Reports: The NSA has supercomputers that can read your encrypted messages
A massive new report from the New York Times, ProPublica, and the Guardian reveals alarming new details about the agency's surveillance capabilities
In the weeks following the revelation that the National Security Agency has been tapping major U.S. internet companies to spy on unsuspecting users, encryption networks like Tor saw enormous spikes in popularity. But as it turns out, our best efforts to keep our information private may be for naught — at least according to a sprawling new joint report from the Guardian, the New York Times, and ProPublica.
Documents leaked by Edward Snowden indicate that the NSA has been using "supercomputers, technical trickery, court orders, and behind-the-scenes persuasion to undermine the major tools" designed to protect the privacy of internet users both abroad and domestically.
In order to do so, the agency reportedly deployed "custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products." Here's the most disturbing bit, however (emphasis added):
Subscribe to The Week
Escape your echo chamber. Get the facts behind the news, plus analysis from multiple perspectives.
Sign up for The Week's Free Newsletters
From our morning news briefing to a weekly Good News Newsletter, get the best of The Week delivered directly to your inbox.
From our morning news briefing to a weekly Good News Newsletter, get the best of The Week delivered directly to your inbox.
It wasn't until 2010, however, when "vast amounts" of data obtained through the program, dubbed Bullrun, were considered to be exploitable. The Guardian reports that the NSA spends about $250 million a year on the program, which includes a British GCHQ team charged with finding open seams in the "big four" service providers: Hotmail, Google, Yahoo, and Facebook.
So. It appears that the NSA's unchecked spying efforts, which span at least three different administrations, are not only able to easily circumvent existing encryption standards, but actually helped create the armor chinks that make our best secret-keeping technologies imperfect. Thanks, NSA.
Sign up for Today's Best Articles in your inbox
A free daily email with the biggest news stories of the day – and the best features from TheWeek.com
-
5 inflammatory cartoons on the L.A. wildfires
Cartoons Artists take on climate change denial, the blame game, and more
By The Week US Published
-
The problems with the current social care system
The Explainer The question of how to pay for adult social care is perhaps the greatest unresolved policy issue of our time
By The Week UK Published
-
Austria's new government: poised to join Putin's gang
Talking Point Opening for far-right Freedom Party would be a step towards 'the Putinisation of central Europe'
By The Week UK Published