A List Of Companies Where NSA Has A "Backdoor" Thus Allowing Snooping On Customers (Apple, Dell, Microsoft, Cisco And..)
Security Experts Pull Out of RSA Conference in NSA Protest
At least six speakers have withdrawn from the February 2014 RSA Conference, one of the top cybersecurity events of the year, in protest over allegations that EMC Corp.'s RSA security division accepted $10 million to essentially create a backdoor in one of its products.
Mikko Hyppönen, chief research officer for the Helsinki, Finland-based security firm, F-Secure, Taia Global Inc. CEO Jeffrey Carr, ACLU technologist Christopher Soghoian and Josh Thomas of Atredis Partners were among the speakers to take to social media to express their displeasure over allegations first revealed in a December 20 story by Reuters’ Joseph Menn.
“You can’t get much worse than this, in terms of a security company betraying its customers,” Mr. Carr told CIO Journal. Mr. Carr, who also founded his own conference called Suits and Spooks, withdrew from the conference on January 3.
Digital Dao: Joining @Mikko in Protest, I’ve Cancelled My Talk at RSA http://t.co/EyFkVPwrqL — Jeffrey Carr (@jeffreycarr) January 3, 2014
Mr. Hyppönen was the first speaker to pull out of the conference on December 23. Since then, others have joined him. “I’ve given up waiting for RSA to fess up to the truth” regarding NSA and withdrew from the conference, wrote Christopher Soghoian, principal technologist and senior policy analyst at the American Civil Liberties Union, Tuesday, in a Twitter message.
I’ve given up waiting for RSA to fess up to the truth re: the NSA and Dual_EC. I’ve just withdrawn from my panel at the RSA conference.
— Christopher Soghoian (@csoghoian) January 7, 2014
Josh Thomas, partner at security firm, Atredis Partners, recently cancelled his plane ticket and withdrew from the conference. Mr. Thomas has worked in cryptography for the Defense Department, has held top-secret security clearance and still has friends in the government. But the Reuters story, alleging that RSA accepted $10 million from the NSA to essentially put a backdoor in a product called Bsafe was too much. Mr. Thomas said he could no longer “lend his credibility” to the RSA Conference. “It’s just not good for business, it’s not good for the population and I don’t really want to support that at all,” he told the Wall Street Journal.
EMC’s RSA unit has said, in a statement, that it “categorically denies” the allegation that it entered into a “secret contract” with the NSA.
Mr. Carr, who labeled RSA’s public statement “misleading and lacking details,” in a January 6 blog post, said RSA and the NSA were at odds in the 1990s during the so-called encryption wars. It wasn’t until after 9/11 that the relationships between many security companies and the government began to change, he said. “The government went to private industry and said, ‘we’re in this war against terrorism together and our country is counting on you,” he added.
Now, besides boycotting the conference, he is calling for a boycott of RSA products
Hugh Thompson, program committee chair of the RSA Conference, says the conference has a history of being neutral and that the recent allegations regarding the NSA would likely be discussed at the conference.
Still, he noted that the cancellations represented a small percentage of the 500 speakers scheduled for the conference. “My personal expectation is that it’s going to be a big event and there’s going to be a lot to discuss,” he added.
Mr. Thompson is chief security technologist and SVP at security technology vendor Blue Coat Systems Inc.
The NSA Has Targeted Manufacturer's Products With Malicious Software And Hardware That Create Backdoors In Products.
Many Customers Are Upset And There Is Skittishness About Whether Their Internal Networks Have Been Somehow Compromised By The NSA.
Companies Are Looking For Suppliers Not Based In The U.S. The Trust Level Is At Rock Bottom. This Is Really Going To Hurt U.S. Company Business – We’re Already Seeing It.
“There’s a very real concern for political or geography-based balkanization, which is in nobody’s best interest,” said William Plummer, Huawei’s Washington, D.C.-based vice president of external affairs. On December 30, Der Spiegel reported that the NSA has targeted Huawei products, among those of other manufacturers, with malicious software and hardware that create backdoors in products.
Huawei is familiar with what happens when trust splinters. For years it has received complaints from the United States government about the Chinese government potentially introducing backdoors into Huawei equipment. Huawei has denied that this has happened. In October 2012, a U.S. House Intelligence Committee Report urged U.S. telecom providers not to do business with Huawei and ZTE Corp., another Chinese equipment manufacturer. Now that the tables are turned, Huawei is not expressing schadenfreude. Instead, Mr. Plummer suggests that the industry find a global standards-setting organization such as the International Telecommunications Union to help manufacturers bolster security in their products.
The NSA reportedly also targeted enterprise products from Cisco Systems Inc., Juniper Networks Inc., Hewlett-Packard Co. and Dell Inc. These companies say they did not assist the NSA in creating backdoors for their products and will work with customers to communicate any vulnerabilities they find. Juniper, Cisco and Huawei say they are investigating specific allegations about products made in the story.
Huawei is “conducting audits of its products to determine if any compromise has occurred.” If so, it will develop and communicate appropriate fixes, said Mr. Plummer.
Cisco is investigating allegations about the creation of alleged implants for some of the Cisco PIX and Cisco ASA platforms and is posting updates on a blog.
Juniper Networks, in a statement, said it is not aware of any implants and the company takes “allegations of this nature very seriously and are working to address any possible exploit paths.”
H-P, in a statement, said it “was not aware of any of the information presented in the Der Spiegel article, and we have no reason to believe that the HP ProLiant G5 server mentioned was ever compromised as suggested in the article.”
Huawei is “conducting audits of its products to determine if any compromise has occurred.” If so, it will develop and communicate appropriate fixes, said Mr. Plummer.
Cisco is investigating allegations about the creation of alleged implants for some of the Cisco PIX and Cisco ASA platforms and is posting updates on a blog.
Juniper Networks, in a statement, said it is not aware of any implants and the company takes “allegations of this nature very seriously and are working to address any possible exploit paths.”
H-P, in a statement, said it “was not aware of any of the information presented in the Der Spiegel article, and we have no reason to believe that the HP ProLiant G5 server mentioned was ever compromised as suggested in the article.”
The NSA, in a statement, said that the U.S. technology industry builds the most secure hardware and software in the world today. “Given its own reliance on many of the very same technologies that the public uses, the U.S. Government is as concerned as the public is with the security of these products.” The NSA won’t comment on specific alleged intelligence-gathering activities, but the “NSA’s interest in any given technology is driven by the use of that technology by foreign intelligence targets.”
For now, many customers are upset and there is skittishness about whether their internal networks have been somehow compromised by the NSA, said Avivah Litan, vice president and distinguished analyst at Gartner Research Inc. “You can’t just redo your network,” she said, adding that IT budgets are tight.
Most customers are trying to find more information at the moment, which includes putting pressure on vendors to delineate which products may have been impacted. Some are looking at taking legal action, she said, which could take years. The prospect of closing the alleged backdoors could take several months from a technical perspective.
Already, in Europe, companies are looking for suppliers not based in the U.S., said Ms. Litan. “The trust level is on rock bottom,” she added. “It’s really going to hurt U.S. company business – we’re already seeing it.”
Apple Denies Working with NSA on ‘Backdoor’ for iPhone
Apple Inc. said it never worked with the National Security Agency to create a back-door way for the organization to spy on iPhone users and it was unaware of any program to target its products.
The company issued a statement Tuesday in response to a leaked document alleging that the NSA had targeted Apple's iPhones in a spyware program called "DROPOUTJEEP" in 2008. The document said once the software was installed on an iPhone, it had the ability to access the device's data, activate the phone's microphone or camera, intercept text messages or narrow down a user's location using cell towers.
"Apple has never worked with the NSA to create a backdoor in any of our products, including iPhone," the company said. "Additionally, we have been unaware of this alleged NSA program targeting our products. We care deeply about our customers' privacy and security. Our team is continuously working to make our products even more secure, and we make it easy for customers to keep their software up to date with the latest advancements."
The leaked document was dated October 2008, implying that these methods were for older devices running older versions of Apple's iOS operating system. A person familiar with the matter said Apple doesn't believe that such spyware has attacked its latest hardware—from iPhone 5 and beyond—or software including its iOS 7 operating system.
The document relating to Apple was part of a larger cache detailing ways the NSA can gain access to equipment made by Cisco Systems Inc., Juniper Networks Inc., and others.
The Wall Street Journal reported in August that U.S. and foreign law-enforcement agencies used software to turn Internet-connected devices, such as laptops and smartphones, into digital eavesdropping posts. Such programs often are created and installed without the device manufacturer's knowledge.
In a statement Tuesday, the NSA said that, because it uses commercial technology made by U.S. companies,"the U.S. government is as concerned as the public is with the security of these products. While we cannot comment on specific, alleged intelligence-gathering activities, NSA's interest in any given technology is driven by the use of that technology by foreign intelligence targets. The U.S. pursues its intelligence mission with care to ensure that innocent users of those same technologies are not affected."
Monty Henry, Owner
Some of Our Latest Articles:
* Mixing Services Add Complete (NSA-Proof) Anonymity To Bitcoin Transactions
Next-Generation Bug / Microwave / ELF / Spy Phone / GSM And Camera Detectors (Buy, Rent, Layaway) tinyurl.com/2eo8mlz Open...
— Spy Store Rentals (@MontyHenry1)
Nanny IP (Internet) Cameras, GPS Trackers, Bug Detectors and Listening Devices, etc, (Buy / Rent / Layaway): tinyurl.com/396jlw6...
— Spy Store Rentals (@MontyHenry1)
NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA.
Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.
NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA: http://www.dpl-surveillance-equipment.com/wireless_hidden_cameras.html
Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.
• Remote Video Access
• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)
• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)
• Live Monitoring, Recording And Event Playback Via Internet
• Back-up SD Storage Up To 32GB (SD Not Included)
• Digital Wireless Transmission (No Camera Interference)
• View LIVE On Your SmartPhone!
Includes:
* Nanny Cameras w/ Remote View
* Wireless IP Receiver
* Remote Control
* A/C Adaptor
* 2GB SD Card
* USB Receiver
FACT SHEET: HIDDEN NANNY-SPY (VIEW VIA THE INTERNET) CAMERAS
Specifications:
Receiver Specs:
* Transmission Range of 500 ft Line Of Sight
* Uses 53 Channels Resulting In No Interference
* 12V Power Consumption
* RCA Output
* Supports up to 32gig SD
Camera Specs:
* 640x480 / 320x240 up to 30fps
* Image Sensor: 1/4" Micron Sensor
* Resolution: 720x480 Pixels
* S/N Ratio: 45 db
* Sensitivity: 11.5V/lux-s @ 550nm
* Video System: NTSC
* White Balance: Auto Tracking
• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)
• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)
• Live Monitoring, Recording And Event Playback Via Internet
• Back-up SD Storage Up To 32GB (SD Not Included)
• Digital Wireless Transmission (No Camera Interference)
• View LIVE On Your SmartPhone!
Includes:
* Nanny Cameras w/ Remote View
* Wireless IP Receiver
* Remote Control
* A/C Adaptor
* 2GB SD Card
* USB Receiver
FACT SHEET: HIDDEN NANNY-SPY (VIEW VIA THE INTERNET) CAMERAS
Specifications:
Receiver Specs:
* Transmission Range of 500 ft Line Of Sight
* Uses 53 Channels Resulting In No Interference
* 12V Power Consumption
* RCA Output
* Supports up to 32gig SD
Camera Specs:
* 640x480 / 320x240 up to 30fps
* Image Sensor: 1/4" Micron Sensor
* Resolution: 720x480 Pixels
* S/N Ratio: 45 db
* Sensitivity: 11.5V/lux-s @ 550nm
* Video System: NTSC
* White Balance: Auto Tracking
Make Your Own Nanny Cameras: Make Tons Of Money In A Booming, Nearly Recession-Proof Industry!
Your Primary Customers Include But Are Not Limited To Anyone In The Private Investigator, Government, Law Enforcement And/Or Intelligence Agencies Fields!
* You Buy Our DVR Boards And We'll Build Your Products! (Optional)
* You Buy Our DVR Boards And We'll Build Your Products! (Optional)
Our New Layaway Plan Adds Convenience For Online Shoppers
DPL-Surveillance-Equipment's
layaway plan makes it easy for you to buy the products and services
that you want by paying for them through manageable monthly payments
that you set. Our intuitive calculator allows you to break down your
order's purchase price into smaller payment amounts. Payments can be
automatically deducted from your bank account or made in cash using
MoneyGram® ExpressPayment® Services and you will receive your order once
it's paid in full. Use it to plan and budget for holiday purchases,
anniversaries, birthdays, vacations and more!
DPL-Surveillance-Equipment's
Customers can now use the convenience of layaway online to help them
get through these tough economic times.
We all shop now
and then just to face a hard reality -- big credit card bills. However,
our latest financing innovation can help you avoid that. Find out why
more and more shoppers are checking out DPL-Surveillance-Equipment's
e-layaway plan.
If you're drooling over a new nanny
camera, longing for a GPS tracker, or wishing for that spy watch, but
you're strapped for cash and can't afford to do credit, do what Jennie
Kheen did. She bought her iPod docking station (hidden camera
w/motion-activated DVR) online using our convenient lay-away plan.
Our
online layaway plan works like the old-fashioned service stores used to
offer. But, in Kheen's case, she went to
DPL-Surveillance-Equipment.com, found the iPod docking station (hidden
camera w/motion-activated DVR), then set up a payment plan.
"It's automatically drawn from my account," she said. "I have a budget, $208.00 a month.
In
three months, Kheen had paid off the $650.00 iPod docking station. She
paid another 3.9 percent service fee, which amounted to about $25.35
(plus $12.00 for shipping) for a total of $687.35.
"You
pay a little bit each month," Kheen said. "It's paid off when you get
it and you don't have it lingering over your head. It's great."
Flexible
payment terms and automated payments make our layaway plan an
affordable and fiscally responsible alternative to credit cards.
1. Register:
It's quick, easy and FREE! No credit check required!
2. Shop:
Select
the items or service you want and choose "e-layaway" as your payment
option. Our payment calculator makes it easy for you to set up your
payment terms.
3. Make Payments:
Payments are made on the schedule YOU set. Check your order status or adjust your payments online in a secure environment.
4. Receive Products:
Receive the product shortly after your last payment. The best part, it's paid in full... NO DEBT.
More Buying Power:
*
Our lay-away plan offers a safe and affordable payment alternative
without tying up your credit or subjecting the purchase to high-interest
credit card fees.
No Credit Checks or Special Qualifications:
* Anyone 18 years old or older can join. All you need is an active bank account.
Freedom From Credit Cards:
*
If you are near or beyond your credit limit or simply want to avoid
high interest credit card fees, our e-layaway is the smart choice for
you.
Flexible Payment Schedules:
*
Similar to traditional layaway, e-layaway lets you make regular payments
towards merchandise, with delivery upon payment in full. Payments are
automatically deducted from your bank account or made in cash using
MoneyGram® ExpressPayment®
A Tool for Planning Ahead:
*
Our e-layaway makes it easy for smart shoppers like you to plan ahead
and buy items such as bug detectors, nanny cameras, audio bugs, gps
trackers, and more!
No Hidden Charges or Mounting Interest:
Our
e-layaway makes shopping painless by eliminating hidden charges and
monthly interest fees. Our customers pay a flat transaction fee on the
initial purchase price.
NO RISK:
* You have the right to cancel any purchase and will receive a refund less a cancellation fee. See website for details.
Security and Identity Protection:
DPL-Surveillance-Equipment
has partnered with trusted experts like McAfee and IDology to ensure
the security and integrity of every transaction. Identity verification
measures are integrated into our e-layaway system to prevent fraudulent
purchases.
Note: Simply Choose e-Lay-Away as a "Payment Option" in The Shopping Cart
DPL-Surveillance-Equipment.com
is a world leader in providing surveillance and security products and
services to Government, Law Enforcement, Private Investigators, small
and large companies worldwide. We have one of the largest varieties of
state-of-the-art surveillance and counter-surveillance equipment
including Personal Protection
and Bug Detection Products.
Buy, rent or lease the same
state-of-the-art surveillance and security equipment Detectives, PI's,
the CIA and FBI use. Take back control!
DPL-Surveillance-Equipment.com
Phone: (1888) 344-3742 Toll Free USA
Local: (818) 344-3742
Fax (775) 249-9320
Monty@DPL-Surveillance-Equipment.com
Google+ and Gmail
DPLSURVE
Twitter
DPLSURVE
MSN
Monty@DPL-Surveillance-Equipment.com
AOL Instant Messenger
DPLSURVE32
Skype
Montyl32
Yahoo Instant Messenger
Montyi32
Alternate Email Address
montyi32@yahoo.com
Join my Yahoo Group!
My RSS Feed
Phone: (1888) 344-3742 Toll Free USA
Local: (818) 344-3742
Fax (775) 249-9320
Monty@DPL-Surveillance-Equipment.com
Google+ and Gmail
DPLSURVE
DPLSURVE
MSN
Monty@DPL-Surveillance-Equipment.com
AOL Instant Messenger
DPLSURVE32
Skype
Montyl32
Yahoo Instant Messenger
Montyi32
Alternate Email Address
montyi32@yahoo.com
Join my Yahoo Group!
My RSS Feed
0 Comments:
Post a Comment
Note: Only a member of this blog may post a comment.
<< Home