NSA Surveillance Can Penetrate VPNs

  /     /     /  
Publicated : 22/11/2024   Category : security


NSA Surveillance Can Penetrate VPNs


National Security Agencys XKeyscore system can collect just about everything that happens online, even things encrypted by VPNs, according to Edward Snowden.



The National Security Agency has a system that allows it to collect pretty much everything a user does on the Internet, according to
a report
published by
The Guardian
on Wednesday, apparently even when those activities are done under the presumed protection of a virtual private network (VPN).
The Guardian
s information comes from whistleblower Edward Snowden, the former NSA contractor now seeking asylum in Russia from U.S. authorities for revealing classified documents about the NSAs intelligence-gathering capabilities to the media. The news organizations report suggests that Snowdens claim that he could wiretap anyone from his desk, dismissed by U.S. lawmakers as false, was essentially accurate.
Described in a 2008 presentation, the system, called XKeyscore, can reportedly track email addresses, logins, phone numbers, IP addresses and online activities — files, email contents, Facebook chats, for example — and can cross-reference this information with other metadata.
Even after weeks of revelations about the scope and breadth of NSA data gathering, news that XKeyscore can penetrate VPNs comes as a something of a shock.
This is huge: XKeyscore slides also suggest NSA regularly decrypts encrypted VPN traffic, said security researcher Ashkan Soltani
via Twitter
.
[ Want to be a Web photographer? Read
Googles Photo Sphere Community Wants You
. ]
Responding to Soltani, CDT senior staff technologist Joseph Lorenzo Hall expressed skepticism that the NSA can break all VPN encryption. But Soltani contends the NSA at least has the capability to crack weak cipher implementations on Windows machines common in the Middle East, such as PPTP and MS-Chap. He points to
a 2012 post
from security researcher Moxie Marlinspike that states, PPTP traffic should be considered unencrypted.
Whether or not the NSA is able to crack more robust implementations remains to be seen. Given the resources available to the NSA, the issue may be how much the NSA wants to break a given code rather than its ability to do so. After all, in cases where codes cannot be broken, people can be. As Danish developer Poul-Henning Kamp argues in ACM Queue,
politics trumps cryptography
.
The White House, trying to contain discontent with its surveillance programs, chose Wednesday to release formerly classified documents about the NSAs domestic phone surveillance program as a Senate Judiciary Committee meeting convened to address the oversight of Foreign Intelligence Surveillance Act programs.
The documents
, published by the Office of the Director of National Intelligence, detail the collection of telephone metadata under Section 215 of the Patriot Act.
Senate Judiciary Committee chair Sen. Patrick J. Leahy (D-Vt.) said in a statement that if the governments collection of phone records is not effective, the program should be discontinued. He suggested that NSA chief Gen. Keith Alexanders prior claim that Section 215 surveillance programs have led to the disruption of 54 terrorist plots is not supported by the classified documentation he was provided.
A 2008 presentation states, Over 300 terrorists [have been] captured using intelligence generated from XKeyscore.
Gen. Alexander
contended with skeptical hecklers
Wednesday at the Black Hat USA 2013 security conference in Las Vegas, where he defended NSA surveillance as necessary for national security.
In
prepared remarks
presented during the Judiciary Committee meeting,
Stewart A. Baker
, a partner in the Washington office of Steptoe & Johnson, LLP, and former assistant secretary for policy at the Department of Homeland Security, dismissed worries about civil liberties concerns.
[I]t appears that law enforcement has been gaining access to our call metadata for as long as billing records have existed — nearly a century, he said. If this were the road to Orwells
1984
, surely wed be there by now, and without any help from NSAs 300 searches.
Baker advocates protecting privacy by, paradoxically, embracing big data and subjecting government employees to more effective surveillance.
We need systems that audit for data misuse, that flag questionable searches, and that require employees to explain why they are seeking unusual data access, he said. Thats far more likely to provide effective protection against misuse of private data than trying to keep cheap data out of government hands. ... A proper system for auditing access to restricted data would not just improve privacy enforcement, it likely would have flagged both Bradley Manning and Edward Snowden for their unusual network browsing habits.
Jameel Jaffer, deputy legal director of the American Civil Liberties Union Foundation, offered testimony in the opposite direction. He
called for Congress
to amend the Foreign Intelligence Surveillance Act to prohibit suspicionless, dragnet monitoring or tracking of Americans communications, to require more disclosure about Foreign Intelligence Surveillance Court opinions, and to ensure that government surveillance activities are subject to reasonable judicial scrutiny.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
NSA Surveillance Can Penetrate VPNs