Reports: The NSA has supercomputers that can read your encrypted messages
A massive new report from the New York Times, ProPublica, and the Guardian reveals alarming new details about the agency's surveillance capabilities
In the weeks following the revelation that the National Security Agency has been tapping major U.S. internet companies to spy on unsuspecting users, encryption networks like Tor saw enormous spikes in popularity. But as it turns out, our best efforts to keep our information private may be for naught — at least according to a sprawling new joint report from the Guardian, the New York Times, and ProPublica.
Documents leaked by Edward Snowden indicate that the NSA has been using "supercomputers, technical trickery, court orders, and behind-the-scenes persuasion to undermine the major tools" designed to protect the privacy of internet users both abroad and domestically.
In order to do so, the agency reportedly deployed "custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products." Here's the most disturbing bit, however (emphasis added):
Subscribe to The Week
Escape your echo chamber. Get the facts behind the news, plus analysis from multiple perspectives.
Sign up for The Week's Free Newsletters
From our morning news briefing to a weekly Good News Newsletter, get the best of The Week delivered directly to your inbox.
From our morning news briefing to a weekly Good News Newsletter, get the best of The Week delivered directly to your inbox.
It wasn't until 2010, however, when "vast amounts" of data obtained through the program, dubbed Bullrun, were considered to be exploitable. The Guardian reports that the NSA spends about $250 million a year on the program, which includes a British GCHQ team charged with finding open seams in the "big four" service providers: Hotmail, Google, Yahoo, and Facebook.
So. It appears that the NSA's unchecked spying efforts, which span at least three different administrations, are not only able to easily circumvent existing encryption standards, but actually helped create the armor chinks that make our best secret-keeping technologies imperfect. Thanks, NSA.
Sign up for Today's Best Articles in your inbox
A free daily email with the biggest news stories of the day – and the best features from TheWeek.com
Create an account with the same email registered to your subscription to unlock access.
-
'A direct, protracted war with Israel is not something Iran is equipped to fight'
Instant Opinion Opinion, comment and editorials of the day
By Harold Maass, The Week US Published
-
Today's political cartoons - April 17, 2024
Cartoons Wednesday's cartoons - political anxiety, jury sorting hat, and more
By The Week US Published
-
Arid Gulf states hit with year's worth of rain
Speed Read The historic flooding in Dubai is tied to climate change
By Peter Weber, The Week US Published