Posts tagged espionage

Inside a low budget consumer hardware espionage implant

espionage, security, DIY, NSA, USB, GSM, S8, 2018

A while back Joe Fitz tweeted about the S8 data line locator1. He referred to it as “Trickle down espionage” due to its reminiscence of NSA spying equipment. The S8 data line locator is a GSM listening and location device hidden inside the plug of a standard USB data/charging cable. It supports the 850, 900, 1800 and 1900 MHz GSM frequencies. Its core idea is very similar to the COTTONMOUTH product line by the NSA/CSS [1] in which an RF device is hidden inside a USB plug. Those hidden devices are referred to as implants. The device itself is marketed as a location tracker usable in cars, where a thief would not be able to identify the USB cable as a location tracking device. Its malicious use-cases can, however, not be denied. Especially since it features no GPS making its location reporting very coarse (1.57 km deviation in my tests). It can, e.g., be called to listen to a live audio feed from a small microphone within the device, as well as programmed to call back if the sound level surpasses a 45 dB threshold. The fact that the device can be repackaged in its sliding case, after configuring it, i.e. inserting a SIM, without any noticeable marks to the packaging suggests its use-case: covert espionage.

via https://ha.cking.ch/s8_data_line_locator/

The Spycraft Revolution

espionage, security, progress, technology, Foreign-Policy

The world of espionage is facing tremendous technological, political, legal, social, and commercial changes. The winners will be those who break the old rules of the spy game and work out new ones. They will need to be nimble and collaborative and—paradoxically—to shed much of the secrecy that has cloaked their trade since its inception. The balance of power in the spy world is shifting; closed societies now have the edge over open ones. It has become harder for Western countries to spy on places such as China, Iran, and Russia and easier for those countries’ intelligence services to spy on the rest of the world. Technical prowess is also shifting. Much like manned spaceflight, human-based intelligence is starting to look costly and anachronistic. Meanwhile, a gulf is growing between the cryptographic superpowers—the United States, United Kingdom, France, Israel, China, and Russia—and everyone else. Technical expertise, rather than human sleuthing, will hold the key to future success.

via https://foreignpolicy.com/2019/04/27/the-spycraft-revolution-espionage-technology/

Estonia: The Little Spycatcher Who Could

espionage, politics, Estonia, KAPO, SVR, NATO

Estonia is Europe’s leading catcher of Vladimir Putin’s spies as well as Europe’s leading unmasker of his manifold agents of influence. It is uncharacteristically unafraid to advertise its own national security threats by naming and shaming its yearly haul of enemy operatives, at least in comparison to other Western NATO democracies, which tend to hush up such bilateral embarrassments, preferring the discreet expulsion of spooks or “PNGing” of diplomats who glad-hand by day and engage in dead-letter drops by night.

via http://www.thedailybeast.com/articles/2017/04/15/estonia-the-little-spycatcher-who-could.html

Operation Socialist: How GCHQ Spies Hacked Belgium’s Largest Telco

Belgacom, GCHQ, espionage, EU, state sponsored hacking, NOCTURNAL SURGE, MUTANT BROTH, Five Eyes, Sn

The Belgacom hack, he said, is the “first documented example to show one EU member state mounting a cyber attack on another…a breathtaking example of the scale of the state-sponsored hacking problem.” Publicly, Belgacom has played down the extent of the compromise, insisting that only its internal systems were breached and that customers’ data was never found to have been at risk. But secret GCHQ documents show the agency gained access far beyond Belgacom’s internal employee computers and was able to grab encrypted and unencrypted streams of private communications handled by the company.

https://firstlook.org/theintercept/2014/12/13/belgacom-hack-gchq-inside-story/

Justice in a “Nation of Laws”: The Manning verdict

al jazeera, manning, freedom, security, espionage, terrorism, corruption, justice, corporatism

When Chelsea Manning (formerly Bradley Manning) was thirteen, the US government announced it had launched “Operation Infinite Justice”. Operation Infinite Justice sought to punish the perpetrators of the September 11, 2001 attacks, destroy Al Qaeda, and end the reign of the Taliban. Operation Infinite Justice was renamed “Operation Enduring Freedom” after protests from Islamic scholars, who argued that God, not the US government, was the arbiter of justice. But freedom, it seemed, was something the United States could give and take away. When Manning was fourteen, the Bush administration announced that detainees in Guantanamo did not deserve protection under the Geneva conventions and that torture was justified. When Manning was fifteen, the US invaded Iraq in response to fabricated reports that Saddam Hussein had weapons of mass destruction. When Manning was sixteen, US soldiers tortured and sodomised prisoners in Iraq’s Abu Ghraib prison. When Manning was seventeen, a movement emerged to prosecute the Bush administration for war crimes. Nothing really came of it. When Manning was nineteen, she joined the army.

http://www.aljazeera.com/indepth/opinion/2013/08/2013823123822366392.html