Close ad

The U.S. National Security Agency (NSA) has largely compromised the security of every Internet user through a previously unknown decade-long encryption program that has amassed a massive amount of exploitable data. The shocking revelation, which saw the light of day on Thursday, as well as a new report from Sunday in a German weekly Der Spiegel they gave a whole new meaning to our personal fears.

The most private data of iPhone, BlackBerry and Android owners is at risk because it is absolutely accessible, as the NSA is able to break through the safeguards of these systems, which were previously considered highly secure. Based on top-secret documents leaked by NSA whistleblower Edward Snowden, Der Spiegel writes that the agency is able to get a list of contacts, text messages, notes and an overview of where you've been from your device.

It doesn't look like hacking is as widespread as the documents mention it, but on the contrary, there are: "individually tailored cases of smartphone eavesdropping, often without the knowledge of the companies that manufacture these smartphones.

In internal documents, the Experts boast of successful access to information stored in iPhones, as the NSA is able to infiltrate a computer in the event that a person uses it to synchronize data in their iPhone, using a mini-program called a script, which then allows access to other 48 functions of the iPhone.

Simply put, the NSA is spying with a system called a backdoor, which is a way to remotely break into a computer and decrypt the backup files created every time an iPhone is synced through iTunes.

The NSA has established task forces that deal with individual operating systems and their task is to gain secret access to data stored in popular operating systems that run smartphones. The agency even gained access to BlackBerry's highly secure email system, which is a huge loss for the company, which has always maintained that its system is completely unbreakable.

It looks like 2009 is when the NSA temporarily had no access to BlackBerry devices. But after the Canadian company was bought by another company that same year, the way data is compressed in BlackBerry changed.

In March 2010, Britain's GCHQ announced in a top-secret document that it had once again gained access to data on BlackBerry devices, accompanied by the celebratory word "champagne".

Data center in Utah. This is where the NSA breaks the ciphers.

The 2009 document specifically states that the agency can see and read the movement of SMS messages. A week ago, it was revealed how the NSA spends $250 million a year to support a program against widespread encryption technologies and how it made a major breakthrough in 2010 by collecting vast amounts of newly exploitable data through cable wiretapping.

These messages come from top-secret files from both the NSA and the government's communications headquarters, GCHQ (the British version of the NSA), which were leaked by Edward Snowden. Not only do the NSA and GCHQ covertly influence international encryption standards, they also use super-powered computers to break ciphers through brute force. These spy agencies also work with tech giants and internet providers through which encrypted traffic flows that the NSA can exploit and decrypt. Particulary speaking about Hotmail, Google, Yahoo a Facebook.

By doing so, the NSA violated the assurances that Internet companies give their users when they assure them that their communications, online banking, or medical records cannot be deciphered by criminals or the government. The Guardian declares: "Look at this, the NSA has secretly modified commercial encryption software and equipment to use it and is able to obtain the cryptographic details of commercial cryptographic information security systems through industrial relations."

GCHQ paper evidence from 2010 confirms that vast amounts of previously useless internet data are now exploitable.

This program costs ten times more than the PRISM initiative and actively engages the US and foreign IT industries to covertly influence and publicly use their commercial products and design them to read classified documents. Another top-secret NSA document boasts of gaining access to information flowing through the center of a major communications provider and through the Internet's leading voice and text communications system.

Most frighteningly, the NSA exploits basic and seldom-refreshed hardware such as routers, switches, and even encrypted chips and processors in user devices. Yes an agency can get into your computer if it is necessary for them to do so, although in the end it will be much more risky and costly for them to do so, as another article from The Guardian.

[do action=”citation”]The NSA has tremendous capabilities and if it wants to be on your computer, it will be there.[/do]

On Friday, Microsoft and Yahoo expressed concern about the NSA's encryption methods. Microsoft said it had serious concerns based on the news, and Yahoo said there was a lot of potential for abuse. The NSA defends its decryption effort as the price of preserving America's unfettered use and access to cyberspace. In response to the publication of these stories, the NSA released a statement through the Director of National Intelligence on Friday:

It may hardly be surprising that our intelligence services are looking for ways for our adversaries to exploit encryption. Throughout history, all nations have used encryption to protect their secrets, and even today, terrorists, cyberthieves, and human traffickers use encryption to hide their activities.

Big brother wins.

Sources: Spiegel.de, Guardian.co.uk
.