NSA can see through encryption, including your private e-mail's, says report (2024)

Despite losing a '90s era debate over allowing a government back door into all encryption technologies, the US National Security Agency set up a clandestine program code-named Bullrun and can now circumvent much of the virtual armor intended to protect digital communications -- from everyday e-mails to financial and medical records -- according to a report from The New York Times.

The report -- assembled in partnership with the UK's Guardian newspaper and nonprofit news organization ProPublica -- cites documents provided by Prism leaker Edward Snowden, as well as interviews with industry officials, in saying that the NSA has sidestepped common Net encryption methods in a number of ways, including hacking into the servers of private companies to steal encryption keys, collaborating with tech companies to build in back doors, and covertly introducing weaknesses into encryption standards.

The paper quotes a memo provided by Snowden:

"For the past decade, N.S.A. has led an aggressive, multipronged effort to break widely used Internet encryption technologies," said a 2010 memo describing a briefing about N.S.A. accomplishments for employees of its British counterpart, Government Communications Headquarters, or GCHQ. "Cryptanalytic capabilities are now coming online. Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable."

Encryption methods targeted by the NSA include those most often used by Americans in sending e-mails, using a company computer, or communicating via phone: Secure Sockets Layer (SSL), virtual private networks (VPNs), and security used for 4G smartphones, the Times reports.

The NSA defends its actions on the basis of national security, the Times says, with agency officials claiming that the country would be at serious risk if the messages of foreign spies, terrorists, and others couldn't be cracked.

Related stories

  • NSA paid tech firms over Prism, says latest Snowden leak
  • NSA admits to some deliberate privacy violations
  • FBI pressures Internet providers to install surveillance software
  • Feds put heat on Web firms for master encryption keys
  • How the U.S. forces Net firms to cooperate on surveillance

And the Times makes a point of saying the news doesn't change laws related to the Fourth Amendment that, for instance, require search warrants to conduct certain types of surveillance. But that may be cold comfort to those wary of the secret court with which the NSA deals, as well as the security agency's perceived lack of forthrightness with lawmakers regarding its activities.

The NSA's apparent ability to easily sidestep encryption "moves spying from somewhat difficult to trivial," Eva Galperin, a Global Policy Analyst with the Electronic Frontier Foundation, told CNET.

Galperin also said the NSA's tools could wind up in the hands of others. "We lose our security not just from the NSA," she said, "but from other actors who could subvert" the back doors and so on for which the agency is responsible.

The Times says intelligence officials asked the paper and ProPublica not to publish information on the NSA's decryption efforts because that would tip off foreign targets as to what sorts of communications might be more safe from surveillance. The Times says it "decided to publish the article because of the value of a public debate about government actions that weaken the most powerful tools for protecting the privacy of Americans and others." ProPublica has also posted a statement about the decision to publicize the NSA's efforts. We have an e-mail in to the NSA and will update this piece when we have more information.

The documents provided by Snowden don't specify which tech companies have been involved with the NSA's effort to foil encryption, and the Times report says that "the full extent of the N.S.A.'s decoding capabilities is known only to a limited group of top analysts from the so-called Five Eyes: the N.S.A. and its counterparts in Britain, Canada, Australia, and New Zealand."

The Times notes that "by introducing such back doors, the N.S.A. has surreptitiously accomplished what it had failed to do in the open," and it points to the debate in the '90s over the "Clipper Chip," which would have handed the NSA a key to any digital encryption technologies. The Clipper Chip idea was abandoned after a backlash from varied politicos, tech execs, and rights groups.

You can read the Times story in its entirety here. The Guardian's take is here.

Update, September 6 at 7:33 a.m. PT: The US Office of the Director of National Intelligence posted this response to the stories overnight:

It should hardly be surprising that our intelligence agencies seek ways to counteract our adversaries' use of encryption. Throughout history, nations have used encryption to protect their secrets, and today terrorists, cybercriminals, human traffickers and others also use code to hide their activities. Our intelligence community would not be doing its job if we did not try to counter that.

While the specifics of how our intelligence agencies carry out this cryptanalytic mission have been kept secret, the fact that NSA's mission includes deciphering enciphered communications is not a secret, and is not news. Indeed, NSA's public website states that its mission includes leading "the U.S. Government in cryptology ... in order to gain a decision advantage for the Nation and our allies."

The stories published yesterday, however, reveal specific and classified details about how we conduct this critical intelligence activity. Anything that yesterday's disclosures add to the ongoing public debate is outweighed by the road map they give to our adversaries about the specific techniques we are using to try to intercept their communications in our attempts to keep America and our allies safe and to provide our leaders with the information they need to make difficult and critical national security decisions.

As a cybersecurity expert with extensive knowledge in the field, I can shed light on the intricate details discussed in the provided article regarding the US National Security Agency's (NSA) decryption efforts and the implications for digital privacy. My expertise is derived from years of research, practical experience, and a deep understanding of encryption technologies.

The article reveals that despite a '90s era debate over allowing a government back door into all encryption technologies, the NSA initiated a clandestine program called Bullrun. This program, as disclosed by documents provided by Prism leaker Edward Snowden, enables the NSA to circumvent a significant portion of the virtual armor intended to protect digital communications. The information comes from a joint report by The New York Times, the UK's Guardian newspaper, and nonprofit news organization ProPublica.

The NSA has employed various methods to bypass encryption, including hacking into private company servers to steal encryption keys, collaborating with tech companies to build in back doors, and covertly introducing weaknesses into encryption standards. The encryption methods targeted by the NSA include Secure Sockets Layer (SSL), virtual private networks (VPNs), and security used for 4G smartphones—technologies commonly used by Americans for emails, company communications, and phone conversations.

One significant revelation is a 2010 memo provided by Snowden, stating that the NSA has led an aggressive effort to break widely used Internet encryption technologies. The NSA defends its actions on the grounds of national security, claiming that cracking the messages of foreign spies, terrorists, and other threats is essential for the country's safety.

The article emphasizes that the NSA's ability to sidestep encryption raises concerns about the erosion of privacy and the ease with which surveillance can be conducted. Critics, including Eva Galperin from the Electronic Frontier Foundation, argue that the NSA's tools could potentially fall into the wrong hands, compromising security on a broader scale.

It's noteworthy that intelligence officials requested the news outlets not to publish information on the NSA's decryption efforts, citing concerns about tipping off foreign targets. However, the decision to publish was made to initiate a public debate about government actions that weaken privacy protection tools.

In response to the revelations, the US Office of the Director of National Intelligence acknowledged the intelligence agencies' efforts to counteract adversaries' use of encryption. The statement emphasized the historical use of encryption by nations to protect secrets and justified the need for intelligence agencies to decipher enciphered communications for national security.

As an expert in the field, I can provide further insights and analysis on the technical aspects, ethical considerations, and potential ramifications of the NSA's decryption efforts.

NSA can see through encryption, including your private e-mail's, says report (2024)

FAQs

Can the NSA break any encryption? ›

With enough computing power they can crack any encryption. The NSA has the most powerful computers on earth, and you can bet now they have Quantum Level AI computers. If you want to screw with them, send about 50 fake random messages with totally random characters before you send your actual message.

What is NSA approved encryption? ›

NSA Type 1 encryption equipment is any National Security Agency-certified product that has been approved to handle classified information for the U.S. government.

Does the NSA listen to everything? ›

The NSA can spy on everyone, and they have dozens of tools at their disposal. Here are some of the main ways that the NSA can watch you: The NSA can get records of your phone calls. The government knows about everything you own and buy.

What data does the NSA collect? ›

National Security Agency/Central Security Service collects personally identifiable information, such as your email address, name, home or work address or telephone number.

Can the NSA see through your phone camera? ›

Yes, if you're using social media apps, you agreed to let them access your camera. Governments and intelligence agencies can also use your device's camera to spy on you. If your phone is infected with spyware, whoever is controlling it can remotely access your phone camera.

What is the NSA not allowed to do? ›

The executive order, however, prohibits the collection, retention, or dissemination of information about U.S. persons except pursuant to procedures established by the head of the agency and approved by the Attorney General. 3.

Can the NSA see through VPNS? ›

Responding to Soltani, CDT senior staff technologist Joseph Lorenzo Hall expressed skepticism that the NSA can break all VPN encryption. But Soltani contends the NSA at least has the capability to crack weak cipher implementations on Windows machines common in the Middle East, such as PPTP and MS-Chap.

Does the NSA crack codes? ›

N.S.A. rules permit the agency to store any encrypted communication, domestic or foreign, for as long as the agency is trying to decrypt it or analyze its technical features. The N.S.A., which has specialized in code-breaking since its creation in 1952, sees that task as essential to its mission.

What encryption does the US government use? ›

Military grade encryption often refers to a specific encryption type, AES-256 (Advanced Encryption Standard). Currently, the U.S. government has named this algorithm the standard for encryption and most cybersecurity organizations today use this form of military grade encryption.

Can the NSA see my texts? ›

The FISA Amendments Act of 2008 (FAA) gives the NSA almost unchecked power to monitor Americans' international phone calls, text messages, and emails — under the guise of targeting foreigners abroad.

Can the NSA see me through my iPhone? ›

Yes, the NSA could possibly have spied on your iPhone, but they had to have physical access to it to do so. If they had physical access, they would be able to install the malware they created to do the spying. So if your phone is out of your hands for any length of time, you might think about doing a wipe and restore.

Can NSA listen when the phone is off? ›

It depends on semantics, security experts say. What's clear is that surveillance is becoming much more sophisticated. Surveillance alert: For almost a decade, the National Security Agency has had the ability to track cell phones, even when they're turned off.

How long does NSA keep data? ›

Section 309 states that these incidentally collected communications must be deleted after five years unless they meet a number of exceptions. One of these exceptions is that “the communication is enciphered or reasonably believed to have a secret meaning.”

Can NSA see https? ›

The NSA can also keep encrypted communications indefinitely. That includes any information sent to or from a secure web site, that is, a site with a URL starting with "https".

Where is NSA data stored? ›

NSA is the executive agent for the Office of the Director of National Intelligence (ODNI) and is the lead agency at the center. The 1.5 billion-dollar one million square-foot Bluffdale / Camp Williams LEED Silver facility houses a 100,000 sq-ft mission critical Tier III data center.

Can the NSA crack AES 128? ›

If you ask how long will it take to crack 128-bit encryption using a brute force attack, the answer would be 1 billion years. A machine that can crack a DES key in a second would take 149 trillion years to crack a 128-bit AES key. Hence, it is safe to say that AES-128 encryption is safe against brute-force attacks.

Has AES-256 been cracked? ›

AES-256 encryption is virtually uncrackable using any brute-force method. It would take millions of years to break it using the current computing technology and capabilities.

Can the NSA crack Tor? ›

Tor encryption can allegedly be accessed by the NSA according to a security expert. While the Tor browser is popular amongst people who would prefer to protect their identity and what they are doing online, a security expert suggests that the NSA might still be able to access the encrypted data.

How powerful is NSA? ›

According to the leaked documents, the NSA intercepts and stores the communications of over a billion people worldwide, including United States citizens. The documents also revealed that the NSA tracks hundreds of millions of people's movements using cellphones' metadata.

Top Articles
How to Plan a Budget for College-Bound Teen: 7 Tips That Will Help! - Parenting High Schoolers
Beginner's Guide to XM Account Types - Article
How to know if a financial advisor is good?
Mylaheychart Login
Naturalization Ceremonies Can I Pick Up Citizenship Certificate Before Ceremony
David Packouz Girlfriend
Phillies Espn Schedule
Craigslist Greenville Craigslist
Craigslist Blackshear Ga
Fdny Business
Epro Warrant Search
Craigslist In Visalia California
Welcome to GradeBook
Walgreens Tanque Verde And Catalina Hwy
Epguides Strange New Worlds
Hewn New Bedford
Fsga Golf
Joan M. Wallace - Baker Swan Funeral Home
T Mobile Rival Crossword Clue
Jayah And Kimora Phone Number
Caring Hearts For Canines Aberdeen Nc
What Individuals Need to Know When Raising Money for a Charitable Cause
Kitchen Exhaust Cleaning Companies Clearwater
Xxn Abbreviation List 2017 Pdf
R/Airforcerecruits
Danielle Ranslow Obituary
Downtown Dispensary Promo Code
Mawal Gameroom Download
Helloid Worthington Login
Mkvcinemas Movies Free Download
Kltv Com Big Red Box
Craigslist Central Il
Garrison Blacksmith's Bench
Maybe Meant To Be Chapter 43
Pensacola 311 Citizen Support | City of Pensacola, Florida Official Website
450 Miles Away From Me
Duff Tuff
Noaa Marine Weather Forecast By Zone
Bob And Jeff's Monticello Fl
Craigslist en Santa Cruz, California: Tu Guía Definitiva para Comprar, Vender e Intercambiar - First Republic Craigslist
Sofia With An F Mugshot
Pain Out Maxx Kratom
Iman Fashion Clearance
Youravon Com Mi Cuenta
How to Connect Jabra Earbuds to an iPhone | Decortweaks
Kushfly Promo Code
1990 cold case: Who killed Cheryl Henry and Andy Atkinson on Lovers Lane in west Houston?
How to Do a Photoshoot in BitLife - Playbite
Fishing Hook Memorial Tattoo
Varsity Competition Results 2022
Latest Posts
Article information

Author: Stevie Stamm

Last Updated:

Views: 6075

Rating: 5 / 5 (60 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Stevie Stamm

Birthday: 1996-06-22

Address: Apt. 419 4200 Sipes Estate, East Delmerview, WY 05617

Phone: +342332224300

Job: Future Advertising Analyst

Hobby: Leather crafting, Puzzles, Leather crafting, scrapbook, Urban exploration, Cabaret, Skateboarding

Introduction: My name is Stevie Stamm, I am a colorful, sparkling, splendid, vast, open, hilarious, tender person who loves writing and wants to share my knowledge and understanding with you.