Many otherwise well-informed people think they have to do something wrong, or stupid, or insecure to get hacked—like clicking on the wrong attachments, or browsing malicious websites. People also think that the NSA and its international partners are the only ones who have turned the internet into a militarized zone. But according to research I am releasing today at the Citizen Lab at the University of Toronto’s Munk School of Global Affairs, many of these commonly held beliefs are not necessarily true. The only thing you need to do to render your computer’s secrets—your private conversations, banking information, photographs—transparent to prying eyes is watch a cute cat video on YouTube, and catch the interest of a nation-state or law enforcement agency that has $1 million or so to spare.
To understand why, you have to realize that even in today’s increasingly security-conscious internet, much of the traffic is still unencrypted. You might be surprised to learn that even popular sites that advertise their use of encryption frequently still serve some unencrypted content or advertisements. While people now recognize that unencrypted traffic can be monitored, they may not recognize that it also serves as a direct path into compromising their computers.
Companies such as Hacking Team and FinFisher sell devices called “network injection appliances.” These are racks of physical machines deployed inside internet service providers around the world, which allow for the simple exploitation of targets. In order to do this, they inject malicious content into people’s everyday internet browsing traffic. One way that Hacking Team accomplishes this is by taking advantage of unencrypted YouTube video streams to compromise users. The Hacking Team device targets a user, waits for that user to watch a YouTube clip like the one above, and intercepts that traffic and replaces it with malicious code that gives the operator total control over the target’s computer without his or her knowledge. The machine also exploits Microsoft’s login.live.com web site in the same manner.
Fortunately for their users, both Google and Microsoft were responsive when alerted that commercial tools were being used to exploit their services, and have taken steps to close the vulnerability by encrypting all targeted traffic. There are, however, many other vectors for companies like Hacking Team and FinFisher to exploit.
In today’s internet, there are few excuses for any company to serve content unencrypted. Any unencrypted traffic can be maliciously tampered with in a manner that is invisible to the average user. The only way to solve this problem is for web providers to offer fully encrypted services.
Last year, my colleagues at the Citizen Lab and I released a paper on the commercialization of digital spying and the burgeoning third-party online-surveillance market. Historically, this technology has been the province of nation-states with the capacity to develop their own boutique capability. Targeted online surveillance typically involves a software “implant” surreptitiously installed on a user’s machine allowing complete control of, for instance, a mobile device or laptop. Intelligence agencies in the U.S., U.K., Russia, Israel, China, etc. have developed their own custom versions of these. But over the last five years, Hacking Team and other players have begun selling this type of capability for what could be considered “dictator pocket change.” Nations who lack the ability to create their own tools can now accelerate their online targeted surveillance programs relatively cheaply.
These so-called “lawful intercept” products sold by Hacking Team and FinFisher can be purchased for as little as $1 million (or less) by law enforcement and governments around the world. They have been used against political targets including Bahrain Watch, citizen journalists Mamfakinch in Morocco, human rights activist Ahmed Mansoor in the UAE, and ESAT, a U.S.-based news service focusing on Ethiopia. Both Hacking Team and FinFisher claim that they only sell to governments, but recently leaked documents appear to show that FinFisher has sold to at least one private security company.
It is important to note what I’m describing today is not massive intercept technology (although it can be used at scale). Unlike the NSA’s metadata collection, these tools are not used to target entire nations. Nevertheless, we need to have an open discussion about how we want law enforcement using this type of technology. Is it being used to catch child pornographers? Kidnappers? Drug dealers? Tax cheats? Journalists who receive leaked documents?
In the digital age, a search through the contents of your laptop, online accounts, and digital communications is just as invasive as a search of your bedroom. Historically, being privy to someone’s most intimate moments and conversations would once have required placing bugging devices inside their home, not to mention the time and manpower to listen to what was being captured. The cost of such an operation required the target to be someone of reasonable interest. Now, it’s possible to watch someone through the lens of their laptop’s camera, to listen to them through the microphone of their cell phone, and to read through online correspondence cheaply and remotely. The canonical surveillance van full of bored government employees (being paid overtime) deployed 24 hours a day is increasingly a thing of the past.
We simply don’t know how often this type of surveillance occurs. While the Snowden revelations of the last year have revealed much about the character of surveillance by the intelligence community, the use of hacking for law enforcement surveillance is less well understood. There is widespread agreement that law enforcement techniques should be held to a high standard of transparency. Indeed, in the U.S., law enforcement agencies publish records detailing the number of wiretaps they deploy each year. But there is almost no public information on law enforcement hacking.
As the costs of deploying this type of technology decrease, and the tools become commercialized, their use is growing much faster than is commonly understood. The research I am publishing today tries to move our understanding forward, but ultimately the answers as to how to respond are going to come from informed dialogue. Each country needs to have an open discussion about which law enforcement agencies should be authorized to use this technology, under what circumstances, and how oversight should to be updated to accommodate this new capability.


Ok, my IP isn’t banned, and I feel better. Maybe it was b/c I entered an email that was too obviously fake the first time. From now on I’ll enter hi-quality fakes only. I flatly refuse to comment on any site that demands I create a profile or identify myself in any ‘real’ (verifiable) way. I have stopped using email completely (simply don’t need it at all), cookies almost completely, and most scripts most of the time. I take several other measures too. None of them make me hard to track, but they do make it harder, which is all one can do without learning a huge amount of sec-tech.
Most importantly, none of the measures I take have much negative impact on what I can do on the web. The biggest is that I can’t comment on very many sites any more. I can watch YouTube by allowing just 2 YT_hosted scripts, and play Mahjongg-3D by enabling about 3. And any site that insists on cookies can go to h*ll !!! They do not get my clicks or anything else but my contempt.
I would prefer that the Intercept’s commenting system put NOT REQUIRED beside the email box, instead of an asterisk, and start encouraging comments without personally identifying information. In fact, isn’t it just a little bit weird that they don’t??? Frankly I think it is. If Bruce Schneier doesn’t then why does this site?
In the 90’s we free-thinking types worried about the day the internet would be taken over by corporate interests, knowing we probably couldn’t prevent it, only slow it down. No one was prepared for this, or for the stunning lack of interest from the world’s general population so far. It’s getting better, but it isn’t getting better faster than than the NSA is charging forward in “damn the torpedoes, full speed ahead” style. More like slower, and that’s an existential level problem imo. It certainly got existential for Aaron Swartz, after all.
See also http://www.washingtonpost.com/world/national-security/spyware-tools-allow-buyers-to-slip-malicious-code-into-youtube-videos-microsoft-pages/2014/08/15/31c5696c-249c-11e4-8593-da634b334390_story.html
California a few years ago was about to pass legislation prohibiting electronic solicitations unless the citizen opted in, then Congress got all worked up and prohibited CA from doing it. Somehow I doubt that this slice does not fit into the picture the article attempts to explain.
Sadly, it seems the patrol, guard is again being extremely heavy handed in Ferguson – when clicking on the previous link (RT) a banner at top o page said teargas was again used. On that page, the tactics seemed – way over the top.
Response to Ferguson = suppression of dissent
In line with this article:
“Hackers steal 4.5 million patient records from multi-state hospital network”
http://rt.com/usa/181172-chs-hospital-network-hacked/
On a O/T sidenote, ..Unbelievable groundshaking revelation in Jewel vs NSA!
https://www.techdirt.com/articles/20140813/23203228207/unsealed-jewel-v-nsa-transcript-doj-has-nothing-contempt-american-citizens.shtml#c248
Btw…before that shitsucking maggot Mussolini shows up and leaves his slimetrail all over the place…fuck you dickwad.
There are no words to describe this attempt by the DOJ to hide their contempt for the rule of law, notwithstanding the very entity that gives them their authority, which now, they have proved to despise. Even the name, Department of Justice, mocks the very concept. In my universe, this attempt at blatant tyranny would invoke a response of such magnitude, these chromosomally aberrant pond scum would explode in monumental fear for their heads. Fortunately for them, in this universe, there is still some remaining shreds of that concept, that will protect them from loosing their heads. That’s not to say, they haven’t completely lost their legitimacy. UNFORTUNATELY, as the USG is now a “legal imperialism”, it appears the ONLY way the people will ever regain their rightful power to reign in this Executive gone mad, is total, unequivocal armed insurrection, as once a republic has become a legal imperialism, it will NEVER, EVER relinquish its armed power. However, it has now demonstrated in no uncertain terms, it’s intention. And that is TOTALITARIANISM. After all..you just read the living proof. And if it didn’t make you sick to your stomach…something is seriously wrong with you.
Nothing would surprise me anymore.
We have a bunch of citizens with their heads stuck so far up their asses that daylight is a dream of days gone by, and a totalitarian government that is only interested amassing more data and more wealth for their Central Banker Masters, so that they can put the economic screws into all life forms left on planet Earth.
Thanks for the post chronicle.
Ever heard about “advocatus diaboli”? He is doing a brilliant job. – Barrack Obama too, but that´s my personal opinion.
http://www.thefreedictionary.com/Advocatus+diaboli
Sorry, little mistake, Barack Obamma of course.
All politicians lie. Or, didn’t you know that?
I commented yesterday that I question the inclusion of the video link in the article, but I can’t find the comment. It would suck if supplying fake email addresses gets one banned (and even if just the single comment is removed) from the site that tells us to avoid email in the first place. So if you see THIS comment, I guess you can draw your own conclusion.
At least Bruce Schneier doesn’t even ask anyone to enter anything in the field. That’s the way to do it if you take this stuff as seriously as one should, imo.
I think I just caught a speech by Obama that said we’re back in Iraq.
Obama is the perfect TOOL of the system.
you keep on believin’ even after you KNOW he’s lying
There are over a thousand troops in Iraq, 3000 troops await at the border, and airstrikes continue.
But we are not *really* back in Iraq. It’s just not the same. Like Libya, it’s because ‘Obama,’ which makes it all different…somehow.
James Risen at the Guardian: Obama and press freedom, a threat and hypocritical as well.
http://www.theguardian.com/world/2014/aug/17/james-risen-obama-greatest-enemy-press-freedom-generation
But he’s really a nice guy who wouldn’t at all fuck us over in the name of corporatist militarism!
Small change we can believe in.
What’s he going to say about this latest incident?
http://www.huffingtonpost.com/2014/08/18/getty-photographer-arrested_n_5689614.html
“The police have every right to defend themselves,” probably.
The only thing missing on their uniforms is the Swastika and Benito leading them.
More on the arrest. Scroll down and see the pretty court order the authorities signed, promising not to do this kind of thing.
http://www.theguardian.com/world/2014/aug/18/ferguson-police-arrest-photographer-scott-olsen
“[NSA] Officials are even running a pilot to monitor what those with clearances post on public social media and message boards, but they think that may be a step too far in terms of scale and intrusion on privacy.
Oh, the hypocrisy and the irony.
The story is here: http://www.thedailybeast.com/articles/2014/08/18/spy-games-us-intelligence-agencies-overdue-for-new-protocols-to-detect-leakers.html
From the same story:
“Adding to that, the officials said in the interview that by next spring, the Office of the Director of National Intelligence will start checking the names of 1.5 million employees with top secret clearances against a series of publicly available and government databases, including those that show recent arrests, credit scores and large cash transactions of $10,000 or more. It’s part of upcoming changes to the Insider Threat Policy set by the Office of the National Counterintelligence Executive.”
1. Shouldn’t that have been standard procedure since…forever?
2. Shouldn’t this task of “watching the watchers” be done by a transparent, outside entity?
3. Please tell me this post will be nested appropriately…
A bit OT – I found out why my comments (and possibly others) aren’t nesting properly: I had JavaScript disabled using NoScript.
Once I enabled it the comment nested properly – however, the fonts again became less visible (still readable, but less so) especially those block-quoted or italicized.
I love that the NSA is eating at its own tail.
I call massive BS.
According to the article, they would add physical hardware to the ISP. Microsoft (and I assume Google) have their own data centers, so this wouldn’t be possible. Third party folks can’t just walk in and put in their own gear.
The security in place also wouldn’t allow them to “intercept” traffic, as it would require a key to decrypt. Unless they’re talking about something that happened a dozen years ago…perhaps…still doubtful.
Yeah this story is getting me thinking about protecting my data, how do I do that exactly? Use TOR? I am going to google this!
Julian Assange wants to leave the embassy in London. And London wants to leave the European Union. Anyone else who wants to leave for a good reason?
Scotland. Cameron thinks he’s Tipper Gore.
That’s what it looks like. BTW, the ongoing Guardian page on Julian Assange is here:
http://www.theguardian.com/media/julian-assange
Clicking to see the cat video is indeed enticing. But for the NSA watchers reading these comments, equally enticing will be this link to a schematic of GCHQ’s basement levels (obtained during construction) on the darknet. But I’m not going to make it easy: you first have to decrypt the GPG cipher below:
—–BEGIN PGP MESSAGE—–
Version: GnuPG v1
jA0EAwMCiLSOPl/cmzVgyWxgkHmmqpfL+2A1MQd/gJvMoD6bnvx1LoSpZRZvVAeE
Xzjd5vRFxrZsTls5TViDTu+EtURfv5Y5K8cwBc9KUeYGrtTpApSDQA90HW9RbnKV
ApIT+tumlp1y1tVUcQQ632hgAP2ysoDhNapAG7U=
=NWPz
—–END PGP MESSAGE—–
(apologies for repeatedly posting this comment, but I am not seeing it on this page, in my browser.)
Which other news sites use https?
It is past-time to take a look at FISA and the FISC.
“What You Need to Know About the FISA Court–and How it Needs to Change”
http://www.opednews.com/articles/What-You-Need-to-Know-Abou-by-Electronic-Frontie-FISA-140817-730.html
“Should interpretation of the laws and Constitution of the United States take place in one-sided secretive courts, away from the public eye?
For years, it has. But even Foreign Intelligence Surveillance Court (FISC) judges don’t agree on how exactly the FISC should work. Since the Snowden disclosures, hundreds of lawmakers have made it clear that they want to see more transparency in the court by supporting various NSA reforms. Most recently, 18 Senators co-sponsored the new USA FREEDOM Act, S. 2685, which offers a few important changes to the FISC.
So who’s right? A look at the history and procedures of the FISC make it clear: real reform is needed now.”
“Who’s right?” is unfortunately always overridden by “Who’s narrative wins?” because propaganda has currently defeated ethics and claimed dominance or force to be forevermore the victor.
But this is not necessarily permanent, despite the claim.
“Whose narrative…” Forgive the grammatical error, I’m a little unfocused and highly annoyed.
@ Cindy:
As far as I am concerned, no court should ever be secret because by virtue of that secrecy it can not possibly represent the people who are supposed to be the body of the Republic and therefore the governors of themselves. A secret court can only represent the will of the elite governing the court. The court needs to be abolished along with all subsequent legislature that allows for mass surveillance.
It is difficult sometimes to make sense of lies and hate when your spirit is focused on truth and love. It is the ultimate grand illusion that soul can be controlled when free choice is given to the spirit. The system has no control if you give it none.
On Earth many people are presently repressed and enslaved by governments that seek to control them. All three branches of government in Washington DC are corrupted by the wizards of economic control (elite) and now they are trying to exert a totalitarian presence upon the people of the United States. It is getting very ugly.
In truth…they have no real control as they are attempting to steal intangibles that can only be given by the respective owners. Collectively, we can just say No. We are taking control of ourselves, our Republic, and our Constitution. No more “get out of jail free cards”. We are holding you accountable for your crimes.
There are many more people than there are of the elite. We can rip their their little political party system in two by forming one coalition of the people, by the people, and for the people.
New age claptrap.
No…in fact, I rather reject the New Age view as just another cult of religious domination. I reject all cults of religious domination as just another form of control…especially the organized and socially accepted ones.
If you can’t see that collective organization in opposition to the existing totalitarian state is necessary that is not my problem. It is incumbent upon each individual to question themselves and their own belief systems. Those that fail at that task will only get what is created for them, not what they create for themselves. That is simple common sense.
You cite “collective organization in opposition to the existing totalitarian state” – now, under what philosophy specifically does this ‘collective’ organize? I’ve seen and admired you quote the Bill of Rights, and if that’s what you mean then hooray we have a deal, but if it requires our “spirit being focused on truth and love” as you say above it sounds like nonsense to me even though as a Zen Buddhist I’m steeped in mysticism. People generally (I believe) need truly direct and not indirect messages, formal rather than nebulous conclusions.
“On Earth many people are presently repressed and enslaved by governments that seek to control them. All three branches of government in Washington DC are corrupted by the wizards of economic control (elite) and now they are trying to exert a totalitarian presence upon the people of the United States. It is getting very ugly.”
The philosophy that I propose is: mass legal and human collective organization in opposition to the martial law state for violating the Amendments of the Constitution of the United States of America. Hope that is clear enough.
As you say in different words, Chakra alignment is not a prerequisite to just say NO! To make this perfectly clear add: Fuck you National Security State, Federal Reserve, IMF, World Bank, Bank of International Settlements, CFR, Committee of 300 and Inner City of London. Especially, Fuck the puppets that we call our representatives in all three branches of our government. All of the great deceivers must Go To Jail and collectively we must throw away the keys.
The Congress getting rid of the US Patriot Act would slow down the NSA and other spy agencies.
A problem I have with this is its use by corporations, having nothing to do with law enforcement. This tech. seems rife with possibility for the marketing branches of multinationals. And, of course, they have no ethics or responsibilities whatsoever.
*Do You Trust the Government? 87% of Americans Don’t*
“Americans are seriously lacking faith in the system – in fact, trust in the U.S. government is at an all-time low. According to the latest CNN poll, just 13% of Americans agree that the U.S. government ‘can be trusted to do what is right always or most of the time.'”
http://www.truth-out.org/news/item/25628-do-you-trust-the-government-87-of-americans-dont
“In addition to government-related questions, the poll asked Americans whether they had faith in the private sector. The amount of Americans who trust corporations is similarly abysmal: just 17%.”
So Americans declaring the corporatist and militarist state is basically okay and not compromised to the point of corruption are 1) in the minority, and possibly 2) [perhaps paid to be] lying. Yet still the pro-establishment voices are so loud everywhere that mostly one hears comments to the effect that maybe the system is not so bad, it’s really the other party’s fault, and basically the establishment just needs tweaking here and there, or a committee or something.
It seems most people do know things are terribly wrong, but also don’t really feel impetus enough to challenge the establishment substantially. Given these figures, it follows that the propaganda which pacifies most of the masses into functional acquiescence regarding the system is obviously VERY effective. The figures imply that dissent and boycotting should be kind of commonplace, but such obviously isn’t the case – even while massive private disapproval is high. Fear is obviously a factor, and perhaps laziness and selfishness, and these are also encouraged and exacerbated by media messaging.
Notice for example how people are primed to think Holder and Obama might honestly assess the Ferguson situation, even after both morons have demonstrated time and again they don’t care about anything other than preserving the status quo.
That stat reflects people’s knowledge that the corporation and the gov. are nearly one and the same. This means that “big gub’mnt” is no longer a reference to the actual gov. but to the corporation too as it governs policy by writing legislation to benefit the corporation and congress simply signs it.
The end result of all this hacking could evolve well beyond financial loss and personal embarrassment. I suspect it will eventually result in a human stampede, possibly a dominipede (multiple, simultaneous stampedes). http://agsaf.org
Everything you know is wrong!
“No man is above the law, NOT even THE PRESIDENT.” -Richard Nixon
Doesn’t Obama have Air Force One at his disposal?
You got it… Pigs can and do fly.
Actually, he has two of them…
Pink Floyd’s 1977 song, “Pigs: Three Different Ones,” on the Animals album still seems very relevant, as does Black Sabbath’s 1970 “War Pigs.”
This is the future of war, the mobilization of vast national resources competing to see who can produce the funniest cat video. There is no need to physically destroy a person, when at the click of the button you can appropriate all their information, take over their bank accounts, evict them from their home and destroy their identities so they no longer officially exist. And yet, even knowing the horrible fate that awaited, how many reading this article were able to resist clicking on the video? While I deplore the demise of old fashioned war, I admit there is an attraction to luring your opponent into clicking on the link which seals their doom.
Google and Microsoft are patching the security holes? Well of course; you don’t want someone else gaining control of the powerful weapons you have developed. And by a fortunate coincidence, the US government, Google and Microsoft all have interests which are aligned and share the same agenda. So there is really nothing to worry about.
I was unable to resist clicking on the button. I’m pretty sure even if i knew for a fact someone would hack me I would still have probably clicked it…
It is part of the article so of course I did watch the video. And I do trust Google and Microsoft – as Munich does. Munich, the capital of Bavaria in Gemany, tried to run all the offical networking with LINUX, but after 10 years they think about returning to Microsoft. So trust is back.
I resisted. … 14 minutes of funny cat videos is a bit much, no?
*also, I resist links to ‘Sales’ of 100% off of fashion wear
100% off fashion wear would leave you naked or very unfashionable. :)
I was praying to the lord for some fine fashion wear … and in walked a bunch of bare naked ladies!
*I figured it was a sign :)
You crack me up, bah! You da man.
This is how it ends, Duce? Not with a bang, not with a whimper, but a meow?
Seriously, though, the vid that probably heralded the end of the Republic was Milley Cyprus’ “We Can’t Stop” at that awards show. It was transcendentally bizarre, so much so it made “The Producers” look like Handel’s “Messiah.”
Resist this … http://www.youtube.com/watch?v=1nt1GAWxaTU
Gear reporting. So justifiable. Your headed straight for fuckin jail time. We have your ass in the slammer fuck face.
She has nice teeth. My compliments to her dentist.
Maybe Miley can do a music video about dental anesthetics. She can call it, “Trance and Dental Etudes.”
“In my opinion, the failure to understand the scope and functions of the various Departments falling under the NSD is the primary reason that citizens are failing to grasp the big picture when provided with bits and pieces of the puzzle.
Excellent conclusion. I do hope that the Intercept and other tech news agencies take heed and try to “dumb down” the dialog for ordinary internet consumers in order to ensure they understand the implications better.
When in doubt, (actually – do it anyway) please enlist Mr. Binney, Mr. Drake, Mr, Snowden, et .al in helping to do so – because their “inside-our” expertise and ability to break it down in to something understandable for the general public is greatly appreciated.
The general public, unlike many in this comment section, long ago became resigned to the fact that someone would be in control. In younger countries such as the US, there is still a rump fringe who believe in the myth that everyone can be free. But in Europe or China, there is an accumulated wisdom, based on a longer experience with government, that one group of leaders, despite all the fancy speeches, is very much like another. If they are somewhat worse than average, they will eventually be replaced by something better. If they are better, they will eventually be replaced by something worse. So the best thing the average person can do is keep their head down, go about living their lives, and hope they don’t attract the unwelcome attention of someone in power.
So you can dumb down the dialog all you want, but it doesn’t change the basic problem that the average person is just too intelligent for their own good.
>”The general public, unlike many in this comment section, long ago became resigned to the fact that someone would be in control.”
I am in ‘control’.
*there you go again, sad sack. I knew (of) Reagan, and you, sir, are no Reagan. All that gloom&doom talk about how nothing ever ‘changes’ is a bunch of nonsense. You’ll give these people a paralyzing case of the ‘can’t help it’ drizzles with defeatist talk like that.
p.s. Unfortunately, they can’t ‘dumb it down’ enough for me. .. I get hacked in a bowl of cheerios.
And I’m too old (or too cantankerous) to learn this stuff. That’s why I only use ‘burner’ laptops … two turntables and a microphone.
Doom and gloom? I’m just the opposite. My message is to relax, let the leaders drive, enjoy the ride and don’t worry too much if they appear to be heading towards a precipice.
It is Glenn Greenwald who’s the backseat driver, questioning every wrong turn. Yes, he may a know a shorter or more scenic route, but unless he wants to drive the bus himself, he’s just upsetting people for no reason. You should address your comment to him.
Ha! Glenn Greenwald deals in ‘all the wrongs he feels compelled to write.’ *
* h/t Nein Quarterly
“don’t worry too much if they appear to be heading towards a precipice.”
I’m not worried in the least Mr. Musolini…In fact, I wish that they would just jump…it would help me avoid those nasty thoughts of pushing them.
I for one will only relax when we have a new bus with a new driver, and maybe when a number of the roads have also been changed which are leading the bus astray. The bus corporation COFR needs to change too, and accept that it can no longer set the routes the buses take without public scrutiny, less secrecy, greater transparency and accountability. The new bus of improved standards in Governance, press freedom and transparency is coming, but until that new bus arrives, Glenn has every reason – not “no reason” to continue his work. Those that are upsetting people are our Governments, not those that reveal their crimes and corruption.I hoe that you are 100% clear on that now Benito.
>”It is Glenn Greenwald who’s the backseat driver … You should address your comment to him”
I think Glenn Greenwald drives a team of sled dogs … No sense wasting ink.
Good lord, it’s worse than I thought! You’re an Obama loyalist!
~ “We tortured some folks … but whadda you gonna do?” (h/t tom tomorrow)
.
.
.
~ “Unfortunate unrest in Furgerson … but whadda you gonna do?”
