Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

N.S.A. Foils Much Internet Encryption
New York Times ^ | September 5, 2013 | NICOLE PERLROTH, JEFF LARSON and SCOTT SHANE

Posted on 09/05/2013 12:14:05 PM PDT by Alter Kaker

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.

The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.

Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor.

(Excerpt) Read more at nytimes.com ...


TOPICS: Foreign Affairs; Front Page News; News/Current Events
KEYWORDS: nsa; security; snowden
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-80 ... 101-107 next last
Breathtaking -- both the scale of the NSA's exploits and the scale of this leak.
1 posted on 09/05/2013 12:14:05 PM PDT by Alter Kaker
[ Post Reply | Private Reply | View Replies]

To: Alter Kaker

And what they can’t break, they record until they can.


2 posted on 09/05/2013 12:17:16 PM PDT by Jack of all Trades (Hold your face to the light, even though for the moment you do not see.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jack of all Trades

Bingo. But nobody is listening in... there’s no “there” there.


3 posted on 09/05/2013 12:23:16 PM PDT by Bogey78O (We had a good run. Coulda been great still.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Alter Kaker
all I know is I was looking up a recipe for "cowboy beef" a couple of weeks ago and today Amazon emails me about a Cowboy recipe book.....

keep your friends close and your enemies closer...

4 posted on 09/05/2013 12:25:43 PM PDT by cherry
[ Post Reply | Private Reply | To 1 | View Replies]

To: Alter Kaker

Our government practically owns and operates Google and Facebook, too.


5 posted on 09/05/2013 12:27:36 PM PDT by GeorgeWashingtonsGhost
[ Post Reply | Private Reply | To 1 | View Replies]

To: cherry

I remember freepers trying to assure us that loyalty cards and asking for zip codes was not to track us but to make their service better. We were assured that it didn’t get specific enough to track us personally.

Then my Brother In Law recieved some awesome coupons for the items he bought all the time. The coupons were specifically tailored to his buying habits. I kid you not.


6 posted on 09/05/2013 12:28:17 PM PDT by GeronL
[ Post Reply | Private Reply | To 4 | View Replies]

To: Alter Kaker

“Properly implemented strong crypto systems are one of the few things that you can rely on,” he said, though cautioning that the N.S.A. often bypasses the encryption altogether by targeting the computers at one end or the other and grabbing text before it is encrypted or after it is decrypted.”

The usual method used is either to steal the encryption passphrase, or use a passphrase-guessing program. These programs are quite useful if you know a lot about the target.


7 posted on 09/05/2013 12:30:10 PM PDT by proxy_user
[ Post Reply | Private Reply | To 1 | View Replies]

To: Alter Kaker

The NSA are wussies living in their mothers’ basements reading everyone’s emails to get their jollies.

Haven’t stopped a single terrorist attack, by all indications.

The Tsarnaevs are laughing at them.


8 posted on 09/05/2013 12:30:41 PM PDT by Uncle Miltie (Are Marines required to salute Al Qaeda yet?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Alter Kaker
I read previous articles saying that the NSA is able to read the weaker PTPP encryption, but not the stronger L2TP/IPSec or OpenVPN protocols, at least not in anything approaching near-real time.

I think it's like cracking WEP, but not WPA2.

-PJ

9 posted on 09/05/2013 12:31:16 PM PDT by Political Junkie Too (If you are the Posterity of We the People, then you are a Natural Born Citizen.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jack of all Trades

10 posted on 09/05/2013 12:32:12 PM PDT by Uncle Miltie (Are Marines required to salute Al Qaeda yet?)
[ Post Reply | Private Reply | To 2 | View Replies]

To: GeorgeWashingtonsGhost

US telecoms fight claims of illegal spying [Bush wins, case dismissed]
http://www.freerepublic.com/focus/f-news/2264404/posts

Ruling: Telcoms Not Liable for ‘Illegal Spying
Publius’ Forum ^ | 6/04/09 | Warner Todd Huston
http://www.freerepublic.com/focus/f-bloggers/2264552/posts

But back then, spying on Americans was ‘good’.


11 posted on 09/05/2013 12:32:13 PM PDT by TurboZamboni (Marx smelled bad & lived with his parents most his life.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: proxy_user
The usual method used is either to steal the encryption passphrase, or use a passphrase-guessing program. These programs are quite useful if you know a lot about the target.

Not just that, they've also apparently come up with a mechanism for storing encryption keys for commercial encryption technologies, found a way to break SSL and hack into VPNs. This will cause every country in the world to create new encryption technologies -- unbelievably broad leak.

12 posted on 09/05/2013 12:32:34 PM PDT by Alter Kaker (Gravitation is a theory, not a fact. It should be approached with an open mind...)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Political Junkie Too
I think it's like cracking WEP, but not WPA2.

Except WPA2 is already hackable by 13 year old kids, not just the National Security Agency.

13 posted on 09/05/2013 12:34:54 PM PDT by Alter Kaker (Gravitation is a theory, not a fact. It should be approached with an open mind...)
[ Post Reply | Private Reply | To 9 | View Replies]

To: Alter Kaker
Maybe that was a bad comparison.

-PJ

14 posted on 09/05/2013 12:35:58 PM PDT by Political Junkie Too (If you are the Posterity of We the People, then you are a Natural Born Citizen.)
[ Post Reply | Private Reply | To 13 | View Replies]

To: Uncle Miltie
Haven’t stopped a single terrorist attack, by all indications.

Stopping terrorism is only a new priority of theirs -- their original mission is foreign intelligence. And this leak will cause the Russians, the Chinese, the Pakistanis and probably every other country in the world to switch technologies.

15 posted on 09/05/2013 12:36:35 PM PDT by Alter Kaker (Gravitation is a theory, not a fact. It should be approached with an open mind...)
[ Post Reply | Private Reply | To 8 | View Replies]

To: GeronL

Wait until people start getting health insurance premium hikes based on the groceries they bought. Oh, and some stores (I’m looking at you, Target!) are requiring the cashiers to swipe the driver’s license into the cash register for all alcohol purchases. I left the cashier with that bottle of Baringer and bought one at walmart instead.


16 posted on 09/05/2013 12:40:19 PM PDT by Orangedog (An optimist is someone who tells you to 'cheer up' when things are going his way)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Alter Kaker

They are apprently using key-stealing to do this. The algorithms are mathmatically unbreakable, but that doesn’t matter if you swipe the key somehow.

You have to understand how SSL works to understand how this is possible. It is a three-step handshake. The server sends you a signed message, which you verify against the public certificates in your browser’s keystore. You then send it an message encrypted with its public key, and it replies with an encrypted message with a proposed symmetric key. You then accept the symmetric key, and from then on communicate in a symmetric cipher.

Now all the NSA has to have is the server’s private certificate, and it can read the asymmetric traffic and pick up the symmetric key as it is sent. If you have a buddy at Verisign, this is easily done.


17 posted on 09/05/2013 12:40:46 PM PDT by proxy_user
[ Post Reply | Private Reply | To 12 | View Replies]

To: Alter Kaker

Because this leak contained information they weren’t already aware of...

I need to find that article about the 4000+ security risks who work for NSA.
Here we go:

http://news.yahoo.com/report-secret-budget-cited-4-000-nsa-leaks-182750941.html

All this leak does is let the REST of us know that encryption is teetering on the edge of nonusefulness.


18 posted on 09/05/2013 12:40:50 PM PDT by Black Agnes
[ Post Reply | Private Reply | To 15 | View Replies]

To: proxy_user

This is why passwords should not be words but instead ramdom characters, # and if you know how to make special ascii characters even better.


19 posted on 09/05/2013 12:41:33 PM PDT by qman (The communist usurper must go!)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Orangedog

What if you present a US passport rather than a driver’s license?


20 posted on 09/05/2013 12:41:42 PM PDT by proxy_user
[ Post Reply | Private Reply | To 16 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-80 ... 101-107 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson