Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

US Says Snowden Leak on Code-breaking is ‘Not News’

WASHINGTON – Leaks revealing how American spies have circumvented encryption for online communications are “not news” because code-breaking is part of their job, US intelligence said Friday.

WASHINGTON – Leaks revealing how American spies have circumvented encryption for online communications are “not news” because code-breaking is part of their job, US intelligence said Friday.

But revelations to newspapers about how the National Security Agency (NSA), along with British spy services, have deciphered data under encryption could help America’s adversaries, the Office of the Director of National Intelligence said in a statement.

“While the specifics of how our intelligence agencies carry out this cryptanalytic mission have been kept secret, the fact that NSA’s mission includes deciphering enciphered communications is not a secret, and is not news,” the ODNI said in a statement.

“It should hardly be surprising that our intelligence agencies seek ways to counteract our adversaries’ use of encryption,” the ODNI said.

“Throughout history, nations have used encryption to protect their secrets, and today terrorists, cybercriminals, human traffickers and others also use code to hide their activities,” it said.

“Our intelligence community would not be doing its job if we did not try to counter that,” the office said.

The ODNI noted that the National Security Agency’s website describes its mission to include “cryptology.”

The statement came a day after the latest dramatic disclosures about the scale of American electronic surveillance, based on leaks from former US intelligence contractor Edward Snowden.

Advertisement. Scroll to continue reading.

Documents handed over by Snowden to The Guardian, The New York Times and ProPublica suggest US and British intelligence agencies are able to penetrate supposedly secure encryption used to protect emails, banking transactions and phone conversations.

The National Security Agency, working with its British counterpart, GCHQ, accomplished the feat by using supercomputers, court orders, and some cooperation from technology firms, according to the leaked documents.

The ODNI expressed concern that the details divulged by Snowden could undermine efforts to track threats posed to the United States and its allies.

“The stories published yesterday, however, reveal specific and classified details about how we conduct this critical intelligence activity.

“Anything that yesterday’s disclosures add to the ongoing public debate is outweighed by the road map they give to our adversaries about the specific techniques we are using to try to intercept their communications in our attempts to keep America and our allies safe …,” the ODNI statement said.

The reports noted that US intelligence officials asked the news organizations not to publish articles on the subject, fearing it would prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read.

ProPublica, an independent, non-profit organization devoted to investigative journalism which has partnered with The Guardian and The New York Times to review documents from Snowden, said it decided to go ahead with the report because of its importance to the public.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.