NSA and GCHQ accused of taking part in sustained web encryption-cracking campaign

Security agencies are alleged to have unraveled encryption used to protect web users' data.

Encryption

GCHQ and the US National Security Agency (NSA) have reportedly cracked many of the encryption methods used to protect web users' personal data and online transactions.

The claim has been published in a joint article by the Guardian newspaper, the New York Times and Propublica, and is based on confidential documents leaked by notorious NSA whistleblower Edward Snowden.

The report claims the security agencies allegedly have the means to unravel the encryption used to protect emails, banking transactions and medical records.

This has reportedly been made possible through the employment of supercomputers that use brute force to crack encryption methods.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

It is also claimed the agencies have colluded with tech firms and internet service providers to insert vulnerabilities into commercially available encryption software.

The Snowden documents suggest the NSA invests around $250 million a year in working with technology companies to influence their product designs, and claims the Agency considers its decryption work to be "the price of admission for the US to maintain unrestricted access to...cyberspace."

GCHQ, meanwhile, has been accused of trying to find a way into Hotmail, Google, Yahoo and Facebook's encrypted traffic.

The documents claim the NSA has been involved in a decade-long encryption-busting programme, which made a major breakthrough in 2010 that has resulted in "vast amounts of encrypted internet data" becoming exploitable.

Exact details about the discovery that made this possible was not disclosed in the documents.

The Guardian report is the latest in a long line of revelations about GCHQ and the NSA's alleged surveillance techniques, which have been trickling out since Snowden started releasing documents back in June 2013.

Featured Resources

Digital Risk Report 2020

A global view into the impact of digital transformation on risk and security management

Download now

6 ways your business could suffer if you don’t backup Office 365

Office 365 makes it easy to lose valuable data regularly, unpredictably, unintentionally, and for good

Download now

Get the best out of your workforce

7 steps to unleashing their true potential with robotic process automation

Download now

8 digital best practices for IT professionals

Don't leave anything to chance when going digital

Download now
Advertisement

Recommended

Visit/cyber-security/33079/gchq-boss-says-uk-must-be-vigilant-againt-chinese-tech-firms
cyber security

GCHQ boss says UK must be vigilant againt Chinese tech firms

25 Feb 2019
Visit/hardware/31258/how-to-build-a-raspberry-pi-security-camera
Hardware

How to build a Raspberry Pi security camera

14 Feb 2020
Visit/security/cyber-security/354540/nsa-hands-serious-flaw-to-microsoft-rather-than-use-it
cyber security

NSA hands serious flaw to Microsoft rather than use it

15 Jan 2020
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Most Popular

Visit/mobile/28299/how-to-use-chromecast-without-wi-fi
Mobile

How to use Chromecast without Wi-Fi

5 Feb 2020
Visit/operating-systems/27717/how-to-fix-a-stuck-windows-10-update
operating systems

How to fix a stuck Windows 10 update

12 Feb 2020
Visit/security/34616/the-top-ten-password-cracking-techniques-used-by-hackers
Security

The top ten password-cracking techniques used by hackers

10 Feb 2020
Visit/security/cyber-security/354827/mcafee-researchers-trick-tesla-autopilot-with-a-strip-of-tape
cyber security

McAfee researchers trick Tesla autopilot with a strip of tape

21 Feb 2020