Talking SIM cards, spooks and hacks on 1395 FIVEaa

FIVEaa logoThird time’s the charm, right? My third radio spot on The Great SIM Heist was for 1395 FIVEaa in Adelaide on Wednesday afternoon.

Again, I won’t repeat the background, because it’s all in my first post on the subject. But I will say that this is the most detailed conversation about it so far, because presenter Will Goodings and I spoke for 13 minutes.

That said, there’s not much more information than we had yesterday. Gemalto isn’t due to hold its press conference until late this evening Australian time, so we’ll know more tomorrow.

Play

The audio is ©2015 Nova Entertainment.

4 Replies to “Talking SIM cards, spooks and hacks on 1395 FIVEaa”

  1. fyi, my friend work in telecommunication company and they ordering from gemalto sim cards encrypted via PGP (US product).
    So, they have access to a lot more information’s..

    here is some samples how deep this going:
    https://www.youtube.com/watch?v=Gv7Y0W0xmYQ
    equation group aka nsa: https://securelist.com/files/2015/02/Equation_group_questions_and_answers.pdf

    https://www.schneier.com/blog/archives/2014/12/ss7_vulnerabili.html

    https://firstlook.org/theintercept/2014/12/04/nsa-auroragold-hack-cellphones/

    off topics:

    bit coin nsa product: http://groups.csail.mit.edu/mac/classes/6.805/articles/money/nsamint/nsamint.htm#Introduction

    cia made google?
    https://medium.com/@NafeezAhmed/how-the-cia-made-google-e836451a959e

    SELinux nsa product.

    CPU backdoors:
    http://danluu.com/cpu-backdoors/
    https://github.com/Groundworkstech/submicron/blob/master/docs/Deep-Submicron-Backdoors-Ortega-Syscan-2014-SLIDES.pdf?raw=true

    UEFI bios backdoored:
    https://www.blackhat.com/docs/us-14/materials/us-14-Kamlyuk-Kamluk-Computrace-Backdoor-Revisited.pdf

    Just think if all this major things are vuln. that mean that they almost have whole control of US product?!

    China and Russia make their hardware and software, they know that all US IT product are not safe.

  2. @Mile: I normally wouldn’t publish a comment from an anonymous source, because I’ve tried to avoid my personal website descending into the depths of the average unmoderated online forum — well, unless I’m the one being a dick — but I’ve let yours through because it’s a reasonable collection of links to a particular worldview.

    I haven’t looked at these pages yet, nor do I have time to think about it this morning. I may or may not comment further, depending on my workload.

  3. Hi Stilgherrian, thank you for approval.
    I am little paranoid how, what and where i put online, always from other position, name, etc.

    I know it is bunch of links, but i am from IT sec. world and track what happening on the scene (try to fit the puzzle).
    If you want, i can share you more info. where is proof what they can and what they are doing.

    Starting from “beginning” government doing what they can to backdoor all mandatory software (Google: FBI openbsd ~1996 or DES encryption nsa or bush administration cryptographic etc.)
    There is bunch of proof that they are “controlled” by government, just search and find prof what someone find (mean on hackers guys) mean on vuln.
    TOR is honeypot for criminals (for start it was US product and it`s tracked and can be monitored like BITTorrent)
    About open source, you have couple big vuln. (one of them is heartbleed or shellshock) which shows how open source is checks.. so there need bunch of people to look at code (who will pay that?).
    Here is one of article about that subject:
    http://daniel.haxx.se/blog/2015/02/23/bug-finding-is-slow-in-spite-of-many-eyeballs/

    NSA playground:
    https://www.youtube.com/watch?v=q-9SMCehrnw
    HOPE X lost privacy, not taking anonymity (great presentation):
    https://www.youtube.com/watch?v=dNZrq2iK87k

    On other side, it is “normal” that government have control of their citizen (because in world where we living in), but problem is when that technologies cross over border and control/spy whole population who use their products.
    “MS13-075 allows low-privileged user to gain SYSTEM. It *only* affects *Chinese* version of Microsoft Office IME”

    here is what happen about Linus Torvalds and NSA:
    https://www.youtube.com/watch?v=wwRYyWn7BEo

    p.s all who are have more knowledge about this stuff (who can find their dirty things) have be categorized for detail monitoring:
    http://yro.slashdot.org/story/14/07/03/1846215/nsa-considers-linux-journal-readers-tor-and-linux-users-extremists

    bonus little “humor”:
    http://phk.freebsd.dk/_downloads/FOSDEM_2014.pdf

    “Remember, if you don’t understand it – it is not secure!”

  4. And one more thing about this subject, by me Snowden is false flag operation.
    He did not say nothing new about IT world and how insecure is.
    This all happening before him and there was journalist who track that but NEVER was in main stream…
    I was have many links (before facebook turn off my account and lose all groups which i has) about him and how he shows “new” data when some unknown journalist (or hacker) find new news, he have place in main stream, and CAN (i believe he does) “Drop” news in other direction.

    one of blogs which i just found with same opinion is:
    https://ajmacdonaldjr.wordpress.com/2013/06/10/nsa-domestic-spying-old-news/

    so, take care when main stream shows some news (even snowden/wikileaks)

Comments are closed.