Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Eliminate costly downtime!
Find out how with Free White Paper
& enter to win a Samsung Galaxy Note

www.apc.com
Network Security
24/7/365 Network Uptime
Average Rating:
Rate this article:  
Did NSA Secretly Tap the Internet Backbone?
Did NSA Secretly Tap the Internet Backbone?

By Barry Levine
November 26, 2013 12:55PM

    Bookmark and Share
Earlier this month, reports surfaced that the documents released by former NSA contract employee Edward Snowden showed the NSA had tapped the transmissions to and from Google's and Yahoo's data centers. The taps meant that the agency had access to hundreds of millions of user accounts, many of which are owned by Americans.
 



Someday, the unraveling of the National Security Agency's spying on virtually everyone might make a great spy movie. In the latest revelation, there are reports the secretive federal agency may have tapped Google and Yahoo through major Internet backbone providers.

On Monday, a story in The New York Times asked how the National Security Agency could spy on Google and Yahoo users without having direct access to those companies' data centers, which have Mission Impossible-levels of security. The Times said that "people knowledgeable about Google and Yahoo's infrastructure" believe the NSA tapped into the fiber-optic cables of such Net backbone providers as Verizon, the BT Group and Level 3.

In particular, the story points at Level 3, the largest backbone provider on the planet. Data traveling through the backbones was not encrypted, although both Google and Yahoo are now encrypting the data they send through the backbones. Level 3 responded to the Times to say that it complies "with laws in every country where we operate," and provides governmental access to customer data "only when we are compelled to do so by the laws in the country where the data is located."

Millions Sent Daily

It's not yet clear if Level 3 was a willing participant in such an arrangement. Although the Internet has a seemingly infinite number of destinations, there are only a handful of major backbone providers. If accurate, the report points to the NSA's ability to tap virtually any corporate data center without their knowledge or consent.

Earlier this month, reports surfaced that the documents released by former NSA contract employee Edward Snowden showed the NSA had tapped the transmissions to and from Google's and Yahoo's data centers. The taps meant that the agency had access to hundreds of millions of user accounts, many of which are owned by Americans.

In its story on the reports, The Washington Post cited a top-secret document in the Snowden-released files, dated January of this year, which revealed that millions of records were sent daily from the Yahoo and Google networks to NSA headquarters in Maryland. The document noted that more than 181 million records, plus metadata, had been sent in the 30 days preceding that document's date.

Google: 'Outraged'

In response to the reports that its data centers had been compromised, Google said it had not provided access and was "outraged" at the steps the governmental agency had taken. Yahoo said it had "strict controls" in place, and had not granted access.

That's the back door. The NSA also has front-door access to user accounts, which requires approval by a Foreign Intelligence Surveillance Court.

In September, security firm RSA warned about another system-wide infiltration by the NSA. RSA advised its customers to avoid using a component in its widely used Data Protection Manager security software, because a Pseudo-Random Number Generator in the software had been flagged by the National Institute of Standards and Technology, another federal agency. NIST indicated it had reason to believe that the NSA, during the public process that created the number generator, may have included code that made the security software easier to break.
 

Tell Us What You Think
Comment:

Name:

Simba:

Posted: 2013-12-17 @ 7:34am PT
There is not a single accusation the Untied States has leveled against other "terrorist" nations that it has not itself been involved with.

While the US was diverting everyone's attention to the war on terror abroad, it has conducted a systematic dismantlement of it's own constitution.

Please help stop this from continuing and vote out all officials that support programs like this before history repeats itself. No nation in all of recorded history has ever survived trying to "ensure" the peace and safety of it's position in the world by trying to control and dominate it.

Smokey Bear:

Posted: 2013-11-27 @ 10:23am PT
Does a bear...in the woods?



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 Network Security
1.   Tips To Defeat the Heartbleed Bug
2.   NSC Backs Disclosing Vulnerabilities
3.   Heartbleed Flaw Affects Hardware
4.   1 in 5 Say They've Had Data Stolen
5.   McAfee Tool To Stop the Heartbleed


advertisement
Don't Reset Passwords for Heartbleed?
Added caution needed to ensure security.
Average Rating:
Tips To Defeat the Heartbleed Bug
Big data analytics could be the key.
Average Rating:
Heartbleed Flaw Affects Hardware
Cisco, Juniper equipment vulnerable.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Tips To Defeat the Heartbleed Bug
Heartbleed headlines continue as IT admins scramble for answers no one has. Early reports of stolen personal data, including 900 social insurance numbers in Canada, are starting to trickle in.
 
NSC Backs Disclosing Software Vulnerabilities
Disclosing vulnerabilities in commercial and open source software is in the national interest and shouldn't be withheld unless there is a clear need, says the National Security Council.
 
Heartbleed Flaw Affects Hardware, Too
It appears the Heartbleed security bug affects not just Web sites, but also the networking equipment that connects businesses and homes to the Net, including Cisco and Juniper's equipment.
 

Enterprise Hardware Spotlight
Vaio Fit 11A Battery Danger Forces Recall by Sony
Using a Sony Vaio Fit 11A laptop? It's time to send it back to Sony. In fact, Sony is encouraging people to stop using the laptop after several reports of its Panasonic battery overheating.
 
Continued Drop in Global PC Shipments Slows
Worldwide shipments of PCs fell during the first three months of the year, but the global slump in PC demand may be easing, with a considerable slowdown from last year's drops.
 
Google Glass Finds a Home in Medical Education, Practice
Google Glass may find its first markets in verticals in which hands-free access to data is a boon. Medicine is among the most prominent of those, as seen in a number of Glass experiments under way.
 

Mobile Technology Spotlight
Is Amazon Launching a 3D Smartphone?
Once known for selling books on an e-commerce platform, Amazon is now a bona fide hardware maker -- and it's reportedly rolling out an innovative smartphone with a 3D screen.
 
Review: S5 Features Useful, Less About Gimmicks
There's a lot to like about Samsung's new Galaxy S5 smartphone -- among them, its relative lack of features. Samsung chose to focus on features people might actually want, not gimmicks.
 
Analyst: Samsung Galaxy S5 Won't Sway iPhone Lovers
The Samsung Galaxy S5 hits store shelves on Friday and the reviews are starting to pour in. The question is: Can the latest in the Galaxy line grab more market share from Appleā€™s iPhone?
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | Small Business | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.