Juniper Hacked, Several Govt Agencies at Risk

Backdoor Code Found in Firewall

Engadget: One of the reasons corporate users and the privacy-minded rely on VPNs is to control access to their networks and (hopefully) not expose secrets over insecure connections. Today Juniper Networks revealed that some of its products may not have been living up to that standard, after discovering “unauthorized code” in the software that runs on its NetScreen firewalls during a code review. Pointed out by security researcher “The Grugq,” the backdoor has been present since late 2012 and can only be fixed by upgrading to a new version of software just released today.

Telnet / ssh exposes a backdoor added by attackers to ScreenOS source code. This has been there since August 2012. Noted code here.

The pair of issues that created the backdoor would allow anyone who knows about it to remotely log in to the firewall as an administrator, decrypt and spy on supposedly secure traffic, and then remove any trace of their activity. Obviously this is a Very Bad Thing, although Juniper claims it has not heard of any exploitation in the wild (which would be difficult, since no one knew it existed and attackers could hide their traces) so far.

Beyond sending IT people sprinting to patch and test their setups, now we can all speculate about which friendly group of state-sponsored attackers is responsible. US government officials have recently been pushing for mandated backdoor access to secure networks and services, but the Edward Snowden saga made clear that even our own country’s personnel aren’t always going to ask permission before snooping on any information they want to check out. I contacted Juniper Networks regarding the issue, but have not received a response at this time.

Update: A Juniper Networks spokesperson told us:

During a recent internal code review, Juniper discovered unauthorized code in ScreenOS® that could allow a knowledgeable attacker to gain administrative access and if they could monitor VPN traffic to decrypt that traffic. Once we identified these vulnerabilities, we launched an investigation and worked to develop and issue patched releases for the impacted devices. We also reached out to affected customers, strongly recommending that they update their systems and apply the patched releases with the highest priority.

The patched releases also address an SSH bug in ScreenOS that could allow an attacker to conduct DoS attacks against ScreenOS devices. These two issues are independent of each other.

Newly discovered hack has U.S. fearing foreign infiltration

Washington (CNN) A major breach at computer network company Juniper Networks has U.S. officials worried that hackers working for a foreign government were able to spy on the encrypted communications of the U.S. government and private companies for the past three years.

The FBI is investigating the breach, which involved hackers installing a back door on computer equipment, U.S. officials told CNN. Juniper disclosed the issue Thursday along with an emergency security patch that it urged customers to use to update their systems “with the highest priority.”

The concern, U.S. officials said, is that sophisticated hackers who compromised the equipment could use their access to get into any company or government agency that used it.

One U.S. official described it as akin to “stealing a master key to get into any government building.”

The breach is believed to be the work of a foreign government, U.S. officials said, because of the sophistication involved. The U.S. officials said they are certain U.S. spy agencies themselves aren’t behind the back door. China and Russia are among the top suspected governments, though officials cautioned the investigation hasn’t reached conclusions.

It’s not yet clear what if any classified information could be affected, but U.S. officials said the Juniper Networks equipment is so widely used that it may take some time to determine what damage was done.

A senior administration official told CNN, “We are aware of the vulnerabilities recently announced by Juniper. The Department of Homeland Security has been and remains in close touch with the company. The administration remains committed to enhancing our national cybersecurity by raising our cyber defenses, disrupting adversary activity, and effectively responding to incidents when they occur.”

Juniper Networks’ security fix is intended to seal a back door that hackers created in order to remotely log into commonly used VPN networks to spy on communications that were supposed to be among the most secure. A free trial vpn has been helpful for those new to the VPN world to decide if it is right for them.

Juniper said that someone managed to get into its systems and write “unauthorized code” that “could allow a knowledgeable attacker to gain administrative access.”

Such access would allow the hacker to monitor encrypted traffic on the computer network and decrypt communications.

Juniper sells computer network equipment and routers to big companies and to U.S. government clients such as the Defense Department, Justice Department, FBI and Treasury Department. On its website, the company boasts of providing networks that “US intelligence agencies require.”

Its routers and network equipment are widely used by corporations, including for secure communications. Homeland Security officials are now trying to determine how many such systems are in use for U.S. government networks.

Juniper said in its security alert that it wasn’t aware of any “malicious exploitation of these vulnerabilities.” However, the alert also said that attackers would leave behind no trace of their activity by removing security logs that would show a breach.

“Note that a skilled attacker would likely remove these entries from the log file, thus effectively eliminating any reliable signature that the device had been compromised,” the Juniper security alert said. If encrypted communications were being monitored, “There is no way to detect that this vulnerability was exploited,” according to the Juniper security alert.

According to a Juniper Networks spokeswoman’s statement, “Once we identified these vulnerabilities, we launched an investigation and worked to develop and issue patched releases for the impacted devices. We also reached out to affected customers, strongly recommending that they update their systems.”

U.S. officials said it’s not clear how the Juniper source code was altered, whether from an outside attack or someone inside.

The work to alter millions of lines of source code is sophisticated. The system was compromised for three years before Juniper uncovered it in a routine review in recent weeks.

Juniper said it was also issuing a security fix for a separate bug that could allow a hacker to launch denial-of-service attacks on networks.

Saudi Led Coalition vs. Islamic States, Big Questions

Audio interviews of attitudes of the newly announced Saudi coalition against Islamic State and terrorism in the region.

BBC: Saudi Arabia is part of the US-led coalition against IS and is also leading a military intervention in Yemen against Shia Houthi rebels.
The list of 34 members: Saudi Arabia, Bahrain, Bangladesh, Benin, Chad, Comoros, Djibouti, Egypt, Gabon, Guinea, Ivory Coast, Jordan, Kuwait, Lebanon, Libya, Malaysia, Maldives, Mali, Morocco, Mauritania, Niger, Nigeria, Pakistan, the Palestinians, Qatar, Senegal, Sierra Leone, Somalia, Sudan, Togo, Tunisia, Turkey, United Arab Emirates and Yemen.
A joint operations centre is to be established in the Saudi capital, Riyadh, state media reported.
Countries from Asia, Africa and the Arab world are involved in the alliance but Saudi Arabia’s main regional rival Iran is not.
It comes amid international pressure for Gulf Arab states to do more in the fight against so-called Islamic State.
Saudi Defence Minister Mohammed bin Salman said the new alliance would co-ordinate efforts against extremists in Iraq, Syria, Libya, Egypt and Afghanistan.
Neither Iraq nor Syria, whose governments are close to Shia-ruled Iran, are in the coalition, nor is Afghanistan.


Two things stand out immediately about this new Saudi-based Islamic Coalition.
The Shia-majority nations of Iran and Iraq are noticeably absent, as is their ally Syria.
It is far from clear how, in practice, the coalition would conduct counter-terrorism operations in IS-plagued Iraq and Syria without the agreement of those governments.
Secondly, there is the question of the exact definition of terrorism. The Saudi authorities’ interpretation of it extends far beyond the violent actions of armed insurgents.
Recent legislation has branded peaceful opposition activists and reformers, whether online or in the street, as suspected “terrorists” and a security risk to the state.

***

CBC: Saudi Arabia’s defence minister gave a rare press conference on Tuesday to announce a new military coalition of 34 Muslim countries, led by Saudi Arabia, to fight terrorism in the region. The coalition includes a broad range of countries including the United Arab Emirates, Turkey, Egypt and Sudan.

The announcement was welcomed by some, and met with skepticism by others, given that Saudi Arabia has long been accused of turning a blind eye to support for terrorism coming from inside its own borders.

By Wednesday, several of the countries involved, including Pakistan and Malaysia, expressed confusion at having been named as members of a military coalition, and began distancing themselves from the commitment.

Aya Batrawy reports on the Arabian Peninsula for the Associated Press. She was in Riyadh, Saudi Arabia.

David A. Weinberg is skeptical of Saudi Arabia’s new military coalition. He is a senior fellow at the Foundation for Defence of Democracies in Washington.

For a sense of how the American government might be thinking, we were joined by James B. Smith. He was the U.S. ambassador to Saudi Arabia from 2009 to 2013. He’s now the president of the policy consulting firm C and M International in Washington.

We did make multiple requests for comment from the Saudi Arabian embassy in Canada, but we did not receive a response. The Saudi embassy to the United States declined our request for an interview.

Hagel: WH Worked to Destroy Me

Hagel: The White House Tried to ‘Destroy’ Me

48 More Approved to Leave Gitmo

The White House itself admits that around 10 percent of those released from Guantanamo have resumed fighting for Islamic extremist organizations, but says it is more important to shutter a facility that has become a recruiting tool for militants.

Obama’s comments come as Sudanese militant Ibrahim al-Qosi — who was released in 2012 — seemingly appeared in a recent video by Al Qaeda in the Arabian Peninsula.

“The judgment that we’re continually making is, are there individuals who are significantly more dangerous than the people who are already out there who are fighting?” Obama said.

“What do they add? Do they have special skills? Do they have special knowledge that ends up making a significant threat to the United States?”

“And so the bottom line is that the strategic gains we make by closing Guantanamo will outweigh, you know, those low-level individuals who, you know, have been released so far.”

The Republican-controlled Congress has thwarted Obama’s repeated efforts to close Guantanamo.

Obama came to office in 2009 vowing to shutter the facility, which opened under his predecessor George W. Bush to hold terror suspects after the September 11, 2001 attacks and became known for harsh interrogation techniques that some have said were tantamount to torture.

Obama is soon expected to put forward a new plan that would speed the release of inmates and transfer the most dangerous ones to US soil.

The plan is likely to accelerate the release of low-level detainees to foreign countries and move the most dangerous prisoners to a specialized facility in the United States.

Because of a congressional ban on funding US transfers, Obama has suggested he may have to resort to an executive order to close the prison. This would ignite a political and legal firestorm.

Obama also told Yahoo News that he “very much” hopes to travel to Cuba before leaving office a little over a year from now.

The United States and Cuba restored diplomatic ties this summer, ending a half-century of enmity stemming from the Cold War era.

Obama reiterated previous White House comments that some progress would need to be seen on human rights before any presidential trip.

Obama said he would go when aides could determine “now would be a good time to shine a light on progress that’s been made, but also maybe (go) there to nudge the Cuban government in a new direction.”

The periodic review list of detainees is here.

Transfers Could Reduce Guantánamo Detainees to 90

NYT’s: WASHINGTON — The Obama administration appears to be on the cusp of the largest round of transfers of Guantánamo Bay detainees in a single month since 2007, a move that could reduce the detainee population there to as low as 90 by mid- to late January, according to officials familiar with internal deliberations.

Defense Secretary Ashton B. Carter has notified Congress in recent days that he has approved 17 proposed transfers of lower-level detainees, said the officials, who spoke on the condition of anonymity to discuss matters that have not yet been made public. Congress has required Mr. Carter to certify that security standards have been met at least 30 days before any transfers.

President Obama wants to close the Guantánamo prison in Cuba before he leaves office in a little over a year. His administration has stepped up efforts to find countries to take 48 detainees on a transfer list and moved to speed up the work of a parole-like board that might approve the release of others who are currently recommended for indefinite detention.

The Republican-led Congress, however, has shown little interest in lifting a ban on bringing any detainees to a prison inside the United States, which is Mr. Obama’s plan for those who are either facing trial or are deemed too dangerous to release.

But even as the administration seems to be trying to speed up its fitful effort to winnow down the Guantánamo population, the military is taking steps that will curtail journalists’ access to the wartime prison.

The commander who oversees the military base, Gen. John F. Kelly, has created new rules that will limit reporters to four “media day” trips a year in which large groups will come and depart the same day. Reporters will generally no longer be permitted to go inside the prison camp’s walls.

In a telephone interview, General Kelly connected his decision “to tighten things up a little bit, particularly on the scheduling” for news media visits, in part to what he described as a sharp rise in visits by delegations from foreign governments that are considering resettling detainees.

The operational strains of handling such visitors, he said, formed the backdrop to an episode in October that focused his attention on rules for visits. He said that a journalist, whom he would not identify, was “extremely impolite” during an interaction with a service member who worked at a detainee library.

All that, he said, prompted him to fix what he saw as a problem before his designated successor, Vice Adm. Kurt Tidd, who is awaiting a Senate confirmation vote, takes over.

Until now, the military has generally permitted small numbers of reporters to visit the prison throughout the year if no military commission hearing is going on. The reporters have flown to the base on a Monday and flown out the following Thursday.

Reporters have spent that time on a tour that included walking through the two camps that hold lower-level detainees. While reporters have never been permitted to speak to the detainees, they have seen them from afar, talked to the officers in charge of each camp, interviewed the senior medical officer in the detainee clinic and interviewed lower-ranking guards.

General Kelly said he decided it would be easier for everyone if groups of reporters came to the base only during quarterly “media days,” in which they could talk to a handful of officials like the joint task force commander and the military’s cultural adviser, and then leave that same day.

The general said he no longer wanted reporters to talk to lower-level guards because it was not their role to opine about detention operations, or to go inside the prison because that could cause disruptions. However, he said, depending on what else is going on, exceptions might be made to let first-time visitors inside.

“The camps have not changed since the last time you’ve been there,” he told a reporter for The New York Times who has visited the prison several times, most recently in August 2014. “We still do the same things.”

Several news media outlets, including The Times, have asked the military to reconsider. Dave Wilson, a senior editor at The Miami Herald who oversees its coverage of Guantánamo, said he had told the military that it was important for experienced beat reporters to keep going inside the prison.

“A first-timer doesn’t know what they are seeing because they are seeing it for the first time,” Mr. Wilson said. “They don’t know if something has changed. They don’t know if it’s better or worse.”

General Kelly previously decided in September 2013 to stop telling reporters how many detainees were participating in a hunger strike each day.

FBI Prevented from Using Open Source?

‘ISIS Supporters’ Twitter Accounts Traced To UK Government Department’: Report

NDTV: London:  Hackers in Britain have claimed that a number of ISIS supporters’ social media accounts are being run from internet addresses linked to the UK government’s Department for Work and Pensions (DWP).

A group of four young computer experts, who call themselves VandaSec, have unearthed evidence indicating that at least three ISIS-supporting accounts can be traced back to the DWP’s London offices, the ‘Daily Mirror’ reported.

Every computer and mobile phone logs onto the internet using an IP address, which is a type of identification number. The hacking collective showed the newspaper details of the IP addresses used by three separate so-called “digital jihadis” to access Twitter accounts, which were then used to carry out online recruitment and propaganda campaigns.

At first glance, the IP addresses seem to be based in Saudi Arabia, but upon further inspection using specialist tools they appeared to link back to the DWP.

The newspaper learned that the British government had sold on a large number of IP addresses to two Saudi Arabian firms.

After the sale completed in October of this year, they were used by extremists to spread their message of hate.

A Cabinet Office spokesperson said: “The government owns millions of unused IP addresses which we are selling to get a good return for hardworking taxpayers.

“We have sold a number of these addresses to telecoms companies both in the UK and internationally to allow their customers to connect to the internet. We think carefully about which companies we sell addresses to, but how their customers use this internet connection is beyond our control.”

The UK government has not revealed how much money it has made from the sale of IP addresses.

Now we have learned that DHS has an edit to not use social media or open source for reasons of profiling, which likely has handicapped the FBI from sourcing and connecting intelligence when it comes to cultivating data on would-be jihadists.

Jihadists are making their plans public. Why hasn’t the FBI caught on?

Each week, In Theory takes on a big idea in the news and explores it from a range of perspectives. This week we’re talking about Internet encryption. Need a primer? Catch up here.

WaPo: Rita Katz is the director of the SITE Intelligence Group and has spent nearly two decades tracking, studying and reporting on jihadists. She has testified before Congress and in terrorism trials, briefed the White House, and is the author of the book “Terrorist Hunter: The Extraordinary Story of a Woman who Went Undercover to Infiltrate the Radical Islamic Groups Operating in America.”

Following the terrorist attacks in Paris and San Bernardino, Calif., FBI Director James Comey revealed to the Senate Judiciary Committee that one of the two Islamic State-inspired shooters in the May 3 attack in Garland, Tex., “exchanged 109 messages with an overseas terrorist” the morning of the attack. He followed up by saying that the FBI was unable to read those messages. His implication? Better regulation of message-disguising encryption technology could have revealed the shooters’ plans earlier and could help prevent attacks.

However, regulation of encryption is unlikely to provide the government with the counterterrorism benefit it says it will.  Jihadists’ main tool for planning and executing attacks in recent years has been social media — to which the government has full access — not encrypted messaging. In addition, regulation of one messaging technology will lead to immediate adaptation and the creation of ways to circumvent it.

In recent years, smartphones and social media have enabled users from around the world to communicate easily, safely and free of charge. Programs facilitating such communications sprouted, and jihadists — the Islamic State in particular — quickly adopted them as their main means of communication. For over three years, Twitter has been the Islamic State’s most important platform. High-level operatives within the group have used Twitter’s unencrypted direct messaging to recruit, give instructions for donating and plan attacks. Jihadists even rely on Twitter to promote their channels on other platforms, such as Telegram, which supporters would otherwise have difficulty finding.

Jihadists’ presence on social media has also spread the Islamic State around the world, with people of all ages, sexes and ethnicities leaving their families and friends to join the group. Social media use has been linked to executed and attempted lone-wolf attacks in the United StatesCanadaAustraliaFranceDenmark and other Western nations.

The Garland, Tex., shooting — the only example Comey used  as an impetus to regulate encrypted technology — in fact makes the opposite point. Attacker Elton Simpson, who was under previous FBI terror-related investigations, used Twitter to openly follow and communicate with high-profile terrorists. His account was followed by prominent English-speaking Islamic State fighters and recruiters Abu Rahin Aziz and Junaid Hussain — both of whom for a long time were known to provide manuals on how to carry out lone-wolf attacks from Raqqa, Syria, before they were killed. Simpson also followed and communicated with Mohamed Abdullahi Hassan, a known American jihadist in Somalia who pledged allegiance to the Islamic State.

Relatedly, the incitement for the Texas shooting came from Hassan’s 31st Twitter account. Simpson, a friend and follower of Hassan, retweeted the call and later requested that Hassan send him a direct message. We at SITE, using only open-source information, reported on the call before the attack took place, and the FBI had a week to investigate the matter before the shooting. Though only nine Twitter users retweeted the call for attack, the FBI failed to prevent it.

The encrypted messages Comey mentioned before the Judiciary Committee were discovered by the FBI only after the attack took place, but Simpson’s open-source communication was available far in advance. There is in fact no evidence that this or any of these other lone-wolf attacks could have been prevented by regulation of encryption technology.

In stark contrast, a proper, targeted open-source investigation could have. Yet the FBI is reluctant to recognize open-source as an important — arguably the most important — tool to track jihadists online.

It’s also important to note that jihadists are very quick to adapt online. In the past year alone, the Islamic State and al-Qaeda fighters have moved quickly from WhatsApp to Kik, Wickr, Surespot, then to Telegram – all different encryption programs created to give smartphone users safe and free text messaging available across multiple devices.  Jihadists are constantly ranking, debating and explaining which of the services is the safest and most effective. Regulation of these programs will take jihadists next to no time to circumvent; the U.S. government would be the one taking years to catch up. And even if successful, they may be able to regulate companies based in the United States, but such programs would appear everywhere else, from Russia to India to China

SITE’s leadership and continued success do not stem from access to secret databases. Our research, investigations and reporting are based on open-source information — social media, forums, websites, blogs, IP addresses — which can be immensely powerful if used wisely. Government agencies, however, seem blind to this bountiful intelligence resource, and too often rely solely on classified documents and back-end access to websites.

Rather than try to create backdoors to encrypted communication services, or use the lack thereof as an excuse to intelligence failures, the U.S. government must first know how to utilize the mass amount of data it has been collecting and to improve its monitoring of jihadist activity online. A focused approach of this sort is much more likely to lead to success in the war on terrorism.