American and British spy agencies can thwart internet security and encryption

American and British spy agencies can thwart internet security and encryption

As reporters at the New York Times, the Guardian and ProPublica dig deeper into the documents leaked by Edward Snowden, new and disturbing revelations continue to be made. Two programs, dubbed Bullrun (NSA) and Edgehill (GCHQ), have just come to light, that focus on circumventing or breaking the security and encryption tools used across the internet. The effort dwarfs the $20 million Prism program that simply gobbled up data. Under the auspices of “Sigint (signals intelligence) enabling” in a recent budget request, the NSA was allocated roughly $255 million dollars this year alone to fund its anti-encryption program.

The agencies’ efforts are multi-tiered, and start with a strong cracking tool. Not much detail about the methods or software are known, but a leaked memo indicates that the NSA successfully unlocked “vast amounts” of data in 2010. By then it was already collecting massive quantities of data from taps on internet pipelines, but much of it was safely protected by industry standard encryption protocols. Once that wall fell, what was once simply a torrent of scrambled ones and zeros, became a font of “exploitable” information. HTTPS, VoIP and SSL are all confirmed to have been compromised through Bullrun, though, it appears that some solutions to the NSA’s “problem” are less elegant than others. In some cases a super computer and simple brute force are necessary to peel back the layers of encryption.

Filed under:

Comments

Source: New York TImes, Guardian, ProPublica

The NSA Can Beat Almost Any Type of Encryption

The NSA Can Beat Almost Any Type of Encryption

Bad news, America. All that effort you and your favorite companies have put into encrypting data was for nothing. After spending billions on research and supercomputers, the NSA can now get around almost any type of encryption according to documents leaked by Edward Snowden. Nothing is safe.

Read more…


    



The Anonymous Internet Is Under Attack

The Anonymous Internet Is Under Attack

Last week left cybersecurity nerds scratching their heads after traffic to Tor, the free software suite that enables anonymity online, quintupled in less that a week. It was obviously too good to be true, and now we know why. A Russian botnet is threatening to bring the whole network down.

Read more…


    



How the NSA Misleads the Public Without Technically Lying

How the NSA Misleads the Public Without Technically Lying

The Wall Street Journal published an important investigation last week, reporting that the National Security Agency (NSA) has direct access to many key telecommunications switches around the country and “has the capacity to reach roughly 75% of all U.S. Internet traffic in the hunt for foreign intelligence, including a wide array of communications by foreigners and Americans.” Notably, NSA officials repeatedly refused to talk about this story on theirconference call with reporters the next day. Instead the Director of National Intelligence and the NSA released a statement about the story later that evening.

Read more…


    



US agencies performed 231 offensive cyber-ops in 2011, leak reveals

This week has seen a new batch of documents swiped by Edward Snowden hit the media, with The Washington Post leaking a barrage of information in recent days. Among this information was data about a hacking collective the NSA has for targeting foreign subjects, and that was followed up today with information stating US agencies […]

Washington Post report details how often security agencies break into other networks

The latest national security related revelation to come from the documents leaked by Edward Snowden is an account of how offensive computer operations work, and how many there are. The Washington Post reports that in 2011, 231 took place with about three quarters of them against “top-priority” targets, which its sources indicate include Iran, Russia, China and North Korea. Also interesting are details of software and hardware implants designed to infiltrate network hardware, persist through upgrades and access other connected devices or networks. The effort to break into networks is codenamed Genie, while the “Tailored Access Operations” group custom-builds tools to execute the attacks. One document references a new system “Turbine” that automates control of “potentially millions of implants” to gather data or execute an attack. All of this access isn’t possible for free however, with a total cyber operations budget of $1.02 billion which includes $25.1 million spent this year to purchase software vulnerabilities from malware vendors. Get your fill of codenames and cloak-and-dagger from the article posted tonight, or check out the “Black Budget” breakdown of overall intelligence spending.

Filed under:

Comments

Source: Washington Post (1), (2)

Leaked Documents Detail the Cyber Operations of US Spy Agencies

Leaked Documents Detail the Cyber Operations of US Spy Agencies

The Washington Post has some more documents that reveal the offensive cyber-operations of US spy agencies. The cyber campaign is even broader and more aggressive than we first thought and uses movie-appropriate code names like GENIE, TAO, TURBINE and The ROC. Apparently, US spy agencies launched 231 offensive cyber-operations in 2011.

Read more…


    



Tor: The Anonymous Internet, and If It’s Right for You

Tor: The Anonymous Internet, and If It's Right for You

Since the revelations about NSA spying came to the surface earlier this summer, everybody’s paying a little bit more attention to their privacy online. That’s good news for Tor, a suite of software and network of computers that enables you to use the internet anonymously. And for anyone who uses it.

Read more…


    



The NSA’s Finally Going to Start Telling Us How Many People They Spy On

The NSA's Finally Going to Start Telling Us How Many People They Spy On

President Obama’s order to the intelligence community is starting to produce results. On Friday, Director of National Intelligence James Clapper announced on Tumblr that the intelligence community will begin issuing annual transparency reports… on Tumblr of course.

Read more…


    



NSA has super secret hacker collective according to newly revealed Snowden docs

A new batch of government documents pilfered by Edward Snowden, who is now living in Russia, were made known by The Washington Post today, one that showed a detailed budget and hinted at encryption decoding efforts by the NSA. A different one, however, had another interesting thing to bring to light: the NSA has a […]