MyNews24 is a user-generated section of The stories here come from users.

Chris Pentago
Comments: 2
Article views: 707
Latest Badges:

View all Chris Pentago's badges.

NSA Supercomputers Crack a Variety of Common Encryption Technologies

01 October 2013, 07:01

Recent revelations regarding the long-standing efforts of the National Security Agency to basically infiltrate even the most airtight encryption technologies has done nothing but reinforce the idea that our private digital data, no matter how theoretically “secure” it may appear to be, is never beyond the reach of the federal government.

As described in a plethora of top secret documents supplied by former NSA contractor and fugitive whistleblower Edward Snowden, the NSA has spent the better part of a decade (and billions of dollars) in an all-out war on encryption (a.k.a. “digital scrambling”), targeting popular data-protection technologies such as HTTPS, SSL and VPN, among others.

As these newly disclosed documents reveal, the NSA has been able to crack or circumvent a large part of the encryption technologies that protect sensitive online information such as medical records, proprietary trade secrets, banking systems, and e-commerce transactions. Various encryption technologies such as SSL and HTTPS are commonly used to protect private email accounts, Internet chats, Web searches, and online credit card purchases from prying eyes, but the NSA’s cryptanalysis efforts (utilizing elaborate supercomputers) have managed to bypass practically all of the major security protocols that exist today.

One recently revealed 2010 memo addressed to GCHQ (the British equivalent of the NSA) reads “For the past decade, N.S.A. has led an aggressive, multi-pronged effort to break widely used Internet encryption technologies.” This memo highlighted the accomplishments of a project codenamed “Bullrun”, a joint effort between the NSA and GCHQ.

Although the average lay-person may assume that these types of exploitation capabilities should be commonplace to the NSA, the opposite is actually true: Modern encryption technologies are highly complex, and many skeptics in the cryptanalysis community doubted that the NSA had already reached this level of sophistication. In a separate memo, British cryptanalysis experts working for GCHQ were reportedly surprised—the document reads “gobsmacked”—upon learning about the advances that the NSA had made in its penetration abilities.

As early as the year 2000, the NSA embarked on a multibillion-dollar clandestine initiative to standardize the practice of inserting a “back door” (i.e., a means by which to eavesdrop on data transmissions) into all encryption technologies.

This effort included attempts to collaborate with various technology companies in the US and overseas in order to build pre-made entry points into their product offerings. According to The Guardian, one of the most well-known examples of this is the recent revelation that Microsoft cooperated with government officials to grant access to pre-encrypted Skype calls, SkyDrive files and Outlook emails.

This carte blanche treatment was granted as part of a “top-secret NSA program known as Prism, in which other prominent Internet companies such as Yahoo, Facebook and Apple were also required to fork over sensitive data to intelligence officials. Many companies say that it wasn’t so much a “collaborative” effort with the NSA as it was a “coercion”, claiming that they were pressured into either building the back doors into their systems or handing over their master encryption keys to the government.

Interestingly enough, classified NSA documents have revealed that even when companies were not so willing to hand over their sensitive data, NSA agents would simply hack into their systems and steal their encryption keys.

Other business owners have had to take extreme measures in order to protect the privacy of their customers. Ladar Levison, owner of the popular encrypted email service Lavabit (which Edward Snowden used), opted to shut his entire business down on August 8th after refusing to acquiesce to the NSA’s demands to grant access to customer emails.

In an open letter to his clients, Levison wrote “I have been forced to make a difficult decision: To become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit.”

Another prominent communications company, Silent Circle, recently had toshutter its encrypted email service due to security concerns.

In an interview with ZDNet’s David Gewirtz, Silent Circle CEO Michael Janke cited email metadata as being a major risk to customer privacy.

According to Janke, metadata such as message headers, ISP, operating system, the recipient’s email address, etc. are “all very dangerous bits of data to retain” when trying to keep your communications secure.

Recent intelligence budget documents reveal that the NSA shows no signs of slowing down its efforts to develop its decryption capabilities, citing the need to “defeat adversarial cryptography”.

Amid public outrage regarding the violation of basic civil liberties, the patent answer from the spy agency is that it is only using its powers for good in its fight against global terrorism. Many people, however, criticize this type of response as somewhat dismissive and aimed at appeasing the naive members of the populace.

Well-known actor and all-around activist Stephen Fry has recently joined in the efforts to end NSA spying, stating that “Privacy and freedom from intrusion are important for everyone. You can’t just scream 'terrorism’ and use it as an excuse for Orwellian snooping“.

Other critics contend that the NSA’s efforts to increase widespread surveillance in the name of anti-terrorism are actually counter-productive, citing the fact that if “back door” exploits are built into existing encryption systems, the NSA won’t be the only agency to attempt to use them. The NSA, on the other hand, sees these types of built-in exploits as essential, claiming that the need to be able to proficiently decrypt information will keep them on par with other intelligence superpowers such as China and Russia.

The U.S. government repeatedly requested for news agencies not to report on Project Bullrun, stating that it could cause enemies of the state to alter their communication methods, hindering US security efforts. Other concerns that have emerged include the risks to the financial well-being of the US technology products and services sector.

If products like encryption software or services like cloud computing are known to carry “back door” exploits that can easily render their security features ineffective, it could negatively impact technology sales as a whole.

Rob Enderle, a San Jose-based technology analyst, issued a scathing rebuke of the NSA’s policies, stating in an interview that “The National Security Agency will kill the U.S. technology industry singlehandedly.”

Staggering fact, recently discovered, is what Ninefold, Australian cloud services provider stated in their warning that even US companies abroad are subject toPatriot Act, law which allows US government to access their servers not located on US soil. They named Amazon Australia as an example of one such entity.

Having in mind that big US cloud companies have their offices/servers in bunch of foreign countries this should raise a lot of eyebrows an make us ask ourselves right questions.

Although there are strong voices on both sides of the fence, one thing is for certain: The NSA domestic spying scandal will no doubt change the landscape of technology and the Internet in the decades to come.

At this point, where we will all end up after the dust settles is anyone’s guess.

Disclaimer: All articles and letters published on MyNews24 have been independently written by members of News24's community. The views of users published on News24 are therefore their own and do not necessarily represent the views of News24. News24 editors also reserve the right to edit or delete any and all comments received.

Read News24’s Comments Policy publishes all comments posted on articles provided that they adhere to our Comments Policy. Should you wish to report a comment for editorial review, please do so by clicking the 'Report Comment' button to the right of each comment.

Comment on this story
Add your comment
Comment 0 characters remaining

Read more from our Users

Submitted by
Terrylin Backpackers
The cheque is in the post

"I hear you are in bond collections. What are the latest excuses people are coming up with these days? I've run out of ideas." Read more...

10 comments 3542 views
Submitted by
News in the digital age

How do you think that spreading your hate/bigotry and or intolerance helps anybody? Read more...

14 comments 1208 views
Submitted by
Brian Faul
How and why a Dictator is born

One needs to remember looking back in history these hard times is when a dictator is more likely to get born. It is during these hard times that a dictator gets voted into power. Read more...

10 comments 2001 views
Submitted by
Prenisha Naidoo
I will be proactive...

This letter is in response to articles on the death of baby Jamie Naidoo, We have the tendency to be reactive…we wait for something to happen, then suddenly we care, writes a News24 User. Read more...

2 comments 492 views
Submitted by

Make a list of at least ten things that you can celebrate, and write two or three reasons why you can celebrate those things or events. Read more...

1 comments 178 views
Submitted by
Eric de Castro
Last squeak of the year


13 comments 296 views

Jobs in Cape Town [change area]

Jobs in Western Cape region

upply Chain Manager

Western Cape
ZIMCO Group (PTY) Ltd
R30 000 - R40 000 Per Month

Restaurant Manager

Western Cape
SET Recruitment Consultants
R20 000 - R30 000 Per Month

Accountant - Cape Town

Western Cape
Quantum Recruitment

Property [change area]

Travel - Look, Book, Go! - shop online today

Grand Theft Auto 5

Now available on PS4, Xbox One and PC from R649. Buy now!

Festive gifts!

Check out our awesome range of festive gifts to make everyone’s wishes come true. Shop now!

Save on Samsung

Cameras, mobile phones, TVs, Tablets and more. While stocks last. Shop now!

Save up to R2200 on electronics! – As seen in the catalogue

Wishing for tech gadgets this festive? Save up to R2100 on hot tech products at While stocks last. Shop now!

30% off the bestselling books

Save big on the most captivating reads of 2014. While stocks last. Shop now!

OLX Free Classifieds [change area]

Samsung Galaxy s4

Mobile, Cell Phones in South Africa, Western Cape, Cape Town. Date October 24

Best bargain in big bay

Real Estate, Houses - Apartments for Sale in South Africa, Western Cape, Cape Town. Date October 25

VW Golf 6, 1.6 Trendline (Excellent condition)

Vehicles, Cars in South Africa, Western Cape, Cape Town. Date October 25



E-mail Alerts The latest headlines in your inbox

RSS feeds News delivered really simply.

Mobile News24 on your mobile or PDA

E-mail Newsletters You choose what you want

News24 on your iPhone Get News24 headlines on your iPhone.

SMS Alerts Get breaking news stories via SMS.

Blogs Your opinion on you, me and everyone.

Calais Website keywords automated by OpenCalais.

Interactive Advertising Bureau
© 2014 All rights reserved.
There are new stories on the homepage. Click here to see them.


Create Profile

Creating your profile will enable you to submit photos and stories to get published on News24.

Please provide a username for your profile page:

This username must be unique, cannot be edited and will be used in the URL to your profile page across the entire network.


Location Settings

News24 allows you to edit the display of certain components based on a location. If you wish to personalise the page based on your preferences, please select a location for each component and click "Submit" in order for the changes to take affect.

Facebook Sign-In

Hi News addict,

Join the News24 Community to be involved in breaking the news.

Log in with Facebook to comment and personalise news, weather and listings.