|  | 
| This undated photo released by the United States government shows the National Security Agency campus in Fort Meade, Md. | 
The National Security Agency is winning its long-running secret war on encryption, using  supercomputers, technical trickery, court orders and behind-the-scenes  persuasion to undermine the major tools protecting the privacy of  everyday communications in the Internet age, according to newly  disclosed documents. 
The agency has circumvented or cracked much of the encryption, or  digital scrambling, that guards global commerce and banking systems,  protects sensitive data like trade secrets and medical records, and  automatically secures the e-mails, Web searches, Internet chats and  phone calls of Americans and others around the world, the documents  show.        
Many users assume — or have been assured by Internet companies — that  their data is safe from prying eyes, including those of the government,  and the N.S.A. wants to keep it that way. The agency treats its recent  successes in deciphering protected information as among its most closely  guarded secrets, restricted to those cleared for a highly classified  program code-named Bullrun, according to the documents, provided by  Edward J. Snowden, the former N.S.A. contractor.        
Beginning in 2000, as encryption tools were gradually blanketing the  Web, the N.S.A. invested billions of dollars in a clandestine campaign  to preserve its ability to eavesdrop. Having lost a public battle in the  1990s to insert its own “back door” in all encryption, it set out to  accomplish the same goal by stealth.        
The agency, according to the documents and interviews with industry  officials, deployed custom-built, superfast computers to break codes,  and began collaborating with technology companies in the United States  and abroad to build entry points into their products. The documents do  not identify which companies have participated. 
The N.S.A. hacked into target computers to snare messages before they  were encrypted. In some cases, companies say they were coerced by the  government into handing over their master encryption keys or building in  a back door. And the agency used its influence as the world’s most  experienced code maker to covertly introduce weaknesses into the  encryption standards followed by hardware and software developers around  the world. 
“For the past decade, N.S.A. has led an aggressive, multipronged effort  to break widely used Internet encryption technologies,” said a 2010 memo  describing a briefing about N.S.A. accomplishments for employees of its  British counterpart, Government Communications Headquarters, or GCHQ.  “Cryptanalytic capabilities are now coming online. Vast amounts of  encrypted Internet data which have up till now been discarded are now  exploitable.”        
When the British analysts, who often work side by side with N.S.A.  officers, were first told about the program, another memo said, “those  not already briefed were gobsmacked!”        
An intelligence budget document makes clear that the effort is still  going strong. “We are investing in groundbreaking cryptanalytic  capabilities to defeat adversarial cryptography and exploit Internet  traffic,” the director of national intelligence, James R. Clapper Jr., wrote in his budget request for the current year. 
In recent months, the documents disclosed by Mr. Snowden have described  the N.S.A.’s reach in scooping up vast amounts of communications around  the world. The encryption documents now show, in striking detail, how  the agency works to ensure that it is actually able to read the  information it collects. 
But some experts say the N.S.A.’s campaign to bypass and weaken  communications security may have serious unintended consequences. They  say the agency is working at cross-purposes with its other major  mission, apart from eavesdropping: ensuring the security of American  communications. 
Some of the agency’s most intensive efforts have focused on the encryption in universal use in the United States, including Secure Sockets Layer, or SSL; virtual private networks,  or VPNs; and the protection used on fourth-generation, or 4G,  smartphones. Many Americans, often without realizing it, rely on such  protection every time they send an e-mail, buy something online, consult  with colleagues via their company’s computer network, or use a phone or  a tablet on a 4G network.        
For at least three years, one document says, GCHQ, almost certainly in  collaboration with the N.S.A., has been looking for ways into protected  traffic of popular Internet companies: Google, Yahoo, Facebook and  Microsoft’s Hotmail. By 2012, GCHQ had developed “new access  opportunities” into Google’s systems, according to the document. (Google  denied giving any government access and said it had no evidence its  systems had been breached).         
“The risk is that when you build a back door into systems, you’re not  the only one to exploit it,” said Matthew D. Green, a cryptography  researcher at Johns Hopkins University. “Those back doors could work  against U.S. communications, too.”        
Paul Kocher, a leading cryptographer who helped design the SSL protocol,  recalled how the N.S.A. lost the heated national debate in the 1990s  about inserting into all encryption a government back door called the Clipper Chip.        
“And they went and did it anyway, without telling anyone,” Mr. Kocher  said. He said he understood the agency’s mission but was concerned about  the danger of allowing it unbridled access to private information.         
“The intelligence community has worried about ‘going dark’ forever, but  today they are conducting instant, total invasion of privacy with  limited effort,” he said. “This is the golden age of spying.” 
A Vital Capability
The documents are among more than 50,000 shared by The Guardian with The  New York Times and ProPublica, the nonprofit news organization. They  focus on GCHQ but include thousands from or about the N.S.A.        
Intelligence officials asked The Times and ProPublica not to publish  this article, saying it might prompt foreign targets to switch to new  forms of encryption or communications that would be harder to collect or  read. The news organizations removed some specific facts but decided to  publish the article because of the value of a public debate about  government actions that weaken the most powerful privacy tools. 
The files show that the agency is still stymied by some encryption, as Mr. Snowden suggested in a question-and-answer session on The Guardian’s Web site in June.        
“Properly implemented strong crypto systems are one of the few things  that you can rely on,” he said, though cautioning that the N.S.A. often  bypasses the encryption altogether by targeting the computers at one end  or the other and grabbing text before it is encrypted or after it is  decrypted.        
The documents make clear that the N.S.A. considers its ability to  decrypt information a vital capability, one in which it competes with  China, Russia and other intelligence powers.        
“In the future, superpowers will be made or broken based on the strength  of their cryptanalytic programs,” a 2007 document said. “It is the  price of admission for the U.S. to maintain unrestricted access to and  use of cyberspace.” 
The full extent of the N.S.A.’s decoding capabilities is known only to a  limited group of top analysts from the so-called Five Eyes: the N.S.A.  and its counterparts in Britain, Canada, Australia and New Zealand. Only  they are cleared for the Bullrun program, the successor to one called  Manassas — both names of an American Civil War battle. A parallel GCHQ counterencryption program is called Edgehill,  named for the first battle of the English Civil War of the 17th century.         
Unlike some classified information that can be parceled out on a strict  “need to know” basis, one document makes clear that with Bullrun, “there  will be NO ‘need to know.’ ”        
Only a small cadre of trusted contractors were allowed to join Bullrun.  It does not appear that Mr. Snowden was among them, but he nonetheless  managed to obtain dozens of classified documents referring to the  program’s capabilities, methods and sources.        
Ties to Internet Companies
When the N.S.A. was founded, encryption was an obscure technology used  mainly by diplomats and military officers. Over the last 20 years, it  has become ubiquitous. Even novices can tell that their exchanges are  being automatically encrypted when a tiny padlock appears next to a Web  address.        
0 Response to "N.S.A. Able to Foil Basic Safeguards of Privacy on Web"
Post a Comment