NSA pays tech companies millions to engineer backdoors into encryption protocols

http://m.naturalnews.com/news/042038_NSA_tech_companies_encryption_...
By J. D. Heyes

(NaturalNews) There is a saying that says, when it comes to government,
they've got you coming and going.

No truer words are spoken when the subject comes to serial invasions of your
privacy. Not only is the National Security Agency monitoring your every
electronic communication, but the agency is paying your tech company and
Internet service provider to hack you as well.

According to Britain's The Guardian newspaper, which broke the story of
massive NSA spying earlier this year:

U.S. and British intelligence agencies have successfully cracked much of the
online encryption relied upon by hundreds of millions of people to protect the
privacy of their personal data, online transactions and emails, according to
top-secret documents revealed by former contractor Edward Snowden.

The files show that the National Security Agency and its UK counterpart GCHQ
have broadly compromised the guarantees that internet companies have given
consumers to reassure them that their communications, online banking and
medical records would be indecipherable to criminals or governments.

If need be, the use of 'brute force' to break encryption

In other words, those little privacy spiels that social media and tech companies
put on their sites to "assure you" that your privacy is "guaranteed" - are lies.
And what's more, they are government-sanctioned lies.

The files that Snowden - who is currently in Russia, having been granted
temporary political asylum by President Vladimir Putin - provided show that
the agencies use a number of methods in their systematic, continual assault
on what they perceive as one of the biggest threats to their ability to access
billions of bytes of Internet traffic - "the use of ubiquitous encryption across the
Internet."

The paper said the methods include covert measures ensuring NSA control
over the establishment of international encryption standards, use of
supercomputers to break encryption protocols and protections using "brute
force," and - the most closely guarded of all secrets - "collaboration with
technology companies and Internet service providers themselves."

Through the establishment of these covert and unconstitutional partnerships -private firms have as much legal obligation to protect your privacy as the
government does - these agencies have had placed into commercial
encryption software the ability to penetrate it in what are known as
"backdoors" or "trapdoors."

According to the files provided by Snowden:

-- A decade-long NSA program targeting encryption technologies made a huge
breakthrough in 2010, which then made "vast amounts" of data collected
through Internet cable taps finally "exploitable."

-- The NSA spends $250 million taxpayer dollars annually on a program that,
among other goals, works through tech companies to "covertly influence" the
design of their products.

-- The secrecy of the programs' capabilities to thwart encryption is extremely
closely guarded, and analysts are warned: "Do not ask about or speculate on
sources or methods."

-- The NSA describes its strong decryption programs as the "price of
admission for the U.S. to maintain unrestricted access to and use of
cyberspace."

-- A GCHQ team has been developing ways to access encrypted traffic on each
of the "big four" service providers: Hotmail, Google, Yahoo and Facebook.

As usual, both agencies insist they need to defeat all encryption in order to
maintain national security and combat terrorism and the ability of foreign
governments to gather intelligence.

But, of course, there is another aspect to this, and security experts have
pointed it out: The agencies are attacking the essence of the Internet itself, as
well as the privacy of all of its users.

'We had to comply'

"Cryptography forms the basis for trust online," Bruce Schneier, an encryption
specialist and fellow at Harvard's Berkman Center for Internet and Society, told
The Guardian. "By deliberately undermining online security in a short-sighted
effort to eavesdrop, the NSA is undermining the very fabric of the internet."

Classified briefings between the agencies celebrate their success at "defeating
network security and privacy," he said.

"For the past decade, NSA has lead [sic] an aggressive, multi-pronged effort to
break widely used internet encryption technologies," a 2010 GCHQ document
stated. "Vast amounts of encrypted internet data which have up till now been
discarded are now exploitable."

The paper and others have also reported previously that Microsoft has
cooperated with NSA to circumvent encryption in its Outlook mail program,
saying it was obliged to comply with "existing or future lawful demands" when
designing its products.

Sources:

http://www.theguardian.com

http://www.naturalnews.com/NSA.html

http://www.pcworld.com

Views: 46

Reply to This

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega commented on Burbia's video
Thumbnail

CHARLIE KIRK WAS CNP! JOSH REEVES 9-11-25

"With all due respect this guy comes off as a drunken asshole and he didn't even  know who…"
23 hours ago
Doc Vega posted a blog post

Was a Planned Civil War Averted?

We are living in sadly historic times where good and evil are in battle all the time. Not that this…See More
yesterday
Sandy posted a photo
yesterday
Less Prone posted a video

President Trump addresses U.N. General Assembly - FULL SPEECH

President Donald Trump speaks at the United Nations General Assembly in New York City.Full video here: https://www.c-span.org/event/white-house-event/preside...
yesterday
Burbia posted a video

2 MIN AGO: Western Provinces MAJOR New WEXIT Announcement - Canada EXPLODES!

In a stunning turn of events, Western provinces just made a major new WEXIT announcement — and it’s shaking the foundations of Canadian unity. Is Western sep...
Saturday
Doc Vega posted a blog post

How You Provoke a Civil War

In the world of counter intelligence which is simply one aspect of many pertaining to asymmetrical…See More
Friday
Burbia commented on Burbia's video
Thumbnail

CHARLIE KIRK WAS CNP! JOSH REEVES 9-11-25

"I don't follow as much with Josh Reeves than I use to. He seems to be a documentary producing…"
Friday
Burbia posted a video

CHARLIE KIRK WAS CNP! JOSH REEVES 9-11-25

DONATE-paypal-dayglow76@yahoo.comCashapp-reevesradioVenmo-Josh-Reeves-61FILMS AND AUDIOBOOKS DOWNLOAD STORE-https://store.payloadz.com/results/242828-josh-re...
Friday
Doc Vega posted blog posts
Thursday
tjdavis posted a video

CHARLIE KIRK VIDEO THAT KEEPS GETTING REMOVED OFF OF SEVERAL PLATFORMS

I had not planned to share this publicly, but I believe Advar, who spoke with Charlie Kirk while I was very ill, would have wanted me to. After my interview ...
Thursday
pohonemas33 team commented on Chris of the family Masters's photo
Thumbnail

Gold-Coast-Message

"untuk bermain slot, kamu cukup kunjungi situs kacang99 pasti langsung gacor"
Wednesday
Doc Vega posted blog posts
Wednesday
Burbia posted a blog post

Former President Trump?

When was this article written? It is attributed to Victor Davis Hanson. He is a Fellow at Hoover…See More
Sep 22
Doc Vega posted a blog post

Don’t Go Hunting For Bigfoot

It is October 19, 2019 at 5:46 AM. This will be the last time any visual evidence of Mark is seen…See More
Sep 22
tjdavis posted a video

Most Corrupt Series: Elizabeth Warren | Forgotten History

Elizabeth Warren has built her reputation as a "reformer", but her political career has also drawn sharp criticism. Questions have been raised about her fina...
Sep 19
Doc Vega commented on Doc Vega's blog post Ashrams and Moonies Perfect Case for Mind Control
"less prone, Thanks for your support Buddy! "
Sep 18
Doc Vega posted a photo

main-thumb-ti-6724328-100-cnsgqkrgkrhyeyyerazynmuwoplecnbx

When will they put Trump on Mt. Rushmore?
Sep 18
Doc Vega's 4 blog posts were featured
Sep 18
Burbia's blog post was featured

Charlie Kirk Assassination

September 10th 2025 in Utah Turning Point USA CEO has been assassinated. Coincidentally,  answering…See More
Sep 18
Charles Magus's blog post was featured

FURTHER PROOF OF WALK-INS! Prisoners of the Dulce Base by Sherry Shriner

There is a real connection between the Cabal and what is happening at this Undergroung…See More
Sep 18

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted