Online:
Visits:
Stories:
Profile image
Story Views

Now:
Last Hour:
Last 24 Hours:
Total:

The NSA Stole the Keys to Your Phone…….

Tuesday, March 3, 2015 5:22
% of readers think this story is Fact. Add your two cents.

(Before It's News)

The NSA Stole the Keys to Your Phone…….

Family fun at The Fountains
Can You Believe This Video?!

This shocking interview has already gone viral. But if you don’t act quickly, you might not get to see it at all. That’s because one analyst is making a bold prediction about a new movement that will ignite the greatest financial and political crisis America has ever seen. And some would like to see him silenced. To watch this shocking interview, click here.

By Ted Baumann, Offshore and Asset Protection Editor

What do you do when someone tells you “no”?

Do you accept it and move on? Continue your attempts at persuasion? Or ignore the answer and do what you want regardless?

If you’re the governments of the U.S. and U.K., you make the third choice. You do what you want and congratulate yourself on a job well done.

That’s the message the rest of the world will take away from the news that the National Security Agency (NSA) and its British counterpart, the Government Communications Headquarters (GCHQ), stole the master encryption keys for most of the world’s cellphones — including yours. They wanted them, so they just took them, violating numerous laws and treaties in the process.

Washington and London now have some explaining to do, especially to the Netherlands, where the theft took place.

But you have some work to do as well … to beat these privacy thieves at their own dirty game.


Urgent Warning for Anyone Carrying a U.S. Passport Issued After 2007

Did you know that all U.S. passports issued after 2007 have a weakness that can electronically broadcast your private information to identity thieves, electronic pickpockets, and the biggest snoop of all — Uncle Sam?!

Hidden, hair-thin computer chips implanted in the passports allow your ultra-private personal data to be read 35 feet away! But, there’s a way to opt-out of becoming a moving target. You can travel with a second passport.

In the just released 11th edition of The Passport Book, Bob Bauman shows you step-by-step how to get a second passport in 30 days or less. Click here to get your copy.


Stealing the Master KeyThe privacy of your mobile communications — voice calls, text messages and Internet access — depends on an encrypted connection between your cellphone and your wireless carrier’s network. This encryption uses keys stored on the SIM, a tiny chip inserted into your phone.

In April 2011, the NSA and GCHQ created a Mobile Handset Exploitation Team (MHET) to steal the keys that would unlock this encryption. The MHET targeted a Dutch company called Gemalto that makes these chips. Among its clients are AT&T, T-Mobile, Verizon, Sprint and some 450 wireless network providers around the world. By hacking the email and Facebook accounts of employees at Gemalto and its clients, the MHET was able to steal Gemalto’s master encryption keys. They even created a program that would steal the keys automatically.

With these stolen keys, the NSA and GCHQ can monitor mobile communications without warrants, wiretaps or approval from telecom companies and governments, leaving no trace of their actions. They can just vacuum up cellular signals out of the air and listen to any or all of the communications they intercept. 
Key Weakness: Single-Tier EncryptionThe reason this NSA/GCHQ hack works is because your cell communications are encrypted by your wireless carrier using keys that they possess. With the keys, anyone can listen in to your calls, texts or emails. You have no control over the matter — unless you take steps to protect yourself.

As numerous observers have noted, the implications of wholesale compromise of master cell encryption keys go well beyond the NSA and GCHQ. After all, if they can steal these keys, so can other countries. Naturally, criminals and fraudsters would love to get their hands on them too: Imagine how much money you could make if you had access to cell calls made around Wall Street.

But the Gemalto hack may be about much more than cellphones. The company is a global leader in digital security, producing banking cards, mobile payment systems, building security devices and identification cards. Among its clients are Visa, MasterCard, American Express, JP Morgan Chase and Barclays. It also provides chips for luxury cars, including those made by Audi and BMW.

Oh, and one other client: the U.S. government, which uses Gemalto technology in its electronic passports.
Assume the Worst and PrepareYou should assume that your cellphone is insecure and that someone is listening in on your communications. Time will tell whether the same is true of your credit cards, passport and car as well.

But there is a simple way to beat this invasion of your cellular privacy. Rather than rely on your cellphone company’s SIM card-based security, use secure communications software that encrypts your calls, texts and emails with a private key that only you and your contacts know.

You can encrypt your voice calls by using encrypted Voice over Internet Protocol (VoIP) apps such as Signal, RedPhone and Silent Phone. These work by turning your calls into encrypted Internet data, bypassing cell networks entirely. Apps such as TextSecure and Silent Text similarly encrypt your text messages. Email services such as Gmail are already encrypted, but you can double down by adopting a specialist service such as Proton Mail.

If you use these encryption apps, governments may still be able to intercept your communications, but listening to them would be impossible without targeting you specifically with time-consuming high-tech codebreaking efforts. And even then they would probably fail.

So what are you waiting for? Secure your cell communications quickly and simply. I have.

Kind regards,

Ted Baumann
Offshore and Asset Protection Editor

P.S. America is on the verge of meltdown. The loss of privacy in the U.S. is just one problem that is threatening to tear the country apart. Jeff Opdyke has identified a growing movement in the U.S. that could change the landscape of the U.S. forever and crush the dollar. To learn how you can financially protect yourself from this tidal wave of change, click here.

NESARA- Restore America – Galactic News



Source: http://nesaranews.blogspot.com/2015/03/the-nsa-stole-keys-to-your-phone.html

Report abuse

Comments

Your Comments
Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

Top Stories
Recent Stories

Register

Newsletter

Email this story
Email this story

If you really want to ban this commenter, please write down the reason:

If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.