Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Build Apps 5x Faster
For Half the Cost
Enterprise Cloud Computing

On Force.com
World Wide Web
24/7/365 Network Uptime
Average Rating:
Rate this article:  
Did NSA Secretly Tap the Internet Backbone?
Did NSA Secretly Tap the Internet Backbone?

By Barry Levine
November 26, 2013 12:55PM

    Bookmark and Share
Earlier this month, reports surfaced that the documents released by former NSA contract employee Edward Snowden showed the NSA had tapped the transmissions to and from Google's and Yahoo's data centers. The taps meant that the agency had access to hundreds of millions of user accounts, many of which are owned by Americans.
 



Someday, the unraveling of the National Security Agency's spying on virtually everyone might make a great spy movie. In the latest revelation, there are reports the secretive federal agency may have tapped Google and Yahoo through major Internet backbone providers.

On Monday, a story in The New York Times asked how the National Security Agency could spy on Google and Yahoo users without having direct access to those companies' data centers, which have Mission Impossible-levels of security. The Times said that "people knowledgeable about Google and Yahoo's infrastructure" believe the NSA tapped into the fiber-optic cables of such Net backbone providers as Verizon, the BT Group and Level 3.

In particular, the story points at Level 3, the largest backbone provider on the planet. Data traveling through the backbones was not encrypted, although both Google and Yahoo are now encrypting the data they send through the backbones. Level 3 responded to the Times to say that it complies "with laws in every country where we operate," and provides governmental access to customer data "only when we are compelled to do so by the laws in the country where the data is located."

Millions Sent Daily

It's not yet clear if Level 3 was a willing participant in such an arrangement. Although the Internet has a seemingly infinite number of destinations, there are only a handful of major backbone providers. If accurate, the report points to the NSA's ability to tap virtually any corporate data center without their knowledge or consent.

Earlier this month, reports surfaced that the documents released by former NSA contract employee Edward Snowden showed the NSA had tapped the transmissions to and from Google's and Yahoo's data centers. The taps meant that the agency had access to hundreds of millions of user accounts, many of which are owned by Americans.

In its story on the reports, The Washington Post cited a top-secret document in the Snowden-released files, dated January of this year, which revealed that millions of records were sent daily from the Yahoo and Google networks to NSA headquarters in Maryland. The document noted that more than 181 million records, plus metadata, had been sent in the 30 days preceding that document's date.

Google: 'Outraged'

In response to the reports that its data centers had been compromised, Google said it had not provided access and was "outraged" at the steps the governmental agency had taken. Yahoo said it had "strict controls" in place, and had not granted access.

That's the back door. The NSA also has front-door access to user accounts, which requires approval by a Foreign Intelligence Surveillance Court.

In September, security firm RSA warned about another system-wide infiltration by the NSA. RSA advised its customers to avoid using a component in its widely used Data Protection Manager security software, because a Pseudo-Random Number Generator in the software had been flagged by the National Institute of Standards and Technology, another federal agency. NIST indicated it had reason to believe that the NSA, during the public process that created the number generator, may have included code that made the security software easier to break.
 

Tell Us What You Think
Comment:

Name:

Simba:

Posted: 2013-12-17 @ 7:34am PT
There is not a single accusation the Untied States has leveled against other "terrorist" nations that it has not itself been involved with.

While the US was diverting everyone's attention to the war on terror abroad, it has conducted a systematic dismantlement of it's own constitution.

Please help stop this from continuing and vote out all officials that support programs like this before history repeats itself. No nation in all of recorded history has ever survived trying to "ensure" the peace and safety of it's position in the world by trying to control and dominate it.

Smokey Bear:

Posted: 2013-11-27 @ 10:23am PT
Does a bear...in the woods?



APC has an established a reputation for solid products that virtually pay for themselves upon installation. Who has time to spend worrying about system downtime? APC makes it easy for you to focus on business growth instead of business downtime with reliable data center systems and IT solutions. Learn more here.


 World Wide Web
1.   Tor Internet Privacy Service Breached
2.   Amazon Invests $2B To Grow in India
3.   Many Sites Are Studying Consumers
4.   Facebook To Force Use of Messenger
5.   OkCupid Experiments with Daters


advertisement
OkCupid Experiments with Daters
Unethical without user consent?
Average Rating:
Radical.FM's Freemium Biz Model
Online radio startup asks for donations.
Average Rating:
Facebook Social Experiment Irks Us
Secretive test was legal, but ethical?
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
New 'Backoff' Malware Slips Undetected into Retail Systems
'Malicious actors' are using a new variety of malware to access consumer payment data remotely through point-of-sale systems, according to a report from the Department of Homeland Security.
 
IBM Beefs Up Identity Intelligence Security Solutions
Big Blue is betting big on identity intelligence. IBM just acquired a private firm with security software to govern user access to apps and data across cloud and on-premise environments.
 
USB Security Flaw Lets Hackers Hijack PCs
Hackers can use the firmware that controls USB functions to take control of computers, say security experts. That means there may be a new class of attack for which there are no defenses.
 

Enterprise Hardware Spotlight
AMD's ARM-Based Opteron Out in $3K Dev Kit
It's dubbed "Seattle" and it's AMD's first 64-bit ARM-based Opteron processor. The low-power chip is being released as part of AMD’s Opteron A1100-series developer kit, and aimed at high-end data center needs.
 
Apple Updates MacBook Pros, Cuts Prices Up to $100
The popular MacBook Pro laptop line just got an update and a price cut of as much as $100. The MacBook Pro with Retina display now includes faster processors and double the memory.
 
Dell, BlackBerry Not Sweating Apple-IBM Alliance
IBM's recent move to partner with Apple to sell iPhones and iPads loaded with corporate applications has excited investors in both companies, but two rivals say they are unperturbed for now.
 

Mobile Technology Spotlight
BlackBerry Messenger Now Available on Windows Phone
BlackBerry's free Messenger chatting and voice app is out of beta and widely available for Windows Phone users, the company said. BBM offers secure messaging, Groups, Voice, Channels and more.
 
Virgin Mobile Offers Custom Smartphone Plans
As the wireless carrier wars continue heating up, Virgin Mobile just threw the customization coal onto the fire. The firm has debuted a no-annual-contract plan with rates based on individual use.
 
Collaboration Provider Asana Revamps Mobile App
Asana, a collaboration software provider started by a Facebook founder, is now out with a rebuilt native iOS mobile app. It replaces one that even the company admits was not up to par.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.