / scanning program was integrated with a pre-existing programme scanning for child pornography, malware and spam. This presents a reasonable explanation so that the new program changes and consequent process (running programme) were part of normal development / evolution of systems.

It still leaves the issue of the backdoor (remote access). It appears that a choice is presented: either there is a rootkit hiding the backdoor and it’s traffic or the string being searched for is the security agency’s string allowing remote access. It’s difficult to hide that backdoor and overall I’d go with a rootkit.

A rootkit tends to support Yahoo’s useless security over the past few years and the fact that it took so long to realise i.e. their systems were owned.

Continue ReadingComputer Security: Why Yahoo email surveillance is a big deal

Message from the new head of GCHQ. Be afraid and embrace the new bullshitism

Spread the love

http://www.bbc.com/news/uk-29891285

So the new head of GCHQ says tech

Oh this is all so much bolox

The new Head of GCHQ is in charge of ~ of how does this work? ~ we’re not criminals listening to absolutely all communications into and out of the UK. We can’t be criminals invading the privacy of all you criminal bastards – WE’VE GOT IT ALL. Oh and that criminal Angela Merkel.

Look you’re all criminals, we’re listening to all of it so we can scare you senseless to do as you’re told. Aren’t you afraid of terrrists. I’ll see what I can do.

[ed: These tech companies are bastards too. They’re not playing the game. Why aren’t they totally afraid of these imaginary terrrists too? They’re not playing the game. They’re not playing the be afraid of terrrists game. Bo Woo Woo Woo Hu!

These tech companies who have techies and intelligent people are not playing the game. Oh dear, I wonder why that is. Not.

Praps they realise that it’s all bullshit by Neo-Con scum. I would at least appreciate them that much. You know, they’re not stupid or not as stupid as you presume.

I’m not that clever but I’m not that stupid.

The new GCHQ boss. Is that the best you could do?

I’d better address that bullshit that the new GCHQ boss is spouting. It’s just that there was much crap that he’s overwhelmed me. So much total nonsense coming from the new twat in charge of GCHQ. So much shit.

There’s so much shit you’ll have to give me a day or two. I’ve got to swim through it and reach for air.

ed: It seems quite easy really. GCHQ boss says you have no right to privacy cos he’s got to chase terrrists. Terrrists are imaginary to make you afraid and accept repression. GCHQ boss watches you skudding.

How long till they insist on watching? No, it’s OK they probably got it bugged anyway in this ‘free’ society. They are only protecting your ‘freedom’ after all.

Do be terribly afraid of terrrists. Don’t be afraid of dying when you cross the road which is far more likely.

The main point about about this new GCHQ boss is that he’s pushing the discredited bullshit terrrism agenda. Oh FO. The USians may have swallowed that. The rest of the world didn’t or at least they don’t now.

FO GCHQ boss YFOS(hit).

Some tech company is gonna employ me as head of tech-terrrism relations soon. I can do that. Gizza, gizza, I can do that.

The dominant belief system is depending on imaginary terrrists. Fear. It’s nonsense and it has been demonstrated repeatedly that these b’stards engage in false flag operations to manufacture that fake fear.

It is very likely that tech companies are fully aware of your BS. Tech companies are not required or expected to follow your false prospectus.

Your false prospectus of imaginary terrrists scring the hebbegebbe out of us. That’s Bolux and I would expect that  that is accepted in not only tech companies. I would expect that  that is accepted in all big companies – that  that is total BS.

People believing in that ridiculous BS is diminishing quickly …

later: Why should tech companies comply with the BS nonsense of terrrism?

Why should tech companies allow political BS method of control  – in this paticular instance, the imaginary threat of terrrism  – exploit and disempower people? Should they? Why should they?

Politicians and GCHQ do the fear. Tech companies do the tech.

Looka like this new GCHQ boss gonna scare you senseless. There’s a Woolaf!

Be afraid. Be afraid. GCHQ boss says BE AFRAID!

Continue ReadingMessage from the new head of GCHQ. Be afraid and embrace the new bullshitism

Cameron, Clegg and Ed sneak in a snoopers’ charter by the back door

Spread the love

A snoopers’ charter by the backdoor: One day until Drip is forced through

by Ian Dunt

Privacy campaigners are frantically trying to brief MPs about the implications of the data retention and investigatory powers bill (Drip), before it is forced through all of its Commons stages tomorrow.

