Glenn Greenwald: How the NSA Tampers With US Made Internet Routers 347
Bob9113 (14996) writes "According to Glenn Greenwald, reporting in The Guardian: 'A June 2010 report from the head of the NSA's Access and Target Development department is shockingly explicit. The NSA routinely receives – or intercepts – routers, servers, and other computer network devices being exported from the US before they are delivered to the international customers. The agency then implants backdoor surveillance tools, repackages the devices with a factory seal, and sends them on. The NSA thus gains access to entire networks and all their users. The document gleefully observes that some "SIGINT tradecraft is very hands-on (literally!)".'"
What about inbound? (Score:5, Insightful)
Surely the NSA can touch anything that Customs does.
Re: (Score:2)
Re: (Score:3)
You think the NSA really needs customs to help them spy on US citizens? They really don't have to be that clever about it.
Re:Fuck the foreigners Re:What about inbound? (Score:5, Insightful)
We hold these truths to be self-evident, that all men are created equal, that they are endowed by their Creator with certain unalienable Rights, that among these are Life, Liberty and the pursuit of Happiness.
Looks to me like those spying on anyone, anywhere, are the real traitors.
Re:Fuck the foreigners Re:What about inbound? (Score:5, Insightful)
Just curious, does that include Alan Turing [wikipedia.org] spying on Germans [wikipedia.org]? Or the UK intelligence intercepting Zimmerman's telegram [wikipedia.org]?
Re: (Score:3)
Yes, if they meet the definition of "traitor". Because "those spying on anyone, anywhere" does not meet any definition I know of.
Or, another way, your statement is just as true as the gp.
I prefer to think of it as redefinition, where the meaning of treason is whatever supports gp post.
On one hand, we have the idea that all spying is wrong. On the other, some spying is okay, if it supports the greater good.
If I misdial an international number and get a terrorist burn phone, does it make sense to flag me as
Re: (Score:3)
I think it's somewhat of "we have all your data. If you are suspected of anything wrong, we will look at it. Don't do anything wrong."
Re: (Score:3, Insightful)
Here is a little logic lesson, take heed of the flow because I realize that logic is difficult for people.
Spying in and of itself can be considered a gray area. We can justify spying on enemies, and not spying on friends.
Deceit on the other hand is always bad. There is really no gray area in that one, try as you like there is no way to convert deceit to honesty.
The issue with the NSA, and say Australia, is that the US Government as a whole has lied to the people that the politicians and office holders are
Re:Fuck the foreigners Re:What about inbound? (Score:5, Informative)
The NSA's own internal watchdog group found that NSA snooping power was used to spy on 'love interests' of several NSA employees.
If their own internal watchdog group is telling the world that there's something going on here, it's a bold move to claim "all the disclosures released so far have shown government ACTIVELY protecting civil liberties of Americans"
Imagine if an organization such as the ACLU had access to all internal NSA snooping records. Are you telling me that you believe that no civil liberties have been violated by the NSA? Alternatively, are you telling me that we have zero rights because the NSA is allowed to spy on everyone doing anything at any time for no reason at all?
Re:Fuck the foreigners Re:What about inbound? (Score:4, Insightful)
Nothwithstanding the fact that I don't think a single person involved in any of this is guilty of treason, you are blatantly wrong about a few things, like this:
In fact, all the disclosures released so far have shown government ACTIVELY protecting civil liberties of Americans.
This is just wrong, the NSA's net is so large that they can and do collect a lot of information about Americans not suspected of a crime. The three hops rule means that they collect data from millions of people who are so loosely connected with a particular suspect as to make it so that there is no real connection there. The recent proposals of changing how the NSA works also removed the privacy advocate. If the federal government's priority was protecting Americans' civil liberties, why did they remove the person whose job that would be?
Remember, the goal is to expand the powers of government.
The goal of what? The goal of the constitution is to limit, not expand, the powers of government. That is spelled out very clearly. The entire purpose of the constitution is to protect the citizens from the government.
Your role as a citizen is to make sure government continues to function and do its job, because that's what we as citizens have decided.
What happens when the government stops doing its job, or starts abusing its power? If that is happening, wouldn't you want to know about it?
Re:Fuck the foreigners Re:What about inbound? (Score:5, Insightful)
No idea why you're being downmoderated. It's *absolutely* the NSA's job to eavesdrop on foreigners. That's what they're being paid to do.
While it is the NSA's job to spy on people, that's traditionally been something you do against your adversaries, not your allies. I mean, it's one thing if we're talking about tapping the USSR's undersea cables. They had nuclear-tipped ICBMs pointed at us. It's quite another thing when we're talking about tapping the phone of Angela Merkel. She's the democratically elected president of an allied NATO state. I mean, up until that point she and Obama had a pretty good working relationship, so if he really wanted to know what she was thinking, he probably could have you, know, asked her.
Re: (Score:3)
By what 'tradition'? Nation states and their predecessors have always spied on friend and foe alike.
Re: (Score:3)
Lie. Spying enables war, it creates the illusion of having sufficient control and being able to go in and kill whom ever you want and win. Spying the disrespecting of other countries laws and their citizens rights and is the peremptory action to war. The death penalty for espionage still exists in many countries and with good reason. Espionage routinely enables and uses organised crime in targeted countries, ignoring laws also covers ignoring laws like murder and extortion the assumption by those countries
Re: (Score:3)
Re:Fuck the foreigners Re:What about inbound? (Score:5, Insightful)
NSA apologist trope #57: [insert foreign country that has no 4th amendment] routinely does the same thing we do.
This is one of the dumbest arguments in the NSA apologist playbook. Gee, we are as bad as China when it comes to spying on our populace. Great job!
Re: (Score:3)
That's true, but what if someone buys a small order? It wouldn't be difficult to tamper with 3 routers and two switches going to Bob's Data Warehouse, LLC.
First (Score:2)
Re:First (Score:5, Insightful)
You can't trust open source either.
Devices like these often have "binary blobs" that aren't open source and could contain backdoors (one of the reasons RMS has been rallying against them, but probably not the primary reason), but even more fundamentally than that, it would be naive to assume that the NSA can't hire programmers to contribute to these projects and that they can't be good enough at what they do to make a backdoors that would pass a code review without being detected.
That said, at least with open source you have the chance to find such things, so there is that. But either way ... I think we're screwed.
Re:First (Score:4, Insightful)
I think we're screwed.
Only if you keep on reelecting the same old crooked politicians over and over again. The NSA can't control who you vote for.
Re:First (Score:5, Informative)
Does it really matter who we vote for, as far as the NSA is concerned? Any "electable" candidate will just let the NSA keep doing what they're doing.
Even if someone like Al Franken got elected president by some miracle (which is not going to happen) he still couldn't do much unless people also elected a whole bunch of Al Frankens/Rand Pauls to Congress. And that just isn't going to happen (there's a reason why those two are such outliers).
Ultimately the only way we'll ever end NSA malfeseanse (or CIA malfeseanse for that matter) is if we can somehow expose what they do. Without that, we'll change politcians but they'll stay the same.
Re: (Score:3, Interesting)
Al Franken? No thanks [opensecrets.org]! Besides, he thinks the NSA is a-okay...
Re: (Score:2)
Not really. The actually influential positions are outside of the democratic reach. They are "too important" to be decided by random public, unless the public can be made to believe the necessary agenda. Besides to be a successful politician one has to sell oneself in many ways, and sacrifice friends. The wall would come about quite quickly otherwise. People in the highest circles have hardly any principles. In the end it's all about power and interests. The intelligence services are in the core.
Re: (Score:2)
The reason is that people like you that ought to know better keep repeating such nonsense. Franken and Paul are only 'outliers' in the context of Washington DC and the deep state - in terms of the country they are essentially mainstream at this point. The media works tirelessly day and night to prevent us from figuring this out, however, and one of their most effective tools is silly little tropes such as the one I quot
Electorial solutions (Score:2)
1) Anti-Establishment candidates are often marginalized by the establishment, by civil methods and later by authoritarian ones depending on the threat and how authoritarian. Example: Ghandi. MLK. The extreme repression was their strength; the wise establishment doesn't empower their enemies.
2) If you can elect somebody, they are a minority and unless it is a dictatorship they can't do anything on their own. Continued marginalization and undermining them with their base as they are forced to compromise to g
Re: (Score:2)
Ultimately the only way we'll ever end NSA malfeseanse (or CIA malfeseanse for that matter) is if we can somehow expose what they do
... and this has already happened, with new stuff coming to light all the time.
And so far, most people don't really seem to care. Not enough to do anything about it, anyways.
Re: (Score:2)
Sorry, I should have clarified: I meant in a more systematic way, not just a one-shot Snowden deal.
Comment removed (Score:5, Informative)
Re: (Score:3, Informative)
The NSA can't control who you vote for.
YET.
Re:First (Score:4, Insightful)
Re: (Score:3)
I think we're screwed.
Only if you keep on reelecting the same old crooked politicians over and over again. The NSA can't control who you vote for.
1) who knows how far NSA has its fingers into everything. If they've hacked the voting machines ... perhaps they *can* control who we vote for.
2) it doesn't have to be the NSA. They may have the most resources and the most support from our government, but China could do similar things. And the part about getting back doors into open source software doesn't require a government agency at all.
The most recent poster child of vulnerabilities that nobody noticed was of course Heartbleed, but who knows how man
Re:First (Score:5, Interesting)
The NSA can't control who you vote for.
And you know this how? You know for a fact that the NSA can't 1) Dig up information on a candidate, that will cause them to (legitimately) lose the election. 2) Donate, or encourage others to donate, to campaigns such that they legitimately lose the election. 3) Frame the candidate for something, that will cause him to lose your vote. 4) Actively eliminate a candidate, eg an "accident", causing you not to vote for them. 5) Change your vote, such that "your" vote becomes a vote for a different candidate?
Full paranoia mode: and occasionally they release a few people like Snowden, to air a select portion of their dirty laundry and make us believe that we know what the NSA is doing. Remember when they were nicknamed the No Such Agency, think they gave up on that level of secrecy rather than just have the current NSA as their public interactions branch?
Now excuse me while I go add a few more layers to my tin foil hat.
Re:First (Score:5, Informative)
You can't trust open source either.
Devices like these often have "binary blobs" that aren't open source
No, you CAN trust open source. If it has a binary blob, then by definition, it is not open source.
it would be naive to assume that the NSA can't hire programmers to contribute to these projects and that they can't be good enough at what they do to make a backdoors that would pass a code review without being detected.
That's still better than closed-source code that you can never inspect. Also, any such contributions will be recorded and tracked. Serious open-source projects like the Linux kernel don't accept anonymous contributions; they have to be signed off by someone. Also importantly, if you look at the Linux kernel, you'll find most contributions (esp. in an area where a backdoor could have a real impact, not places like USB joystick drivers or whatever) come from programmers working for well-known companies, not from random people on the internet.
Linux-libre is proof of the point, pre-Snowden (Score:4, Informative)
Addressing both your comment and the grandparent comment: this distinction of allowing non-free software is part of what distinguishes the older free software movement from the younger open source movement. RMS has been talking and writing about this critical distinction for years.
Consider the following from "Why Open Source misses the point of Free Software [gnu.org]":
In other words, open source won't endorse software freedom for its own sake. That movement was designed to never raise the issue of software freedom in order to promote a developmental methodology thought to lead to more reliable, more powerful programs. That methodology is fine as far as it goes (everyone likes powerful robust programs) but as we're seeing with the Snowden revelations, that methodology doesn't go far enough. RMS realized this very early on and has been providing ethical counterarguments since the open source movement began (older essay [gnu.org], newer essay [gnu.org]).
This difference explains what we're seeing in the very different approaches taken in Linus Torvalds' fork of the Linux kernel versus the GNU Linux-libre fork of the Linux kernel [fsfla.org]. Linux-libre's distinction is that this fork removes the blobs that come with the Torvalds fork of the Linux kernel. Torvalds includes nonfree code meant to make the kernel run on more hardware which places a high value on convenience at the cost of software freedom. Linux-libre values software freedom instead. As a result, Linux-libre doesn't run on as much hardware and might not take advantage of everything modern hardware can do, but one gains a system they are allowed to fully inspect, share, and modify—software freedom. Linux-libre lets users make sure the software does only what that user wants that program to do. RMS, as recently as his recent responses to /. questions [slashdot.org], encouraged readers to reverse engineer hardware in order to fully document hardware ("The parts of Linux we need to replace are the nonfree parts, the "binary blobs". [...] The main work necessary to replace the blobs is reverse engineering to determine the specs of the peripherals those blobs are used in. That's a tremendously important job -- please join in if you can."). This work leads to increased support for fully free operating systems, including fully free support in Linux-libre.
Increased security is one of the things you get with the pursuit of software freedom for its own sake. I think RMS very much recognizes the security enhancements that come along with Linux-libre and why his org [gnu.org]
Re: (Score:3)
I never said open-source was perfect, but there's no shortage of vulnerabilities discovered in closed-source software. Heartbleed is just an exceptional case, and was very quickly fixed once reported. How many proprietary vendors have sat on vulnerabilities and refused to fix them for ages? They even contend that vulnerabilities should never be disclosed to the public, so that they can take their time fixing them, if they ever get around to it.
Re:First (Score:4, Insightful)
That said, at least with open source you have the chance to find such things, so there is that.
Even with "open source" you still have to get the source code to your spiffy new router. Then you have to do a code review to see what's there. Then compile it, then get the libraries and try to link it, then try comparing the binary just to find out that it will have natural differences from what is installed in the router IF you can extract the binary once it has been flashed into it. (Do many firmware-upgradeable routers have an "extract" function, or only "install"?)
So, if by "chance to find such things" you really mean "install your own code that will overwrite anything that isn't supposed to be there", yes. But to actually FIND the backdoors you need to extract the binary and decompile it anyway. The source may be a guide to what you expect to see, but with optimization and compiler tricks the source may not be all that helpful.
Re:First (Score:4, Interesting)
You can't really trust the firmware upgrader to actually write your code there unmodified, either. Or that your code is the only code that runs on the system.
Re: (Score:3)
And don't forget that the hardware itself may be compromised.
Trustworthy firewall? (Score:3)
Isn't it still possible to have a trustworthy firewall as separate hardware, that can inform you if there are any inappropriate data transfers? It would seem like an important tool to have if only for virus/malware analysis.
Nice job NSA (Score:5, Insightful)
You just single-handedly killed the entire US tech industry. You murdered trust. No one will ever trust US hardware again.
Re:Nice job NSA (Score:5, Insightful)
The problem is that even if this is a lie, the NSA has done enough that it will likely be believed. Once some lines have been crossed, its difficult to claim that others have not been. There are lots of companies with a huge financial interest in damaging the reputation of US equipment, so one can expect a constant flow of stories - some true some not.
Yes the NSA has done grave damage to US tech industry. They likely have also drastically weakened our national defense by creating / allowing / obscuring weaknesses in our cyber defense. I don't think it was intentional, just people applying 20th century ideas to 21st century conflicts. The sort of thinking that causes great nations to become quaint has-been's.
Applying 20th century ideas to 21st c. conflicts (Score:5, Interesting)
"just people applying 20th century ideas to 21st century conflicts."
All too true. Although the results may be far worse than becoming a "quaint has-been". To expand on your point: ... There is a fundamental mismatch between 21st century reality and 20th century security thinking. Those "security" agencies are using those tools of abundance, cooperation, and sharing mainly from a mindset of scarcity, competition, and secrecy. Given the power of 21st century technology as an amplifier (including as weapons of mass destruction), a scarcity-based approach to using such technology ultimately is just making us all insecure. Such powerful technologies of abundance, designed, organized, and used from a mindset of scarcity could well ironically doom us all whether through military robots, nukes, plagues, propaganda, or whatever else... Or alternatively, as Bucky Fuller and others have suggested, we could use such technologies to build a world that is abundant and secure for all."
http://www.pdfernhout.net/reco... [pdfernhout.net]
"Likewise, even United States three-letter agencies like the NSA and the CIA, as well as their foreign counterparts, are becoming ironic institutions in many ways. Despite probably having more computing power per square foot than any other place in the world, they seem not to have thought much about the implications of all that computer power and organized information to transform the world into a place of abundance for all. Cheap computing makes possible just about cheap everything else, as does the ability to make better designs through shared computing.
And also on intelligence specifically:
http://www.phibetaiota.net/201... [phibetaiota.net]
"A failure to realize this irony will produce ever greater problems down the road as we develop ever greater technologies that can become ever greater amplifiers of destructive impulses (including self-replicating nanotech and biotech) or ever greater inhibitors of constructive impulses (like pervasive surveillance to enforce arbitrary unhealthy norms as a "war on the unexpected"" [see Schneier]). So, how can we have an intelligence community in the 21st century that is truly worthy of the name? How can we have an intelligence community that truly helps prevent misadventures that waste trillions of US dollars while millions of US children grow up in poverty and tens of millions of US citizens lack access to health care or even adequate nutritious food?"