~ “Iraq war was dumb&stupid … but whadda you gonna do”?
etc., etc.
The problem with the leadership principle, Duce, be it in despotisms, corporate states or absolute monarchies, is that the leader has to be benevolent and wise, someone Niccolo Machiavelli would approve of, a Cosimo de’ Medici or a Marcus Aurelius. What we in the Stati Uniti have is someone who more resembles Tsar Nicholas II, or maybe Napoleon III.
Yes, it is a bus, but if the driver is Ralph Kramden or Jimmy McNulty, the discerning passenger should get off at Grand Central Station.
You don’t need a Weatherman to know which way the wind blows ;)
“So you can dumb down the dialog all you want, but it doesn’t change the basic problem that the average person is just too intelligent for their own good.”
vs a dumbass like you, right?
Thanks Sillyputty.
I do continue to try, but as you might note….it often falls on deaf ears. More is the pity I guess….
“Mr. Binney, Mr. Drake, Mr, Snowden, et .al ” they and many more persecuted heroes from the annals of history provide the evidence, the guts of the matters at hand; and let us not forget the hero journalists that report objectively despite the over-bearing threat of slander, libel, or worse. But…. ultimately, the end result of their noble work falls upon their audience. It is about an individual’s choice to acquire and keep an open-mind regarding the information that they provide and then transfer it into a viable framework for action.
Ultimately, I believe that human beings can and will, rise to overcome the most prevalent of reported threats to the most basic of inalienable human rights. It is just a choice away.
OT:
“This is the other side of America’s drone program: the part that comes after the missiles fly and the cars explode, when the smoke clears and the bodies are sorted. Because it is here, at desert strike sites across the Middle East, where unsettling questions emerge about culpability and responsibility — about the value of a human life and assessing the true costs of a surgical war.”
*Nothing Says “Sorry Our Drones Hit Your Wedding Party” Like $800,000 And Some Guns*
http://www.buzzfeed.com/gregorydjohnsen/wedding-party-drone-strike
What an article. It was so well researched and written. It really brought home the horrors these people are living with. It also explored the area of payments for civilian casualties in a compelling way. Thanks.
If I understand this (and please someone correct me if I am wrong), the equipment sold for the function discussed here is useful to an internet service provider, an entity that has access to the data stream on the way to/from users. Obviously, such an entity can, contrary to its usually understood function, do anything to these data streams (but if encrypted, there would be only very limited information about what is passing through and therefore little it could do), and therefore the equipment under discussion has the convenient purpose of allowing the ISP to easily screw around with the data it is supposedly, by contract in fact, just passing along. Fine, some ISP’s are shits; maybe most are these days. Others might be under pressure from the OEG (our evil government).
However, I am puzzled by the connection to law enforcement agencies. At least in the US, these agencies are not ISPs. Where, then, is the role for these types of equipment? We know that the telecoms already provide essentially everything our agencies want to them under contract. So, then, is the application of the equipment discussed in this article for government use effective only in those lesser countries that have direct access to the data streams, but lack the ability to build their own systems? This makes sense, but then this article would seem to be two independent discussions, welded together in a way that seems a bit confusing.
@ Mike:
The equipment discussed in this article is intercept hardware installed into ISP servers allowing any of the agencies in the National Security Directorate (NSD) to intercept data from the servers. For instance, A T T has been getting paid for years by OEG (Our Evil Government) to allow these intercepts and store data on their customers. These NSD agencies share this accumulated data among one another as well as with the Five-eyes partners. (This is not to say that ISP servers could not be hacked by other than so-called “partners” which is basically any nation state or individual with the right access) One of the NSD agencies is the Department of Homeland Security under who’s hierarchy are local law enforcement agencies like police and Sheriff Departments all over the United States of America. Here is the page to view the full directorate:
“Office of the Director of National Intelligence”
http://www.dni.gov/index.php
In my opinion, the failure to understand the scope and functions of the various Departments falling under the NSD is the primary reason that citizens are failing to grasp the big picture when provided with bits and pieces of the puzzle.
Hope this helps.
Thanks, but it should be clear that the DNI web page is not the place to find out the details of what they do and thus hide from you.
The link certainly won’t tell you what they are hiding but it will tell you how “they” are organized and even details the tasked mission statements of each agency.
One has to dig around in the dirt a bit before planting a garden.
Garden of Eden where your lesbian ass is going. Fuck you fuckers Lauren has your shit figured out and the FRENCH are even up your ass now. Lauren says FUCK YOU BASTARDS
Also posted to the “militarization” story. The US military gave $449m in equipment to US police forces in 2013 alone. You can get it from the horse’s mouth here (h/t thewire and legitgov) –
http://www.dispositionservices.dla.mil/leso/Pages/default.aspx
More than that in previous years, courtesy of the 1033 program, billions’ worth. All the better to pursue the followers of Chairman Meow in the name of homeland security.
The lunacy of the barbaric notion ‘peace through intimidation’ appears to be ‘the American Way,’ with everyone in any situation of power vying for one kind of supreme dominance or other. The culture itself is corrupted, it seems, not just the establishment. The populace is now as blind to the full dynamics of the nation’s own unethical cultural conclusions (promoted daily by the media and government) as any other group of fanatically and dangerously warped minds that considers itself ‘exceptional.’
Related to my last point (“any other group of fanatically and dangerously warped minds that considers itself ‘exceptional'”):
*Our kills are ‘clean and secular,’ theirs are messy and religious.*
http://www.informationclearinghouse.info/article39417.htm
Thanks for the that link coram nobis.
My local police department was able to request, a couple of aircraft (Utility and Observation), 4 HMMWV’s, 1 MRAP, 50 M16A2 assault weapons, and 30 M-1911 45 Cal pistols. Not bad for a little typing and a sizable relinquishment of county funds.
Yeesh. The M1911 pistol. It was as much a threat to the American soldier as it was to the enemy due to training accidents, and superseded by the Beretta 9mm around the time of Desert Storm (the Beretta is also being superseded currently). I’m surprised they had it in stock, probably packed in cosmoline in hopes of a blessed resurrection. The M16 was no prize either: if the bolt carrier wasn’t fouling, it was double- or triple-feeding rounds — in any event, prone to malfunction in an emergency.
Damn! Now I have to notify my local PD to cancel the M-1911’s and get the Beretta 9mm’s instead. Rather partial to the M16’s….true they sometimes jammed but the automatic function was just so effective for those with less than perfect eyesight.
The AK and Galil series are better. HK and FN probably have something worthwhile as well. As for handguns, anything by Walther is better than the crap they have now.
I wonder if the Intercept holds any further information or documentation on this ~
http://www.counterpunch.org/2007/11/16/two-brothers-and-two-scandals/
http://en.wikipedia.org/wiki/A._B._Krongard
ok, as a user of the internet and one who likes to watch cute kitten videos, how do I make sure I’m not being hacked?
Also, if I put a video on You Tube how can I encrypt it? Don’t want friends getting hacked
New article from Germany’s Heise and authors, Julian Kirsch, Christian Grothoff, Monika Ermert, Jacob Appelbaum, Laura Poitras, Henrik Moltke.
NSA/GCHQ: The HACIENDA Program for Internet Colonization
http://www.heise.de/ct/artikel/NSA-GCHQ-The-HACIENDA-Program-for-Internet-Colonization-2292681.html
Thanks for posting this article seer. A wee bit on the technical side.
TCP Stealth is a positive measure. Will be looking into the “Knock” patch but need to review those command lines several more times before attempting implementation. It might be better to contact my distribution gurus and ask them test the package and the code; they can then put it into a distribution specific repository.
Thanks again.
Don’t know how I left out the first thought of my comment to you – getting too old I guess – but I meant to say that You Tube (Google) has created fixes so criminals can’t (for the time being) exploit your connection to their products. Only the NSA can, the exalted criminals of privilege.
P.S. Yes, it is far too technical for me also. For instance, I know for sure this computer has been backdoored but I don’t trust myself to get inside and repair it without doing damage. Grrrr!
Whoops! I *did* tell you that, but in a different comment further down. Second cup of coffee on the way. Soon I’ll be awake.
Whoops! I *did* mention that in a different comment. Awake now after second cup of coffee.
So sorry for the error.
Please pardon the interruption, but NPR Ombudsman published a response to Glenn’s article. I linked to it in the NPR post. Many of you will be interested in that.
Get out
This is somewhat on topic regarding VOIP networks. Actually, rather funny.
“Turnabout’s fair play? Germany intercepts Hillary Clinton phone call”
http://rt.com/usa/180716-germany-spies-hillary-cell/
“Germany’s foreign intelligence agency intercepted at least one phone call made by former Secretary of State Hillary Clinton, according to German media reports. Her phone was tapped “accidentally” while she was on a US government plane.”
for the german readers there was a summary about this published recently at http://lowerclassmagazine.blogsport.eu/2014/08/nerdnews-verschluesslung-alternativlos/
You should really eliminate this section of the Intercept. You should have your own name listed up top of the Intercept (like Greenwald) or you should be placed in “news”. You are being placed in a lower status area of the Intercept – and this does qualify as news of interests to a lot of people.
Good article though.
Is this Windows only?
Whenever I go to this site, I’m first getting a prompt that it’s cerificate can’t be verified, and it warns me to stay away.
Is anyone else experiencing this? Anyone know why it’s happening?
Another thing that concerns me is the possibility (probability?) of it’s use for blackmail. If virtually anyone with the inclination to do so can easily mine someone’s personal info, then it’s only a very small leap to conclude that this crime will be committed and probably to a freightening degree. And how are we to know who’s being violated and who the perpetrators are? The possibilites are truly disturbing.
Maybe I’m over-reacting (in circumstances like these, how would I be able to know?), but…
A little disappointed at the inclusion of a link to said YT cat video in the article with no additional info such “It is safe to click this link” or “It is NOT safe to click this link”. Especially b/c if one clicks the YT logo at the bottom of the vid’s “window”, one gets taken to the actual video, on the ACTUAL YouTube website, we’ve just been warned not to watch in the article’s headline. Some of us, without being stupid or even particularly uninformed, will not know what to do (HERE’s what to do: DON’T CLICK THE LINK, since no one has deemed it useful to bother mentioning that it is safe to do so. Precautionary principle. Sorry.)
Somebody at THE INTERCEPT please take a close look at this, and maybe also your basic mandate(s), to see if there’s a (possibly egregious) mismatch of noble intentions, or something, somewhere?? Leaving us, your rather dedicated readers, “unsure” of what to do isn’t really very helpful, imho. With great hope, I regard this as something of an error on your parts – one that might NOT be repeated!
” But there is almost no public information on law enforcement hacking.”
This post is important, especially since the conversation about militarized local police has begun.
A national discussion about reforms including better psych-screening and policy reviews with more emphasis on public safety and security could include this nugget. But again I ask; what’s the cats name? If you feel it’s more digestible to relay facts uncovered by the teaspoonful and this is the reason for not feeding in greater portions, ok. But does that mean the list of names will also drip slowly, starting with only high-level persons? I vote for releasing in toto.
Which news sources use HTTPS?
What I like about this is that it speaks to the most common of common ground. While I’ve never understood the allure of these “cut pets/kids” sites, they clearly speak to the masses, and it’s the masses that need to get over this notion that only “bad guys” (vomitous phrase) have to worry about the NSA. Anything that can be done to make inroads in undoing this desperately naive mentality is welcome.
I love “kitties and puppies” but due to the warning that I might get hacked by the entire National Security State Directorate (but of course that has already happened); I am hesitant to watch the You-Tube video in this presentation.
I do agree that ANY method of cutting inroads to the less than technically inclined is warranted and necessary. Maybe something like a “Hacking by the US National Security Directorate for Dummies” with a few stick people carrying signs that say “OMG!!!” in a Vimeo presentation format?
You may be safer than you think watching a You Tube video now that they fixing at least part of the problem.
http://www.washingtonpost.com/world/national-security/spyware-tools-allow-buyers-to-slip-malicious-code-into-youtube-videos-microsoft-pages/2014/08/15/31c5696c-249c-11e4-8593-da634b334390_story.html
Sorry…All proprietary software companies lost me in their sea of economic greed. I do not trust either Google or Microsoft. Open source for me….thank you.
Microsoft hacked my Windows OS install with their updates….several years ago. I could possibly hack away at the registry but it would probably destroy the OS. Turned off all of their services and removed lots of software instead. Still have the evidence in an quarantined partition on the hard drive.
Just kidding about you-tube. It doesn’t matter any more. The damage was done years ago, to everyone, in the United States of America. The whole proprietary software industry, hardware manufacturers, component manufacturers, and Internet Service Providers are in cahoots with all of agencies in the National Security Directorate to get it all on everyone. Hell…it’s too late to care about how much they can get because they already have it – all.
My advice at the present time….switch to a Linux operating system(OS), use a secure proxy service, install a lite Linux OS running a TOR browser into Virtual Machine software and feel free to use the internet. Another alternative is to install a lite Linux OS running TOR onto an external drive and minimize storage of personal data on that drive, then connect using a proxy service. Of course, that is something of a hassle to the casual user isn’t it? Most people just want to point and click and jumping through hoops just to use the internet to prevent the USA spy team from acquiring data that they already have is rather futile.
The answer is to prohibit mass surveillance of citizens by any government and force destruction of all illegally obtained records accumulated thus far. We Americans need to grow a pair regardless of gender, and demand that Washington DC complies with and upholds the Amendments of the Constitution of the Republic of the United States of America.
Where does one find a *secure* proxy service? They all attract negative attention… spooky.
See the latest from Barton Gellman @ Washington Post, August 15:-
“U.S. firm helped the spyware industry build a potent digital weapon for sale overseas”
So do not wash your cat, otherwise next day the FBI is visiting you. Good news for all cat lovers.
Better feed kitty nothing but tuna and salmon from now on, not that gooey stuff, or s/he will rat you out to Homeland Security.
This may be a bit OT, but I wanted to let you good folks know about this – as the germ of my idea came from TI comments!
Actually, some of the comments from David and his quoting Inelia Benz about trying to think of new futuristic plots got me wondering if I could come up with a story possibility. Her actual challenge was a bit harder than I thought so I’m still mulling that part over. BUT – I have come up with a story and, well ok, I stole – um, – borrowed the basic plot, but I’ll take creative sparks wherever I find them. I hope some of you will give a read. I just put up part 1 on my blog, to be followed by part 2 tomorrow.
The link to my blog is: http://observergal.blogspot.com
And thanks.
@ feline 16:
Hanging on the edge feline…waiting for part 2.
Thanks sooo much Lyra1 –
That’s probably the highest compliment you can give a writer! Thanks again for reading and I hope you’ll like part 2 as well :-)
{“…..Together, we found we could make changes and fight for better working conditions. So social justice can happen, if we unite to fight for progress.
“I once told someone ‘If you want to remember me, organize!’ Community based action needs to keep happening.” }
https://www.youtube.com/watch?v=5iU26rp6hDQ
Part 2 was even better than Part 1. “A Christmas Carol” was an old childhood favorite but “A Summer’s Carol” is better. It could change the world.
Thanks felline16.
Lyra1 –
Thank you so very much for your kind words. I’m so glad you found “A Summer’s Carol” worth reading. As an artist it’s so gratifying to know that the offering had made a connection with someone. I so appreciate hearing this!
This is a massively sensationalist article… the attack vector is not just any website which does not use https:
The attack vector has multiple parts to it, and the most important part here is a shitty much hated proprietary browser plugin called flash. There’s nothing new here, flash has holes in it, in many ways. Exploits have been found in the past and will be found in the future until it’s dead.
When was the last time there was any news about gaining root access to a machine via plain standard HTML, CSS, Javascript and basic content formats such as PNG and JPG.
Almost overwhelmingly all abritrary code execution vectrors are through closed source proprietory software.
Using https to view a video or consume any kind of content on the web is not the solution. It is completely unessesary and misses the point… the point eing that the real attack vector is the exploit ridden software. If every company serving content that requires buggy closed source software to view starts serving over https exclusively then the obvious next step for anyone wanting to exploit that software is to do it from within those companies.
The solution is: don’t use flash, don’t use JAVA (read JAVA (Oracle)… not Javascript which is an open, a w3c standard and is safe.)
Today my 4th grade daughter dragged me into the”Build a bear workshop” store in the Mall of America. There she picked out a fuzzy little bear “skin” and we went to get it stuffed with fluff. The fluff-stuffing operative started by tearing an RFID tag off the bottom of the uniquely-identified price label, and placing it inside the toy – where it will remain for as long as it exists. She explained that she was doing this because if my daughter dropped the bear later in the day and someone happened to bring it back to the store, they would know that it was her bear. The fact that it was paired with the price tag and would therefore identify whoever paid for the bear as the parent of a 9YO child, and tie that person via his cellphone signal to a permanent record of every footstep he took in the course of his visit to said mall, as well as tracking the location of the toy, and therefore the child, indefinitely, was something that was lost on her. Welcome to the 21st century, folks….
I suspect that even at prices as low as 1 million dollars, these guys are overcharging.
The technology just isn’t that complex. At least 5-eyes intelligence agencies pretend to have oversight, and at least their interests coincide with mine. I doubt that their equivalents in states like North Korea, Syria, Iran, Russia, Uzbekistan or Turkmenistan have any such quibble, or any such alignment.
Even so, the murderous pettiness of the nation-state worries me less than highly automated organised crime. Surveillance isn’t the only thing that technology enables you to do in “mass” … the exploitation of that surveillance is simply a matter of connecting a “mass sensor” to a “mass effector”.
Could First Look please provide a list of which newspapers’ sites use HTTPS?
I bought attwifi for the day recently, and my browser said the certificate was bad. Wouldn’t let me look at it though. I called the at&t wifi Help number, and the woman who answered said to just go ahead, that “we’ve been seeing that lately”.
Start with a reputable VPN service. Read “Which VPN Services Take Your Anonymity Seriously? 2014 Edition” on TorrentFreak, and choose. For better anonymity and security, install VirtualBox and connect through the Tor anonymity network using Whonix. Whonix is a pair of virtual machines (VMs). One is a gateway to Tor, and the other is a workspace. Even if the workspace VM were totally hosed, the attacker wouldn’t know your ISP-assigned IP address, or be able to access anything on the host machine or in other VMs. For specifics, please see my guides on the iVPN website.
Lauren likes being a Chinese spy she hates your fucking ass her daughter takes Chinese they want your fucking ass they LOVE HER
Very useful – your VPN info suggestion. Thank you.
You shove systematically killed the soul of a women like we took her over. It was inevitable. She will live this way for the rest of her life due to your hatred and vengeance. For the world. She suffered. Man in the mirror
…hmmm? Could this be why Oracle is laying off thousands of employees. Trust on the internet, and of internet hardware is collapsing?
Exactly ducking dumb shit CIA
Oracle: nope, that’s simply because no one wants to buy their overpriced database, applications and services.
Is this threat dependent on OS? For example, if I was using a Mac or Linux, would I be affected?
Surely, if they just target Windows users (because they have the biggest slice of the pie) then if the affected people switched to say, Mac or Linux, then it would be a different kettle of fish, wouldn’t it?
Aubrey Mclendon is Mr Rhizome… Lauren came up with that on her own before she knew us before she knew your shit and before she knew the popo were chasing her. Lauren is a fucking telepathic genius. The doctors who study her are fuckin blown away. She is fuckin Lucy even Lauren blows her own shit… She FEELS EVERYTHING…she is the fuckin bomb…you are fucked the WORLD is up your a holes. She hates you. She is going to think of a song for you cause Lauren likes songs she speaks in music and crypt she is ducking amazing she has been doing it before she was chased she is Bi Polar you are fucked
Lauren is isolated to her home for another 6 months to keep her from getting shot in the head.CIA….FUCK!!!Lauren says fuck you fuckers!!! Go to fucking hell on earth. There is NO GOD THERE IS NO REDEMER THERE IS ONLY FUCKERS LIKE YOU you are full if shit and fucking screwing me you FUCKING SUCK NOT ME FUCKERS YOU DO..
I would love to fill you in on the following from my personal experience, but no one is giving me the benefit of doubt that i’m not crazy. Its far more unfortunate for you all that i’m not being heard than it is for me. When you are ready to hear the truth you will find me.
“In the digital age, a search through the contents of your laptop, online accounts, and digital communications is just as invasive as a search of your bedroom. Historically, being privy to someone’s most intimate moments and conversations would once have required placing bugging devices inside their home, not to mention the time and manpower to listen to what was being captured. The cost of such an operation required the target to be someone of reasonable interest. Now, it’s possible to watch someone through the lens of their laptop’s camera, to listen to them through the microphone of their cell phone, and to read through online correspondence cheaply and remotely. The canonical surveillance van full of bored government employees (being paid overtime) deployed 24 hours a day is increasingly a thing of the past.
We simply don’t know how often this type of surveillance occurs. While the Snowden revelations of the last year have revealed much about the character of surveillance by the intelligence community, the use of hacking for law enforcement surveillance is less well understood. There is widespread agreement that law enforcement techniques should be held to a high standard of transparency. Indeed, in the U.S., law enforcement agencies publish records detailing the number of wiretaps they deploy each year. But there is almost no public information on law enforcement hacking.”
Marco………………Polo
Little weed first chapter was Lauren’s pride and joy. We made her publish it. She stood her ground like custards last stand…get that fuckers like mustard gas. She fuckinbf took your shit as long as she possibly could. She is a fucking American hero. You are all fucked everyone hates you.
Ill stop the world and melt with you. They fuckin love her. YOU ARE FUCKED
Lauren is drinking cheap wine like your asses when he comes to understanding a global economy. Even little star weed lauren understands the fucking economy that feeds your fucking asses. Guess what? Lauren blames her potential suicide on you because now she knows you were holding out against her to get your big boys. She knows you are responsible for all of this. The whole fucking world with any fucking money knows Lauren little star weed Lucy and they fucking hate you now. You fucked yourselves. Even Lauren hates you. She says she would NEVER speak for you cause you are the greediest of all.
“The Hacking Team device targets a user, waits for that user to watch a YouTube clip like the one above, and intercepts that traffic and replaces it with malicious code that gives the operator total control over the target’s computer without his or her knowledge.”
I think this is stated there simpler than it actually is. So, bad guys can inject evil code into video streams. But to actually execute this code, they would need some kind of exploit in the video player software, no? Provided I keep my software up-to-date, they would need a zero-day which is not that easy to find/write. Its not as if you are automatically exploitable just by viewing an unencrypted stream.
Furthermore, I don’t see how encryption is going to help against this kind of attacks. The bad guys can still inject evil code into encrypted traffic and exploit bugs that occur prior or during decryption. Encryption does not make the traffic tamper proof. Could it be that you were actually talking about integrity/authenticity measures (which are also provided by HTTPS).
I’m not sure if this article makes plainly incorrect statements or is just lacking sufficient detail. Maybe you could enlighten me?
You can find links to good free security software at Prism-Break.org
http://prism-break.org/en/
You can find links to many different free security software solutions at Prism-Break.org
http://prism-break.org/en/
Lauren wants to know how you couldn’t figure out the Chinese were up your asses a long time ago..we didn’t have to spell it out for her telepathic little weed stem she knew all along….she says she wants to play ill melt with you on you tube cause that’s what LUCY did. Your little minds can’t even imagine that’s why Lauren says you are fuckin stupid she says the peole at google could put screws up your ass from their PC and you wouldn’t even know it. You would think its a fuckin hemroid from sitting on your fat asses being STUPID that’s from Lauren Lucy also Lauren wants you to know that Lucy is coded for Lucky go get your fuckin Madonna lucky star you tube app for your dumb fucking brains. Lauren says fuck you.
Lauren is getting drunk she says fuck you for doing this to her she knows all about you by reading your shit and yeah you fuckin bitch it’s all robo cause you’ve got your head so fuckin up your ass it takes that much to spell it out for you but we know more than Lauren does and we know your days are limited with them up your assholes. Have fun kiddos! CIA
What does become obvious as one deconstructs much of this is that the creators of the digital space did a disservice when they did not tell people about the weaknesses. What type of world where law enforcement or any number of goons from here there or anywhere can go through people’s lives and computers and social and business networks to mine them and others? I wonder as some of them take a look at the environment they created if they will see the danger in militarizing the digital realm as well as Main Street. Human rights are basic to being human and it is important to be have the right to be left alone and unmolested.
All good points…..but the one that Privacy is an alienable right, not one granted by statutory law, is the most important in my humble opinion.
I only browse the web with iOS devices, rarely my computer. iOS apps are allegedly sandboxed. Has anyone seen any evidence of iOS hacks using these techniques?
If you think by switching OS or encrypting it all, you can escape the IT Intrusion Industry you are wrong. https://www.privacyinternational.org/blog/six-things-we-know-from-the-latest-finfisher-documents
Lauren says your coding is too elementary shut the fuck up dumb ass even Lauren could code better than that this isn’t fucking first grade anymore fucking code better shit face…Lauren
What code EXACTLY is being “injected” into the YouTube datastream? Because if it’s taking advantage of FLASH, then this should be just one MORE, GIANT NAIL in the coffin of that PoS pile-of-beetle-dung software. For crissakes, YTF hasn’t HTML5 embedded-video wiped that gawdawful abomination of a malware-welcome-mat off the face of the freaking planet yet?!!???!!!??
You’re adding to the problem by making people think they’re safe when they use SSL. They’re not.
Powerful enough agencies have access to certificate authorities (CAs) that are accepted by all browsers. To explain it, CAs are those companies like Verisign or Thawte where you can buy SSL certificates. The browser just looks if a certificate it gets from a server is signed by one of the CAs it knows and trusts. If yes (and some other tests are ok, like the cert hasn’t expired etc.), the browser accepts the certificate as valid.
Now, if a secret service wants to read your communication to a certain service and maybe launch an attack as described above, it simply generates a valid SSL certificate for such a server, like mail.google.com, for example. It then uses devices like the ones described above, and when you try to access mail.google.com, they answer instead and present their own certificate for mail.google.com. The browser says “Good, everything ok, the certificate is valid.” They’ll then forward the traffic to the real mail.google.com and, the other way round, forward mail.google.com’s answers to you, so that everything looks perfectly normal to you.
But they can read everything, and they can launch attacks as described in the article.
Even if they’re not able to crack the encryption, SSL by design is not at all safe, at least not against adversaries that are powerful enough to have access to a browser-valid CA and hardware as described in the article.
FinFisher website written in PHP – :-( fail
the easiest way to prevent http-based sniffing and injection is to force https only at your Internet connection gateway as shown here – then even this proof of concept above doesn’t work…
https://www.dnsthingy.com/blog/2014/06/https-only
“Fortunately for their users, both Google and Microsoft were responsive when alerted that commercial tools were being used to exploit their services, and have taken steps to close the vulnerability by encrypting all targeted traffic.”
So videos are fine, now? Google owns youtube, after all. I understand other arenas are still vulnerable, and appreciate the information (I knew nothing of this), but this quoted sentence seems to contradict the headline. Unless you’re saying the steps they’re taking are inadequate, which is altogether possible.
Google runs YouTube using https. Are videos fine now? They are fine from the attack vector mentioned above; however, there is nothing that says they cannot route your Internet traffic through a proxy server and then run the exploit from within the https tunnel. All this is done is added another layer to run the exploit. Must businesses have systems that perform the task of a proxy server. The difference to me would be the proxy server would be configured to work in conjunction with the exploit tool where a legitimate business would be using such a tool to ensure trade secrets and other data are not transmitted outside of their network. Essentially, the federal government in the name of “national security” has ruined the Internet. My feeling is the Internet as we know it needs to be phased out. What you replace it with I don’t know…
Thanks for the response. But almost everything between “there is nothing…” and “Essentially…” went right over my head. However, it’s quite an alarming conclusion.
Do you thin the proxy will be fixed by gbcz to safeguard the tunnels of lbc?
See how long it took the people to understand that any tool of the master (especially one designed by DARPA) would be primarily used to protect those who are privileged to be known as, and sign documents as, “The United States of America” and not those who merely belong to the entity known as such.
Well, an HTTPS proxy wouldn’t work without you getting a warning from the browser that there’s something wrong with the site’s certificate. A TCP/IP proxy that just passes traffic through wouldn’t have a way to encrypt it and decrypt it, so that’s also fine. What might be a problem would be if, say, the NSA gets a certificate from a Root CA, as if they were YouTube, fooling your browser. There’s a feature in newer browsers that detects a change in the certificate, though. Now, if they manage to get the actual certificate from YouTube, there’s not much you can do.
HTTPS/SSL vulnerabilities have been known for some time now. See, e.g.,
http://www.infoworld.com/t/security/red-alert-https-has-been-hacked-174025
“intercepts that traffic and replaces it with malicious code that gives the operator total control over the target’s computer without his or her knowledge”
Utter BS. “traffic”, in this case video content, can’t take control of a computer.
As someone that has had a computer and been on the internet for over ten years and also thinking of myself as being moderatly competent at alot of things to do with using a computer and software in general; anything computing tend to suck .
• Not happy with Windows OS, me thinking of it as being some corporation’s big pile of half assed development effort. Everytime ‘explorer’ crashes on me in Windows, I can’t help but think that something aweful happened in the OS.
• Thinking of Linux OS’ in general as being supposedly secure, but with untested and unreviewed code. Things and technology being too complicated.
• Not happy with anything that has to do with security and privacy. It’s like the world isn’t attempting to develop things properly, as if just jumping ahead with the newest trend in technology and pushing out new software.
• I still wonder sometimes if developers of graphics cards know what they are doing when working on their display drivers.
• Any software that has so to speak cringe worthy gui makes me think they rushed the development and stopped caring.
• Why is computer hardware so noisy? Particularily mice and keyboards. Pretty sure noone would like to have their head next to your mouse, if that mouse makes thousands of “clicks” for the duration of some hours.
Correction: I really meant to write ‘Windows explorer’ and not simply ‘explorer’, this is the file browser and not the internet browser from MS.
Probably the most audited and secure operating system is OpenBSD. It makes a decent desktop operating system, but the learning curve is steep.
@ Curious:
Reconsider you use of proprietary Operating Systems like Microsoft Windows and Apple Macs. These companies appear to be in lucrative financial collusion with the National Security Agencies (Directorate) and are routinely back-dooring machines with OS software upgrades. Equipment manufactures can also install hardware as permanent spy devices. How many core’s does one need to operate a machine? Also, does one really need to have a camera in a monitor or cellphone? Particularly when the only way to secure those devices is to remove the power supply?
Still….at the present time, if you use a cooperative ISP to access the internet you are screwed by back-door’s into your browser add-in’s and plug-ins. Google is practically CIA owned and operated. Don’t think that Adobe, and other software companies are innocuous. They’re getting their share of the pie too.
We are all the targets because they want all of the data, on everyone. Silicon Valley is making millionaires off of our data and use of their communication devices. It’s always about money.
Hell…DARPA pioneered the Internet. I realize now that it was for government spying use and not for our personal convenience.
Presently, I suspect that the only truly secure computer is a single core device, without camera’s, and no internet capability or prior internet use. We could all shut down and let the government agencies spy on each other. Or we could fight for our inalienable rights to internet individual privacy. We get a choice.
I couldn’t agree more… And, you didn’t even touch on the collusion with hardware manufactures.
Like these companies on this list?
“Registered Electronic Manufacturers”
http://www.mde.state.md.us/programs/Land/RecyclingandOperationsprogram/SpecialProjects/Pages/programs/landprograms/recycling/specialprojects/registeredmanu.aspx
You will notice that they will even retrieve the relevant components for you. Isn’t that nice?
Yep.. Ditto I’ve basically been saying the same things FOR YEARS. I was screaming about what I knew they were capable of (and was REALLY already going on) long before Snowden. My friends looked at me like I was a paranoid skitzo.
If you own MS, Mac, Linux opsys; if you run software such as Adobe, MS, or have anything Oracle on your computer; if you don’t know exactly what the hardware is doing in your computer, you have so many back doors into your computer you’d never turn the thing on again, if you knew. FB, Google, Sprint, Verizon, ATT et al. are in tight collusion with the NSA. Every single person reading this has their own personal profile with the NSA. here is no communication whether you’re actually ON you cell phone, computer, OR NOT, that they can’t tap in on. And YES.. LOL, Even IF you take your battery out of your cell phone.
Ex CIA Chief Petraus: We’ll Spy on You Through Your Dishwasher”
http://www.wired.com/2012/03
/petraeus-tv-remote/
CORRECTION: WE ALREADY ARE spying on you through your dishwasher (toaster, phone, router, stereo, TV… )
Laughing…..
Your probably on the one of target lists for being a dissenting “conspiracy theorist” as well.
I’d pride myself on being one of the first–were it true.. since “Dissent is the highest form of patriotism”
In full: Mayor John Lindsay of New York City stated, “We cannot rest content with the charge from Washington that this peaceful protest is unpatriotic…The fact is that this dissent is the highest form of patriotism.”
As far as I know only Tor and some PGP can protect your machine. Even then there are ways in through Flash or some other program. As we know that most if not all internet and tech companies cooperate either willingly (Micorsoft/Google etc) or they are forced to by the heavy hand of the state.
Further we know that the so called encryption being used has been compromised by government in close cooperation Google and the other internet giants. As well as the “security” companies who create the encryption and include the gov/corporate openings so the encryption is basically useless.
Until there is personal verifiable strong encryption that is easy to use the internet is not nor can it be a place where privacy exists. While the internet is a great idea and can help people get along in life it has been so thoroughly compromised it has lost most if not all its potential. This internet is ruined another internet with strong verifiable encryption seems to be the only viable answer.
Half measures are not being used against us and half measures will not protect us. Handring and whining is just that – totally ineffective.
But so far very few people even know about this much less are concerned.
It is known that Facebook manipulates your feed in order to get you in the mood they want you to be in and yet Facebook is as popular as ever.
Our problem is ourselves we obey and don’t care.
I recently read that Tor has been overtaken buy USA government officials, it isn’t truly (well, hasn’t been truly) secure for over half a year now.
We also know as of 2012, 80% of The Tor Project’s $2M annual budget came from the United States government, with the U.S. State Department, the Broadcasting Board of Governors, and the National Science Foundation.
Stasibook is just another distraction for the populace, and it’s pathetic just how caught up in gossip and status updates many people seem to be. What’s even worse is the attitude that I’ve found many to have, which is that things really aren’t that bad because people are still able to use social media and watch cat videos. No one’s stopping them from doing their favorite activities, so surveillance isn’t causing any real harm. Many are fooled by the facade of freedom, but we’re only “free” until we tow the line or ask the wrong questions… or watch the wrong cat video, I guess. But if people are occupied with distractions, then they’re less likely to be thinking about and questioning things that are going on.
It’s even easier to keep people in line if you have them live in fear of a hyped-up threat and tell them that only the almighty government can protect them from such a threat. When the majority of the population has been put to sleep with the sweet lullaby that’s been sung by our “protectors,” then illegal and morally questionable activities can continue uninhibited.
Words from Maynard James Keenan seem appropriate for the current state of affairs:
“Pay no mind what other voices say
They don’t care about you like I do
Safe from pain, and truth, and choice, and other poison devils
See they don’t give a f*** about you like I do
Just stay with me, safe and ignorant
Go back to sleep
Go back to sleep
Lay your head down child, I won’t let the boogeyman come
Counting bodies like sheep to the rhythm of the war drums
Pay no mind to the rabble, pay no mind to the rabble
Head down, go to sleep to the rhythm of the war drums”
– Pet by A Perfect Circle
Another question should be asked is, how many black market copies of acts like ‘FinFisher’ are in the hands of criminal organizations?
Re: “the use of hacking for law enforcement surveillance is less well understood” … should remind of Valerie Caproni; Recalling Bush had nominated ‘torture is legal’ Jay Bybee to the Federal bench, let’s go to the thought Senator Feinstein never encountered a First, Fourth or Fifth Amendment violation she did not like, until it was the CIA spying on her committee staff. Then, Feinstein changed the label, in her case these violations are not ok because they are suddenly ‘separation of powers’ violations. The clear indication, based on her record is, violations of the American peoples’ rights are ok, just don’t violate the rights of Feinstein. Reinforcing this would be, Feinstein voted to confirm Valerie Caproni as a federal judge; the very same woman [Caproni] who’d when the FISA Court had rejected a surveillance request, had gone ahead and authorized her FBI agents to target the victim regardless. In all, over the courts first 33 years, the FISA court had granted 33,942 warrants, with only 11 denials. Let’s make that a de facto 10 denials, on account of the Bush FBI lawyer Caproni nominated to be a federal judge by Obama, with Feinstein voting in favor.
Insofar as “Is it being used to catch … Journalists who receive leaked documents?”
You better bet it is. That’s why I developed this idea:
http://ronaldthomaswest.com/2014/06/07/above-top-secret-or-how-not-to-leak/
^
And for those who prefer the satire:
http://ronaldthomaswest.com/2013/08/22/demons-anonymous/
^
Or….we could just bury the whole net and resort to park benches and destroy evidence by eating small bits of shredded paper.
Linux lite OS’s on thumb drives with TOR browsers allow for easy destruction of evidence. Shameful that it should come to this.
M M-B – per your main article, it appears that a user still has to infect himself by actively agreeing to run some code – a fake Flash plugin upgrade, for example. Is that correct?
Excellent stuff. Was sort of vaguely aware of this issue, but this was really helpful.
I don’t get it. What is the nature of the threat discussed in the title beyond “flash players have security holes”? How is finfishers sw new/different from any other malware or spyware? How does encrypting the video stream mitigate against the attack? Wouldn’t it be the cert authentication more than encryption that would secure against an attack… And what about not using flash at all as a partial fix?
Is this just about man in the middle attacks and network injection generally or is there something particular to YouTube?
There are a lot of stories about telecoms and satellite services stealing one another’s codes to sink one another’s battleships. See Usual Suspect, Ripper Murdoch.
On the down and low I read TalkTalk’s head hates those mobile ad network app hoodies. I just can’t find where he said that. He said they have made his dumbpipe life a misery he’d like to off load. So I just assumed the mobile ad network is NSA since that very day about a year or two ago, I’m getting to downloaded with data in my mind palace.
Welcome Mr. Marquis-Boire!
This is a most enlightening article which presents highly technical data in a format which anyone can understand.
“Nevertheless, we need to have an open discussion about how we want law enforcement using this type of technology.”
Let me start a discussion for you with my answer to this.
I don’t want law enforcement collecting or using my data unless they have a reasonable probable cause and have obtained a search warrant from an approved court appointee.
Any procedure contrary to this is a violation of my rights UP Amendment IV of the Constitution of the United States of America, which I hope that someone, somewhere, (over the rainbow) will uphold.
Thanks for this article. I’ll be looking forward to seeing more of your excellent technical journalistic work.
Wow, was Lyra1’s comment programmatically generated? It certainly reads as such–you just provided an answer for something that wasn’t even a question.
Good article, anyhow.
@ Amalgovinus:
Quote from article = “how we want law enforcement using this type of technology.”
My answer = I don’t want law enforcement using the technology at all.
BTW the article has links to two papers. One is 117 pages long and I haven’t finished reading it yet. The other has informed me that individual’s privacy can be compromised at any time , with network intercept technology inserted into the servers of Internet Service Providers (ISP). That is, if one has an ISP that is cooperative, you can have a software implant back-doored into any plug-in or add-in of your web-browser simply with an intercept relay in which the user sees a re-direction screen that prompts for upgrade. Also….it appears that certain Operating Systems of the Apple and Microsoft variety can do the same thing via OS updates. Linux OS’s upgrade via package repositories which require a password entry to accept a software install or upgrade. Still….if you use a browser to access the internet, and have a cooperative ISP, you are screwed.
Hence, my reply. No branch of the US Government, particularly those belonging to the National Security Directorate ; has the right to hack my computer with the express purpose of invading my privacy and stockpiling information. It is illegal. Hacking is still hacking. Many have been imprisoned for acquiring and misusing financial data, so why should any government have the right to hack all of their citizens? Show probable cause and get a court order or you are violating the Fourth Amendment.
Still think that my response was generated by a robo-machine?
You are operating under the premise that the law applies to employees of the federal government. They are above the rule of law. Commit perjury and see what happens to you. How many people in leadership roles within the federal government have committed perjury before congress and got away with it? I can think of a half dozen without much effort…
The word “privilege” comes from one word of the same root as “private”, and another word of the same root as “legislate”.
So privilege is merely a private law applying to others than the public.
Privilege explains why Clapper lies to Congress about NSA spying without facing a trial, while “Federal prosecutors accuse Clemens of lying to Congress when lawmakers investigated the illicit use of steroids in professional baseball.”
@ inthenews:
Yup….I believe that the duality or lack of balance in the justice system is the root of the problem. In fact, that is an understatement as Lady Justice is no longer blind; she has one eye open so that she can give preference to the minions of the central banking elite. Meanwhile, the rest of us, still have a choice in the Monopoly Game….play by the state rules or “Go To Jail” without passing Go and receiving the $$$$$$$$.
BTW….we can also be retained indefinitely, without trial any where in the world and may be tortured at the hands of robot goons. Or, there is always the possibility of getting nuked by a presidential drone and being at ground zero on flash. Hot damn! No radiation sickness to contend with.
My sentiments precisely.
“Wow, was Amalgovinus? comment programmatically generated? It certainly reads as such–they just provided a rebuttal for something that was entirely self-evident .
Very good article, anyhow; and a well stated response by Lyra1.
Agreed
I don’t want the government, including law enforcement, to have this ability either. In the end, you have to abandon the technology, minimize the threat of the technology or find an alternative that isn’t exploitable by government.
bababooey bababooey howard stern’s ass bababooey