Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
Editorials & Other Articles
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
General Discussion
In reply to the discussion: A thread for apologies from those who said I was nuts about the NSA [View all]niyad
(132,559 posts)3. here are a couple of articles for those in denial:
Latest Snowden Revelation: NSA Sabotaged Electronic Locks
by Jon Healey
The latest Edward Snowden-powered exposé published by the New York Times, ProPublica and the Guardian is, to me, the most frightening. It reveals that the National Security Agency has moved beyond its historic role as a code-breaker to become a saboteur of the encryption systems. Its work has allegedly weakened the scrambling not just of terrorists' emails but also bank transactions, medical records and communications among coworkers. This undated photo provided by the National Security Agency shows its headquarters in Ft. Meade, Md. (Handout / Getty Images / May 11, 2006)
Here's the money graf:
"The NSA hacked into target computers to snare messages before they were encrypted. And the agency used its influence as the worlds most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world."
. . .
http://www.commondreams.org/view/2013/09/06-2
Published on Friday, September 6, 2013 by Deeplinks Blog
Leaks Show NSA is Working to Undermine Encrypted Communications, Here's How You Can Fight Back
by Eva Galperin and Dan Auerbach
Through covert partnerships with tech companies, the spy agencies have inserted secret vulnerabilities into encryption software. (Photograph: Kacper Pempel/Reuters)In one of the most significant leaks to date regarding National Security Agency (NSA) spying, the New York Times, the Guardian, and ProPublica reported Thursday that the NSA has gone to extraordinary lengths to secretly undermine our secure communications infrastructure, collaborating with GCHQ (Britain's NSA equivalent) and a select few intelligence organizations worldwide.
These frightening revelations imply that the NSA has not only pursued an aggressive program of obtaining private encryption keys for commercial productsallowing the organization to decrypt vast amounts of Internet traffic that use these productsbut that the agency has also attempted to put backdoors into cryptographic standards designed to secure users' communications. Additionally, the leaked documents make clear that companies have been complicit in allowing this unprecedented spying to take place, though the identities of cooperating companies remain unknown.
Many important details about this program, codenamed Bullrun, are still unclear. For example, what communications are targeted? What service providers or software developers are cooperating with the NSA? What percentage of private encryption keys of targeted commercial products are successfully obtained? Does this store of private encryption keys (presumably procured through theft or company cooperation) contain those of popular web-based communication providers like Facebook and Google?
What is clear is that these NSA programs are an egregious violation of our privacy. We can and should enjoy a future where it is still possible to speak privately with fellow citizens, to freely associate and engage in political activism, and to be left alone when we want to be. If the NSA is allowed to continue building backdoors into our communications infrastructure, as law enforecement agencies have lobbied for, then the communications of billions of people risk being perpetually insecure against a variety of adversaries, ranging from foreign governments to criminals to domestic spy agencies, which would have disastrous economic consequences.
. . . .
http://www.commondreams.org/view/2013/09/06-5
. . . .
As joint reporting by ProPublica and the New York Times explains, according to the documents and interviews with industry officials, the NSA has deployed "custom-built, superfast computers to break codes" and began collaborating with "technology companies in the United States and abroad" to build 'backdoor' entry points into their products and introduce weaknesses into their encryption standards.
The records do not identify which specific companies have been working with the NSA to this extent. However, one document does reveal that a GCHQ team has been working to develop ways into encrypted traffic on the "big four" service providers, named as Hotmail, Google, Yahoo and Facebook.
"By deliberately undermining online security in a short-sighted effort to eavesdrop, the NSA is undermining the very fabric of the internet."
. . . . . .
As one of the NSA documents obtained by the news agencies states, the NSA "actively engages US and foreign IT industries to covertly influence and/or overtly leverage their commercial products' designs," and in turn inserts "vulnerabilities into commercial encryption
systems. "US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails," the Guardian reports.
"For the past decade, NSA has lead [sic] an aggressive, multi-pronged effort to break widely used internet encryption technologies," a 2010 GCHQ document states. "Vast amounts of encrypted internet data which have up till now been discarded are now exploitable.
. . .
http://www.commondreams.org/headline/2013/09/05-7
Edit history
Please sign in to view edit histories.
Recommendations
0 members have recommended this reply (displayed in chronological order):
109 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
RecommendedHighlight replies with 5 or more recommendations
A thread for apologies from those who said I was nuts about the NSA [View all]
hootinholler
Sep 2013
OP
All of that s true, but also look at the customized ASIC chips available for bitcoin mining.
AtheistCrusader
Sep 2013
#16
The way you id a partisan loon is as follows: when they wage a war on math
ConservativeDemocrat
Sep 2013
#42
When I was a young pup working at my first real job in the late 60's and early 70's
LiberalArkie
Sep 2013
#14
Good and bad - the NSA harrassed Martin Hellman, but he became friends with Bobby Inman
bananas
Sep 2013
#36
I think you're mixing up hardware based encryption with open source software.
PrestonLocke
Sep 2013
#62
Always remember if it can be encrpted, then the encryption can be decrypted. It is all a game,
Thinkingabout
Sep 2013
#54
can you work faster than high powered computer, why yes, the smart ones at NSA, etc
Thinkingabout
Sep 2013
#68
There is only so much electricity and computing power available, right now.
PrestonLocke
Sep 2013
#69
If the encryption is from their files it will probably be broken in short time, remember they
Thinkingabout
Sep 2013
#88
Uhhh...we are talking about encryption so assume the brute force attack is on that subject.
Gravitycollapse
Sep 2013
#92
Brute force was before the computers, like brute force required to build the pyrmaids so there is a
Thinkingabout
Sep 2013
#96
Okay, so your statements lead me to believe you do not understand a brute force attack.
Gravitycollapse
Sep 2013
#98
If they had a file in which they already know what the file contains and it is encrpyted then the
Thinkingabout
Sep 2013
#99
How would they have the encryption key for files they did not themselves generate?
Gravitycollapse
Sep 2013
#100
They would probably get it by spying and stealing information, that works pretty well.
Thinkingabout
Sep 2013
#101
If the keys are encrypted themselves then that becomes a useless endeavor.
Gravitycollapse
Sep 2013
#103
If a middle level grunt has something an unethical billionaire wants, it will be sold,
GoneFishin
Sep 2013
#57