Researcher Says Simple Security Fixes From Carriers Would Have Prevented NSA Collection Of Cell Communications

from the we're-nos.-1-whatever,-why-try-harder? dept

Hanlon’s Razor states: never attribute to malice that which is adequately explained by stupidity. Replace “stupidity” with “laziness” and you’ve got one researcher’s theory as to why cell phone carriers failed to make basic efforts to provide a secure product — one that would have prevented the NSA’s collection of communications. (h/t to DSLreports)

The world’s mobile phone carriers have failed to implement technology fixes available since 2008 that would have thwarted the National Security Agency’s ability to eavesdrop on many mobile phone calls, a cyber security expert says.

Karsten Nohl, chief scientist with Berlin’s Security Research Labs, told Reuters ahead of a highly anticipated talk at a conference in Germany that his firm discovered the issue while reviewing security measures implemented by mobile operators around the world…

None of the carriers surveyed had implemented measures for thwarting a method that allows the NSA to eavesdrop on most mobile calls by unscrambling a widely used encryption technology known as A5/1[…] Nohl said that method would have been blocked if carriers had applied two patches released in 2008.

Were carriers compelled to leave this hole open for NSA exploitation? It’s a good question, but Nohl says the more likely explanation is that carriers simply didn’t find the problem worth addressing.

“I couldn’t imagine it is complicity. I think it is negligence,” he said. “I don’t want to believe in a worldwide conspiracy across all worldwide network operators. I think it is individual laziness and priority on network speed and network coverage and not security.”

As has been observed everywhere, the path of least resistance is favored by many entities, even those not explicitly performing government work. Making a minimum of effort dumped customers’ conversations right into the NSA’s lap.

Of course, if the NSA had knocked on these carriers’ doors and asked for a small favor, like leaving a security hole big enough to drive a semi full of unused privacy protections through, chances are many would have said, “Sure, why not.” Verizon and AT&T have only very belatedly joined the national conversation on intelligence gathering, after spending months shuffling around the periphery while staring at the floor. For years, these providers have handed over everything the agency’s asked for and shown an active interest in helping it anticipate what it might need next.

But Nohl’s theory dismisses a worldwide conspiracy to dump cell phone customers’ conversations into the waiting ears of the NSA — something that’s more likely to be true. While American carriers have proven to be useful NSA allies, very little has been exposed about the compliance rate of foreign carriers. Not that their resistance would matter much (or that they’d even be approached directly), as foreign intelligence agencies have been just as “helpful” as AT&T and Verizon in terms of granting access to data and communications — much of which ultimately ends up in the NSA’s sprawling lockboxes.

The moral here, if Nohl is correct, is that the industry’s idle hands are the NSA’s workshop. Not doing something can be just as harmful as complete complicity.

Filed Under: , , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “Researcher Says Simple Security Fixes From Carriers Would Have Prevented NSA Collection Of Cell Communications”

Subscribe: RSS Leave a comment
24 Comments
Violynne (profile) says:

“I couldn’t imagine it is complicity. I think it is negligence,” he said. “I don’t want to believe in a worldwide conspiracy across all worldwide network operators. I think it is individual laziness and priority on network speed and network coverage and not security.”

This thinking is inaccurate. Yes, there *was* a worldwide network operation conspiracy.

For crying out loud, it doesn’t take a genius to see the price gouging, price fixing ways of the telcos without seeing the tradeoff is allowing governments to spy on their customers.

Show me a single country whose government isn’t into spying on its people and I’ll show you a country without a cell network.

weneedhelp (profile) says:

Re: Re:

“I couldn’t imagine it is complicity. I think it is negligence,” he said. “I don’t want to believe in a worldwide conspiracy across all worldwide network operators. I think it is individual laziness and priority on network speed and network coverage and not security.”

He wouldn’t believe in a world wide conspiracy, but will believe ALL telcos techs were inept or negligent? Or just missed that patch… give me a break.

Eldakka (profile) says:

Re: Re: Re:

If (and it’s a big ‘if’) the patches significantly increased resource requirements (CPU/Memory) of the telco-side devices, then from a commercial perspective it is not beyond the realm of possibility that a BUSINESS-level decision overrode any techie-level decision and the business decided not to apply them due to the cost requirements in purchasing new kit/facilities space.

But I do prefer the conspiracy theory 😉

aldestrawk says:

Re: Re:

The news is about why the telecoms don’t fix a well known security weakness, not that there is a weakness. Publicly known attacks against A5/1 have been known since 1994. Undoubtedly, the NSA and GCHQ were able to crack this from the time of it’s initial adoption in GSM. The following is from the Wikipedia entry for A5/1:

“According to professor Jan Arild Audestad, at the standardization process which started in 1982, A5/1 was originally proposed to have a key length of 128 bits. At that time, 128 bits was projected to be secure for at least 15 years. It is now estimated that 128 bits would in fact also still be secure as of 2014. Audestad, Peter van der Arend, and Thomas Haug says that the British insisted on weaker encryption, with Haug saying he was told by the British delegate that this was to allow the British secret service to eavesdrop more easily. The British proposed a key length of 48 bits, while the West Germans wanted stronger encryption to protect against East German spying, so the compromise became a key length of 56 bits.[5]”

alan turing says:

gullibility

“I couldn’t imagine it is complicity. I think it is negligence,” he said. “I don’t want to believe in a worldwide conspiracy across all worldwide network operators. I think it is individual laziness and priority on network speed and network coverage and not security.”

If you can’t imagine the former how can you swallow the latter?

out_of_the_blue says:

Sheesh. Discussing a "theory" of how happened rather than every day FACT of it done.

Just more Typical Techdirt distraction with weenie-ing academic digging into details. WHO THE HELL CARES?

We KNOW what’s going on: universal and increasing spying which can’t be avoided — even when done by Google and Facebook. Globalist mega-corporate monsters conspire with gov’ts to steal our privacy in order to put in place a PEOPLE CONTROL system. — And by the way, Google has just plunked down 3.2 BILLION of its untaxed for “Nest” which makes “smart” thermostats in order to SNOOP on you better.

QUIT WEENIE-ING with academic “theory”. Just state some damn opposition to being spied on by every corporation and gov’t department.


Where Mike sez: “Any system that involves spying on the activities of users is going to be a non-starter. Creeping the hell out of people isn’t a way of encouraging them to buy. It’s a way of encouraging them to want nothing to do with you.” — So why doesn’t that apply to The Google?

02:50:32[c-501-5]

Anonymous Coward says:

Worth Not Addressing

“Nohl says the more likely explanation is that carriers simply didn’t find the problem worth addressing.”

More likely they found the so-called “problem” to be worth not addressing.

“I don’t want to believe in a worldwide conspiracy across all worldwide network operators.”

No, not a single “worldwide conspiracy”, but multiple conspiracies worldwide. Every government worldwide has security agencies that want to spy on their own citizens. And every cell phone company worldwide is dependent on their government for permission to operate. One hand washes the other. That’s the ways the system is setup.

aldestrawk says:

encryption only used between handset and cell tower

To put the NSA monitoring of cell phone (and landline) traffic in the U.S. into perspective, there are two ways to do this. Encryption only comes to play between the mobile phone hand set and the base transceiver station (the local cell tower). The contents of a call is not encrypted within the trunks and switching equipment of the telecoms. Since it appears the NSA has it talons, and high capacity Narus monitoring equipment within the telecom infrastucture, they don’t have to bother with decrypting call contents. The only reason they would bother to monitor handset/tower communications is where they don’t have such core access or perhaps when they have a particular target.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...