And:
http://pcast.ideascale.com/a/d... [ideascale.com]
"As with that notion of "mutual security", the US intelligence community needs to look beyond seeing an intelligence tool as just something proprietary that gives a "friendly" analyst some advantage over an "unfriendly" analyst. Instead, the intelligence community could begin to see the potential for a free and open source intelligence tool as a way to promote "friendship" across the planet by dispelling some of the gloom of "want and ignorance" (see the scene in "A Christmas Carol" with Scrooge and a Christmas Spirit) that we still have all too much of around the planet. So, beyond supporting legitimate US intelligence needs (useful with their own closed sources of data), supporting a free and open source intelligence tool (and related open datasets) could become a strategic part of US (or other nation's) "diplomacy" and constructive outreach."
"Good will" is an important resource. Slowly the USA has been squandering what goodwill it including from WWII. Fortunately, good will can be a renewable resource depending on the political choices the USA makes going forward.
For example, imagine how much goodwill the USA would have right now if we had given the people of Iraq US$6 trillion dollars (US$300
Re:Nice job NSA (Score:5, Insightful)
You mean that Chinese manufactured US hardware? They have to ship the crap here for the NSA to backdoor it because it's made in China. My question is do they take out the Chinese backdoors or do they leave those in with the NSA backdoors?
Re: (Score:2)
what they have, then, is a 'garage'. right? its two backdoors right next to each other: the chinese one and the nsa one.
where I come from, 2 back doors right next to each other = "a garage"
and so, we have been letting our citizens install routers with built-in garages... garages big enough to, uhm, drive a truck thru.
Doesn't matter. (Score:2)
That doesn't matter. We now know that the NSA has backdoors in them. We highly suspect that the Chinese also have backdoors in them.
The question is how long it will take the other nations to start their own chip fabrication plants and build their own routers / switches / etc.
Since nothing from us can be trusted (even by us) then they should be building their own stuff which they can trust more than our stu
Re: (Score:3)
I've started raising pigeons to communicate with friends. It's pretty cool, you see you take a message and fold it and attach it to the pigeons leg with a band and he flies off to home with it. Just have to watch for the hawks.
Re: (Score:2)
You just single-handedly killed the entire US tech industry. You murdered trust. No one will ever trust US hardware again.
Not single handedly. The FBI seizing domain names of legal foreign companies, and arresting foreign nationals that never came to US soil sure helped.
Re: (Score:2)
Come on, if we let one person break ROT-13 [cryptome.org], then all the Evil Content Pirates® will do it!!!
Re:Nice job NSA (Score:4, Informative)
Your statement if altered slightly to reflect the perspective of the NSA and the US government might actually provide insight into the reason behind the outlash against Edward Snowden. One would presume such tampering isn't done wholesale because doing so on an industrial scale is not feasible. Yet. And because ubiquitous tampering would be detected by security researchers so the majority of devices on the market should remain untampered with. Tampering is most effective when done in a targeted manner depending on who will own the routers in question. Maintaining a baseline level of trust that is actually justified is very important, otherwise this technique wouldn't work. Mr. Snowden's revelations have destroyed all trust, thus undermining the ability of the NSA to ride on the back of that trust to engage in targeted spying.
This is why it baffles me that people can so readily point to entities like Startpage and Duck Duck Go as trustworthy just because they say so. Their claims may indeed be accurate for the vast majority of those using their services, but it's easy to imagine that particular searches can be scrutinized on demand if there is an interest. In other words, they can't be trusted based on their claims alone, even if they themselves believe them to be true.
It seems to me the only rational approach is to assume that nothing can be trusted and and act accordingly. Assume that whatever you are doing online is being observed by someone or anyone and don't communicate about genuinely private things, because they will no longer be private.
Re: (Score:2)
No one will ever trust US hardware again.
No one will ever trust US citizens again.
I expect we'll be getting blacklisted soon from working on projects in foreign countries.
Re:Nice job NSA (Score:5, Funny)
You just single-handedly killed the entire US tech industry. You murdered trust. No one will ever trust US hardware again.
Right.
Because hardware from China isn't subject to this.
Or Europe. Those oh-so-reasonable Europeans would never engage in espionage.... (what a good, simple eyeroll emoticon?)
We should get equipment from Canada. If they start to put such measures in their hardware, it would come with an apology sticker on the box.
Re: (Score:2)
I think the giveaway would be the wooden casings.
Re:Nice job NSA (Score:4, Funny)
I think the gooey maple syrup finger prints on the hardware would give them away....
Re: (Score:2)
We should get equipment from Canada. If they start to put such measures in their hardware, it would come with an apology sticker on the box.
Which is really quite effective, since you'd never see it amongst all the other apology stickers.
Re:Nice job NSA (Score:5, Insightful)
"'Merica is doing it so everyone must be doing it" is a really dumb defense mechanism. In the case of the US we now all have the facts, in the case of everyone else you just have your paranoia.
Re: (Score:2)
Sell Cisco (Score:2)
What a travesty.
Well sure.... (Score:3)
This is to be expected.... what is the real scope of this?
I believe that a router on the way to a German auto maker is not targeted. OK I want to believe.
I believe that a well managed site will audit and reload software. I believe that additional system admin audits behind and in front of the
hardware are justified.
For the NSA (Never Say Anything) to snoop does not bother me but they are not the only TLA in the game today.
The internet has not been friendly for a gosh long time nothing has changed.
Re: (Score:3)
Who says it's just firmware? Working examples of chip level modifications are in the open.
Re: (Score:2)
Only possibility is to home-build all your systems, using nothing but individual parts, bought from several different suppliers, preferably from factories not based in the U.S. or China. Difficult, but not impossible.
Finally, once machine has been built, install nothing but open-source software, such as Quagga or OpenBGPD, PfSense and FreeNAS, for instance, including auditing the code yourself.
And even then, you are not safe, since Vupen and other delightful guns-for-hire are busy selling NSA zero-day explo
Re: (Score:2)
unless you build CHIPS, you can't build a fully trustable computer anymore. maybe using 30 yr old chips, but not any modern chips.
its easy enough to put firmware and microcode in almost any chip.
would you trust a nic chip? it has firmware and its rom is closed source. cpus? they have closed source 'errata' microcode and even what's deep inside an intel chip is not for you or I to see.
pc's bios? yeah, right. like you can trust that.
basically, nothing is trustable anymore. maybe that 30 yr old trs-80 i
Re: (Score:2)
So buy everything from Samsung? Everything else is either an American company or made in China.
I think this relates: (Score:5, Interesting)
Security researcher and Tor developer, Andrea Shepherd, found something fishy:
http://www.techdirt.com/articl... [techdirt.com]
Re: (Score:2)
that is almost guaranteed to be bogus.
why? do you REALLY think that the world' 'greatest' spy agency would be so sloppy as to have the mail system (any mail system) log 'route-arounds' that look suspicious?
really? REALLY??
anyone that powerful will have built-in ways to suppress any mail log records. in fact, if you ordered from dell, my GUESS is that dell is in bed with the bad guys and any 'special firmware' that might have to be installed for user X will be done BY dell AT dell, never having to give an
Re: (Score:2)
Nah, if they did it at Dell it would have been leaked by now.
Re: (Score:2)
Two things:
1) According to the picture on the tracking thing, this was not a Dell, it was a Lenovo Thinkpad, which is a Chinese company, which Chinese company probably does not install "special firmware" for the NSA.
2) However, the picture actually doesn't say it is a Lenovo Thinkpad, it actually says it is a Lenovo Thinkpad KEYBOARD. I guess I haven't dismantled a Thinkpad lately, but it doesn't make as much sense to me to intercept a keyboard as it does to intercept a computer.
Why should I distrub Heuwei again ? (Score:2)
NSA's message (Score:5, Insightful)
NSA's message:
Beware: we're doing it to them so they could be doing it to us.
Of course they could not go public with part one to they only publicized part two.
Oh dear (Score:3)
Now they've been found out it's going to hurt USA's export market.
And people though Huawei concerns were baseless (Score:4, Insightful)
And one time at band camp. (Score:2)
Sorry, I've given up on all this Spy vs. Spy nonsense. Frankly I'm surprised that there hasn't been a story where the NSA employes pixies who spread magic fairy dust on the Internet Tubes and the secret encryption keys float magically in the air. Sure, a lot of what Snowden took possession of and released was most likely based in fact but a lot of it is starting to sound a bit more ridiculous. If this article has even 1% of credibility I would have thought that any security firm outside the US would have
So where to get my routers from? (Score:2)
So, as a business I ness US made routers so the chinese slave labor me out of the market, but in my home I need chineese made routers so the NSA isn't hacking my local computer.
Or I just get both, and put them back to back, and hope the US NSA never cooperates with the chineese NSA [equivalent]
Re: (Score:3)
here's your solution: buy a US router and a china router. put them in parallel (on their inputs) and on their outputs, use a local AND. only pass packets that are produced by both and reject all differences.
(I'm kidding, but maybe only half kidding..)
Tech Support Rep here with International Customers (Score:3, Interesting)
I work for a company that ships laptops, desktops, and routers to customers overseas and I'm going to say that there are some really weird things going on in transit that I can't explain. Particularly with international shipments, but not necessarily exclusively. I've personally heard from numerous customers who've had there systems seemingly opened in transit. Not just the packages, but the actual cases. They don't even always do a good job of re-connecting and re-sealing everything. Its obviously the cases that have been opened too as snap-style pieces are left disconnected (hard drives). No amount of vibration or force will cause a disconnect.
While I've suspected something like this I've never attempted to have a customer take a hash of the disk image and compare it to a before-shipment hash. Given this is a problem I think I might just go ahead and start doing this. The problem now is actually finding a customer who is going to be able to repeat the process on the other end.
This news won't hurt US business at all (Score:3)
... I just can't imagine how anyone would be offended or in the least bit concerned over this.
This is going to kill the US tech industry (Score:3)
If I'm a foreign buyer for this stuff... say a bank in Germany that wants to build a data center... I can't buy American stuff anymore. That's a huge blow to US tech.
Look... I'm okay with pulling this crap against brutal dictatorships. But I suspect they're just doing it to anyone they're even vaguely interested in... I have to assume that because there's so much double talk and evasion on the issue along with apparently no oversight or auditing.
If this sort of crap continues then the companies are at they very least going to have to use protected shipping methods that guarantee no tampering. A guard going with the shipment 24 hours a day from the factory to the delivery location would be an example.
And of course, any organization or customer that is responsible to data security is going to have increasing trouble trusting US businesses with anything.
This is incredibly damaging. The NSA needs to do their job without destroying the US tech industry in the process.
Re:Knock knock (Score:5, Insightful)
Working for a defense contractor, I can say that someone is going to have fun talking with the FBI and/or the CIA and/or the NSA soon.
Happy butt raping!
Soon?
You must have missed the part where it says "A June 2010 report from the head of the NSA's Access and Target Development ".
I seriously doubt the FBI or CIA are going to go after the NSA.
It just costs US companies sales, and further encourages them to move manufacturing overseas.
Re:Knock knock (Score:5, Interesting)
Well that's what I was wondering. They must import them to the US, backdoor them and then export them again. I'd bet they have chinese backdoors in addition to the US ones.
Re: (Score:3)
Re: (Score:3)
(cough) with china, the backdoors are put there FROM the factory. no trip to the chinese version of NSA needed.
if you trust chinese software or embedded hardware, you are stupid and/or ignorant.
(similar if you trust the US stuff, now, too, sorry to say!)
maybe something good will come from this: the world does not trust as easily anymore. in a way, that can be a good thing; its certainly a maturing thing. the world is growing up and not thinking life is a wonderful disney movie anymore. the world is fill
Re: (Score:2)
Re:China (Score:5, Interesting)
Simply raise tech propaganda, wait for the US to build backdoors into everything, and then steal the knowledge because apparently the US is very bad with cybersecurity.
I'm suprised most people haven't realized that it's part of the pattern USians show, do-evil-blame-someone-else. NSA backdoors everything, thinks everybody is just as evil and paranoid as they are so they start creating negative propaganda against 'enemy' targets accusing them of doing exactly what they are doing.
I'm not a USian, so haven't been exposed to all the mind numbing media they have, but has there ever been ONE piece of intelligence about other countries that was true and wasn't simply the US looking in a mirror and trying to cover their tail???
Re:China (Score:5, Insightful)
Let's see. We have proof of the US doing this. We don't have proof of China doing it.
Conclusion: Accuse China!
This makes perfect sense.
Re: (Score:3)
To be fair this should be rephrased as:
"You lose the moral high ground when you resort to being no better than you claim that the dictators and terrorists are."
Re: (Score:2)
Probably not the largest in terms of sheer numbers.
Re: (Score:2, Insightful)
Considering the US government blatantly and consistently ignores its constitution, the document which grants it sovereignty, and is thus a rogue or fail[ing/ed] state, dismantling the intelligence apparatus would be a good thing for its citizens.
Re: (Score:2)
and not a moment too soon.
Re:Nothing unconstitutional about this (Score:5, Insightful)
Had Snowden only leaked the unconstitutional domestic spying, he would be a hero. It should be very clear now that those leaks were just a cover for treason. His goal seems to be nothing less than the dismantling of our entire intelligence apparatus.
You can't hide an intelligence operation of this scale forever, this was going to come out sooner or later, Snowden is an inevitability. That having been said, while your concern over how the USA's ability to find out what color underwear everybody else is ordering online is a valid one, consider the economic impact of this. I'm sure Cisco and a whole horde of other US based network equipment manufactures were thrilled to the core when they woke up one morning and found out that the NSA just crashed their sales and to add insult to injury ensured that in the long term their overseas competitors will get a whole lot more business as governments and corporations look for secure and preferably domestic sources of network equipment. Maybe the fact that it was all done in the name of patriotism and national security will more than compensate these US businesses for any financial losses that result from this activity?
Re: (Score:2)
I don't think the NSA is operating for the good of the US. I think the NSA is operating for the good of the NSA.
What is the NSA? A collection of security services companies milking a black budget with zero accountability and oversight. That's how this leak happened in the first place. Shitty contractors overcharging and under providing. All it took was one ordinary guy with a conscious to unravel the whole thing.
It's not just that we're being betrayed. We're being ripped off to make a buck at the same time.
Re: (Score:2)
Arguably, it is taking possession of private property without due process of law. Also note that the Bill of Rights applies to the government wherever it is, not just to citizens within the borders.
Re: (Score:2)
Re:Most damaging release yet (Score:5, Informative)
Just wait till the markets open tomorrow. NASDAQ down 600-800 points (at least). Nobody sane is going to purchase US-made networking gear for a very long time.
Nah, this won't budge the markets, mainly because this info was released some time ago - and it wasn't limited to router hardware. [forbes.com]
The only reason this is being re-reported is to promote Greenwalds's book. [macmillan.com]
Re: (Score:3)
Try not to be distracted by the hyperbole of GP. Companies aren't going to go bankrupt or lose all their large international contracts overnight.
What'll happen is a gradual shift away from doing business with U.S. based companies. Nor will the business necessarily go to the Chinese counterparts. Instead, what'll likely happen is niche local players will suddenly find that some new doors have opened up. And regulators will give U.S. companies more trouble when they're making large acquisitions of foreign (or
Re: (Score:3)
Is there any US made networking gear? I'd be surprised if it was more than 3 percent of the market. Maybe some high end stuff but I'd bet all the consumer grade shit is Chinese in origin. Hard to boycot made in America when it's not made in America. This article sounds like bullshit.
Re:Most damaging release yet (Score:4, Insightful)
Re: Most damaging release yet (Score:4, Insightful)
You do know they put the branding on them there don't you. It comes here to be sold to US consumers. I can't believe anyone is stupid enough to buy a router made in china and then shipped out of the US. You have to know the only possible reason for it to come to the US and then leave again is that it's been altered. Anyone who falls for that is so incompetent you shouldn't really need to spy on them.
Re: (Score:2)
I'm sure it's against the law to spy on anyone unless you tell them about it first.
Re: (Score:2)
I don't think he could get any whiter
http://en.wikipedia.org/wiki/D... [wikipedia.org]
Re: (Score:2)
Re-Flash it. Done. Or better yet get a reputable firm to validate the Firmware via CRC check etc. vs. OEM.
Re: (Score:3)
Re: (Score:2)
Well, they could get a friendly nation to detain his partner, question him for 9 hours and confiscate his electronic devices. Oh wait, that didn't work.