Researcher Says Simple Security Fixes From Carriers Would Have Prevented NSA Collection Of Cell Communications
from the we're-nos.-1-whatever,-why-try-harder? dept
Hanlon's Razor states: never attribute to malice that which is adequately explained by stupidity. Replace "stupidity" with "laziness" and you've got one researcher's theory as to why cell phone carriers failed to make basic efforts to provide a secure product -- one that would have prevented the NSA's collection of communications. (h/t to DSLreports)
The world's mobile phone carriers have failed to implement technology fixes available since 2008 that would have thwarted the National Security Agency's ability to eavesdrop on many mobile phone calls, a cyber security expert says.Were carriers compelled to leave this hole open for NSA exploitation? It's a good question, but Nohl says the more likely explanation is that carriers simply didn't find the problem worth addressing.
Karsten Nohl, chief scientist with Berlin's Security Research Labs, told Reuters ahead of a highly anticipated talk at a conference in Germany that his firm discovered the issue while reviewing security measures implemented by mobile operators around the world…
None of the carriers surveyed had implemented measures for thwarting a method that allows the NSA to eavesdrop on most mobile calls by unscrambling a widely used encryption technology known as A5/1[…] Nohl said that method would have been blocked if carriers had applied two patches released in 2008.
"I couldn't imagine it is complicity. I think it is negligence," he said. "I don't want to believe in a worldwide conspiracy across all worldwide network operators. I think it is individual laziness and priority on network speed and network coverage and not security."As has been observed everywhere, the path of least resistance is favored by many entities, even those not explicitly performing government work. Making a minimum of effort dumped customers' conversations right into the NSA's lap.
Of course, if the NSA had knocked on these carriers' doors and asked for a small favor, like leaving a security hole big enough to drive a semi full of unused privacy protections through, chances are many would have said, "Sure, why not." Verizon and AT&T have only very belatedly joined the national conversation on intelligence gathering, after spending months shuffling around the periphery while staring at the floor. For years, these providers have handed over everything the agency's asked for and shown an active interest in helping it anticipate what it might need next.
But Nohl's theory dismisses a worldwide conspiracy to dump cell phone customers' conversations into the waiting ears of the NSA -- something that's more likely to be true. While American carriers have proven to be useful NSA allies, very little has been exposed about the compliance rate of foreign carriers. Not that their resistance would matter much (or that they'd even be approached directly), as foreign intelligence agencies have been just as "helpful" as AT&T and Verizon in terms of granting access to data and communications -- much of which ultimately ends up in the NSA's sprawling lockboxes.
The moral here, if Nohl is correct, is that the industry's idle hands are the NSA's workshop. Not doing something can be just as harmful as complete complicity.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: carriers, nsa, privacy, security, surveillance
Reader Comments
Subscribe: RSS
View by: Time | Thread
This thinking is inaccurate. Yes, there *was* a worldwide network operation conspiracy.
For crying out loud, it doesn't take a genius to see the price gouging, price fixing ways of the telcos without seeing the tradeoff is allowing governments to spy on their customers.
Show me a single country whose government isn't into spying on its people and I'll show you a country without a cell network.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re:
-
He wouldn't believe in a world wide conspiracy, but will believe ALL telcos techs were inept or negligent? Or just missed that patch... give me a break.
[ link to this | view in chronology ]
Re: Re:
But I do prefer the conspiracy theory ;)
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Carriers fooling people
Lets hope it wont get any worse :)
[ link to this | view in chronology ]
This article did not need to name-drop Snowden, but then who'd read it?
[ link to this | view in chronology ]
Re:
"According to professor Jan Arild Audestad, at the standardization process which started in 1982, A5/1 was originally proposed to have a key length of 128 bits. At that time, 128 bits was projected to be secure for at least 15 years. It is now estimated that 128 bits would in fact also still be secure as of 2014. Audestad, Peter van der Arend, and Thomas Haug says that the British insisted on weaker encryption, with Haug saying he was told by the British delegate that this was to allow the British secret service to eavesdrop more easily. The British proposed a key length of 48 bits, while the West Germans wanted stronger encryption to protect against East German spying, so the compromise became a key length of 56 bits.[5]"
[ link to this | view in chronology ]
gullibility
If you can't imagine the former how can you swallow the latter?
[ link to this | view in chronology ]
Joke?
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
"Idle mind is devil's workshop"
rephrase this now...
[ link to this | view in chronology ]
Sheesh. Discussing a "theory" of how happened rather than every day FACT of it done.
We KNOW what's going on: universal and increasing spying which can't be avoided -- even when done by Google and Facebook. Globalist mega-corporate monsters conspire with gov'ts to steal our privacy in order to put in place a PEOPLE CONTROL system. -- And by the way, Google has just plunked down 3.2 BILLION of its untaxed for "Nest" which makes "smart" thermostats in order to SNOOP on you better.
QUIT WEENIE-ING with academic "theory". Just state some damn opposition to being spied on by every corporation and gov't department.
Where Mike sez: "Any system that involves spying on the activities of users is going to be a non-starter. Creeping the hell out of people isn't a way of encouraging them to buy. It's a way of encouraging them to want nothing to do with you." -- So why doesn't that apply to The Google?
02:50:32[c-501-5]
[ link to this | view in chronology ]
....
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
http://www.aftenposten.no/nyheter/uriks/Sources-We-were-pressured-to-weaken-the-mobile-security-in-t he-80s-7413285.html
[ link to this | view in chronology ]
Worth Not Addressing
More likely they found the so-called "problem" to be worth not addressing.
"I don't want to believe in a worldwide conspiracy across all worldwide network operators."
No, not a single "worldwide conspiracy", but multiple conspiracies worldwide. Every government worldwide has security agencies that want to spy on their own citizens. And every cell phone company worldwide is dependent on their government for permission to operate. One hand washes the other. That's the ways the system is setup.
[ link to this | view in chronology ]
encryption only used between handset and cell tower
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Remember Ceej's Razor...
Yeah. Hanlon can go slit his wrists with HIS razor for all I care.
[ link to this | view in chronology ]