Stolen SIM Card Keys Could Be Powerful Spy Tool

Advertisement
By Agence France-Presse | Updated: 21 February 2015 12:41 IST
It would be another powerful tool in the arsenal of US and British spy services: encryption keys for a large share of the SIM cards used for mobile phones.

A report by the investigative news website The Intercept, citing leaked documents from former National Security Agency contractor Edward Snowden, said the US and British agencies "hacked into" European manufacturer Gemalto to gain these keys.

The report, if accurate, could allow the NSA and its British counterpart GCHQ to secretly monitor a large portion of global communications over mobile devices without using a warrant or wiretap.

Advertisement

"This is a huge deal," said Bruce Schneier, a cryptographer who is chief technology officer at the security firm Resilient Systems, and a fellow at Harvard's Berkman Center.

"The things that are the most egregious are when the NSA hacks everybody to get a few people," Schneier told AFP.

Advertisement

"They're getting encryption keys of everybody, including you and me. It's a scorched earth policy."

The report suggests the intelligence services could have access to a wider range of communications than has been previously reported. Other documents have indicated that the NSA can monitor email and traditional phone communications.

Advertisement

Schneier said the report is credible and probably indicates other SIM card makers were hacked as well.

"Do we think this is the only company? Odds are low," he said.

Advertisement

David Perry, threat strategist at the security firm F-Secure, called the revelations "the biggest story on mobile privacy we've seen so far."

The report is troubling, Perry said, because of the methods described.

"Intelligence services are hacking all the time," he said. "What concerns me is that they would go into a factory and spoil the security at the point of origination."

The NSA did not immediately respond to requests for comment.

Gemalto said in a statement that it takes the matter "very seriously and will devote all resources necessary to fully investigate" the allegations.

It added that the intended target was "not Gemalto, per se - it was an attempt to try and cast the widest net possible to reach as many mobile phones as possible."

Unanswered questions
Yet the report leaves many questions unanswered, and some experts were cautious about jumping to conclusions about the documents.

"One of the reasons I'm skeptical is that different governments have been using other methods to grab communications and wireless data which are unsecured to begin with," said Darren Hayes, director of cybersecurity at Pace University's School of Computer Science and Information Systems.

"I'm not sure that the US or UK governments would use hackers in the same way that the Chinese or Russians are doing."

Schneier said more information is needed to know exactly what the encryption keys would provide, but says it is likely that they would allow access to the phone communications rather than the data transfer, so SMS or voice messages might be accessed but not Skype or other Internet-based services.

"I think the company should do what Sony did (after being hacked) -- hire a forensics team," Schneier said.

"We need details on how this was done and what can be done to remedy it."

Greg Nojeim, a lawyer for the Center for Democracy & Technology, a digital rights organization, said the revelation suggests privacy of people around the world is at risk.

"Almost everyone in the world carries cell phones and this is an unprecedented mass attack on the privacy of citizens worldwide," Nojeim said.

"While there is certainly value in targeted surveillance of cell phone communications, this coordinated subversion of the trusted technical security infrastructure of cell phones means the US and British governments now have easy access to our mobile communications."

John Pirc, co-founder of the Virginia-based security firm Bricata, said the report is "plausible" and, if true, could undermine confidence in mobile communications.

"If someone had access to the SIM card and put malware on it, that means anyone can get in," Pirc said.

He added that the revelations could end up hurting manufacturers or carriers if they fail to take steps to correct any security weaknesses.

"If this turns out to be true, every consumer should ask for a new SIM card," Pirc said.

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Further reading: SIM, SIM Cards, Telecom, NSA, Hack, Privacy, Security, Spy, Spying
Advertisement

Related Stories

Popular Mobile Brands
  1. Here's How Much the Upcoming Vivo T5 Pro 5G Could Cost in India
  2. OnePlus Nord 6 vs Redmi Note 15 Pro+ 5G vs Nothing Phone 4a Pro Compared
  3. British Cryptographer Responds After Report Suggests He Is Bitcoin Creator
  4. Moto G Stylus (2026) With a Built-In Active Stylus Debuts in These Countries
  5. Vivo T5 Pro 5G Set to Launch in India on This Date
  6. Sony Will Scan PlayStation's Biggest Fans and Put Them in PS5 Games
  7. Oppo F33 Series Set to Launch in India in April on This Date
  8. Samsung's Exynos 2700 Chip Has Already Visited Geekbench
  9. iPhone 18 Could Retain Same Design, iPhone Air 2 Launch Timeline Leaked
  10. WhatsApp's Long-Awaited Username Feature Is Finally Rolling Out
  1. Oppo Watch X3 Mini Design, Health Tracking Features Revealed Days Before Launch in China
  2. Intel Joins Elon Musk’s Terafab Project to Build Chips for Humanoid Robots and Data Centres
  3. Vivo T5 Pro 5G Price in India Leaked as New Geekbench Listing Reveals Key Specifications
  4. British Cryptographer Adam Back Responds After Report Suggests He Might Be Bitcoin Creator 'Satoshi Nakamoto'
  5. WhatsApp Username Feature Reportedly Rolling Out to Some Users on iOS, Android
  6. Cyberpunk Gets Free PS5 Pro Update That Brings PSSR Support, Ray Tracing Enhancements
  7. Project Glasswing: Anthropic Debuts Claude Mythos Preview, Its First Cybersecurity-Focused AI Model
  8. Coinbase Plans to Expand Crypto Offerings in Australia After Securing Financial Services Licence
  9. Samsung Exynos 2700 Chip Reportedly Surfaces on Geekbench With 10-Core CPU, Xclipse 970 GPU
  10. MSI Raider 18 Max HX Launched in India With Intel Core Ultra 9 Processor, MSI Prestige 13 AI+ Tags Along
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.