Quantcast
Published On: Thu, Feb 19th, 2015

NSA hacked SIM card maker to steal key codes to track cell phone users, data

Top secret documents previously provided by former NSA contractor Edward Snowden have revealed that the US and Britain broke into the network of the world’s largest SIM card maker to compromise global communications.

According to the documents obtained by The Intercept, the online news magazine founded by Snowden collaborator Glenn Greenwald, the US National Security Agency (NSA) and its British counterpart, the Government Communications Headquarters (GCHQ), stole the encryption keys used to secure voice calls and texts from Gemalto, the largest manufacturer of SIM cards in the world.

photo Oregon Department of Transportation

photo Oregon Department of Transportation

Two billion SIM cards are made annually by Gemalto. They are used by 450 wireless network providers around the world, including AT&T, T-Mobile, Verizon and Sprint, subsequently effecting the bulk of the world’s telephonic communications.

Gemalto has headquarters around the globe, including a US office in Texas, but is incorporated in the Netherlands and traded on the Eurolist.

By compromising the company’s internal computer network and stealing valuable encryption keys, the NSA and GCHQ have been able to render as useless the security measures used to protect communications sent through hundreds of networks the world over.

From Greenwald’s Twitter page:

NSA/GCHQ hack empowered them “to secretly monitor a large portion of the world’s cellular communications, including both voice and data.” – @ggreenwald

According to Jeremy Scahill and Josh Begley at The Intercept, classified files supplied by Snowden, including one GCHQ document from 2010 in particular, show how US and UK intelligence together conspired to compromise the SIM card maker.

One slide contained in the document showed that the GCHQ got inside of the manufacturer’s network, then stealthily installed malware that is believed to have opened up access to the SIM card maker’s entire computer system.

By possessing a copy of the encryption keys, US and UK intelligence agencies are believed to be able to crack into any affected communication, allowing authorities to eavesdrop internationally and on a mass scale without serving search warrants to local telecoms or requesting assistance from host countries.

“Once you have the keys, decrypting traffic is trivial,” Christopher Soghoian, the principal technologist for the American Civil Liberties Union, told the magazine.

Edward Snowden NSA background donkeyhotey

On the DISPATCH: Headlines  Local  Opinion

Subscribe to Weekly Newsletter

* indicates required
/ ( mm / dd ) [ALL INFO CONFIDENTIAL]

About the Author

- Writer and Co-Founder of The Global Dispatch, Brandon has been covering news, offering commentary for years, beginning professionally in 2003 on Crazed Fanboy before expanding into other blogs and sites. Appearing on several radio shows, Brandon has hosted Dispatch Radio, written his first novel (The Rise of the Templar) and completed the three years Global University program in Ministerial Studies to be a pastor. To Contact Brandon email [email protected] ATTN: BRANDON

Tags
Displaying 3 Comments
Have Your Say
  1. Mobile Phone | Cell Phones says:

    […] NSA hacked SIM card maker to steal key codes to track cell phone users, data – Top secret documents previously provided by former NSA contractor Edward Snowden have revealed that the US and Britain broke into the network of the world’s largest SIM card maker to compromise global … […]

  2. US and UK accused of hacking Sim card firm to steal codes – BBC News | Amazing News says:

    […] Keys To Gather Private DataTechCrunchGCHQ and NSA Collaborate to Steal the Keys to Your CellphoneEFFNSA hacked SIM card maker to steal key codes to track cell phone users, dataThe Global DispatchCTV News -ABC Online -SiliconANGLE (blog)all 174 news […]

  3. Cell Phones At&t | Cell Phones says:

    […] NSA hacked SIM card maker to steal key codes to track cell phone users, data – They are used by 450 wireless network providers around the world, including AT&T, T-Mobile, Verizon and Sprint … them “to secretly monitor a large portion of the world’s cellular communications, including both voice … […]

Leave a comment

XHTML: You can use these html tags: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Sign up for our Weekly Newsletter



Recent Posts

Things to Consider Before Getting A Home Warranty for Your New Home

May 16, 2023, Comments Off on Things to Consider Before Getting A Home Warranty for Your New Home

Have You Heard About Mesothelioma? Here Are Some Things to Know

May 16, 2023, Comments Off on Have You Heard About Mesothelioma? Here Are Some Things to Know

Top Gym Liability Insurance Plans: Secure Your Fitness Business with Unbeatable Coverage

May 5, 2023, Comments Off on Top Gym Liability Insurance Plans: Secure Your Fitness Business with Unbeatable Coverage
rabies

Dog Bite Incidents: Prevention, Liability, and Seeking Legal Assistance

May 5, 2023, Comments Off on Dog Bite Incidents: Prevention, Liability, and Seeking Legal Assistance

The 7 Tools You Need to Know About to Maximize Your Profits on Amazon

May 2, 2023, Comments Off on The 7 Tools You Need to Know About to Maximize Your Profits on Amazon

Top Reasons to Switch to Solar Energy

May 2, 2023, Comments Off on Top Reasons to Switch to Solar Energy

Increasing the Value of Your Home: A Complete Guide to Selling

May 2, 2023, Comments Off on Increasing the Value of Your Home: A Complete Guide to Selling

What Duolingo Got Wrong With Its ChatGPT Integration

May 2, 2023, Comments Off on What Duolingo Got Wrong With Its ChatGPT Integration

Categories

Archives