Cryptome: NSA has real-time access to Hushmail servers

A frequent source ‘A’ sending updated NSA-Affiliated IP resources to Cryptome’s Web site has reported the following new information:

Certain privacy/full session SSL email hosting services have been purchased/changed operational control by NSA and affiliates within the past few months, through private intermediary entities.

Reportedly the following services are controlled:

Hushmail – based in Canada,
Guardster – based in USA,
and
SAFe-mail.net – based in Israel.

Link here: NSA Controls SSL Email Hosting Services

Update 22nd Dec: Guardster Team has posted its response on 21st Dec to Cryptome:

We can assure you that we do not cooperate with the NSA or any other government agency anywhere in the world. We invite whomever is making this statement to provide proof, rather than making a baseless accusation.
….

Response from Safe-mail.net Team (24th Dec) is the following:

1. We never had any contacts, direct or indirect, with the NSA or any other
government agency anywhere in the world.
2. All software we use is in-house development.
3. We have never shared our technology with any other party.
….

Update 30th Dec: Hushmail Team has posted its response yesterday to Cryptome’s Web site:

Hush Communications Corporation, the company that provides the Hushmail.com email service, is not owned, wholly or in part, by any government agency.

Additionally, ‘More info on industry Windows security software’ has been released:

Zone Alarm, Symantec, MacAfee: All facilitate Microsoft’s NSA-controlled remote admin access via IP/TCP ports 1024 through 1030; ie will allow access without security flag. Unknown whether or not software port forward routing by these same programs will defeat NSA access.

The post released in Cryptome.org on 1st Nov informed about the future updates with details related to this issue and this is the first piece of information.

To the new readers: Cryptome: NSA has access to Windows Mobile smartphones

Share
  • http://www.JDCampbell.com jdcampbell

    So the NSA has a back door to everybody’s comptuer, right? Even the Linux kernel has NSA code in it.

  • Dan Guido

    I’d really like to continue reading this blog however I’m more than a little disturbed at the declining quality of blog posts lately. Remote admin access on ports 1024 and 1030? Did you take any time to verify this? Does software from those companies even open those ports? Frankly, the ‘A’ source doesn’t even sound technical at all, he’s not even describing things in the correct terminology.

    Instead of just being an echo for Cryptome, why don’t you guys stick to and continue writing up posts about new techniques and code, the reason I started reading this blog in the first place and get rid of this worthless crap about the NSA and Cryptome.

    Thanks.

  • Port 1030

    Remote access is already inherently installed in Windows XP and Vista, via Remote Assistance, this product uses the random ports assigned between 1024 and 1030 (not any of the two specifically).

    That is what the post meant.

    Don’t jump before you read a bit more on what you say.

  • http://www.cryptocity.net/blog/ investigator

    looking into your website dan foo! I noticed that your thoughts aren’t a lot smarter than the cryptom ones

  • Yay

    Don’t dismiss it out of hand. Mr. Young who runs Cryptome is neither a rube or an attention seeker. Send in your own story that’s similar, I would be highly surprised if he posted it soley on your say so. Whoever “A” is, he nodoubt has proven his credentials privately. Of course it could also be rubbish.

  • http://anonymousspeech.com anonymous email

    Using any US based provider for secure or anonymous email is a joke itself. When choosing your provider go offshore!

  • Pingback: Microsoft Windows Update » Cryptome: NSA has real-time access to Hushmail servers (6 items)

  • Pingback: Microsoft Windows Update » Cryptome: NSA has real-time access to Hushmail servers (7 items)

  • ShadowSurfer

    In response to Dan Guido’s Comments Top of page.
    *********************************************************
    “Remote admin access on ports 1024 and 1030? Did you take any time to verify this? Does software from those companies even open those ports? ”
    **********************************************************
    RE:
    Yes , in fact Dan and readers ,
    ZoneAlarm Pro’s monitoring function ” vsmon.exe ”
    ( found @ System32\ZoneLabs\vsmon.exe )
    specifically uses Local port 1025 in the ” Listen “State
    with no apparent ” Remote Port ” associated with it .
    **********************************************************
    If in Fact the ZoneAlarm C.E.O. and sotware developers , have caved in to political pressure and
    have given the NSA a backdoor , then this popular
    and eficient firewall is worthless now , and a security risk rather than an asset to it’s many users worldwide.
    But the Question is , how do you verify this ?