The more experts look at the bill, the more convinced they’ve become that it provides authorities with the spine of the snoopers’ charter, but without any of the public debate or parliamentary scrutiny which were supposed to accompany it.

The charter – known as the draft communications bill before it was killed off – would have forced internet service providers and mobile operators to keep details of their customers’ behaviour for 12 months.

Analysis of Drip, which was supposed to only extend the government’s current powers for another two years, suggests it forces through many of those requirements on internet firms without any of the political outrage which derailed the earlier effort.

Clause four of the bill appears to extend Ripa – the Regulation of Investigatory Powers Act (basically Britain’s Patriot Act) – so that the UK government can impose severe penalties on companies overseas that refuse to comply with interception warrants. It also lays out situations in which they may be required to maintain permanent interception capacity.

Clause five then provides a new definition of “telecommunications service”, which includes companies offering internet-based services. That seems to drag services like Gmail and Hotmail into the law, and very probably social media sites like Facebook too.

The government insists the extraterritoriality clause merely makes explicit what was previously implicit. It’s tosh. As the explanatory notes for the legislation – released very quietly on Friday night – make clear, overseas telecommunications companies did not believe they were necessarily under Ripa’s jurisdiction.

“Regarding the amendments to Ripa, in view of the suggestion by overseas telecommunications service providers that the extra-territorial effect of Ripa is unclear, it is considered necessary to amend the legislation to put the issue beyond doubt,” it reads.

“This includes clarifying the definition of a ‘telecommunications service’ to ensure the full range of telecommunications services available to customers in the United Kingdom are included in the definition.”

David Cameron, Nick Clegg and Ed Miliband insist Drip merely extends their current powers for two years. That’s nonsense. These two clauses, which have nothing to do with the purported aim of the bill, provide the spine of the snoopers’ charter.

They also appear to provide a legal basis for programmes like Tempora, the project revealed by Edward Snowden to allow GCHQ to tap into transatlantic fibre-optic cables and stored data.

Notably, Privacy International, Liberty and others are taking the government to a tribunal this week on whether Tempora is legal, even though the government won’t even admit its existence. Drip could make the tribunal ruling irrelevant.

read more

Continue ReadingCameron, Clegg and Ed sneak in a snoopers’ charter by the back door

The simple way to install Tor for online anonymity

Spread the love

Image of Tor onion networkingThe bad news is that the National Security Agency (the US authority that spies on internet users) targets anyone searching for privacy tools.

NSA classifies Linux Journal readers, Tor and Tails Linux users as “extremists”

“Months of investigation by the German public television broadcasters NDR and WDR (ARD), drawing on exclusive access to top secret NSA source code, interviews with former NSA employees, and the review of secret documents of the German government reveal that not only is the server in Nuremberg under observation by the NSA, but so is virtually anyone who has taken an interest in several well-known privacy software systems,” said the ARD report.

The program marks and tracks the IP addresses of those who search for ‘tails’ or ‘Amnesiac Incognito Live System’ along with ‘linux’, ‘ USB ‘,’ CD ‘, ‘secure desktop’, ‘ IRC ‘, ‘truecrypt’ or ‘ tor ‘. It also refers to the Tails Linux distribution as “a comsec mechanism advocated by extremists on extremist forums”.

The good news is that it’s never been easier to install tor anonymity software. Just head over to Torproject, grab the tor browser bundle and follow the instructions.

 

edit: I support the Tor project by running a Tor relay.

Continue ReadingThe simple way to install Tor for online anonymity

Commentary on and analysis of recent political events

Spread the love

Why did Jack Straw try to make it illegal for children at childrens’ homes to speak out about abuse? Was Jack Straw influenced by the fact that some of his friends and fellow politicians were paedophiles? Was this a desperate attempt to stop the truth coming out not only that Labour politiicans are paedophiles but highest level politicians of ALL parties?

Fifty new nuclear plants could be goal in official energy plans

Up to 50 nuclear power stations could be built under plans being looked at by the government. The remarkable figure – 10 times the number the government is openly discussing – is revealed in documents submitted to the Department of Energy and Climate Change by one of its own advisory bodies.

The documents are likely to raise questions as to what extent the government’s energy policy is weighted in favour of nuclear and away from renewables such as wind turbines. It comes as Brussels begins an investigation into whether Britain is providing up to £17bn of potentially illegal public guarantees for the first nuclear power plant in a generation, Hinkley Point C in Somerset, which aims to provide 7% of the country’s electricity.

Image of GCHQ donught building

NSA leaks: UK and US spying targets revealed

More details of people and institutions targeted by UK and US surveillance have been published by The Guardian, The New York Times and Der Spiegel.

The papers say that the list of around 1,000 targets includes a European Union commissioner, humanitarian organisations and an Israeli PM.

The Guardian writes that GCHQ targeted the UN development programme, Unicef, German government buildings and the EU Competition Commissioner, Joaquin Almunia.

Latest Snowden revelations expose Obama’s lies on NSA spy programs

Just hours after receiving a report from his hand-picked advisory panel on National Security Agency surveillance operations, President Barack Obama used his end of the year press conference Friday to deliver an Orwellian defense of unrestrained US spying both at home and abroad.

“I have confidence that the NSA is not engaging in domestic surveillance and snooping around,” Obama said, despite the cascade of revelations proving just the opposite. These revelations, including the latest from former NSA contractor Edward Snowden, have established that the agency is collecting and storing billions of files recording the phone calls, text messages, emails, Internet searches and even the daily movements of virtually ever US citizen, not to mention those of hundreds of millions of people abroad.

“The United States is a country that abides by rule of law[!], that cares deeply about privacy[!], that cares deeply about civil liberties[!],” he added. Who, at this late juncture, does the American president think he’s fooling? One only has to read the ruling by a Washington, DC Federal District Court judge—which was then stayed in the interest of “national security”—finding the surveillance methods of the NSA to be “almost Orwellian,” and its activities unconstitutional, i.e., criminal.

UK reneges on promised independent inquiry on rendition, torture

The Conservative-Liberal Democrat coalition has abandoned its promise to carry out an independent inquiry into Britain’s involvement in “extraordinary rendition”, detention”and torture carried out by the US Central Intelligence Agency (CIA). Instead, the inquiry will be undertaken by Parliament’s Intelligence and Security Committee (ISC), whose record is one of covering up the activities of the intelligence services.

Only last month, the ISC questioned the head of the internal security service MI5, Andrew Parker; the director of the Government Communications Headquarters (GCHQ), Sir Iain Lobban; and Sir John Sawers, head of the foreign intelligence department MI6. The hearing was meant to demonstrate unprecedented openness and accountability to Parliament of the secret state apparatus, after revelations by US National Security Agency whistleblower Edward Snowden that the UK agencies worked with the US to monitor the Internet and phone activity of most of the world’s citizens.

 …

Clare Algar, executive director of the human rights organisation Reprieve, criticised the decision to hand the investigation to the ISC: “If the government takes this course, it will be breaking its promise to hold a genuine, independent inquiry into the UK’s involvement in torture.

‘Megrahi was my friend. He did not kill my daughter’: Lockerbie father says British government is not telling the truth about the bombing

The father of one of the 270 victims of the Lockerbie bombing has asked mourners to pray for the “innocent family” of the only person convicted of the worst mass murder in British history, as the nation marked its 25th anniversary.

In his address to a memorial service at Westminster Abbey yesterday evening attended by relatives of the victims, Dr Jim Swire also accused the British government of failing to tell “all the truth they know about this terrible tragedy”.

Before the service, the UK, US and Libyan governments in a joint statement promised to work together to “reveal the full facts of the case”, saying that they wanted “all those responsible for this most brutal act of terrorism brought to justice, and to understand why it was committed”. [BS: positive identification]

Employment tribunal claims fell by more than half after introduction of fees

Theresa May strips citizenship from 20 Britons fighting in Syria

Abandoned: Theresa May turns back on American-held terror suspect

Labour should “do god” BS …

Continue ReadingCommentary on and analysis of recent political events