upper waypoint

Top-Secret Documents Show NSA Can Get Into Your Encrypted Data

Save ArticleSave Article
Failed to save article

Please try again

NSA headquarters in Fort Meade, Maryland. (NSA vis Getty Images)
NSA headquarters in Fort Meade, Md. (NSA vis Getty Images)

You may have thought that if you use a good encryption program, your data are safe. Wrong! Newly disclosed documents show that the National Security Agency has been waging a secret war against encryption -- the digital scrambling used to safeguard everything from banking to trade secrets to email to Web searches and phone calls - and is winning.

The docs, obtained by the Guardian, the New York Times and ProPublica from former NSA contractor Edward Snowden, show that the NSA has been working with industry to weaken standards and establish "back doors" to encryption programs. The agency has worked closely with its British counterpart, GCHQ; documents indicate that GCHQ, "almost certainly in collaboration with the NSA," says the New York Times, has been looking for ways into protected traffic of such Internet companies as Google, Yahoo, Hotmail and Facebook.

According to the Times:

The NSA hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys or building in a back door. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.

The Times says that while attempting to foil terrorist plots, the NSA is compromising the security of average American citizens:

Some of the agency’s most intensive efforts have focused on the encryption in universal use in the United States, including Secure Sockets Layer, or SSL; virtual private networks, or VPNs; and the protection used on fourth-generation, or 4G, smartphones. Many Americans, often without realizing it, rely on such protection every time they send an e-mail, buy something online, consult with colleagues via their company’s computer network, or use a phone or a tablet on a 4G network.

Tech-savvy individuals may want to take steps to keep their data from the N.S.A.'s prying eyes. The Guardian's Bruce Schneier suggests a number of ways to do that, including using an air gap (it involves a computer that has never been connected to the Internet).

Sponsored

lower waypoint
next waypoint
California Homeowners Say Oakland Lender Scammed Them Out of $3M in Home ImprovementsFAFSA 2024: The May 2 Deadline for California Students is Almost HereThousands of San Francisco Residents Saved From Eviction by 2018 Legal Aid MeasureBillionaire-Backed Bid for New Solano County City Is Closer to November BallotBay Area High School Students Scramble to Find Seats to Take the SAT and ACTMay Day Rallies Focus on Palestinian Solidarity in San Francisco, OaklandHow to Spend this Summer Camping CaliforniaCollege Protests From the Eyes Of Student JournalistsE. Coli Outbreak Linked to Organic Bulk Walnuts Sold in Some Bay Area StoresPhotos: Campus Protests Grow Across Bay Area