Visitors Now:
Total Visits:
Total Stories:
Profile image
Story Views

Now:
Last Hour:
Last 24 Hours:
Total:

Top Secret: NSA Breaks Through Encryption

Monday, November 25, 2013 5:37
% of readers think this story is Fact. Add your two cents.

(Before It's News)

Top Secret: NSA Breaks Through Encryption

B4INREMOTE-aHR0cDovLzEuYnAuYmxvZ3Nwb3QuY29tLy16UzR5WURyM0sxOC9VaXBNTlluT1gxSS9BQUFBQUFBQVBSVS9FYUxWTTVBdURlMC9zNjQwL2J1ZGdldDEucG5n

Based on recently released documents courtesy Edward Snowden, it’s evident the NSA either knows all or can get access to anything it wants by cracking all the normally used encryption technologies used on the Net as seen by the joint post  from the NY Times and The Guardian.

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.

The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.

Seen below is a screen grab of the various types of private communications the NSA can crack. Click the image to learn about the different kinds of encryption we rubes use to “protect” our privacy.

B4INREMOTE-aHR0cDovLzIuYnAuYmxvZ3Nwb3QuY29tLy1EZE90TXlDTkpGOC9VaXBOelIwbk5RSS9BQUFBQUFBQVBSZy9scDZ6Mm0zT0g0TS9zMTYwMC9lbmNyaXlwdGlvbl90b29scy5qcGc=

Here is a blurb about Bullrun, the code word used for the top secret NSA decryption program.

A classification guide for NSA employees and contractors on Bullrun outlines in broad terms its goals.

“Project Bullrun deals with NSA’s abilities to defeat the encryption used in specific network communication technologies. Bullrun involves multiple sources, all of which are extremely sensitive.” The document reveals that the agency has capabilities against widely used online protocols, such as HTTPS, voice-over-IP and Secure Sockets Layer (SSL), used to protect online shopping and banking.

I feel better already.

Published on Nov 24, 2013

THIS IS WHERE YOU WILL FIND MORE TRUTH EXPOSED and SCANDALS UNCOVERED:
http://truth.themoneygps.com

****************************************­*****************************
The Money GPS by David Quintieri featuring Bob Chapman, James Turk, and David Morgan.

FREE version @ http://themoneygps.com/free

TOXIC WASTE in our Water Supply. FREE eBook:
http://fluoride.themoneygps.com

Genetically Modified Food will END Humanity. FREE eBook:
http://gmo.themoneygps.com

The Tools I Use to PREPARE for COLLAPSE:
http://amazon.themoneygps.com
****************************************­*****************************

Description:
Project Bullrun — classification guide to the NSA’s decryption program
Guide for NSA employees and contractors on Bullrun outlines its goals — and reveals that the agency has capabilities against widely-used online protocols such as HTTPS

1. Project BULLRUN deals with NSA’s abilities to defeat the 
used in specific network communication technologies. BULLRUN involves multiple
sources, all of which are extremely sensitive. They include CNE, interdiction, industry
relationships, collaboration with other IC entities, and advanced mathematical techniques.
Several ECls apply to the specific sources, methods, and techniques involved. Because
of the multiple sources involved in BULLRUN activities, “capabilities against a
technology” does not necessarily equate to decryption.

Sources:
http://pixabay.com/en/barcode-bar-cod…
http://www.theguardian.com/world/inte…
http://pixabay.com/en/screen-business…

 

If you find that you liked this story, don’t forget to hit the RECOMMEND CONTRIBUTOR button at the top of the page so that I can bring you more stories like this. I appreciate your interest and, it is a way to say thanks. Share this liberally with everyone you know and if there is anyone who can add futher information, pictures, and or video on this or related subjects, please feel free to e-mail me with that at [email protected]. All comments are welcome too. Please keep it clean and do not use profanity or Obscene language otherwise BIN’s automated system will have it removed. Thanks so much!!!

You can also visit me at:

                                                   

 

Be AWARE and be PREPARED, FEAR is not an option. Be safe everyone…

Report abuse

Comments

Your Comments
Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

Total 2 comments
  • Listen you schmucks!
    Remember, remember the “Enigma Machine”!!!!! :wink: :wink: :wink: :roll:

  • This is precisely why the sales of companies like Cisco and IBM have absolutely cratered in the global marketplace. People are saying no to companies that collaborate to make security backdoors for the NSA. Software and hardware with backdoors are not secure, so they’ve moving onto other companies/technologies that are.

Top Stories
Recent Stories

Register

Newsletter

Email this story
Email this story

If you really want to ban this commenter, please write down the reason:

If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.