Tuesday, May 29, 2012

New Big Brother Cyber Weapon Can Turn on Your Computer’s Microphone, Take Screen Shots, Copy Data, Record Communications

To the disbelief of many of our readers, in a 2011 report titled Everything You Do Is Monitored, we noted that microphones and cameras on cell phones and computers allow interested parties (translated to mean your respective government) to hear and see everything going on in the direct vicinity of the device without the knowledge of its owner.

That these monitoring features are available on cell phones was a known fact, as FBI surveillance networks already have the ability to turn on any cell phone microphone or camera remotely without tipping off the user. It’s believed that this surveillance technique can work even when the cell phone user has shut down their phone, with the only surefire way to prevent such surveillance being removal of the unit’s battery.

Computers, however, were believed to be secure from these kinds of backdoors, and the majority of computer users believe their PC’s are protected from such intrusive technologies once they install virus and malware protection software.

However, a new virus identified by leading digital security firm Kaspersky Lab, is reportedly capable of not only embedding itself onto computer systems without being identified by traditional anti-virus applications, but able to execute total surveillance and monitoring that includes turning on your camera and microphone, copying your data, and recording emails and chat conversations.

Evidence suggest that the virus, dubbed Flame, may have been built on behalf of the same nation or nations that commissioned the Stuxnet worm that attacked Iran’s nuclear program in 2010, according to Kaspersky Lab, the Russian cyber security software maker that took credit for discovering the infections.

Kaspersky researchers said they have yet to determine whether Flame had a specific mission like Stuxnet, and declined to say who they think built it.

Cyber security experts said the discovery publicly demonstrates what experts privy to classified information have long known: that nations have been using pieces of malicious computer code as weapons to promote their security interests for several years.

Symantec Security Response manager Vikram Thakur said that his company’s experts believed there was a “high” probability that Flame was among the most complex pieces of malicious software ever discovered.

Kaspersky’s research shows the largest number of infected machines are in Iran, followed by Israel and the Palestinian territories, then Sudan and Syria.

The virus contains about 20 times as much code as Stuxnet, which caused centrifuges to fail at the Iranian enrichment facility it attacked. It has about 100 times as much code as a typical virus designed to steal financial information, said Kaspersky Lab senior researcher Roel Schouwenberg.

Flame can gather data files, remotely change settings on computers, turn on PC microphones to record conversations, take screen shots and log instant messaging chats.

Kaspersky Lab said Flame and Stuxnet appear to infect machines by exploiting the same flaw in the Windows operating system and that both viruses employ a similar way of spreading.

“The scary thing for me is: if this is what they were capable of five years ago, I can only think what they are developing now,” Mohan Koo, managing director of British-based Dtex Systems cyber security company.

Source: Reuters

With a new National Security Agency data center coming online and capable of capturing, aggregating and analyzing every digital communication in the United States, cellphones and computers having in excess of 99% penetration across the country, and some 30,000 drones being prepared for domestic operations, we can safely say that a total police state surveillance infrastructure is now in place and fully capable of monitoring everything - and we mean EVERYTHING – that you do.

The Matrix has you…

Source: SHTFplan

Security backdoor found in China-made US military chip

A microchip used by the US military and manufactured in China contains a secret "backdoor" that means it can be shut off or reprogrammed without the user knowing, according to researchers at Cambridge University's Computing Laboratory.

UPDATE: However, one security consultancy has said that the implication that the backdoor might have been secretly inserted by the Chinese manufacturer is "bogus", and that malicious intent is unlikely.

In a draft paper, Cambridge University researcher Sergei Skorobogatov wrote that the chip in question is widely used in military and industrial applications. The "backdoor" means it is "wide open to intellectual property theft, fraud and reverse engineering of the design to allow the introduction of a backdoor or Trojan", they said.

The discovery was made during testing of a new technique to extract the encryption key from chips, developed by Cambridge spin-off Quo Vadis Labs. The "bug" is in the actual chip itself, Skorobogatov wrote, rather than the firmware installed on the devices that use it, meaning there is no way to fix it than to replace the chip altogether.

"The discovery of a backdoor in a military grade chip raises some serious questions about hardware assurance in the semiconductor industry," wrote Skorobogatov. Interesting Links

Anonymous forces plant research website offline

However, Robert Graham, of US security consultancy Errata Security, wrote yesterday that the backdoor is unlikely to have been added maliciously. He claims that the entry route discovered by Skorobogotov is likely to be a debugging tool deliberately installed by the manufacturer.

"It's remotely possible that the Chinese manufacturer added the functionality, but highly improbable. It's prohibitively difficult to change a chip design to add functionality of this complexity."

He also questioned the description of the chip as "military grade". "The military uses a lot of commercial, off-the-shelf products. That doesn't mean there is anything special about it."

Graham writes that the backdoor could pose a security threat, however. "It not only allows the original manufacturer to steal intellectual-property, but any other secrets you tried to protect with the original [encryption] key."

Source: Information Age