Encryption protocols compromised by NSA and GCHQ, according to leaked Edward Snowden documents
The latest revelation shows "an aggressive, multi-pronged effort to break widely used internet encryption"
Your support helps us to tell the story
From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.
At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.
The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.
Your support makes all the difference.Intelligence agencies from Britain and the US have cracked many of the encryption protocols used to secure communications on the internet, according to documents leaked by the NSA whistleblower Edward Snowden.
The fresh information reveals that the US National Security Agency has worked in collaboration with the the UK's GCHQ to compromise online privacy.
"For the past decade, NSA has lead [sic] an aggressive, multi-pronged effort to break widely used internet encryption technologies,” reads a GCHQ document from 2010. "Vast amounts of encrypted internet data which have up till now been discarded are now exploitable."
Various methods have been pursued in order to break or circumvent the security protecting the personal data of billions of people.
These include breaking encryption with “brute force” attacks conducted by super computers; using court-orders to force companies into handing over master keys to their software, and one program that “actively engages US and foreign IT industries to covertly influence and/or overtly leverage their commercial products' designs”.
This latter scheme, named the Sigint Enabling Project, costs the NSA $254.9m a year according to a 2013 budget document provided by Snowden. Sigint stands for "signal intelligence". An internal memo from the agency records the reaction from British analysts: “Those not already briefed were gobsmacked!”
“These frightening revelations imply that the NSA has not only pursued an aggressive program of obtaining private encryption keys for commercial products […] but that the agency has also attempted to put backdoors into cryptographic standards designed to secure users' communications,” said the Electronic Frontier Foundation in response.
“Additionally, the leaked documents make clear that companies have been complicit in allowing this unprecedented spying to take place, though the identities of cooperating companies remain unknown.”
In response to the leaked documents - which were handed from Mr Snowden to The Guardian, The New York Times and the non-profit news site Pro Publica - Google have claimed that no such "active engagement" has taken place.
"We have no evidence of any such thing ever occurring,” said the company in a statement. “We do not provide any government, including the US government, with access to our systems […] We provide user data to governments only in accordance with the law.”
The NSA described their various decryption programs as "price of admission for the US to maintain unrestricted access to and use of cyberspace”, but security experts believe that their actions are an attack against the most basic structure of the internet.
“Cryptography forms the basis for trust online," Bruce Schneier, a fellow at Harvard's Berkman Center for Internet and Societ, told The Guardian. "By deliberately undermining online security in a short-sighted effort to eavesdrop, the NSA is undermining the very fabric of the internet."
Subscribe to Independent Premium to bookmark this article
Want to bookmark your favourite articles and stories to read or reference later? Start your Independent Premium subscription today.
Join our commenting forum
Join thought-provoking conversations, follow other Independent readers and see their replies
Comments