What's new

British e-spy agency hacked network routers to access almost any internet user in Pakistan

Devil Soul

ELITE MEMBER
Jun 28, 2010
22,931
45
29,058
Country
Pakistan
Location
Pakistan
British e-spy agency hacked network routers to access almost any internet user in Pakistan
By Web Desk
Published: June 24, 2015

New documents from former National Security Agency contractor Edward Snowden reveal how the British intelligence agency GCHQ had received legal sanction to “reverse engineer” and hack into softwares commonly used to run web forums, and website administration tools, and even hardware that allowed them unprecedented access to almost every user in Pakistan at least before 2008.

According to The Intercept, the GCHQ had managed to receive warrants, a 2008 memo of which described how it could reverse engineer commercial software under a section of British intelligence law that does not explicitly authorise — and had apparently never been used to authorise — a kind of copyright infringement that the GCHQ believed was necessary to infiltrate systems without detection.

The electronic spy agency, according the newly published documents, targeted anti-virus programmes – which could potentially detect GCHQ’s attempts to exploit computer networks (CNE).

The other end of the GCHQ’s activity was hacking hardware components such as network routers in order to gain access to networks and or users on such networks, who the GCHQ was targeting.

A 2012 NSA document boasted how hacking routers, made by US technology company Cisco, was “good business for us [GCHQ] and our 5-eyes partners for some time now.”

Such was the GCHQ’s hacking capability against Cisco that its operations against “in-country communications switches (routers) have also benefited from SRE (software reverse engineering.” This enabled the agency to have access to “almost any user of the internet” inside the entire country of Pakistan – but aslo “to re-route selective traffic across international links toward GCHQ’s passive collection systems.”

Cisco did not comment specifically on the warrant document, saying in a written statement only that its products are securely developed and tested, that the company has a “robust” process for handling vulnerabilities, and that “Cisco does not work with any government, including the UK Government, to weaken or compromise our products.”

Rights group outraged over PIE hacking

A digital rights group has voiced serious concerns regarding the latest revelations from NSA documents.

Digital Rights Foundation said that the infiltration of Pakistan’s Internet Exchange (PIE) by the GCHQ seriously undermines the right to privacy of all users of the internet in Pakistan.

“By targeting a key point in Pakistan’s communications infrastructure, GCHQ have put at risk the security and integrity of a significant portion of Pakistan’s communications infrastructure,” it said in a statement.

“We urge the government of Pakistan to take action to protect the right to privacy of Pakistani citizens, and to condemn the actions of GCHQ.”

While noting that it was unclear whether the Pakistan government knew of these intrusions in PIE, it noted that the government did have an obligation to protect right to privacy of its citizens and to plug vulnerabilities.

“It is of paramount importance that the government does all it can to account for this intrusion and to take meaningful steps to ensure the right to privacy in Pakistan and prevent it from being brazenly interfered with by foreign intelligence agencies.”
 
Is this really unexpected? It is not just PIE but almost all computer systems within Pakistan, including NADRA.
 
For the everyday "Joe" user of the internet , the TOR browser provides one option for anonymous browsing of the net.

TOR browser is slow but does provide a degree of anonymity

images


Edit: The TOR download site seems to be down , maybe got taken down .. oh well
 
No son.... TOR is not the answer....... answer lies way deeper than that......... start from your routers firmware to cooking up your own compilation of os........ the problem is, nowadays every other monkey who can buy a laptop thinks he's the master of the universe......... besides, in WHOLE of Pakistan, I have yet to see ONE guy, who's worth his salt in NETSEC.... most just get some silly engineering degrees and qualify some basic networking course and think they are bee's knees......... it's not just one guy, but, the problem is both systemic and systematic....... one idiot gets another idiot to replace him at agencies that are there to protect...... think of our CyberSecurity in terms of our Police and Armed Forces, that's exactly how capable they are....... inexperienced, mission less and visionless........above all followers and not leaders....... this is one place where replicating zero day hacks have no standing, you need to to be the one discovering exploits, day in day out!


For the everyday "Joe" user of the internet , the TOR browser provides one option for anonymous browsing of the net.

TOR browser is slow but does provide a degree of anonymity

images


Edit: The TOR download site seems to be down , maybe got taken down .. oh well
 
For the everyday "Joe" user of the internet , the TOR browser provides one option for anonymous browsing of the net.

TOR browser is slow but does provide a degree of anonymity

images


Edit: The TOR download site seems to be down , maybe got taken down .. oh well

Its not 100% secure anymore. NSA cracked it while ago.
 
For the everyday "Joe" user of the internet , the TOR browser provides one option for anonymous browsing of the net.

TOR browser is slow but does provide a degree of anonymity

images


Edit: The TOR download site seems to be down , maybe got taken down .. oh well
On the start up TOR takes IP address and MAC address of user before connecting to its proxy server...

And on Microsoft's window Operating System web browsers like Chrome works on background and by using it,it is easy to know the user..
 
Police and Armed Forces
sometimes ago, I was with Military guy and I ask him some features of MS window OS and he say I don't know anything about them, I have heard these features just now from you.. and Beside MS window OS he say he don't know about other OS...

He was Low level military guy but his word was on Computer,,
 
Its not 100% secure anymore. NSA cracked it while ago.

Thats not quite correct , Tor network is among those that even the NSA has found difficult to full tear down. Now what they are doing is that if you are looking up information about Tor , they will try to exploit vulnerability before you even start using the Tor browser

Edward Snowden provided the following
https://edwardsnowden.com/wp-content/uploads/2013/10/tor-stinks-presentation.pdf

The NSA presentation "Tor Stinks" was the uncomfortable acknowledgment that Tor is not an easy target for the NSA

upload_2015-6-23_23-23-23.png


Untitled.jpg
 
Last edited:
Dude, Armed Forces and Police was just for comparative analysis, not for skill-sets.... and not that they are they guardians of our cyber security............ it's people manning the backbone and the ones in telcos that are incompetent to the core!

sometimes ago, I was with Military guy and I ask him some features of MS window OS and he say I don't know anything about them, I have heard these features just now from you.. and Beside MS window OS he say he don't know about other OS...

He was Low level military guy but his word was on Computer,,
 
No son.... TOR is not the answer....... answer lies way deeper than that......... start from your routers firmware to cooking up your own compilation of os........ the problem is, nowadays every other monkey who can buy a laptop thinks he's the master of the universe......... besides, in WHOLE of Pakistan, I have yet to see ONE guy, who's worth his salt in NETSEC.... most just get some silly engineering degrees and qualify some basic networking course and think they are bee's knees......... it's not just one guy, but, the problem is both systemic and systematic....... one idiot gets another idiot to replace him at agencies that are there to protect...... think of our CyberSecurity in terms of our Police and Armed Forces, that's exactly how capable they are....... inexperienced, mission less and visionless........above all followers and not leaders....... this is one place where replicating zero day hacks have no standing, you need to to be the one discovering exploits, day in day out!

And to think 3 of decades ago 2 Pakistanis invented first virus.
 
Dude, Armed Forces and Police was just for comparative analysis.... not that they are they guardians of our cyber security............ it's people manning the backbone and the ones in telcos that are incompetent to the core!
sir, my intention was to tell how military is protecting its secrecy ..
 

Users Who Are Viewing This Thread (Total: 1, Members: 0, Guests: 1)


Back
Top Bottom