Subscribe free to our newsletters via your
. Military Space News .




CYBER WARS
US data mining system technical details murky
by Staff Writers
Washington (AFP) June 7, 2013


Spy row will not undercut US-China summit: White House
Rancho Mirage, California (AFP) June 7, 2013 - The White House insisted on Friday that revelations about a vast US phone and Internet surveillance program would not undercut US complaints about Chinese cyber hacking at a key summit.

Obama was due to sit down with Chinese President Xi Jinping for two days of informal meetings later in the day at the Annenberg retreat in California.

US officials have said that Obama will raise the issue of repeated cyber attacks emanating from China that have targeted US military and commercial secrets, some of which are believed to have been sponsored by organs of the state.

But Obama goes into the summit fending off complaints about US anti-terror espionage efforts, after reports exposed National Security Agency programs to sweep up phone data and tap servers of nine US Internet giants.

One program accesses the servers of firms like Google, YouTube, Facebook and Apple. It does not target Americans or those on US soil but seeks data solely on foreigners -- a fact that could give Xi a card in the negotiations.

But White House deputy spokesman Josh Earnest insisted to reporters on Air Force One that the program did not undermine Obama's message -- and, to the contrary, enhanced his negotiating position.

"This is a pretty good illustration of the type of conversation we want to have about respecting civil liberties and protecting the constitutional rights of the people that you govern," Earnest said.

"What the president did was he put in place a very strict oversight regime, one that he strengthened when he took office -- one that constrained his own ability, constrained his own authority.

"I think that is a testament to the strength of our system of government," Earnest said, shortly after Obama argued the spy sweeps were legal, endorsed in law by Congress and subject to continual judicial oversight.

Earlier this week, US Defense Secretary Chuck Hagel accused China of waging cyber espionage against the United States, and intruding into sensitive US information systems.

Independent groups have also warned at a rising wave of commercial cyber espionage coming from China, as firms on the mainland seek to enhance their competitive advantage and mine US intellectual property.

The US government's vast online data collection system revealed this week could tap into companies like Google and Facebook without the knowledge of top executives, experts said.

The so-called PRISM program could be so secret that only a small number of computer network administrators and company lawyers may have been aware of it, according to technical and legal specialists.

Still, many aspects of the program remain murky, according to people who follow issues related to online privacy and security.

The government has acknowledged tapping into servers of nine Internet giants -- including Apple, Facebook, Google, Microsoft and YouTube -- even though the companies deny giving direct "backdoor" access.

The Washington Post and The Guardian reported the system dates back to 2007.

"There is something deeply mysterious about this," said Joseph Hall, senior technologist with the Center for Democracy and Technology, a digital rights activist group. "We've been wracking our brains all night."

The program run by the top-secret National Security Agency with the FBI "could be doing things in ways the companies wouldn't know," Hall said.

Hall noted that many questions are unanswered, such as how the program handles encrypted communications.

Johannes Ullrich, chief research officer for the SANS Institute computer research center, said it would be technically possible to set up a "master account" to give government spies access but that many in the companies might be kept in the dark.

"Given the secrecy of these systems, I am not surprised that only few inside the respective organizations have knowledge about the access," Ullrich told AFP.

Ullrich said that "the exact nature of the backdoor is still not known" but that it would be hard to "filter" the data to target only non-US users, as the government insists is the case.

"It's not realistic to filter non-US data" in the collection process, he said, adding that the system must later exclude non-relevant data about Americans.

Ullrich said the program raises questions about the vulnerability of the companies if a so-called "backdoor" has been established.

"Not just the organization authorized to use the backdoor has access to the data, but anybody who penetrated that organization," he said.

"So the Chinese probably have access to the data as well."

Alex Halderman, a University of Michigan computer science professor who specializes in data security, said the company denials "seem quite broad and are hard to square with the supposed capabilities of PRISM."

Halderman said it is possible that "the gag orders were so restrictive that senior management was not told... arguably only a small group of attorneys and engineers would need to know in order to comply with a sweeping access request."

Sascha Meinrath, who heads the New America Foundation's Open Technology Institute, said companies are "trying to elide the truth" about their cooperation.

"I expect that when it comes to light, we will find a number of boxes at the data centers of these companies," he said.

"You need that because the amount of data is so huge that you have to have an infrastructure in place."

Although it is possible to tap into services remotely, Meinrath said this would be "a massive security risk" that could allow access from hackers or others.

Marc Rotenberg, president and executive director of the Electronic Privacy Information Center (EPIC), said he sees no contradiction between the public statement of the companies and the likely cooperation.

"What strikes the reader as a denial is not a denial," Rotenberg said.

"Google did not say they were not disclosing information to the NSA. They said they did not provide a backdoor."

Rotenberg, whose organization has sued unsuccessfully to get details of what was reported to be a cooperation agreement between Google and the NSA, said data orders might be known only by the legal staff and a technical expert.

"Much of this authority to disclose information is subject to the gag provisions which prevent companies from disclosing the existence of the obligation," he said.

"The spokespeople may be speaking accurately about what they know but it might not be an accurate statement. They could be punished for acknowledging it."

EPIC attorney Ginger McCall said the program appeared to be designed "to circumvent the need for a court order," and that as a result, "there is a strong possibility it was illegal."

But companies have "an incentive not to be forthright" because "if they were cooperating, there is a potential for liability," she noted.

Bruce Schneier, an author of books on computer security who is the chief security technology officer at BT, said the latest revelations are only providing a small amount of information on government snooping.

"All we have is shadows of information," he said. "We are finally learning some things. We need more whistleblowers."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
US bill would deny visas, freeze assets of hackers
Washington (AFP) June 6, 2013
A group of lawmakers proposed legislation Thursday that would deny US entry and freeze the assets of foreign nationals involved in hacking or cybercrimes targeting the United States. The Cyber Economic Espionage Accountability Act calls US authorities "to bring more economic espionage criminal cases against offending foreign actors," the lawmakers said in a statement. The bill would also ... read more


CYBER WARS
Israel fast-tracks Arrow 3 over Iran nuclear fears

US Missile Shield Threatens Balance in Asia-Pacific Region

US to send Patriot missiles, F-16s to Jordan for drill

Russia developing counter-measures for European anti-missile shield

CYBER WARS
Putin holds back on Syria missile delivery

Taiwan deploys new powerful rocket system: report

Lockheed Martin Completes Anti Ship Missile Tests

Raytheon, US Navy complete first phase of RAM Block 2 developmental testing

CYBER WARS
US drone kills 7, first since Pakistan PM Sharif sworn in

Pakistan families of victims demand halt to US drone strikes

End drone strikes, new Pakistan PM tells US

Incoming Pakistan PM Sharif condemns drone attack

CYBER WARS
Mutualink Platform to be Deployed by US DoD during JUICE 2013

General Dynamics to Deliver U.S. Army's Newest Tactical Ground Station Intelligence System

Boeing-built WGS-5 Satellite Enhances Tactical Communications for Warfighters

US Navy And Lockheed Martin Deliver Secure Communications Satellite For Mobile Users

CYBER WARS
Chile to buy surplus U.S. armored amphibious vehicles

Raytheon books Paveway II contract

New Nerve and Muscle Interfaces Aid Wounded Warrior Amputees

More than 60 countries sign new arms trade treaty

CYBER WARS
Pressures grow on global defense spending: report

India promises to clean up military corruption

Thales delivers final Hawkei test vehicles

Netherlands, Germany move to enhance military cooperation

CYBER WARS
Obama, Xi forge rapport in debut summit

Outside View: Trapped in the cul de sac of no good choices

Rising China propels Xi into Obama summit: analysts

Obama, Xi stir intrigue with desert oasis summit

CYBER WARS
Stretchable, transparent graphene-metal nanowire electrode

Shape-shifting nanoparticles flip from sphere to net in response to tumor signal

Gold nanocrystal vibration captured on billion-frames-per-second film

Understanding freezing behavior of water at the nanoscale




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement