NSA and GCHQ accused of taking part in sustained web encryption-cracking campaign

Security agencies are alleged to have unraveled encryption used to protect web users' data.

Encryption

GCHQ and the US National Security Agency (NSA) have reportedly cracked many of the encryption methods used to protect web users' personal data and online transactions.

The claim has been published in a joint article by the Guardian newspaper, the New York Times and Propublica, and is based on confidential documents leaked by notorious NSA whistleblower Edward Snowden.

Advertisement - Article continues below

The report claims the security agencies allegedly have the means to unravel the encryption used to protect emails, banking transactions and medical records.

This has reportedly been made possible through the employment of supercomputers that use brute force to crack encryption methods.

It is also claimed the agencies have colluded with tech firms and internet service providers to insert vulnerabilities into commercially available encryption software.

The Snowden documents suggest the NSA invests around $250 million a year in working with technology companies to influence their product designs, and claims the Agency considers its decryption work to be "the price of admission for the US to maintain unrestricted access to...cyberspace."

GCHQ, meanwhile, has been accused of trying to find a way into Hotmail, Google, Yahoo and Facebook's encrypted traffic.

The documents claim the NSA has been involved in a decade-long encryption-busting programme, which made a major breakthrough in 2010 that has resulted in "vast amounts of encrypted internet data" becoming exploitable.

Advertisement
Advertisement - Article continues below

Exact details about the discovery that made this possible was not disclosed in the documents.

The Guardian report is the latest in a long line of revelations about GCHQ and the NSA's alleged surveillance techniques, which have been trickling out since Snowden started releasing documents back in June 2013.

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now
Advertisement

Recommended

Visit/security/encryption/355820/k2view-innovates-in-data-management-with-new-encryption-patent
encryption

K2View innovates in data management with new encryption patent

28 May 2020
Visit/software/video-conferencing/355410/zoom-50-adds-256-bit-encryption-and-ui-refresh
video conferencing

Zoom 5.0 adds 256-bit encryption to address security concerns

23 Apr 2020
Visit/security/hacking/355382/whatsapps-flaw-shoulder-surfing
hacking

WhatsApp flaw leaves users open to 'shoulder surfing' attacks

21 Apr 2020
Visit/security/cyber-security/355368/microsoft-builds-ai-to-detect-security-flaws-with-99-accuracy
cyber security

Microsoft AI can detect security flaws with 99% accuracy

20 Apr 2020

Most Popular

Visit/operating-systems/microsoft-windows/355812/microsoft-warns-against-installing-windows-10-may-2020
Microsoft Windows

Microsoft warns users not to install Windows 10's May update

28 May 2020
Visit/security/data-breaches/355777/easyjet-faces-class-action-lawsuit-over-data-breach
data breaches

EasyJet faces class-action lawsuit over data breach

26 May 2020
Visit/security/cyber-security/355797/microsoft-bans-trend-micros-rootkit-buster-from-windows-10
cyber security

Microsoft bans Trend Micro driver from Windows 10 for "cheating" hardware tests

27 May 2020