{"id":16033,"date":"2016-10-12T15:37:03","date_gmt":"2016-10-12T19:37:03","guid":{"rendered":"http:\/\/mjtsai.com\/blog\/?p=16033"},"modified":"2024-07-09T23:26:19","modified_gmt":"2024-07-10T03:26:19","slug":"yahoos-fisa-e-mail-scan","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2016\/10\/12\/yahoos-fisa-e-mail-scan\/","title":{"rendered":"Yahoo&rsquo;s FISA E-mail Scan"},"content":{"rendered":"<p><a href=\"http:\/\/www.nytimes.com\/2016\/10\/06\/technology\/yahoo-email-tech-companies-government-investigations.html\">Charlie Savage and Nicole Perlroth<\/a> (via <a href=\"http:\/\/www.macrumors.com\/2016\/10\/06\/yahoo-spam-filter-court-order\/\">MacRumors<\/a>):<\/p>\n<blockquote cite=\"http:\/\/www.nytimes.com\/2016\/10\/06\/technology\/yahoo-email-tech-companies-government-investigations.html\"><p>A system intended to scan emails for child pornography and spam helped Yahoo satisfy a secret court order requiring it to search for messages containing a computer &ldquo;signature&rdquo; tied to the communications of a state-sponsored terrorist organization, several people familiar with the matter said on Wednesday.<\/p>\n<p>Two government officials who spoke on the condition of anonymity said the Justice Department obtained an individualized order from a judge of the Foreign Intelligence Surveillance Court last year. Yahoo was barred from disclosing the matter.<\/p>\n<p>To comply, Yahoo customized an existing scanning system for all incoming email traffic, which also looks for malware, according to one of the officials and to a third person familiar with Yahoo&rsquo;s response, who also spoke on the condition of anonymity.<\/p><\/blockquote>\n\n<p><a href=\"http:\/\/arstechnica.com\/tech-policy\/2016\/10\/welcome-to-the-machine-yahoo-mail-scanning-exposes-another-us-spy-tool\/\">David Kravets<\/a>:<\/p>\n<blockquote cite=\"http:\/\/arstechnica.com\/tech-policy\/2016\/10\/welcome-to-the-machine-yahoo-mail-scanning-exposes-another-us-spy-tool\/\"><p>At its most basic level, this newly surfaced tool exposes another US digital surveillance program. It differs from so-called <a href=\"http:\/\/arstechnica.com\/tech-policy\/2015\/06\/new-snowden-documents-reveal-secret-memos-expanding-spying\/\">&ldquo;upstream&rdquo; spying<\/a> in which the authorities tap directly into the Internet backbone and scan for certain search terms&mdash;a spying program with diminishing returns as more and more data on the Internet has become encrypted. This Yahoo situation is also different from the <a href=\"http:\/\/arstechnica.com\/tech-policy\/2013\/06\/details-emerge-about-prism-big-tech-companies-release-data-request-reports\/\">Prism program<\/a>, where the authorities acquire customer data from tech companies matching chosen search selectors.<\/p><\/blockquote>\n\n<p><a href=\"http:\/\/macsparky.com\/blog\/2016\/10\/yahoogov\">David Sparks<\/a>:<\/p>\n<blockquote cite=\"http:\/\/macsparky.com\/blog\/2016\/10\/yahoogov\"><p>Yahoo has responded that <a href=\"http:\/\/mobile.reuters.com\/article\/idUSKCN1241YT\">Reuter&rsquo;s original reporting<\/a> of this was &ldquo;misleading&rdquo;, But again how would we really know? All of this is done under the veil of secrecy.<\/p><\/blockquote>\n\n<p><a href=\"http:\/\/www.reuters.com\/article\/us-yahoo-nsa-order-idUSKCN12800D\">Joseph Menn<\/a>:<\/p>\n<blockquote cite=\"http:\/\/www.reuters.com\/article\/us-yahoo-nsa-order-idUSKCN12800D\"><p>The court-ordered search Yahoo conducted, on the other hand, was done by a module attached to the Linux kernel - in other words, it was deeply buried near the core of the email server operating system, far below where mail sorting was handled, according to three former Yahoo employees.<\/p>\n<p>They said that made it hard to detect and also made it hard to figure out what the program was doing.<\/p><\/blockquote>\n\n<p><a href=\"http:\/\/motherboard.vice.com\/read\/yahoo-government-email-scanner-was-actually-a-secret-hacking-tool\">Lorenzo Franceschi-Bicchierai<\/a> (via <a href=\"https:\/\/it.slashdot.org\/story\/16\/10\/07\/1810228\/yahoos-government-email-scanner-was-not-a-modified-spam-filter-but-a-secret-hacking-tool-motherboard\">Slashdot<\/a>):<\/p>\n<blockquote cite=\"http:\/\/motherboard.vice.com\/read\/yahoo-government-email-scanner-was-actually-a-secret-hacking-tool\"><p>The spy tool that the US government ordered Yahoo to install on its systems last year at the behest of the NSA or the FBI was a &ldquo;poorly designed&rdquo; and &ldquo;buggy&rdquo; piece of malware, according to two sources closely familiar with the matter.<\/p>\n<p>[&#8230;]<\/p>\n<p>Anonymous sources told <em>The Times<\/em> that the tool was nothing more than a modified version of Yahoo&rsquo;s existing scanning system, which searches all email for malware, spam and images of child pornography.<\/p>\n<p>But two sources familiar with the matter told Motherboard that this description is wrong, and that the tool was actually more like a &ldquo;rootkit,&rdquo; a powerful type of malware that lives deep inside an infected system and gives hackers essentially unfettered access.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/www.schneier.com\/blog\/archives\/2016\/10\/yahoo_scanned_e.html\">Bruce Schneier<\/a>:<\/p>\n<blockquote cite=\"https:\/\/www.schneier.com\/blog\/archives\/2016\/10\/yahoo_scanned_e.html\"><p>Other companies have been <a href=\"https:\/\/techcrunch.com\/2016\/10\/04\/twitter-microsoft-and-google-say-they-havent-scanned-messages-like-yahoo\/\">quick to deny<\/a> that they did the same thing, but I generally don&rsquo;t believe those carefully worded statements about what they have and haven&rsquo;t done.<\/p><\/blockquote>\n\n<p>Previously: <a href=\"http:\/\/mjtsai.com\/blog\/2016\/09\/28\/yahoo-says-hackers-stole-data-on-500-million-users-in-2014\/\">Yahoo Says Hackers Stole Data on 500 Million Users in 2014<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Charlie Savage and Nicole Perlroth (via MacRumors): A system intended to scan emails for child pornography and spam helped Yahoo satisfy a secret court order requiring it to search for messages containing a computer &ldquo;signature&rdquo; tied to the communications of a state-sponsored terrorist organization, several people familiar with the matter said on Wednesday. Two government [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2024-07-10T03:26:13Z","apple_news_api_id":"6ea8be96-2aa1-4ee8-bd33-caf75229a063","apple_news_api_modified_at":"2024-07-10T03:26:13Z","apple_news_api_revision":"AAAAAAAAAAD\/\/\/\/\/\/\/\/\/\/w==","apple_news_api_share_url":"https:\/\/apple.news\/Abqi-liqhTui9M8r3UimgYw","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[2106,150,355,459],"class_list":["post-16033","post","type-post","status-publish","format-standard","hentry","category-technology","tag-child-sexual-abuse-material-csam","tag-email","tag-privacy","tag-yahoo"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/16033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=16033"}],"version-history":[{"count":1,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/16033\/revisions"}],"predecessor-version":[{"id":16034,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/16033\/revisions\/16034"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=16033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=16033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=16033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}