Breaking News

JEDEC Sets the Stage for the Next Leap in Flash Storage With UFS 5.0 MSI Launches Its First Back-Connection Graphics Card—GeForce RTX 5070 Ti 16G VENTUS 3X PZ Series TAMRON announces the Class-Leading Compact and Lightweight Telephoto Zoom, 70-180mm F2.8 VC G2 SAMA Announces Amazon Prime Big Deal Days Discounts on Gaming PC Cases, CPU Coolers, and ATX 3.1 PSUs Elgato Drives Audio Innovation with Two Next-Gen Tools

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

British Agency Was Stealing Cell Phone Codes

British Agency Was Stealing Cell Phone Codes

Enterprise & IT Feb 19,2015 0

In the latest Snowden leak, Britain's electronic spying agency, in cooperation with the U.S. National Security Agency, hacked into the networks of a Dutch company to steal codes that allow both governments to eavesdrop on mobile phones.

The Intercept on Thursday detailed how the intelligence agencies employed the eavesdropping capability. According to the report, the two agencies targetted Netherlands-based Gemalto - the world's largest manufacturer of SIM cards, which are used by any mobile phone.

The Intercept offered no evidence of any eavesdropping against American customers of those providers, and company officials told the website they had no idea their networks had been penetrated, adding they would investigate a report

The NSA did not immediately respond to a request for comment.

The privacy of all mobile communications depends on an encrypted connection between the cellphone and the wireless carrier’s network, using keys stored on the SIM, a tiny chip smaller than a postage stamp, which is inserted into the phone. All mobile communications on the phone depend on the SIM, which stores and guards the encryption keys created by companies like Gemalto.So, under normal circumstances, when a mobile call, text, or other communication is made, that communication is encrypted as it travels through the air from a mobile device to a carrier’s tower. At that point, even if the communication was intercepted by a third party (like the NSA), it would be encrypted and indecipherable. But anyone who has obtained the encryption key for a particular wireless user could use it to decrypt that communication.

As the Intercept notes, "if an intelligence agency has been "passively" intercepting someone’s communications for a year and later acquires the permanent encryption key, it can go back and decrypt all of those communications."

This type of interception leaves "no trace on the wireless provider’s network" or on an individual users device.

In the past, former agency officials have defended using techniques to further surveillance capabilities, saying the U.S. needs to be able to eavesdrop on terrorists.

Tags: nsa
Previous Post
Japan Display To Build iPhone Display plant: reports
Next Post
IBM Unveils New Storage Solutions Based on Micron's Flash

Related Posts

  • Microsoft Releases Critical Windows Security Pathes Discovered by U.S. NSA

  • NSA Could End Phone Surveillance Program

  • Congress Votes to Extend NSA Spying

  • NSA Oultines New Telephone Spying Program

  • NSA's Phone Surveillance Program Changes

  • NSA Ordered to Stop Collecting Plaintiffs' Phone Records

  • NSA Was Targetting Google Play

  • US House Approves Bill Ending NSA Bulk Data Collection

Latest News

JEDEC Sets the Stage for the Next Leap in Flash Storage With UFS 5.0
Cameras

JEDEC Sets the Stage for the Next Leap in Flash Storage With UFS 5.0

MSI Launches Its First Back-Connection Graphics Card—GeForce RTX 5070 Ti 16G VENTUS 3X PZ Series
GPUs

MSI Launches Its First Back-Connection Graphics Card—GeForce RTX 5070 Ti 16G VENTUS 3X PZ Series

TAMRON announces the Class-Leading Compact and Lightweight Telephoto Zoom, 70-180mm F2.8 VC G2
Cameras

TAMRON announces the Class-Leading Compact and Lightweight Telephoto Zoom, 70-180mm F2.8 VC G2

SAMA Announces Amazon Prime Big Deal Days Discounts on Gaming PC Cases, CPU Coolers, and ATX 3.1 PSUs
Cooling Systems

SAMA Announces Amazon Prime Big Deal Days Discounts on Gaming PC Cases, CPU Coolers, and ATX 3.1 PSUs

Elgato Drives Audio Innovation with Two Next-Gen Tools
Consumer Electronics

Elgato Drives Audio Innovation with Two Next-Gen Tools

Popular Reviews

be quiet! Dark Mount Keyboard

be quiet! Dark Mount Keyboard

Terramaster F8-SSD

Terramaster F8-SSD

be quiet! Light Mount Keyboard

be quiet! Light Mount Keyboard

be quiet! Light Base 600 LX

be quiet! Light Base 600 LX

be quiet! Pure Base 501

be quiet! Pure Base 501

Soundpeats Pop Clip

Soundpeats Pop Clip

Akaso 360 Action camera

Akaso 360 Action camera

Dragon Touch Digital Calendar

Dragon Touch Digital Calendar

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed