Risk
6/26/2013
12:51 PM
50%
50%

Germany Criticizes U.K. 'Project Tempora' Cyber Spy Program

German politician wants the EU to address reports that Britain's spymasters are even better at harvesting Internet traffic than their NSA allies.

Europe continues to be shaken by the fallout from the NSA Prism revelations -- with Britain's alleged surveillance activities the latest issue.

Two weeks ago, British foreign secretary William Hague attempted to reassure Parliament and the nation that whistleblower Edward Snowden's claims about massive spying on Internet communications were inaccurate.

However, subsequent claims by Snowden, published in U.K. newspaper The Guardian, that the country's GCHQ signals monitoring center taps fiber optic cables in a data-harvesting scheme called Project Tempora have angered Britain's European colleagues.

If the reports are true, Tempora is an 18-month old scheme whereby large volumes of data are drawn from fiber optic cables for up to 30 days so that it can be sifted and analyzed.

[ U.S. Congress also reacts to the Prism fallout. See Senate Bill Seeks Greater NSA Surveillance Oversight. ]

Tempora is claimed to be in some ways an even bigger operation than Prism, allowing British spooks to boast to their intelligence colleagues in the Five Eyes electronic eavesdropping alliance, comprised of the U.S., U.K., Canada, Australia and New Zealand, that it had the "biggest Internet access" capabilities of the club, and that GCHQ "produces larger amounts of metadata than the NSA."

Not everyone is as impressed with this act of questionable technical prowess, of course. Germany's federal justice minister, Sabine Leutheusser-Schnarrenberger, has expressed anger and demanded the U.K. government's details of how her citizens may have been affected by the program. The Guardian reported Wednesday that Leutheusser-Schnarrenberger has written to two British ministers, Secretary of State for Justice Chris Grayling and Home Secretary Theresa May, to find out more.

Reportedly, the German politician wants Tempora to be discussed in the context of ongoing discussions about EU data protection regulation at the next meeting of European justice and home affairs ministers, scheduled for July.

She is also alleged to have described Tempora as like the plot of a "Hollywood nightmare," claiming free and democratic societies could not flourish when states shrouded their actions in "a veil of secrecy."

The Home Office told the newspaper that it refuses to comment on what it regards as private correspondence, while the Ministry of Justice said it would respond in "due course."

Leutheusser-Schnarrenberger had already criticized Prism in the German press. "As much as we want counterterrorism efforts to be effective, there has to be a reasonable balance between security and the freedom of citizens ... The global Internet has become indispensible for a competitive economy, the sharing of information and the strengthening of human rights in authoritarian countries. But our trust in these technologies threatens to be lost in the face of comprehensive surveillance activities," she said.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6228
Published: 2014-12-28
Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split ...

CVE-2014-6229
Published: 2014-12-28
The HashContext class in hphp/runtime/ext/ext_hash.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 incorrectly expects that a certain key string uses '\0' for termination, which allows remote attackers to obtain sensitive information by leveraging read access beyond the end of the string,...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.