The National Security Agency programs revealed on Sept. 5 in three media reports were perhaps the most important revelations yet this summer, and have profound implications for everyone who uses the Internet.
The reports make clear that the NSA and its British counterpart Government Communications Headquarters (GCHQ), have been methodically undermining the vast encryption-based “web of trust” that makes possible secure online financial transactions, communications and other sensitive transmissions.
The spy agencies’ activities have gone on for more than a decade. Like a silent but pervasive cancer, they have penetrated and weakened every corner of the Internet.
“Not only does the worst possible hypothetical … appear to be true,” wrote Johns Hopkins cryptographer Matthew Green on his blog last night, “but it’s true on a scale I couldn’t even imagine.”
“The companies that build and manage our Internet infrastructure, the companies that create and sell us our hardware and software, or the companies that host our data: We can no longer trust them,” wrote American encryption expert Bruce Schneier on the website of the British newspaper The Guardian.
Subterfuge by any means necessary
The surveillance programs, named “Manassas,” “Bullrun” and “Edgehill” after battles in the American and English civil wars, not only built powerful computers to crack encryption protocols.
They also coerced technology companies into handing over encryption keys, infiltrated NSA and GCHQ personnel onto corporate staffs, broke into the computer servers of uncooperative companies to steal information and ensured that some companies built “backdoors” into their technology so that the spy agencies would always have access.
Perhaps most egregiously of all, the NSA and GCHQ deliberately poisoned publicly distributed encryption standards, used by hundreds of millions of people across the world every day, so that the standards would be secretly — but fatally — flawed.
“The (actually substantial) goodwill that NSA built up in the public crypto community over the last two decades was wiped out today,” tweeted University of Pennsylvania cryptography expert Matt Blaze.
The implications are that, if they wanted to, the spy agencies could access nearly every Internet-based purchase, money transfer, email, Internet phone call, instant message or file transfer made by anyone, anywhere.
The Latest Bing News on:
- How To Increase Your Privacy On Android By Changing These Settingson May 19, 2022 at 2:23 pm
Google has recently introduced new policies to make Android far more privacy-friendly than its previous iterations, giving users better control over their personal information. Android versions 11 and ...
- Do People Caught on Ring Cameras Have Privacy Rights?on May 19, 2022 at 5:00 am
Surveillance devices are becoming more ubiquitous. Do those who unknowingly appear in cam footage have rights—and who gets to decide?
- Brave Browser for iOS Gains New 'Privacy Hub' and Fingerprinting Protectionson May 19, 2022 at 4:09 am
Privacy-focused browser Brave has updated its iOS app with a new Privacy Hub feature that displays a summary of the trackers it has blocked for specific sites or over a given time span. Similar to ...
- Apple’s Privacy Changes Slashed Ad ROI 38%. This Company Says They Can Fix Iton May 18, 2022 at 6:36 pm
Apple’s privacy changes on iPhone have cut the average mobile advertiser’s return on investment by almost 40% and caused them to drop mobile ad spend by 25%, according to a mobile measurement ...
- Health data privacy concerns grow as abortion laws change nationwideon May 18, 2022 at 1:27 pm
As the nation awaits the fate of Roe v. Wade, some privacy experts are concerned about how your personal health data is stored online and even shared without your knowledge.
- Apple's New Privacy Commercial Puts Data Brokers On Noticeon May 18, 2022 at 10:00 am
Apple's latest commercial focuses on privacy and assures iPhone and iPad users that their data won't be collected in secret and sold to the highest bidder.
- Data Privacy And Clinic Safety After Roe v. Wadeon May 17, 2022 at 1:45 pm
With the Supreme Court set to roll back federal protections for abortions, protesters have mobilized across the country. A new report by Reveal looks into the growing number of calls to police from ...
- Clear the Cache and Cookies on Your Android to Give It a Privacy Booston May 17, 2022 at 12:44 pm
Giving your phone's web browser a cleanup can keep pesky trackers away. Here's how to do it in Google Chrome, Firefox and Samsung Internet.
- Musk does not seem to have evidence for his bot claims, says former Facebook chief privacy officeron May 17, 2022 at 8:02 am
Chris Kelly, Facebook’s former chief privacy officer and general counsel, joins 'Squawk on the Street' to discuss the ongoing conflict between Elon Musk and Twitter.
- Privacy Vs. Anonymity - The Massive Challenge of The Metaverseon May 16, 2022 at 5:00 pm
Scott McNealy, co-founder of Sun Microsystems. Wired Magazine, “Sun on Privacy: ‘Get Over It’” — January 26, 1999. One of the most hotly debated subjects among the public and governments is the ...
The Latest Google Headlines on:
The Latest Bing News on:
- Hisham: Data leak won't affect national securityon May 19, 2022 at 9:29 pm
KUALA LUMPUR: The Defence Ministry has systems in place to prevent any issues stemming from the latest data leak from affecting national security, says Datuk Seri Hishammuddin Hussein. The Defence ...
- Morrison grilled over Pacific strategy leakon May 19, 2022 at 8:59 pm
Prime Minister Scott Morrison was grilled over the circumstances surrounding a leaked report on a Cabinet-blocked Pacific strategy. It comes after the Cabinet's National Security Committee rejected a ...
- Prime Minister Scott Morrison refuses to entertain reports Foreign Minister Marise Payne lobbied for more Pacific fundingon May 19, 2022 at 8:41 pm
Scott Morrison has not been drawn into commenting on whether Foreign Minister Marise Payne lobbied for additional funding for the Pacific.
- PM denies national security cabinet leakon May 19, 2022 at 8:11 pm
Morrison refused to comment on the veracity of reports he rejected increased Pacific aid spending before the Solomons signed a security pact with China ...
- Recycling critical minerals is an underappreciated national security toolon May 19, 2022 at 11:00 am
The United States’ dependence on its geostrategic adversaries for critical materials constrains its ability to maneuver strategically and diplomatically.
- School Teacher Charged Under National Security Act In UP Exam Leak Casleon May 17, 2022 at 5:37 am
In a criminal case involving the leakage of question papers of the Uttar Pradesh Board examination. An accused has been charged under the National Security Act. With this, 5 people are charged under ...
- NSA slapped on one more in UP class 12 exam paper leak caseon May 17, 2022 at 3:00 am
The people against whom the NSA was invoked earlier are paper leak mastermind Nirbhay Narain Singh, Ma Lachhiyamurat Yadav Higher Secondary School’s principal Akshay Lal Yadav, Bhimpura’s Maharaji ...
- Biden tells top national security officials leaks about intelligence sharing with Ukrainians must stopon May 9, 2022 at 9:40 am
President Joe Biden recently told his top national security officials that leaks about US intelligence sharing with Ukrainians aren't helpful and need to stop, according to an official familiar with ...
- NSA invoked against school principal in English paper leak caseon May 1, 2022 at 5:01 pm
Earlier, NSA was invoked against three other accused in the paper leak case -- mastermind Nirbhay Narain Singh, Bhimpura Maharaji Devi Memorial Inter College manager Raju Prajapati and Ravindra Singh.
- UP: School principal charged under NSA in paper leak caseon May 1, 2022 at 5:50 am
The principal of a school in the Uttar Pradesh Board of Secondary Education's English question paper leak case has been charged under the strict National Security Act (NSA), police announced on ...