Sep 05, 2013
According to the Guardian--which has reported extensively on the NSA's dragnet surveillance practices revealed by NSA whistleblower Edward Snowden--the NSA and its British counterparts the GCHQ have used "covert measures" to control and manipulate international encryption standards to the benefit of the NSA, largely through building "industry relationships" with many technology companies and internet service providers.
As joint reporting by ProPublica and the New York Times explains, according to the documents and interviews with industry officials, the NSA has deployed "custom-built, superfast computers to break codes" and began collaborating with "technology companies in the United States and abroad" to build 'backdoor' entry points into their products and introduce weaknesses into their encryption standards.
The records do not identify which specific companies have been working with the NSA to this extent. However, one document does reveal that a GCHQ team has been working to develop ways into encrypted traffic on the "big four" service providers, named as Hotmail, Google, Yahoo and Facebook.
"By deliberately undermining online security in a short-sighted effort to eavesdrop, the NSA is undermining the very fabric of the internet."
Through these relationships the NSA has become nearly immune to most encryption technologies, and has thus mastered the use of "supercomputers" to break encryption with "brute force," leaving a dying number of encryption technologies immune to NSA surveillance.
As one of the NSA documents obtained by the news agencies states, the NSA "actively engages US and foreign IT industries to covertly influence and/or overtly leverage their commercial products' designs," and in turn inserts "vulnerabilities into commercial encryption systems."
"US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails," the Guardian reports.
"For the past decade, NSA has lead [sic] an aggressive, multi-pronged effort to break widely used internet encryption technologies," a 2010 GCHQ document states. "Vast amounts of encrypted internet data which have up till now been discarded are now exploitable."
"Cryptography forms the basis for trust online," said Bruce Schneier, an encryption specialist and fellow at Harvard's Berkman Center for Internet and Society. "By deliberately undermining online security in a short-sighted effort to eavesdrop, the NSA is undermining the very fabric of the internet."
The NSA's encryption busting program designated as "Sigint [signals intelligence] enabling" received $254.9 million in 2013 alone (compared to $20 million allotted to the previously exposed PRISM program).
"The encryption technologies that the NSA has exploited to enable its secret dragnet surveillance are the same technologies that protect our most sensitive information, including medical records, financial transactions, and commercial secrets," stated Christopher Soghoian, principal technologist of the ACLU's Speech, Privacy and Technology Project.
Soghoian continues:
Even as the NSA demands more powers to invade our privacy in the name of cybersecurity, it is making the internet less secure and exposing us to criminal hacking, foreign espionage, and unlawful surveillance. The NSA's efforts to secretly defeat encryption are recklessly shortsighted and will further erode not only the United States' reputation as a global champion of civil liberties and privacy but the economic competitiveness of its largest companies.
_______________________
No one is coming to save us. Join with us.
The world is a pretty dark place right now. Economic inequality off the charts. The climate emergency. Supreme Court corruption in the U.S. and corporate capture worldwide. Democracy in many nations coming apart at the seams. Fascism threatens. It’s enough to make you wish for some powerful being to come along and save us. But the truth is this: no heroes are coming to save us. The only path to real and progressive change is when well-informed, well-intentioned people—fed up with being kicked around by the rich, the powerful, and the wicked—get organized and fight for the better world we all deserve. That’s why we created Common Dreams. We cover the issues that corporate media never will and lift up voices others would rather keep silent. But this people-powered media model can only survive with the support of readers like you. Can you join with us and donate right now to Common Dreams’ Mid-Year Campaign? |
Our work is licensed under Creative Commons (CC BY-NC-ND 3.0). Feel free to republish and share widely.
Jacob Chamberlain
Jacob Chamberlain is a former staff writer for Common Dreams. His website is www.jacobpchamberlain.com.
According to the Guardian--which has reported extensively on the NSA's dragnet surveillance practices revealed by NSA whistleblower Edward Snowden--the NSA and its British counterparts the GCHQ have used "covert measures" to control and manipulate international encryption standards to the benefit of the NSA, largely through building "industry relationships" with many technology companies and internet service providers.
As joint reporting by ProPublica and the New York Times explains, according to the documents and interviews with industry officials, the NSA has deployed "custom-built, superfast computers to break codes" and began collaborating with "technology companies in the United States and abroad" to build 'backdoor' entry points into their products and introduce weaknesses into their encryption standards.
The records do not identify which specific companies have been working with the NSA to this extent. However, one document does reveal that a GCHQ team has been working to develop ways into encrypted traffic on the "big four" service providers, named as Hotmail, Google, Yahoo and Facebook.
"By deliberately undermining online security in a short-sighted effort to eavesdrop, the NSA is undermining the very fabric of the internet."
Through these relationships the NSA has become nearly immune to most encryption technologies, and has thus mastered the use of "supercomputers" to break encryption with "brute force," leaving a dying number of encryption technologies immune to NSA surveillance.
As one of the NSA documents obtained by the news agencies states, the NSA "actively engages US and foreign IT industries to covertly influence and/or overtly leverage their commercial products' designs," and in turn inserts "vulnerabilities into commercial encryption systems."
"US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails," the Guardian reports.
"For the past decade, NSA has lead [sic] an aggressive, multi-pronged effort to break widely used internet encryption technologies," a 2010 GCHQ document states. "Vast amounts of encrypted internet data which have up till now been discarded are now exploitable."
"Cryptography forms the basis for trust online," said Bruce Schneier, an encryption specialist and fellow at Harvard's Berkman Center for Internet and Society. "By deliberately undermining online security in a short-sighted effort to eavesdrop, the NSA is undermining the very fabric of the internet."
The NSA's encryption busting program designated as "Sigint [signals intelligence] enabling" received $254.9 million in 2013 alone (compared to $20 million allotted to the previously exposed PRISM program).
"The encryption technologies that the NSA has exploited to enable its secret dragnet surveillance are the same technologies that protect our most sensitive information, including medical records, financial transactions, and commercial secrets," stated Christopher Soghoian, principal technologist of the ACLU's Speech, Privacy and Technology Project.
Soghoian continues:
Even as the NSA demands more powers to invade our privacy in the name of cybersecurity, it is making the internet less secure and exposing us to criminal hacking, foreign espionage, and unlawful surveillance. The NSA's efforts to secretly defeat encryption are recklessly shortsighted and will further erode not only the United States' reputation as a global champion of civil liberties and privacy but the economic competitiveness of its largest companies.
_______________________
Jacob Chamberlain
Jacob Chamberlain is a former staff writer for Common Dreams. His website is www.jacobpchamberlain.com.
According to the Guardian--which has reported extensively on the NSA's dragnet surveillance practices revealed by NSA whistleblower Edward Snowden--the NSA and its British counterparts the GCHQ have used "covert measures" to control and manipulate international encryption standards to the benefit of the NSA, largely through building "industry relationships" with many technology companies and internet service providers.
As joint reporting by ProPublica and the New York Times explains, according to the documents and interviews with industry officials, the NSA has deployed "custom-built, superfast computers to break codes" and began collaborating with "technology companies in the United States and abroad" to build 'backdoor' entry points into their products and introduce weaknesses into their encryption standards.
The records do not identify which specific companies have been working with the NSA to this extent. However, one document does reveal that a GCHQ team has been working to develop ways into encrypted traffic on the "big four" service providers, named as Hotmail, Google, Yahoo and Facebook.
"By deliberately undermining online security in a short-sighted effort to eavesdrop, the NSA is undermining the very fabric of the internet."
Through these relationships the NSA has become nearly immune to most encryption technologies, and has thus mastered the use of "supercomputers" to break encryption with "brute force," leaving a dying number of encryption technologies immune to NSA surveillance.
As one of the NSA documents obtained by the news agencies states, the NSA "actively engages US and foreign IT industries to covertly influence and/or overtly leverage their commercial products' designs," and in turn inserts "vulnerabilities into commercial encryption systems."
"US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails," the Guardian reports.
"For the past decade, NSA has lead [sic] an aggressive, multi-pronged effort to break widely used internet encryption technologies," a 2010 GCHQ document states. "Vast amounts of encrypted internet data which have up till now been discarded are now exploitable."
"Cryptography forms the basis for trust online," said Bruce Schneier, an encryption specialist and fellow at Harvard's Berkman Center for Internet and Society. "By deliberately undermining online security in a short-sighted effort to eavesdrop, the NSA is undermining the very fabric of the internet."
The NSA's encryption busting program designated as "Sigint [signals intelligence] enabling" received $254.9 million in 2013 alone (compared to $20 million allotted to the previously exposed PRISM program).
"The encryption technologies that the NSA has exploited to enable its secret dragnet surveillance are the same technologies that protect our most sensitive information, including medical records, financial transactions, and commercial secrets," stated Christopher Soghoian, principal technologist of the ACLU's Speech, Privacy and Technology Project.
Soghoian continues:
Even as the NSA demands more powers to invade our privacy in the name of cybersecurity, it is making the internet less secure and exposing us to criminal hacking, foreign espionage, and unlawful surveillance. The NSA's efforts to secretly defeat encryption are recklessly shortsighted and will further erode not only the United States' reputation as a global champion of civil liberties and privacy but the economic competitiveness of its largest companies.
_______________________
We've had enough. The 1% own and operate the corporate media. They are doing everything they can to defend the status quo, squash dissent and protect the wealthy and the powerful. The Common Dreams media model is different. We cover the news that matters to the 99%. Our mission? To inform. To inspire. To ignite change for the common good. How? Nonprofit. Independent. Reader-supported. Free to read. Free to republish. Free to share. With no advertising. No paywalls. No selling of your data. Thousands of small donations fund our newsroom and allow us to continue publishing. Can you chip in? We can't do it without you. Thank you.