Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Encryption Government Network Security United States Technology

NSA Cracked Open Encrypted Networks of Russian Airlines, Al Jazeera, and Other 'High Potential' Targets (theintercept.com) 68

An anonymous reader quotes a report from The Intercept: The National Security Agency successfully broke the encryption on a number of "high potential" virtual private networks, including those of media organization Al Jazeera, the Iraqi military and internet service organizations, and a number of airline reservation systems, according to a March 2006 NSA document. The fact that the NSA spied on Al Jazeera's communications was reported by the German newsmagazine Der Spiegel in 2013, but that reporting did not mention that the spying was accomplished through the NSA's compromise of Al Jazeera's VPN. During the Bush administration, high-ranking U.S. officials criticized Al Jazeera, accusing the Qatar-based news organization of having an anti-American bias, including because it broadcasted taped messages from Osama bin Laden.

According to the document, contained in the cache of materials provided by NSA whistleblower Edward Snowden, the NSA also compromised VPNs used by airline reservation systems Iran Air, "Paraguayan SABRE," Russian airline Aeroflot, and "Russian Galileo." Sabre and Galileo are both privately operated, centralized computer systems that facilitate travel transactions like booking airline tickets. Collectively, they are used by hundreds of airlines around the world. In Iraq, the NSA compromised VPNs at the Ministries of Defense and the Interior; the Ministry of Defense had been established by the U.S. in 2004 after the prior iteration was dissolved. Exploitation against the ministries' VPNs appears to have occurred at roughly the same time as a broader "all-out campaign to penetrate Iraqi networks," described by an NSA staffer in 2005.

This discussion has been archived. No new comments can be posted.

NSA Cracked Open Encrypted Networks of Russian Airlines, Al Jazeera, and Other 'High Potential' Targets

Comments Filter:
  • by Anonymous Coward

    That's what they exist to do.

    • by Anonymous Coward

      Good we hack the Russians, Bad the Russians hack us.

      Got it.

      You DO know we are not at war with them, right?

      I think the word is, Hypocrite

      • Good we hack the Russians, Bad the Russians hack us. Got it. You DO know we are not at war with them, right?

        We have always been at war with East^H^H^H^Eurasia.

    • by AHuxley ( 892839 )
      Thats nice AC. Until the same powerful methods walk out. Then get sold to anyone with cash.
      Then get given to other nations due to share faith, split loyalty.
      End up in a police collection product?
      The everyone has decryption and all internet use is weakened.
      Better to work on the best encryption and make encryption great again.
  • by 93 Escort Wagon ( 326346 ) on Friday August 17, 2018 @04:38PM (#57146456)

    More or less, anyway. But I don't understand how they found time for this, what with all the domestic spying they were doing...

  • by duke_cheetah2003 ( 862933 ) on Friday August 17, 2018 @04:50PM (#57146522) Homepage

    So, naturally, I want to know which VPN suites they broke into, any particulars on the settings used in such VPNs would also be great.

    I would like to improve my own VPN to be.. not what they broke into. No real point in this article if we can't learn how to better secure our own VPNs from it.

    • Working with vendors insisting on Cisco gear: outdated protocols (MD5, RC4 and 56-bit DES is standard if you want to use the âaccelerationâ(TM) module.

      • by MightyMartian ( 840721 ) on Friday August 17, 2018 @05:10PM (#57146632) Journal

        My VPN uses ROT13, you insensitive clod!

      • by amorsen ( 7485 )

        I wouldn't be surprised if the NSA has a fairly generic way to take on IPSEC running aggressive mode IKEv1 with group PSK and XAUTH. Because all other options are still a pain...

        The various *SWAN implementations of IKE showed us 15(?) years ago how to do secure roadwarrior VPNs with "raw" public key authentication, no insecure CA's or anything involved. No commercial implementation exist. IKEv2 can do cert-for-the-server + PSK-for-the-client, which is half way decent without relying on a full PSK infrastruc

        • Considering the recent USENIX talk on exploiting most mainstream IKE implementations via a Bleichenbacher attack, this seems most probable. Related paper: https://www.ei.rub.de/media/nd... [ei.rub.de]
        • by rtb61 ( 674572 )

          From what I understand of the US government, would not the US government declare those acts to be acts of war and should generate the potential for a first strike nuclear retaliatory attack. Just saying, according to American exceptionlism that would be the common consensus within corporate controlled main stream media, the US congress and Senate and the White house. So what does the US feel is the appropriate response by the targeted countries, where is the press release to define that, just saying.

    • by AHuxley ( 892839 )
      We know of Bullrun https://en.wikipedia.org/wiki/... [wikipedia.org]
      The world now knows more now with this news.
      The security services know of the origin network, the VPN use in the middle and the destination network.
      Is it decryption in the middle or really perfected decrypted collection on both ends?
    • by gweihir ( 88907 )

      Probably Cisco. They are thoroughly compromised, both from no skill and from no integrity.

  • ... because of all the superior airplane technology and the military secrets that can be sourced from there, right?

    Or was this network just hacked to later stage really relevant attacks originating from there, that are then attributed to evil Russians?
  • It's what they are tasked to do.

  • This makes me wonder if what the cost/effort for NSA is to crack a VPN? Is it high enough that somebody there has to justify it?

    • It costs something: "Al Jazeera talks to high-value targets, we should expend the effort/resources to crack their VPN"
    • It costs little: "Al Jazeera might have interesting conversations, add them to the list"
    • It costs nothing (or already paid for): Network sniffer detects VPN encyrpted patterns, adds them to the list to crack, auto-scaling group chews on that list continuously

    The pe

    • by AHuxley ( 892839 )
      AC nobody knows the math side to this.
      Has the NSA found an easy way around all consumer VPN products rather than into VPN encryption
      Is the NSA and GCHQ tracking all networks back from a VPN use and just getting in networks beyond their later VPN use?
      CIA placing devices that collect before VPN use and the NSA ensures their data flow out of nations?
      Some sort of design problem network wide that only the NSA/GCHQ discovered over decades makes all collection very easy?

      PRISM could be the way to understand t
  • Summary miss the method of exploitation: this was done thought LogJam. Note that this is a 12 years old source within Snowden leaks.
  • U.S. officials criticized Al Jazeera, accusing the Qatar-based news organization of having an anti-American bias, including because it broadcasted taped messages from Osama bin Laden.

    So Qatar is the badguy because they broadcast messages, but Saudi Arabia is on our side because actually causing 911 is OK.
    Good to know, funding terrorists and killing thousands of Americans is not as bad as gloating about it afterwards.

Intel CPUs are not defective, they just act that way. -- Henry Spencer

Working...