Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

N.S.A. Able to Foil Basic Safeguards of Privacy on Web
The New York Times ^ | September 6, 2013 | NICOLE PERLROTH, JEFF LARSON and SCOTT SHANE

Posted on 09/06/2013 2:20:42 AM PDT by FewsOrange

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.

The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.

Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor.

Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth.

The agency, according to the documents and interviews with industry officials, deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products. The documents do not identify which companies have participated.

The N.S.A. hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys...

(Excerpt) Read more at nytimes.com ...


TOPICS: Government; News/Current Events
KEYWORDS: dnccorruption; notransparency; nsarico; nsatransparency

1 posted on 09/06/2013 2:20:42 AM PDT by FewsOrange
[ Post Reply | Private Reply | View Replies]

>> Cracking the code...

With a 286 it would take hundreds of years...

I already assumed typical asymmetrical was crackable if by brute force, but I guess there’s more complex stuff; stuff that has a limited user base not concerning the average Joe.

I admire the mathematics and those that pursue it.


2 posted on 09/06/2013 2:43:53 AM PDT by Gene Eric (Don't be a statist!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: FewsOrange

legally there is no privacy in public.


3 posted on 09/06/2013 3:52:28 AM PDT by donmeaker (Blunderbuss: A short weapon, ... now superceded in civilized countries by more advanced weaponry.)
[ Post Reply | Private Reply | To 1 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson