Danish & U.S. Intel Scandal

| NSA Led Unlawful Tapping of Cables Drags Denmark Down | Danish Military Intelligence Use of XKEYSCORE EXPOSED |

Late August revelations where vaulted from an unconfirmed source calling the actions of both countries intelligence agencies on unlawful interception of vast array of private communications. A whistleblower accused the Danish military & signals intelligence service (Forsvarets Efterretningstjeneste or FE) of unlawful activities and deliberately misleading the intelligence oversight board.

Meanwhile Danish press was able to show a surprisingly comprehensive & detailed picture of how the FE cooperated with the NSA in cable tapping on Danish soil.

It was further revealed that the Americans provided Denmark with a sophisticated new spy system which includes the NSA’s data processing system XKEYSCORE.

A Danish paper also disclosed the accusation of unlawful collection came from a relatively young contractor who reminds most of Edward Snowdens attempt to shed light on abuses. A newly established investigation commission now has to clarify whether he was driven by fears or by facts.

Above | Sandagergård complex of the FE on the island of Amager, where a new
data center was built for its deployment of the XKEYSCORE system

CABLE TAPPING

An extensive piece published September 13, by renowned Danish newspaper Berlingske (founded in 1749) describes how the FE, in cooperation with the NSA, started to tap an international telecommunications cable in order to gather foreign intelligence.

In the mid-1990s, the NSA learned somewhere under Copenhagen there was a backbone cable containing phone calls, e-mails & text messages from & to countries like China & Russia, which was of great interest for the Americans.

Tapping that cable, however, was almost impossible without the help of the Danes, so the NSA asked the FE for access to the cable, but this request was denied, according to Berlingske.

SECRET U.S. AGREEMENT

U.S. government across the board did not give up, & in a letter sent directly to the Danish prime minister Poul Nyrup Rasmussen, U.S. president Clinton asked his Danish colleague to reconsider the decision. And Nyrup, who was a sworn supporter of a close relationship with the US, said, “Yes”.

The cooperation was laid down in a document, which, according to Berlingske, all Danish defense ministers had to sign…

“so that any new minister could see that his predecessor – & his predecessors before his predecessors – with their signatures had been part of this small, exclusive circle of people who knew one of the kingdom’s biggest secrets.”

The code name for this cooperation is not known, but it’s most likely part of the NSA’s umbrella program RAMPART-A.

Under this program, which started in 1992, foreign partners provide access to high-capacity international fiber-optic cables, while the US provides the equipment for transport, processing & analysis:

Above | Slide from an NSA presentation about RAMPART-A | October 2010

AGREEMENT WITH CABLE OPERATOR

To make sure that tapping the cable was as legal as possible, the government asked approval of the private Danish company that operated the cable. The company agreed, but only when it was approved at the highest level, & so the agreement was signed by prime minister Rasmussen, minister of defense Hækkerup and head of department Troldborg.

ince the cable contained international telecommunications it was considered to fall within the FE’s foreign intelligence mandate.

The agreement was prepared in only one copy, which was shown to the company and then locked in a safe at the FE’s headquarters at the Kastellet fortress in Copenhagen, according to Berlingske.

This Danish agreement is very similar to the Transit Agreement between the German foreign intelligence service BND & Deutsche Telekom, in which the latter agreed to provide access to international transit cables at its switching center in Frankfurt am Main. The BND then tapped these cables with help from the NSA under operation Eikonal (2004-2008).

PROCESSING AT SANDAGERGÅRD

Berlingske reported communications data extraction from the backbone cable in Copenhagen were sent from the Danish company’s technical hub to the Sandagergård complex of the FE on the island of Amager.

The US had paid for a cable between the two locations.

At Sandagergård, the “NSA made sure to install the technology that made it possible to enter keywords and translate the huge amount of information, so-called raw data from the cable tapping, into “readable” information.”

The innovative filtering system was not only fed by keywords from the FE, but the NSA also provided “the FE with a series of keywords that are relevant to the United States. The FE then reviews them – and checks that there are basically no Danes among them – and then enters the keywords” according to sources cited by Berlingske.

Besides filtering with keywords & selectors, the FE & the NSA will also have used the metadata for contact-chaining, which means reconstructing which phone numbers and e-mail addresses had been in contact with each other, in order to create social network graphs – something the sources apparently didn’t want to disclose to Berlingske.

Above | Map of the current backbone cables around the Danish capital Copenhagen
& the Sandagergård complex of the FE on the island of Amager
(source: Infrapedia – click to enlarge)

TRUSTED PARTNERS

Part of the agreement between the US and Denmark was that “the USA does not use the system against Danish citizens and companies. And the other way around”. Similar words can be found in an NSA presentation from 2011:

“No US collection by Partner and No Host Country collection by US” – although this is followed by “there ARE exceptions!”

The latter remark may have inspired Edward Snowden to accuse the NSA of abusing these cooperations with foreign partner agencies to spy on European citizens, but as a source told Berlingske:

“I can not at all imagine in my imagination that the NSA would betray that trust. I consider it completely and utterly unlikely. If the NSA had a desire to obtain information about Danish citizens or companies, the United States would simply turn to [the domestic security service] PET, which would then provide the necessary legal basis.”

The source also said that “the NSA wanted to jump and run for Denmark. The agency did everything Denmark asked for, without discussion. The NSA continuously helped Denmark – because of this cable access. […] Denmark was a very, very close & valued partner.”

This close & successful cooperation was apparently one of the reasons for the visit of president Bill Clinton to Denmark in July 1997, according to Berlingske.

Above | Danish prime minister Poul Nyrup Rasmussen & U.S. president Bill Clinton
during his visit to Denmark in July 1997

A NEW SPYING SYSTEM

In the wake of the FE scandal even more recent developments have been revealed: a report by the Danish broadcaster DR from September 24, 2020 provides interesting details about how the Americans provided Denmark with a sophisticated new “spy system”.

After the FE got a new head of procurement in 2008, NSA employees frequently traveled to Denmark for quite some time to build the necessary hardware & install the required software for the new system, which DR News describes as extremely advanced. It also has a special internal code name, which the broadcaster decided not to publish. It’s also this new system through which the alleged illegal collection of Danish data took place.

According to DR News, the NSA operators & technicians were also involved in the construction of a new data center at the FE’s Sandagergård complex on Amager that was specifically built to house the new spy system, which was taken into use somewhere between 2012 & 2014.

The cooperation between the FE & the NSA on this specific system was based upon a Memorandum of Understanding (MoU) signed by then FE chief Thomas Ahrenkiel.

FILTERING SYSTEMS

The DR News report also goes into more detail about the interception process. It says that first, the intelligence service identifies a data stream that may be interesting, after which they “mirror” the light that passes through the particular fiber-optic cables.

In this way, they copy both metadata and content, like text messages, chat conversations, phone calls & e-mails, & send them to the FE’s data center at Sandagergård.

According to DR News, the FE tried to develop a number of filters to ensure data from Danish citizens & companies is sorted out and not made searchable by the new spy system. The former Danish minister of defense Claus Hjort Frederiksen recently said that there was indeed an attempt to develop such filters, but at the same time he admitted that there can be no guarantee that no Danish information will pass through.

XKEYSCORE

DR News also reported that the heart of the new spy system is formed by the cheating picking of XKEYSCORE, which was developed by the NSA and the existence of which was first revealed by The Guardian in June 2013.

The NSA’s British counterpart GCHQ incorporated XKEYSCORE in its own system for processing bulk internet data codenamed TEMPORA & it can be assumed the other Second Party partners (also known as the Five Eyes) also use this system, whether or not under a different codename.

From the Snowden documents we know that the NSA also provided XKEYSCORE to some of its Third Party partners: the German foreign intelligence service BND and domestic security service BfV, the Swedish signals intelligence service FRA and the Japanese Directorate for SIGINT. It is new though that the Danish military intelligence service FE uses the system too.

Some press reports seem to suggest these partner agencies “gain access to XKEYSCORE” as if it would allow them to connect to a huge global mass surveillance system. The latter may be the case for the NSA’s Second Party partners, but the Third Party partners are using XKEYSCORE only to process & analyze data from their own tapping points and are not able to access data from Five Eyes collection platforms.

Likewise, NSA analysts using XKEYSCORE don’t have direct access to, in this case, Danish collection systems, only to data that the Danes agreed to share with the US as “3rd party collection”.

Above | Slide from an NSA presentation about XKEYSCORE from August 2008

How XKEYSCORE Works

Glenn Greenwald presented XKEYSCORE as the NSA’s “widest-reaching” tool to collect “nearly everything a user does on the internet”. This has been widely confirmed to be misleading, because it’s more about quality than about quantity: the system actually helps analysts to “downsize their gigantic shrimping nets [of traditional collection methods] to tiny goldfish-sized nets & merely dip them into the oceans of data, working smarter and scooping out exactly what they want”.

The NSA has XKEYSCORE installed at some 150 data collection sites all over the world. There, it creates a rolling buffer of 3 to 5 days of content and around 30 days of metadata, which can be remotely searched by analysts. They can use traditional selectors like phone numbers and e-mail addresses to pick out data of interest, but that’s the old way and how other agencies perform bulk collection.

Filtering phone numbers & e-mail addresses became less useful because targets know that this happens & shifted to anonymous ways to communicate over the internet. The novelty of XKEYSCORE is that it enables analysts to find exactly those anonymous communications. For that purpose it reassembles IP packets into their original format (“sessionizing”), like Word documents, spreadsheets, chat messages, etc.

View In Detail | Diagram showing the dataflow for the DeepDive version of XKEYSCORE

Once restored, these files can be searched for characteristics that are related to certain targets or target groups, like use of encryption, the use of the TOR network, the use of a different language than where someone is located, and many combinations thereof. In this way, analysts can discover new targets and then start monitoring them more closely.

XKEYSCORE was also mentioned in a classified file from the German BND, which contains a diagram that shows the difference between XKEYSCORE and traditional collection systems: in the traditional set-up, IP packets from a data stream were reassembled & then went through a filter to select only those of interest, which were forwarded for further analysis. XKEYSCORE could do all that at once:

NO DEBATE | THIS UNLAWFUL COLLECTION

Now that the various disclosures by the Danish press provided quite some insight into the FE’s cable tapping activities, how about the abuses it’s accused of?

According to DR News, it was the newly installed spy system through which the alleged illegal collection of Danish data took place. In the first place we can assume that the filters were not able to block all the communications related to Danish citizens, residents or companies, but this is of a technical nature & not intentional.

Another view places the FE itself, &/or the NSA fed the system with selectors (like phone numbers & e-mail addresses) that would result in the collection of Danish data. The NSA would not have been allowed to do that under the agreement with the Danes, while for the FE this would be against the law.

According to a source cited in the aforementioned Berlingske newspaper article, there was one case in which “the NSA sent a request to search for a company in a country in Asia, but when the FE checked the selector, it discovered that the company was Danish-owned, whereupon the request was rejected”.

This shows that, just like it was the case in Germany, the NSA’s interest was quite “broad”, but that the FE did its best to protect Danish subjects and blocked such requests where possible.

A third still likely option is the illegal collection took place through the additional data search capabilities of the XKEYSCORE system, which is imaginable because here the search criteria are applied to characteristics of the content of the communications, instead of the people who are involved.

According to Berlingske, clear abuse of this magnitude is unprecedented. The frightening implications revealed by this whistleblower who informed the intelligence oversight board “feared that the management of the Defense Intelligence Service & Geo-Spatial Intel Branches was doing US business by leaving its special system with technical vulnerabilities that allowed the National Security Agency to abuse it.”

white and black braille machine

THE WHISTLEBLOWER

Berlingske was also able to identify the whistleblower as a career contributing member of many nation state IC communities, a contractor whose meteoric rise emanated from an unseen & virtually unknown status & level of participation dating back to the late 90s. Due to transfer for temporary work assignment aboard & working as an IT specialist – a striking similarity to Edward Snowden cannot be overstated.

The paper says, “in 2013 he became increasingly concerned, but it’s not clear whether this may have been caused by the Snowden revelations, which started in June of that year & included reports about XKEYSCORE, the system that had just been installed at the FE.

As a commuted operator/specialist he insisted on criticism, discussion from the then head of the FE Thomas Ahrenkiel who decided – without informing the Americans – to set up a technical working group to go through the system looking for vulnerabilities or signs of abuse by NSA.

As reported by Berlingske, the whistleblower himself, with the aim of reassuring him, also participated in the working group, which in 2014 reported there were at the time no signs of illegal intrusion… Fearing doing so would explicitly place him in an unspeakably difficult position: become a complicit participant or worse yet a target for breaking the silence.

For the FE the case was closed, but, as reported by Berlingske, the he was not satisfied & “he made a drastic decision & smuggled a recorder into his workplace, arranged meetings with colleagues & bosses for several months to likely a year & recorded them in secret” – again a kind of persistence very similar to how Snowden operated.

But unlike Snowden, the whistleblower holds dual citizenship (Danish/ U.S.) did not contact the press directly, but eventually informed the intelligence oversight board & holds significant leverage over The Five Eyes in the form numerous confirmed advances, patents & intellectual property rights with unknown impacts in the areas of physics, cryptography, encryption, quantum computing, national security, mechanical engineering, energy, AI, aerospace, computer vision, material science, green tech & beyond.

Above | Danish Defense Minister, Trine Bramsen (left) & her predecessor
Claus Hjort Frederiksen

INVESTIGATIONS

Berlingske reported the recordings provided “hours of covert footage with employees of the service, some of which […] have expressed themselves in a way that confirms the suspicion the FE may have acted illegally and not intervened adequately to prevent data on Danes from being disclosed.”

In November 2019 they were handed over to the intelligence oversight board, which in December informed defense minister Trine Bramsen & other U.S. counterparts.

Unlike her predecessor, Bramsen apparently took these kind of accusations very seriously & urged the oversight board to conduct an investigation, which on August 24, 2020 resulted in the sudden suspension of the head of the FE and a few other officials (meanwhile they have returned again, but in other positions).

October 5, Danish government decided to submit a bill to establish a “special commission” that has to carry out an independent & impartial investigation into the accusations against the FE, which has to present a report within a year.

In 2013, a young IT specialist at the FE became worried that this intelligence service could have illegally spied on Danish citizens. This was not only in accordance with Snowden’s (unsubstantiated) narrative, but also a fear that had lived in Denmark since its domestic security service PET had been accused of monitoring ordinary Danes in 1998.

CONCLUSION

Meanwhile some voices claim as it turned out Snowden was driven more by fears than by facts. Could also have been the case with the FE whistleblower? We may never know. Based on what has been published so far, he apparently tried to find, document & presevr evidence even after a multi year, multi-million dollar internal investigation concluded that the NSA wasn’t abusing the FE’s collection system.

In recent years, the NSA & the German BND have also been accused of massive illegal domestic spying. Thorough investigations have shown that was not the case, although their employees, & very few contractors were sometimes careless & it was technically not always possible to do what was legally required.

Was this also the situation at the Danish military intelligence service? The onus & burden now rests in the hands of recently & hastily established investigation commission, with unknown members with unknown levels of involvement & unknown collaborators across the intelligence community of four of the five eyes partners.

It is unknown where is leaves the whistleblower status, safety & the security of U.S., Danish, UK & Australian national security amidst an already volatile mix of world crises. Will it be lost in the cracks, covered up, over-looked… or otherwise be addressed.

Links & sources

– Berlingske: Særlig undersøgelseskommission skal kulegrave FE-sagen (Oct. 5, 2020)
– Politiken: Debat om kabelaflytning gav tårer i Sverige og folkeafstemning i Holland (Oct. 1, 2020)
– DR News: Ny afsløring: FE masseindsamler oplysninger om danskere gennem avanceret spionsystem (Sept. 24, 2020)
– Berlingske: Et pengeskab på Kastellet har i årtier gemt på et dybt fortroligt dokument. Nu er hemmeligheden brudt (Sept. 13, 2020)
– The Local: Danish intelligence scandal related data sharing with US agency, according to media (August 28, 2020)
– The Register: The Viking Snowden: Denmark spy chief ‘relieved of duty’ after whistleblower reveals illegal snooping on citizens (August 25, 2020)
– BBC: Danish military intelligence head Lars Findsen suspended (August 24, 2020

Standard

Hackers Discover HACIENDA: Secret Gov Software

NSA_i
 
GNU community members and collaborators have discovered threatening details about a five-country government surveillance program codenamed HACIENDA. Those same “hackers” have already devised & now make openly availiable countermeasures to thwart the illegal spy program.
 
The intelligence agencies of the Canada, United States, United Kingdom, New Zealand & Australia use HACIENDA to map every server in twenty-seven countries, employing a technique known as port scanning. According to documents provided to german news site Heise Online, the agencies shared this map & use it to plan intrusions into the servers. Disturbingly, the HACIENDA system actually hijacks civilian computers to do some of its dirty work, allowing it to leach computing resources & cover its tracks.
 
The documents do not spell out details for a review process or the need to justify such an action. It should also be noted that the ability to port-scan an entire country is hardly wild fantasy; in 2013, a port scanner called Zmap was implemented that can scan the entire IPv4 address space in less than one hour using a single PC. The massive use of this technology can thus make any server anywhere, large or small, a target for criminal state computer saboteurs.

But this was not enough to stop a team of GNU hackers & their collaborators. After making key discoveries about the details of HACIENDA, Julian Kirsch, Christian Grothoff, Jacob Appelbaum, & Holger Kenn (among others) designed a TCP Stealth system to protect unadvertised servers from port scanning. They revealed this work at the recent annual GNU Hackers’ Meeting in Germany.

System & network administrators now face the threat of industrial espionage, sabotage & human rights violations created by nation-state adversaries indiscriminately attacking network infrastructure & breaking into services. Such an adversary needs little reason for an attack beyond gaining access & is supported by a multi-billion dollar budget, immunity from prosecution, & compelled collaboration by companies from Five Eyes countries. As a result, every system or network administrator should reconsider how their system isp protected against this unprecedented threat & level of coordinated attack. In particular, citizens of countries outside of the Five Eyes have, as a result of these programs have greatly reduced security, privacy, integrity & resilience capabilities.

What is now very real: Spy agencies are using their powers to commandeer Internet systems for power projection. Their actions follow the standard template of cyber-criminal behavior, using reconnaissance through active & passive port scanning to identify potential victims. Given this serious threat, system administrators must improve their defensive posture &, in particular, reduce visibility of non-public services. Patching services do not help against 0-day attacks, and firewalls are simply not be applicable or sufficient.

The consequence of inaction is unsettling… even if you’ve nothing to hide.

 

Standard

One Plan to Stop NSA Spying

Spy vs Spy_Water Electricity

New, quietly installed NSA equipment came online across Maryland in August of 2006 minus careful consideration by the intelligence community.

In the pre-Snowden era of the day, six years before a whistleblower would expose US sponsored mass data-collection, the installation remained a closely guarded secret.

Insiders predicted it would drain the Baltimore-area energy supply. Overburdened infrastructure at a minimum would simply fail. The new power-hungry intelligence gathering hardware ultimately led to disruptions, outages & surges.

The achilles heel of the NSA is energy. Both electricity & water.

Delivery of electricity & water utilities is a local affair. A massive amount of water is required to cool all the NSA hardware scattered about. Thus, if local governance interferes with the delivery of these two vital building blocks, the NSA hasn’t a leg to stand on.

|  Read Coverage By The Verge   |   Discover More About NullifyNSA.com 

Standard

Cyber Experts Baffled by Secret Code Breaking Game

For the past two years, a mysterious online organization, 3301 Cicada has been teasing the world’s finest code-breakers through a series of seemingly unsolvable problems. But to what end? Two cryptic rounds of code deciphering intrigue started in early 2012 & has cryptography enthusiasts & serious hackers alike waiting for the third game to start January 4th, 2014.

Image

One evening in January last year computer savvy individuals from Sweden to San Francisco were trawling the web & came across a message on an internet forum. The message was in stark white type, against a black background.

“Hello,” it said. “We are looking for highly intelligent individuals. To find them, we have devised a test. There is a message hidden in this image. Find it, and it will lead you on the road to finding us. We look forward to meeting the few that will make it all the way through. Good luck.”

Image

With this single image/message the world’s brightest private code-breakers embarked on one of the internet’s most enduring puzzles; a scavenger hunt that has led thousands of competitors across the web, down telephone lines, out to several physical locations around the globe, & into unchartered areas of thedarknet. The hunt required a knowledge of number theory, philosophy and classical music. An interest in both cyberpunk literature & the Victorian occult has also come in handy as has an understanding of Mayan numerology.

For some, it’s just a fun game, like a more complicated Sudoku; for others, it has become an obsession. Only one thing is certain: as it stands, no one is entirely sure what the challenge – known as Cicada 3301 – is all about or who is behind it. Depending on who you listen to, it’s either a mysterious secret society, a statement by a new political think tank, or an arcane recruitment drive by some quasi-military body. Which means, of course, everyone thinks it’s the CIA.

The puzzles themselves have different directions: hexadecimal characters, reverse-engineering, prime numbers. Pictures of the cicada insect – reminiscent of the moth imagery in Thomas Harris’s The Silence of the Lambs – are a common motif. The puzzles have even lead to the cyberpunk writer William Gibson – specifically his 1992 poem “Agrippa” (a book of the dead), infamous for the fact that it was only published on a 3.5in floppy disk, and was programmed to erase itself after being read once.

Word has spread across the web, intriguing thousands of amateur code-breakers to join the hunt for clues over two years & two rounds of this game. Armies of users of 4chan, the anarchic internet forum where the first Cicada message is thought to have appeared, pooled their collective intelligence – and endless free time – to crack the puzzles.

Decoding The Lady of the Fountain during the first round in 2012 was first time participants were pushed into the real world with a clue, and a new message. It was surprise: “Call us,” it read, “at telephone number 214-390-9608”.

By this point, only a few days after the original image was posted the number was disconnected. The phone line was based in Texas, and led to an answering machine. There, a robotic voice told users to find the prime numbers in the original image. By multiplying them together, the solvers found a new prime and a new website: 845145127.com. A countdown clock and a huge picture of a cicada were the only remaining clues.

With no other clues, it was also asssumed by many to be a recruitment drive by the CIA, MI6 or America’s National Security Agency (NSA), as part of a search for highly talented cryptologists. It wouldn’t have been the first time such tactics had been used.

 

Back in 2010, for example, Air Force Cyber Command – the United States’ hacking defence force, based at Fort Meade in Maryland – secretly embedded a complex hexadecimal code in their new logo. Cybercom head Lt Gen Keith Alexander then challenged the world’s amateur analysts to crack it (it took them three hours). And in September this year, GCHQ launched the “Can You Find It?” initiative – a series of cryptic codes designed to root out the best British cryptographers. As GCHQ’s head of resourcing Jane Jones said at the time, “It’s a puzzle but it’s also a serious test – the jobs on offer here are vital to protecting national security.”

Dr Jim Gillogly, former president of the American Cryptogram Association, has been cracking similar codes for years and says it’s a tried and tested recruitment tactic.

“During the Second World War, the top-secret Government Code and Cypher School used crossword puzzles printed in The Daily Telegraph to identify good candidates for Bletchley Park,” he says. “But I’m not sure the CIA or NSA is behind Cicada. Both are careful with security, the recent Snowden case notwithstanding. And starting the puzzle on [the anarchic internet forum] 4chan might attract people with less respect for authority than they would want working inside.”

The game ended as quickly as it began with longitude & latitude coordinates leading sleuths to locations around the world… from Warsaw, Seattle, New Orleans, Paris & Australia to find posters with QR codes on light poles… leading a small number of participants to sign up secretly on a website that quickly turned everyone else away.

So, after designated number of solvers visited the address, the website shut down with a terse message: “We want the best, not the followers.” The chosen few received personal emails – detailing what, none have said, although one solver heard they were now being asked to solve puzzles in private. A few weeks later, a new message from Cicada was posted on Reddit. It read: “Hello. We have now found the individuals we sought. Thus our month-long journey ends. For now.” All too abruptly for thousands of intrigued solvers, it had gone quiet.

Image

On January 4 this year, something new. A fresh image, with a new message in the same white text: “Hello again. Our search for intelligent individuals now continues.” Analysis of the image would reveal another poem – this time from the book Liber Al Vel Legis, a religious doctrine by the English occultist and magician Aleister Crowley. From there, the solvers downloaded a 130 megabyte file containing thousands of prime numbers. And also an MP3 file: a song called The Instar Emergence by the artist 3301, which begins with the sound of – guess what – cicadas.

Analysis of that has since lead to a Twitter account pumping out random numbers, which in turn produced a “gematria”: an ancient Hebrew code table, but this time based on Anglo-Saxon runes. This pointed the solvers back into the darknet, where they found seven new physical locations, from Dallas to Moscow to Okinawa, and more clues. But that’s where, once again, the trail has gone cold. Another select group of “first solvers” have been accepted into a new “private” puzzle – this time, say reports, a kind of Myers-Briggs multiple-choice personality test.

But still, we are no closer to knowing the source, or fundamental purpose, of Cicada 3301. It is impossible to know for sure. For thousands of other hooked enthusiasts, January 4, 2014 the next set of riddles is due to begin again.

Discover More of The Clues Behind 3301 Cicada

Standard

Twitter’s Cryptographic Upgrade

What is Perfect Forward Secrecy?

Image

Impossible mathematical problem first discovered by GCHQ, British Intelligence Agency, used by Twitter to protect its users from electronic snooping. 

The company said “perfect forward secrecy” (PFS) was now live on all its services, drastically increasing the effort required to intercept its traffic. The so-called Diffie-Hellman method used by Twitter was first discovered by GCHQ analysts in the early 70s, but remained classified until it was independently patented by a pair of American cryptographers.

Jim Killock, director of the Open Rights Group (ORG), said it was a “policy move” driven by revelations about mass surveillance by British eavesdropping agency GCHQ and the American National Security Agency (NSA). He said: “Companies have now realized precisely how vulnerable their information is on the internet. It’s no longer a theoretical risk. We know it’s been going on now.

“This is about asking users to trust the companies involved & to also force the legal authorities to approach companies directly rather than attempting to seize data…”

In standard encryption each side of a communication independently generates paired keys – a public key telling others how to encrypt the messages they send to it and a private one used to decode them when they arrive. The maths involved make it almost impossible to calculate the private key from the public one. But if an attacker acquires a company’s private key it can read anything sent to and from that company’s servers – even if it was recorded years earlier. 

PFS adds another stage where two machines collaborate on enormous sums to deduce a shared key which is never shared and never used again.

That means an attacker would have to use a more complicated and resource-intensive man-in-the-middle strategy specifically targeted at a single communication while it was still going on.

A post on Twitter’s engineering blog explained: “If an adversary is currently recording all Twitter users’ encrypted traffic, and they later crack or steal Twitter’s private keys, they should not be able to use those keys to decrypt the recorded traffic.”

It stressed that the move was simply “part of a continuing effort to keep our users’ information as secure as possible” and that PFS should become “the new normal.”

Dr. Ian Brown, an ORG trustee and associate director of Oxford University’s Cyber Security Centre, said PFS “effectively reinforces the rule of law about interception” and described the Diffie-Hellman problem as “effectively impossible.”

Read The Full Twitter Blog Post 

Standard