Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News Editorials & Other Articles General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

niyad

(132,559 posts)
3. here are a couple of articles for those in denial:
Fri Sep 6, 2013, 10:16 AM
Sep 2013

Latest Snowden Revelation: NSA Sabotaged Electronic Locks
by Jon Healey

The latest Edward Snowden-powered exposé published by the New York Times, ProPublica and the Guardian is, to me, the most frightening. It reveals that the National Security Agency has moved beyond its historic role as a code-breaker to become a saboteur of the encryption systems. Its work has allegedly weakened the scrambling not just of terrorists' emails but also bank transactions, medical records and communications among coworkers. This undated photo provided by the National Security Agency shows its headquarters in Ft. Meade, Md. (Handout / Getty Images / May 11, 2006)

Here's the money graf:

"The NSA hacked into target computers to snare messages before they were encrypted. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world."
. . .

http://www.commondreams.org/view/2013/09/06-2


Published on Friday, September 6, 2013 by Deeplinks Blog
Leaks Show NSA is Working to Undermine Encrypted Communications, Here's How You Can Fight Back
by Eva Galperin and Dan Auerbach

Through covert partnerships with tech companies, the spy agencies have inserted secret vulnerabilities into encryption software. (Photograph: Kacper Pempel/Reuters)In one of the most significant leaks to date regarding National Security Agency (NSA) spying, the New York Times, the Guardian, and ProPublica reported Thursday that the NSA has gone to extraordinary lengths to secretly undermine our secure communications infrastructure, collaborating with GCHQ (Britain's NSA equivalent) and a select few intelligence organizations worldwide.

These frightening revelations imply that the NSA has not only pursued an aggressive program of obtaining private encryption keys for commercial products—allowing the organization to decrypt vast amounts of Internet traffic that use these products—but that the agency has also attempted to put backdoors into cryptographic standards designed to secure users' communications. Additionally, the leaked documents make clear that companies have been complicit in allowing this unprecedented spying to take place, though the identities of cooperating companies remain unknown.

Many important details about this program, codenamed Bullrun, are still unclear. For example, what communications are targeted? What service providers or software developers are cooperating with the NSA? What percentage of private encryption keys of targeted commercial products are successfully obtained? Does this store of private encryption keys (presumably procured through theft or company cooperation) contain those of popular web-based communication providers like Facebook and Google?

What is clear is that these NSA programs are an egregious violation of our privacy. We can and should enjoy a future where it is still possible to speak privately with fellow citizens, to freely associate and engage in political activism, and to be left alone when we want to be. If the NSA is allowed to continue building backdoors into our communications infrastructure, as law enforecement agencies have lobbied for, then the communications of billions of people risk being perpetually insecure against a variety of adversaries, ranging from foreign governments to criminals to domestic spy agencies, which would have disastrous economic consequences.

. . . .

http://www.commondreams.org/view/2013/09/06-5



. . . .

As joint reporting by ProPublica and the New York Times explains, according to the documents and interviews with industry officials, the NSA has deployed "custom-built, superfast computers to break codes" and began collaborating with "technology companies in the United States and abroad" to build 'backdoor' entry points into their products and introduce weaknesses into their encryption standards.

The records do not identify which specific companies have been working with the NSA to this extent. However, one document does reveal that a GCHQ team has been working to develop ways into encrypted traffic on the "big four" service providers, named as Hotmail, Google, Yahoo and Facebook.
"By deliberately undermining online security in a short-sighted effort to eavesdrop, the NSA is undermining the very fabric of the internet."
. . . . . .

As one of the NSA documents obtained by the news agencies states, the NSA "actively engages US and foreign IT industries to covertly influence and/or overtly leverage their commercial products' designs," and in turn inserts "vulnerabilities into commercial encryption
systems. "US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the privacy of their personal data, online transactions and emails," the Guardian reports.

"For the past decade, NSA has lead [sic] an aggressive, multi-pronged effort to break widely used internet encryption technologies," a 2010 GCHQ document states. "Vast amounts of encrypted internet data which have up till now been discarded are now exploitable.

. . .

http://www.commondreams.org/headline/2013/09/05-7

Recommendations

0 members have recommended this reply (displayed in chronological order):

The NSA has been key in developing encryption and security methods. MineralMan Sep 2013 #1
The NSA did the math, not the implementation. hootinholler Sep 2013 #2
Not exactly. The NSA is involved totally in cryptology research MineralMan Sep 2013 #5
All of that s true, but also look at the customized ASIC chips available for bitcoin mining. AtheistCrusader Sep 2013 #16
Frankly, I don't know their exact capabilities, and I'm not a MineralMan Sep 2013 #52
Do you have a cite for that? joshcryer Sep 2013 #26
For what? The NSA developing algorithms and the math behind AES? hootinholler Sep 2013 #27
And this confirmation you speak of Hutzpa Sep 2013 #41
You do deserve apologies, but I don't think you'll be getting any. sabrina 1 Sep 2013 #43
CPU rewrite discussion hueymahl Sep 2013 #46
Thanks for that. n/t hootinholler Sep 2013 #109
here are a couple of articles for those in denial: niyad Sep 2013 #3
Sorry. No apology. longship Sep 2013 #4
No back doors? AtheistCrusader Sep 2013 #17
My main box is Gentoo Linux. longship Sep 2013 #19
A back door need not be obvious. AtheistCrusader Sep 2013 #20
Sounds to me you are probably looking for an answer yourself. nt Hutzpa Sep 2013 #25
I am aware of that, too. longship Sep 2013 #30
I think it's fair to say that the security is suspect hootinholler Sep 2013 #34
Well, I know the math and the tech. longship Sep 2013 #45
Perhaps we are at odds over terminology? hootinholler Sep 2013 #58
Okay, I see where you're going. longship Sep 2013 #61
Claiming that you are a hardware engineer Aerows Sep 2013 #78
Who claimed they were a hardware engineer? longship Sep 2013 #82
Thank heaven you didn't Aerows Sep 2013 #83
This message was self-deleted by its author guyton Sep 2013 #33
And like all such exploits, it was discovered and fixed. longship Sep 2013 #49
This message was self-deleted by its author guyton Sep 2013 #73
Your post brought a smile. Good one. longship Sep 2013 #75
Even Theo & company missed that one, IIRC Recursion Sep 2013 #64
I'd prefer Aerows Sep 2013 #80
Were you around then? hootinholler Sep 2013 #97
+ 1000 Hutzpa Sep 2013 #24
Fucking typical hootinholler Sep 2013 #28
Awww Did I hurt your feelings Hutzpa Sep 2013 #37
This is why you are wasting your time waiting for an apology. Rex Sep 2013 #39
The way you id a partisan loon is as follows: when they wage a war on math ConservativeDemocrat Sep 2013 #42
I certainly never though you were nuts Aerows Sep 2013 #6
I don't have time to read all the articles but isn't this a case of Luminous Animal Sep 2013 #10
They undoubtably use multiple strategies. AtheistCrusader Sep 2013 #21
Alice's problem is always Bob Recursion Sep 2013 #65
You have moved back in the last days Aerows Sep 2013 #70
is still insane to say AES is broken Recursion Sep 2013 #107
There is no doubt PrestonLocke Sep 2013 #67
The people that creep into these threads and attempt to sound like rational Aerows Sep 2013 #71
Sorry if you misunderstood. PrestonLocke Sep 2013 #76
Well Aerows Sep 2013 #77
More money does not always equal best PrestonLocke Sep 2013 #85
Can you elaborate? DanTex Sep 2013 #81
Yes and yes PrestonLocke Sep 2013 #91
That passage is regarding commercial vendors. DanTex Sep 2013 #93
I agree PrestonLocke Sep 2013 #94
Rec and kick-- felix_numinous Sep 2013 #7
rec'd for beer and travel money. progressoid Sep 2013 #8
+1 Matariki Sep 2013 #79
sneaking a backdoor into commercial encryption programs yodermon Sep 2013 #9
Point taken... hootinholler Sep 2013 #11
Good luck with the apology Cryptoad Sep 2013 #12
+1 on that ! lunasun Sep 2013 #15
Also the phone system Rumold Sep 2013 #18
voice calls Cryptoad Sep 2013 #53
any Random Thoughts reference will always get a K&R from me corkhead Sep 2013 #13
+1 nolabear Sep 2013 #29
When I was a young pup working at my first real job in the late 60's and early 70's LiberalArkie Sep 2013 #14
Based on what I've found Hydra Sep 2013 #23
I blame Darth the dick Cheney and His cronies Demeter Sep 2013 #31
Cheney and his cadre are certainly part of the problem Hydra Sep 2013 #55
I think there are good guys at the NSA. For example: Richard Clarke avaistheone1 Sep 2013 #35
Good and bad - the NSA harrassed Martin Hellman, but he became friends with Bobby Inman bananas Sep 2013 #36
No need for me to apologize. zeemike Sep 2013 #22
I apologize for those who refuse to see or admit the possibilities Demeter Sep 2013 #32
I agrree with your first statement, truedelphi Sep 2013 #106
Ego much? n/t PasadenaTrudy Sep 2013 #38
No apologies... devils chaplain Sep 2013 #40
Yeah, there knowledge is based on using softwares Hutzpa Sep 2013 #44
people need to understand that uncrackable encryption still exists... devils chaplain Sep 2013 #48
Could not agree more, my friend! PrestonLocke Sep 2013 #47
There's this thing called Linux... ;) devils chaplain Sep 2013 #50
And who wrote the compiler? You have its source, too? MineralMan Sep 2013 #59
I think you're mixing up hardware based encryption with open source software. PrestonLocke Sep 2013 #62
The compiler was written by Richard Stallman. Here's the source. DanTex Sep 2013 #72
As a newbie, I would have said you were nutz. Clown is Down Sep 2013 #51
Always remember if it can be encrpted, then the encryption can be decrypted. It is all a game, Thinkingabout Sep 2013 #54
Yes, but can the data be decrypted in a reasonable amount of time? PrestonLocke Sep 2013 #63
can you work faster than high powered computer, why yes, the smart ones at NSA, etc Thinkingabout Sep 2013 #68
There is only so much electricity and computing power available, right now. PrestonLocke Sep 2013 #69
Time will tell, I will bet on the code being broken. Thinkingabout Sep 2013 #86
It's a matter of physical laws, not NSA black magic... Gravitycollapse Sep 2013 #84
Hey, you never know PrestonLocke Sep 2013 #87
If the encryption is from their files it will probably be broken in short time, remember they Thinkingabout Sep 2013 #88
Do you understanding the premise of the brute force attack? Gravitycollapse Sep 2013 #89
Regarding what subject, brute force attack applies to many things. Thinkingabout Sep 2013 #90
Uhhh...we are talking about encryption so assume the brute force attack is on that subject. Gravitycollapse Sep 2013 #92
Brute force was before the computers, like brute force required to build the pyrmaids so there is a Thinkingabout Sep 2013 #96
Okay, so your statements lead me to believe you do not understand a brute force attack. Gravitycollapse Sep 2013 #98
If they had a file in which they already know what the file contains and it is encrpyted then the Thinkingabout Sep 2013 #99
How would they have the encryption key for files they did not themselves generate? Gravitycollapse Sep 2013 #100
They would probably get it by spying and stealing information, that works pretty well. Thinkingabout Sep 2013 #101
If the keys are encrypted themselves then that becomes a useless endeavor. Gravitycollapse Sep 2013 #103
Never say never, just watch. Thinkingabout Sep 2013 #104
Your argument is essentially ludicrous. Gravitycollapse Sep 2013 #105
omg someone was right on the Internet Enrique Sep 2013 #56
If a middle level grunt has something an unethical billionaire wants, it will be sold, GoneFishin Sep 2013 #57
Good luck with that Blue_Tires Sep 2013 #60
Interesting article... bobGandolf Sep 2013 #66
What's the NSA? Vashta Nerada Sep 2013 #74
^^^ +1000 alittlelark Sep 2013 #102
yeah...I remember that...and I'm not a techie. But, your posts were always KoKo Sep 2013 #95
K&R woo me with science Sep 2013 #108
Latest Discussions»General Discussion»A thread for apologies fr...»Reply #3