Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

N.S.A. Foils Much Internet Encryption
New York Times ^ | September 5, 2013 | NICOLE PERLROTH, JEFF LARSON and SCOTT SHANE

Posted on 09/05/2013 12:14:05 PM PDT by Alter Kaker

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.

The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.

Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor.

(Excerpt) Read more at nytimes.com ...


TOPICS: Foreign Affairs; Front Page News; News/Current Events
KEYWORDS: nsa; security; snowden
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-107 next last
To: Orangedog

Use cash at a small business.

Their videotapes aren’t recorded and stored forever in some central database in NW Arkansas...


21 posted on 09/05/2013 12:42:10 PM PDT by Black Agnes
[ Post Reply | Private Reply | To 16 | View Replies]

To: rarestia

ping


22 posted on 09/05/2013 12:46:10 PM PDT by null and void (I'm betting on an Obama Trifecta: A Nobel Peace Prize, an Impeachment, AND a War Crimes Trial...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: qman

What the password-guessing program does is take your personal information, like birthdays, phone numbers, street address, girlfriends and combines it into various strong passwords that you might have used.

For example, if you are Joe Blow of 486 Main Street, Anytown, Illinois 60823, and you girlfriend is Doris and you dog is Spike, it will try stuff like

doris60823spike
spike486doris
illiniDoris60823spike

...and so on. It can do thousands of combinations a second. They get hits about 25-30% of the time.


23 posted on 09/05/2013 12:47:12 PM PDT by proxy_user
[ Post Reply | Private Reply | To 19 | View Replies]

To: GeronL

I was speaking to some twenty-somethings about the NSA spying and they were nonplussed about the whole thing. It’s terrible. Government schools have raised pro-government drones.


24 posted on 09/05/2013 12:50:10 PM PDT by 1010RD (First, Do No Harm)
[ Post Reply | Private Reply | To 6 | View Replies]

To: TurboZamboni

Yep, we’ve forgotten that when the come for X, eventually they come for you.


25 posted on 09/05/2013 12:51:19 PM PDT by 1010RD (First, Do No Harm)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Alter Kaker
unbelievably broad leak.

UNBELIEVABLE YES

Perhaps Mr Snowden is not what he appears to be?

26 posted on 09/05/2013 12:51:33 PM PDT by DUMBGRUNT
[ Post Reply | Private Reply | To 12 | View Replies]

To: 1010RD

Yep. They have created a generation of mindless sheeple


27 posted on 09/05/2013 12:51:37 PM PDT by GeronL
[ Post Reply | Private Reply | To 24 | View Replies]

To: Alter Kaker
So NSA deliberately interfered with encryption standards so that it could create backdoors for itself?

Great. Just great!

28 posted on 09/05/2013 12:58:14 PM PDT by Timber Rattler (Just say NO! to RINOS and the GOP-E)
[ Post Reply | Private Reply | To 1 | View Replies]

To: proxy_user
I use passages from The Declaration of Independence or The Constitution. Nobody working for the fed has a clue where to look.
29 posted on 09/05/2013 1:07:14 PM PDT by kitchen (Make plans and prepare. You'll never have trouble if you're ready for it. - TR)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Alter Kaker

FWIW my credit union just called and said Visa had notified them my debit card was on a list that had been hacked. But nothing appears to be missing. And they are sending me a new card.


30 posted on 09/05/2013 1:07:16 PM PDT by bigheadfred (INFIDEL)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Alter Kaker

We need to shut this shit down or we are slaves, and our futures is the ovens.


31 posted on 09/05/2013 1:15:43 PM PDT by LowTaxesEqualsProsperity
[ Post Reply | Private Reply | To 1 | View Replies]

To: kitchen

Well, they do now!


32 posted on 09/05/2013 1:16:24 PM PDT by proxy_user
[ Post Reply | Private Reply | To 29 | View Replies]

To: Alter Kaker

Any encryption scheme merely delays and increases the effort needed to read a message. That should be well understood by anyone who uses any encryption scheme. In some ways encryption makes your communications more vulnerable as attention tends to be focused on encrypted messages, rather than the vast number of clear text messages.

Of course the best way to keep your message safe is to use a one time use code, not a repeated cipher.

The other thing that protects your messages is the provision of vast amounts of false information with similar cipher techniques to those used with your true information. To work best, this is done with a plan as to the false ideas you want your enemy to think is true, and the true ideas you want your enemy not to know.

During WWII Germany tried to present an image of great strength, so enemies would be discouraged. They sought to plant the notion that they were manufacturing 1400 tanks a month.

Analysis of a few captured tanks in north Africa put the lie to that. The serial numbers were collected and seemed to all be very close together. Analysis of castings showed that the parts came from a small number of masters, and that put an upper limit on the rate of manufacture.

For people who seek to look behind the lies disseminated by propagandists, there is a good Wikipedia article on “The German Tank Problem”.


33 posted on 09/05/2013 1:16:38 PM PDT by donmeaker (Blunderbuss: A short weapon, ... now superceded in civilized countries by more advanced weaponry.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LowTaxesEqualsProsperity

At least we have one section of the government that listens to us!


34 posted on 09/05/2013 1:17:13 PM PDT by donmeaker (Blunderbuss: A short weapon, ... now superceded in civilized countries by more advanced weaponry.)
[ Post Reply | Private Reply | To 31 | View Replies]

To: Alter Kaker; All

To all Freepers; Get some kind of encryption software for your email. Send 50 emails a day with a single message: “Drink more Ovaltine.”


35 posted on 09/05/2013 1:17:49 PM PDT by TangoLimaSierra (To the left the truth looks like Right-Wing extremism.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: proxy_user

I’m going to use those three passwords next time some stoopid site wants one:)


36 posted on 09/05/2013 1:33:47 PM PDT by Cold Heart
[ Post Reply | Private Reply | To 23 | View Replies]

To: Alter Kaker

It’s always been a race, someone comes up with a way of protecting something and then someone that wants that comes up with a way to crack that protection. The NSA has been doing what governments always do which is to constantly seek power and advantage. SSL and VPN’s are mostly based on public key cryptography that is old and in dire need of replacement and has been known to be vulnerable for some time. Even the newer public key algorithms are not anywhere near as good as AES so don’t expect any of them to provide protection against any government because they won’t.

The distressing thing is not that we are vulnerable but that the USG has bought and paid for so many technology companies and service providers that the encryption methods have become moot because they are using back doors to suck up everything before the data hits any encryption device. We’ve been sold out by Facebook, Goggle, Yahoo, Microsoft, Verizon, AT&T, etc.

Snowden did tremendous damage to our countries ability to suck up foreign intelligence and more than likely a lot of damage to the US economy long term as I see most countries moving away from US based suppliers and more towards either open source or suppliers from second and third world (read not China, Russia, UK, etc.). If I was a non-US based company or country I’d certainly be shopping elsewhere now and would imagine that a lot of them are scrambling to do just that.


37 posted on 09/05/2013 1:37:47 PM PDT by trapped_in_LA
[ Post Reply | Private Reply | To 1 | View Replies]

To: Jack of all Trades

“And what they can’t break, they record until they can.”

AAMTD SFSF SH%G)E DFWERJPA-id
%&HTJLS: PM. @! RTB..?Q


38 posted on 09/05/2013 1:40:48 PM PDT by The Antiyuppie ("When small men cast long shadows, then it is very late in the day.")
[ Post Reply | Private Reply | To 2 | View Replies]

To: Alter Kaker

How does a decrypter know it has been successful? How does it know the difference between gibberish and clear text? It’s a computer program and doesn’t understand anything. Does it look for words like “the” and “bomb”?
Don’t real terrorists use words like “the” and “Package”? Wouldn’t it write in code, like “Aunt Susie is going to deliver the package to New York”
And anyway, why would a true terrorist write in English?

In other words, if the decrypter doesn’t know what it’s looking for, what does it look for?

I would like to know. Not being flippant, for a change.


39 posted on 09/05/2013 1:44:53 PM PDT by I want the USA back
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cold Heart

I use FUB0. They still don’t get it.


40 posted on 09/05/2013 1:47:41 PM PDT by unixfox (Abolish Slavery, Repeal the 16th Amendment)
[ Post Reply | Private Reply | To 36 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-80 ... 101-107 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson