Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

N.S.A. Foils Much Internet Encryption
New York Times ^ | September 5, 2013 | NICOLE PERLROTH, JEFF LARSON and SCOTT SHANE

Posted on 09/05/2013 12:14:05 PM PDT by Alter Kaker

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.

The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.

Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor.

(Excerpt) Read more at nytimes.com ...


TOPICS: Foreign Affairs; Front Page News; News/Current Events
KEYWORDS: nsa; security; snowden
Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-107 next last
To: Bobalu
Is that REALLY a watermark on that picture?

Steganography must still be a huge problem ...

81 posted on 09/06/2013 5:08:19 AM PDT by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 41 | View Replies]

To: Bobalu
Subtle steganography is a real headache for those looking for secret meaning in masses of data.

So is blatant!


82 posted on 09/06/2013 5:12:23 AM PDT by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 46 | View Replies]

To: Lonesome in Massachussets

‘Twas brillig in the mimsywabe, and...


83 posted on 09/06/2013 5:13:04 AM PDT by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 47 | View Replies]

To: Alter Kaker; Triple; Elsie

http://www.rot13.com/


84 posted on 09/06/2013 5:16:24 AM PDT by Lonesome in Massachussets (Doing the same thing and expecting different results is called software engineering.)
[ Post Reply | Private Reply | To 47 | View Replies]

To: Biggirl
Problem though is to remember all those characters.

Not really. I store mine in PASSWORDS.txt

85 posted on 09/06/2013 5:16:45 AM PDT by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 59 | View Replies]

To: Monty22002

I leave all my secret messages just sitting on the desk.


86 posted on 09/06/2013 5:18:14 AM PDT by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 63 | View Replies]

To: Elsie

I store mine in an encrypted Excel worksheet. Excel is AES protected, so even if someone copied it, they would have their work cut out for them reading it.


87 posted on 09/06/2013 5:20:10 AM PDT by Lonesome in Massachussets (Doing the same thing and expecting different results is called software engineering.)
[ Post Reply | Private Reply | To 85 | View Replies]

To: Alter Kaker
TSA: 'Pay $85 to skip our security checks and get back your dignity'
88 posted on 09/06/2013 5:22:14 AM PDT by Daffynition (Life's short- paddle hard!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Elsie
`Twas brillig, and the slithy toves
Did gyre and gimble in the wabe:
All mimsy were the borogoves,
And the mome raths outgrabe.

89 posted on 09/06/2013 5:22:31 AM PDT by Lonesome in Massachussets (Doing the same thing and expecting different results is called software engineering.)
[ Post Reply | Private Reply | To 83 | View Replies]

To: supercat

Back in the old days, we sent our secret stuff by teletype to Langley.

We had a one-time roll of random(?) stuff on one tape, and our data on another. We exclusiveored the two tapes together and sent the message.

Back at headquarters they had the same tape as we did.

When they received our encrypted data, they exclusiveored their tape against it, and the clear data then reappeared.

I know that we destroyed our encryption tape, and assume they did the same at their end.


90 posted on 09/06/2013 5:24:44 AM PDT by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 68 | View Replies]

To: Triple

Good!


91 posted on 09/06/2013 5:27:21 AM PDT by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 75 | View Replies]

To: Orangedog
You still use gas? Shame on you!


92 posted on 09/06/2013 5:27:38 AM PDT by Daffynition (Life's short- paddle hard!)
[ Post Reply | Private Reply | To 43 | View Replies]

To: qman

In this S3ntAnc3 which word is my password?

Design a filter to capture passwords out of bit stream....

Require passwords to be certian way.

Just S4yin.


93 posted on 09/06/2013 5:28:21 AM PDT by CJ Wolf
[ Post Reply | Private Reply | To 19 | View Replies]

To: donmeaker

Safes are easier to crack, since the numbers are a bit sloppy in execution. The mechanical precision allows one to merely get close to the number needed.

http://www.wikihow.com/Crack-a-%22Master-Lock%22-Combination-Lock


94 posted on 09/06/2013 5:31:50 AM PDT by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 79 | View Replies]

To: Daffynition
EXTORTION!
95 posted on 09/06/2013 5:33:17 AM PDT by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 88 | View Replies]

To: supercat

Are you aware of public key encryption? Public key algorithms, unlike symmetric key algorithms, do not require a secure initial exchange of one (or more) secret keys between the parties.

The Venona decrypts were the result of “sometime” (as opposed to one-time) pads used by the Soviet Embassy in Washington. Soviet “sometime” pads consisted of books containing pages and pages of keys. Ideally, every page was unique and random. Under wartime production pressure, some pages were simply copies of pages in other books. American cryptographers noticed unlikely “collisions” (coincidences) in the headings of certain messages, and were able to deduce that the same “one time” pad had been used to “encrypt” the two or more messages. With this realization, it was apparent that searching for further coincidences would bear fruit, which, indeed, it did.


96 posted on 09/06/2013 5:33:28 AM PDT by Lonesome in Massachussets (Doing the same thing and expecting different results is called software engineering.)
[ Post Reply | Private Reply | To 68 | View Replies]

To: Lonesome in Massachussets
 

'When I use a word,' Humpty Dumpty said, in a rather scornful tone,
' it means just what I choose it to mean, neither more nor less.'

'The question is,' said Alice, 'whether you can make words mean so many different things.'

'The question is,' said Humpty Dumpty, 'which is to be master - that's all.'  


97 posted on 09/06/2013 5:34:13 AM PDT by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 89 | View Replies]

To: 1010RD
Government schools have raised pro-government drones.

The Ministry of Truth, Winston's place of work, contained, it was said, three thousand rooms above ground level, and corresponding ramifications below.

98 posted on 09/06/2013 5:36:50 AM PDT by Elsie (Heck is where people, who don't believe in Gosh, think they are not going...)
[ Post Reply | Private Reply | To 24 | View Replies]

To: Elsie

It costs $85.

99 posted on 09/06/2013 5:37:58 AM PDT by Daffynition (Life's short- paddle hard!)
[ Post Reply | Private Reply | To 95 | View Replies]

To: null and void

There are some silver linings, but honestly, for a bulk of “secure” Internet traffic, they know.

Buy a copy of Matt Bracken’s latest book Castigo Cay on Amazon? They know.

Buy a few crates of milsurp ammo on CTD? They know.

Buying survival supplied from Cabelas? They know.

It was revealed a month or so ago that they were very obviously collecting unsecured Internet traffic (i.e. FreeRepublic), but now the cat’s out of the bag and the revelation is that they’re collecting all traffic, regardless of security, and are able to decrypt it thanks to back doors peppered into the protocols.

We could all go the route of symmetric cryptography vs. PKI, but I don’t think it’ll make a lick of difference any more. They’re likely recruiting mathematical mensches straight out of college to put them to work on algorithmic decryption across the board.

Some idiot was saying, “Oh, well at least it’s the ‘good guys’ with the keys and not someone like China or Iran.”

Really? People have zero concept of liberty. There will come a time, very soon I believe, when we will be unable to live from when we wake to when we bed without our every breath being surveilled, watched, monitored, cataloged, and databased. “Going dark” will literally mean nothing.

Unless you completely eschew technology in all of its forms, they’ll have a way to watch you. No phones, no television, no computers. Hell, you can’t even read books without either buying them, which is tracked, or borrowing them from a library, which is tracked. There’s almost nothing in our day-to-day lives that can’t be monitored. I would challenge anyone to come up with an activity that can’t be directly monitored by some government agency.


100 posted on 09/06/2013 5:47:06 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 71 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-107 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson