This video is called US and UK spy agencies ‘have access to German telecoms’.
By Thomas Gaist:
NSA developing real time map of all Internet-connected devices
16 September 2014
The US National Security Agency (NSA) penetrated the systems of leading German technology and communications companies as part of a global operation seeking to track all of the planet’s data flows and Internet-capable electronic devices, according to NSA documents leaked by Edward Snowden and published jointly in Der Spiegel and the Intercept.
The leaked NSA slides reveal that the agency infiltrated data-capturing software into the systems of major German firms including Deutsche Telekom, Netcologne, Stellar, Cetel and IABG as part of a program codenamed Treasure Map. The slides display the targeted German firms as nodes in a worldwide network, with nodes highlighted red to indicate the maintenance of NSA “Collection Access Points” on their servers.
Treasure Map is an astonishingly expansive electronic surveillance and data mapping operation conceived by the NSA and the British GCHQ as “a near real-time, interactive map of the global internet,” according to the documents. The information has been made accessible to the “five eyes” alliance that also includes Canada, Australia and New Zealand.
Der Spiegel writes that its aim is to map “every single end device that is connected to the Internet somewhere in the world—every smartphone, tablet and computer…”
Treasure Map “ingests approximately 16-18 million trace routes per day” according to NSA documents. By endlessly analyzing the connections between Internet-linked data sources, the agency is seeking to “map the entire Internet” and locate “Any device, anywhere, all the time” through continuous updating of a comprehensive global Internet map, the slides state.
The program, described by the Intercept as a “Google Earth for global internet traffic, a bird’s eye view of the planet’s digital arteries,” processes “30+ gigabytes of additional data added and replaced per day” and has “new capabilities delivered every 90 days,” according to the leaked documents.
The information gives the NSA, the GCHQ and its allies broader powers to monitor individuals within their countries as well as those targeted for attack. The article in Der Spiegel noted, “In addition to monitoring one’s own networks as well as those belonging to ‘adversaries,’ Treasure Map can also help with ‘Computer Attack/Exploit Planning.’ As such, the program offers a kind of battlefield map for cyber warfare.”
The leaked slides further show that the NSA is developing a number of auxiliary programs to supplement and exploit Treasure Map data for operational purposes, including:
· Toygrippe, which maintains a “repository of VPN [virtual private network] endpoints”;
· Vitalair2, which automatically scans IP addresses to search for vulnerabilities that can be exploited by the NSA’s in-house hacker unit, known as Targeted Access Operations (TAO);
· IPGeoTrap, which supplies the exact latitude and longitude of targeted IP addresses.
In support of Treasure Map, the NSA maintains at least 13 covert data-gathering operations embedded inside “unwitting data centers” in Malaysia, Singapore, Taiwan, China, Indonesia, Thailand, India, Poland, Russia, Germany, Ukraine, Latvia, Denmark, South Africa, Argentina and Brazil, the leaked slides show.
The NSA rightly views the German tech firms as useful access points for snooping on international data flows. Deutsche Telekom and Netcologne operate global fiber optic networks that are integral components of globalized communications infrastructure, including the TAT14 trans-Atlantic fiber optic cables responsible for handling much of the Internet traffic passing between the US and Europe.
Telekom, which was formerly owned outright by the German government and retains close ties to the state, serves at least 60 million customers in Germany alone. Based on its penetration of the German telecommunications firm Stellar, the NSA could “shut down the Internet in entire African countries,” according to an employee at the company who saw the documents.
In order to get access to the information from Stellar, the CEO said that the spy agencies would have to have broken into their network by overcoming the company’s firewall. “A cyber-attack of this nature is a clear criminal offense under German law,” he said.
These are only the latest revelations of spying by US and British imperialism against German companies in particular. Surveillance operations by Britain’s GCHQ intelligence agency targeting Stellar, Cetel, IABG and other companies were previously exposed by Snowden leaks published in March 2014. Internal documents from GCHQ’s Network Analysis Center showed that UK intelligence agents were engaged in “tasking” of “key staff,” that is, in continuous data gathering and analysis targeting “central employees” at these companies.
Snowden leaks published last October showed that the NSA had been spying on the telephone of German Chancellor Angela Merkel since 2002, and that the NSA was collecting some 500 million communications every month from German sources.
Google received some 32,000 data requests from governments worldwide during the first six months of 2014. The total number of data requests submitted by governments have surged 150 percent in the past five years, according to a “transparency report” published this week by the company: here.
THE TOP-SECRET TOOL THAT CAN TRACK YOUR CELL PHONES “The technology goes by various names, including StingRay, KingFish or, generically, cell site simulator. It is a rectangular device, small enough to fit into a suitcase, that intercepts a cellphone signal by acting like a cellphone tower. The technology can also capture texts, calls, emails and other data, and prosecutors have received court approval to use it for such purposes.” [NYT]
On Monday, a hacker group calling itself the Shadow Brokers released malware files and code it claimed to have taken from hackers employed by the US National Security Agency (NSA). The codes, described by the group as a “state sponsor tool set” for spying and exploiting breaches in computer networks of foreign governments and companies, were released in two bundles–one a freely accessible trove and the other an encrypted bundle containing “the best files,” which would be auctioned to the public for $500 million: here.