Not yet a member? No problem!
Sign-up just takes a second.
Forgot your password?
Recover it now.
Already signed up?
Log in now.
Forgot your password?
Recover it now.
Not yet a member? No problem!
Sign-up just takes a second.
Remember your password?
Log in now.
11 Comments
siftbotsays...The thumbnail image for this video has been updated - thumbnail added by Barseps.
siftbotsays...2 more comments have been lost in the ether at this killed duplicate.
dingenssays...*promote
siftbotsays...Promoting this video and sending it back into the queue for one more try; last queued Sunday, September 14th, 2014 3:57am PDT - promote requested by dingens.
mxxconsays...Maybe there's some article that covers this in more details, but the video is very sensationalist and does not really show anything particularly outrageous. It's not that difficult to find company employee info; network routing table is public information; cracked password of some service provider and ability to turn on/off service is annoying but not exactly "spying".
SpaceOdditysays...I disagree with the meaning of "tasked."
In this context, I believe it means to develop the engineers as an asset, and task them with espionage.
The engineers in this case seem like they wouldn't comply voluntarily, which means they'd have to be threatened or blackmailed.
Scary.
radxsays...Three, actually.
https://firstlook.org/theintercept/2014/09/14/nsa-stellar/
http://www.spiegel.de/international/world/snowden-documents-indicate-nsa-has-breached-deutsche-telekom-a-991503.html
http://www.spiegel.de/international/germany/gchq-and-nsa-targeted-private-german-companies-a-961444.html
And here's some of the original GCHQ documents specifically about Stellar: http://www.spiegel.de/media/media-34756.pdf
Maybe there's some article that covers this in more details...
mxxconsays...Bleh. This is hype and scaremongering by Germany.
It is nowhere even near to the crap that NSA was/is trying to pull with their efforts.
Other than the password for that one router/system, everything else is a publicly available information.
Here's interactive map of every single IP on the internet http://internetcensus2012.bitbucket.org/hilbert/index.html
Here's the same scary looking "Top Secret" Robtex graph for videosift.com https://www.robtex.com/en/advisory/dns/66/228/54/105/#graph
If Germany is trying to stir public outrage, they should do better than this.
Three, actually.
https://firstlook.org/theintercept/2014/09/14/nsa-stellar/
http://www.spiegel.de/international/world/snowden-documents-indicate-nsa-has-breached-deutsche-telekom-a-991503.html
http://www.spiegel.de/international/germany/gchq-and-nsa-targeted-private-german-companies-a-961444.html
And here's some of the original GCHQ documents specifically about Stellar: http://www.spiegel.de/media/media-34756.pdf
radxsays...Last week, The Intercept published the Quadrennial Intelligence Community Review of 2009 which outlined industrial espionage.
Let's look at the list of German companies in question today: DTAG, NetCologne, Stellar, CETel and IABG. Two internet providers, two operators of satellite communications and a service provider with close ties to Airbus, ESA and EPCIP. All prime targets for industrial espionage, IABG and DTAG in particular.
A penetration of DTAG alone should be quite enough to convince our Attorney General to start an investigation, and the records about the penetration into Stellar's server centre are even more detailed.
So it's not just another violation of Article 10 of our Basic Law, it's industrial espionage. But I know very well that fuck all is going to come out of it, given how subservient our government is.
By the way, Firstlook Media and DER SPIEGEL does not equal Germany.
---------------
Edit:
Sorry for being cranky, anyway. I suppose for people outside Germany the interesting parts are that a) NSA/GCHQ own global communications and b) security for satellite net access is appaling.
The second, in particular, is rather frustrating, given that a great number of users of these are bound to be persons of interest otherwise unreachable through HUMINT. Quite the low hanging fruit, isn't it...
Bleh. This is hype and scaremongering by Germany.
(...)
If Germany is trying to stir public outrage, they should do better than this.
DuoJetsays...I think the issue is quite well documented in the video.
In the video, the engineer learns that the NSA has stolen his credentials and used them to gain access to his company's private, otherwise secure network.
The map shown in the video is not a routing table, nor is it a colorful map of domain records associated with a given domain such as appears in your Robtex link. It's actually a copy of the NSA's rendering of the network map denoting the number of nodes they have penetrated.
He then realizes that the NSA can use this particular access to intercept communications from any and all of his company's customers, and, in the case of satellite customers, use geolocation to pinpoint the physical origin of a given communication.
If you don't agree that this is outrageous, then there's nothing more to discuss.
Maybe there's some article that covers this in more details, but the video is very sensationalist and does not really show anything particularly outrageous. It's not that difficult to find company employee info; network routing table is public information; cracked password of some service provider and ability to turn on/off service is annoying but not exactly "spying".
mxxconsays...I don't think your read the same article, read the same document or watched the same video...
The video and the released document does not show that NSA stole his credentials. It shows that NSA cracked password to a 3rd party company that resells their service.
Furthermore, "network map" they showed on pages 3, 4 and 5 are simply AS interconnection maps. You can easily see it here https://www.robtex.com/as/as35207.html#graph or here https://stat.ripe.net/widget/bgplay#w.resource=35207
THEY CAN NOT INTERCEPT COMMUNICATIONS from "any and all of his company's customers". The only thing they can do that password is see physical location of satellite service users and turn on or turn off their service. HE SPECIFICALLY SAID THAT THIS SPECIFIC LOGIN IS LIMITED IN WHAT IT CAN DO!!!!!!!
If it obvious that you have no technical understanding of the issue at hand and this is a perfect example of how this article is scaremongering hype!
I think the issue is quite well documented in the video.
In the video, the engineer learns that the NSA has stolen his credentials and used them to gain access to his company's private, otherwise secure network.
The map shown in the video is not a routing table, nor is it a colorful map of domain records associated with a given domain such as appears in your Robtex link. It's actually a copy of the NSA's rendering of the network map denoting the number of nodes they have penetrated.
He then realizes that the NSA can use this particular access to intercept communications from any and all of his company's customers, and, in the case of satellite customers, use geolocation to pinpoint the physical origin of a given communication.
If you don't agree that this is outrageous, then there's nothing more to discuss.
Discuss...
Enable JavaScript to submit a comment.