French telco Orange says that the telco plans to take legal action against the NSA for the agency's tapping of undersea cables, recently revealed in the latest round of Edward Snowden document leaks. Specifically, the documents note that the NSA tapped the SeaMeWe-4 cable, which links Europe, North Africa and the Middle East. Reuters notes that Orange hasn't decided if they'll file their own legal assault (the success/legality of that being highly unclear), or if they'll join an existing legal action launched in July by the International Federation of Human Rights. Orange's surprise seems justified if not dramatic -- undersea cable taps have been rumored to be commonplace under programs like Echelon for more than a generation.
anything sensitive going underseas is either encrypted or through a VPN, so no real harm was done that could be the basis of any legal tort action. it's possible some treaty or trade agreement was bent, but then the damage award would most likely be punitive.
Sir where have you been ? The NSA has had it's in in breaking the back of All encryption by helping to create a bad seed timer. So they can, have been , and will continue to get around that pesky thing you call encryption. -- "It's always funny until someone gets hurt......and then it's absolutely friggin' hysterical!"
2014-Jan-6 2:40 pm: ·
Packeteers Premium join:2005-06-18 Forest Hills, NY kudos:1
Re: paying lawyers to play politics
pure FUD: the NSA has not broken common secure encryptions, they simply data tap in before the encryption even takes place.
You mean to tell me 3/4 of the internet lies ? Or that fact that I myself can break encryption with a half rack If I know the seed, is not true ? Please do tell me how this is wrong.
When you know the seed 2/3 rds of the encryption is already broken. Why do you think everything down to even a simple smart card has a Random Number Generator ? Don't let encryption math facts get in the way though. -- "It's always funny until someone gets hurt......and then it's absolutely friggin' hysterical!"
know we are talking about them poisoning others as well.
Implementations which used Dual_EC_DRBG would usually have gotten it via a library. At least RSA Security (BSAFE library), OpenSSL, Microsoft, and Cisco has libraries which included Dual_EC_DRBG, but only BSAFE used it by default. According to the Reuters article which revealed the secret $10 million deal between RSA Security and NSA, RSA Security's BSAFE was most important distributor of the backdoored algorithm. There was a flaw in OpenSSL's implementation of Dual_EC_DRBG that made it non-working outside test mode, from which OpenSSL's Steve Marquess concludes that nobody used OpenSSL's Dual_EC_DRBG implementation.
So they poisoned the base libraries of pretty much everything that uses openssl, Microsoft, and Cisco. Not a lot of gear there. You know considering almost every ssl based vpn/tunnel uses openssl libraries.
Yeah Your absolutely correct it was only RSA. -- "It's always funny until someone gets hurt......and then it's absolutely friggin' hysterical!"
"Is it actually that difficult for the underwater cable owners to go in the water and actually find the physical tap that they all speak of?"
If the tap didn't cause a disruption or degradation of service it would be almost impossible unless you inspected every inch of the cable. -- I do not, have not, and will not work for AT&T/Comcast/Verizon/Charter or similar sized company.
Continental shelves don't fall precipitously everywhere, in some places the drop off is gradual. 12 miles out could only be in 1000-2000 ft of water. Also need to consider that placing such a tap in deep water would be a large expense, compared to shallower areas. What they could do is just sever the connection close in to shore and order a search for breakage starting out far, then have them remove any erroneous hardware they find connected on the way back in. Sure, it's severe remedy, but it would find the hardware.
This one is not new. The US has been doing this for a long time. I looked for but couldn't find a link to a story about how the US was able to tap undersea cables in a way that was undetectable. It was done by bending the fiber to the point that light was leaking out but still transmitting. Another method was some way to hot splice a tap with 0ms loss. -- I do not, have not, and will not work for AT&T/Comcast/Verizon/Charter or similar sized company.
2014-Jan-6 2:14 pm: ·
Kommie Premium join:2003-05-13 united state kudos:3
Re: Snowden didn't reveal anything new here...
USS Jimmy Carter
2014-Jan-6 2:35 pm: ·
kevinds Premium join:2003-05-01 Calgary, AB kudos:3
This would be neat to see done, on the ocean floor