MercoPress, en Español

Montevideo, May 1st 2024 - 19:09 UTC

 

 

US and UK intelligence cracked encryption codes and security protocols, claims Snowden

Monday, September 9th 2013 - 01:45 UTC
Full article 27 comments
Leaker Snowden continues to reveal secrets Leaker Snowden continues to reveal secrets
UK Government Communications Headquarters in Cheltenham UK Government Communications Headquarters in Cheltenham

US and UK intelligence have reportedly cracked the encryption codes protecting the emails, banking and medical records of hundreds of millions of people. Disclosures by leaker Edward Snowden allege the US National Security Agency (NSA) and the UK's GCHQ successfully decoded key online security protocols.

They suggest some internet companies provided the agencies backdoor access to their security systems. The NSA is said to spend 250m dollars a year on the top-secret operation.

It is codenamed Bullrun, an American civil-war battle, according to the documents published by the Guardian in conjunction with the New York Times and ProPublica.

The British counterpart scheme run by GCHQ is called Edgehill, after the first major engagement of the English civil war, say the documents.

The reports say the UK and US intelligence agencies are focusing on the encryption used in 4G smart-phones, email, online shopping and remote business communication networks.

The encryption techniques are used by internet services such as Google, Facebook and Yahoo.

Under Bullrun, it is said that the NSA has built powerful supercomputers to try to crack the technology that scrambles and encrypts personal information when internet users log on to access various services.

The NSA also collaborated with unnamed technology companies to build so-called back doors into their software - something that would give the government access to information before it is encrypted and sent over the internet, it is reported.

As well as supercomputers, methods used include “technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications”, the New York Times reports.

The US reportedly began investing billions of dollars in the operation in 2000 after its initial efforts to install a “back door” in all encryption systems were thwarted.

During the next decade, it is said the NSA employed code-breaking computers and began collaborating with technology companies at home and abroad to build entry points into their products.

The documents provided to the Guardian by Mr Snowden do not specify which companies participated.

The NSA also hacked into computers to capture messages prior to encryption, and used broad influence to introduce weaknesses into encryption standards followed by software developers the world over, the New York Times reports.

When British analysts were first told of the extent of the scheme they were “gobsmacked”, according to one memo among more than 50,000 documents shared by the Guardian.

NSA officials continue to defend the agency's actions, claiming it will put the US at considerable risk if messages from terrorists and spies cannot be deciphered.

But some experts argue that such efforts could actually undermine national security, noting that any back doors inserted into encryption programs can be exploited by those outside the government.

It is the latest in a series of intelligence leaks by Mr Snowden, a former NSA contractor, who began providing caches of sensitive government documents to media outlets three months ago.

In June, the 30-year-old fled his home in Hawaii, where he worked at a small NSA installation, to Hong Kong, and subsequently to Russia after making revelations about a secret US data-gathering programme.

A US federal court has since filed espionage charges against Mr Snowden and is seeking his extradition. Snowden, however, remains in Russia where he has been granted temporary asylum.
 

Categories: Politics, International.

Top Comments

Disclaimer & comment rules
  • Gordo1

    To the vast majority of people on this planet this is a NON story. Those of us who use cyber space for honest and legitimate purposes should not worry about this allegations - I certainly don't!

    Sep 09th, 2013 - 03:41 am 0
  • lsolde

    Well, l don't think they'd find my mail very interesting.
    1) stock market results
    2) ordering parts etc
    3) gardening tips
    4) greetings to extended family
    Not much earth-shattering there.

    Sep 09th, 2013 - 04:49 am 0
  • Conqueror

    I don't understand the problem. For example, in 1917 British Intelligence intercepted and decoded what came to be known as the “Zimmermann Telegram”. There's a picture of it in Wikipedia. It's on Western Union paper. The “message” consists of obvious code groups. It was a proposal from the Foreign Secretary of the German Empire for Mexico to join the war on the side of the Central Powers, e.g. Germany. There were “inducements” such as funding and territories in Texas, New Mexico and Arizona. It was sent just prior to the resumption of unrestricted submarine warfare and was obviously intended to split any U.S. war effort. And the interception and decoding was wrong? In this day and age, the jihadists and loonies get everywhere. So with its lovely close links with places like Iran, latam is a good place from which to direct terrorist activity. A lot of latam hates “the West” anyway and would love to see Europeans and North Americans killed, wounded, maimed. It's not as though many of them haven't done their own killing and maiming. Not to mention one-way “sightseeing” flights to the middle of the Rio de la Plata. Anyone think the NSA or GCHQ is interested in the sort of stuff Isolde mentions? So they will be looking for particular words. Can't say what those words might be. Wouldn't want to give info to argie terrorists!

    Sep 09th, 2013 - 05:27 am 0
Read all comments

Commenting for this story is now closed.
If you have a Facebook account, become a fan and comment on our Facebook Page!