Feeds

Tech companies are raising their game (and pants) post-Snowden

Is everything fatally borked? Not quite, say security godheads

Protecting users from Firesheep and other Sidejacking attacks with SSL

Snowden anniversary If there’s a positive to the disclosures by ex-National Security Contractor (NSA) contractor Edward Snowden, it’s that it’s been a disaster for technology and internet firms.

Yes, a positive.

In the last year we’ve learned the NSA has backdoors placed in the hardware that makes networks, the existence of massive funnels placed in internet and phone companies’ data centers to suck up vast amounts of data, and the breaking of internet encryption.

The effect of all this should be a raising of these companies’ games and a shaking of users’ complacency in relying on “free” products and in being too accepting of what they’re given and of standard “solutions.”

Already, tech and web companies are coming back. Caught with their pants down, they are now being given the time and money to pull them back up again.

Pre-Snowden it was generally assumed the government was carrying out some sorts of surveillance against key targets and that the bright boys and girls at the National Security Agency (NSA) could subvert security systems if they really wanted to.

Bruce Schneier

Schneier: how far has the NSA really gone?

There had long been rumors of backdoors in operating systems and government malware-writing teams, but very little in the way of proof.

Snowden's leaks showed not only that security weaknesses are being built into software but also that the large companies to whom we entrust our data are helping in this – and they have been criminally lax about the security of users' data within their own organizations.

The first two leaks from the Snowden files – allegations that Verizon was handing over consumer metadata on mobile calls and the existence of the PRISM program – didn’t come a as a massive surprise to many. Caspar Bowden, Microsoft's former chief privacy adviser, has been warning about this kind of stuff for years after all.

Then, in August 2013, Snowden's secure email provider Lavabit shut down its service, with its chief, Ladar Levison, saying that he wouldn't "become complicit in crimes against the American people." Shortly afterwards Silent Circle, which had been offering a similar service, followed suit.

Both companies are prohibited by law from confirming the exact reason for their shutdown, but it's down to the use of existing legislation whereby the US government can force email providers to hand over encryption keys on national security grounds. Too bad for users of this kind of system, you might think, but the problems didn’t stop there.

It was the September 2013 leak about Project Bullrun that really set the cat among the pigeons. The documents Snowden released showed that the NSA was spending $250m a year to build security weaknesses into common code and had cracked many of the encryption systems commonly used online.

Bullrun appears to have started after September 11, 2001 and appears to have allowed the NSA to get around both VPN protections, SSL and HTTPS. For most internet users that's pretty much the entire ballgame.

As any security expert knows, intentionally introducing flaws into your products is a stupid move. Sure, it gives the intelligence community a backdoor into software, but there's no guarantee that someone else won’t discover the same flaw and start using it. In fact, the way code examination is these days, it's a virtual certainty that someone will do this.

Crypto and privacy guru Bruce Schneier is frank in his assessment of what this all meant for the internet. He told The Register:

From forcing Microsoft to make Skype more eavesdropping friendly and then not telling anyone, to demanding Lavabit's master encryption key and demanding that they lie about it, to creating fake Facebook servers on the Internet to hack into computers, to intercepting Cisco networking equipment in transit to install eavesdropping equipment, the NSA has completely subverted the internet.

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.