Sie sind auf Seite 1von 6

12/28/201408:01PM

PryingEyes

InsidetheNSA'sWaronInternetSecurity
BySPIEGELStaff
USandBritishintelligenceagenciesundertakeeveryeffortimaginabletocrackalltypesof
encryptedInternetcommunication.Thecloud,itseems,isfullofholes.Thegoodnews:
NewSnowdendocumentsshowthatsomeformsofencryptionstillcauseproblemsforthe
NSA.
WhenChristmasapproaches,thespiesoftheFiveEyesintelligenceservicescanlookforwardtoabreak
fromthearduousdailyworkofspying.Inadditiontotheirusualjobattemptingtocrackencryption
allaroundtheworldtheyplayagamecalledthe"KryptosKristmasKwiz,"whichinvolvessolving
challengingnumericalandalphabeticalpuzzles.Theproudwinnersofthecompetitionareawarded
"Kryptos"mugs.
Encryptiontheuseofmathematicstoprotectcommunicationsfromspyingisusedforelectronic
transactionsofalltypes,bygovernments,firmsandprivateusersalike.Butalookintothearchiveof
whistleblowerEdwardSnowdenshowsthatnotallencryptiontechnologiesliveuptowhatthey
promise.
OneexampleistheencryptionfeaturedinSkype,aprogramusedbysome300millionusersto
conductInternetvideochatthatistoutedassecure.Itisn'treally."SustainedSkypecollectionbegan
inFeb2011,"readsaNationalSecurityAgency(NSA)trainingdocumentfromthearchiveof
whistleblowerEdwardSnowden.Lessthanhalfayearlater,inthefall,thecodecrackersdeclaredtheir
missionaccomplished.Sincethen,datafromSkypehasbeenaccessibletotheNSA'ssnoops.Software
giantMicrosoft,whichacquiredSkypein2011,saidinastatement:"Wewillnotprovidegovernments
withdirectorunfetteredaccesstocustomerdataorencryptionkeys."TheNSAhadbeenmonitoring
Skypeevenbeforethat,butsinceFebruary2011,theservicehasbeenunderorderfromthesecretUS
ForeignIntelligenceSurveillanceCourt(FISC),tonotonlysupplyinformationtotheNSAbutalsoto
makeitselfaccessibleasasourceofdatafortheagency.
The"sustainedSkypecollection"isafurthersteptakenbytheauthorityinthearmsracebetween
intelligenceagenciesseekingtodenyusersoftheirprivacyandthosewantingtoensuretheyare
protected.Therehavealsobeensomevictoriesforprivacy,withcertainencryptionsystemsprovingto
besorobusttheyhavebeentriedandtruestandardsformorethan20years.
FortheNSA,encryptedcommunicationorwhatallotherInternetuserswouldcallsecure
communicationis"athreat".InoneinternaltrainingdocumentviewedbySPIEGEL,anNSA
employeeasks:"DidyouknowthatubiquitousencryptionontheInternetisamajorthreattoNSA's
abilitytoprosecutedigitalnetworkintelligence(DNI)trafficordefeatadversarymalware?"
TheSnowdendocumentsrevealtheencryptionprogramstheNSAhassucceededincracking,but,
importantly,alsotheonesthatarestilllikelytobesecure.Althoughthedocumentsarearoundtwo
yearsold,expertsconsideritunlikelytheagency'sdigitalspieshavemademuchprogressincracking
thesetechnologies."Properlyimplementedstrongcryptosystemsareoneofthefewthingsthatyou
canrelyon,"SnowdensaidinJune2013,afterfleeingtoHongKong.
Thedigitizationofsocietyinthepastseveraldecadeshasbeenaccompaniedbythebroaddeployment
ofcryptography,whichisnolongertheexclusiverealmofsecretagents.Whetherapersonis
conductingonlinebanking,Internetshoppingormakingaphonecall,almosteveryInternetconnection
todayisencryptedinsomeway.Theentirerealmofcloudcomputingthatisofoutsourcing
computingtaskstodatacenterssomewhereelse,possiblyevenontheothersideofthegloberelies
heavilyoncryptographicsecuritysystems.Internetactivistsevenholdcryptopartieswheretheyteach
peoplewhoareinterestedincommunicatingsecurelyandprivatelyhowtoencrypttheirdata.
Germanofficialssuggest"consistentencryption"
InGermany,concernabouttheneedforstrongencryptiongoesrightuptothehighestlevelsofthe
government.ChancellorAngelaMerkelandhercabinetnowcommunicateusingphonesincorporating
strongencryption.ThegovernmenthasalsoencouragedmembersoftheGermanpublictotakesteps

toprotecttheirowncommunication.MichaelHange,thepresidentoftheFederalOfficeforInformation
Security,hasstated:"Wesuggestcryptographythatis,consistentencryption."
It'sasuggestionunlikelytopleasesomeintelligenceagencies.Afterall,theFiveEyesalliancethe
secretservicesofBritain,Canada,Australia,NewZealandandtheUnitedStatespursueacleargoal:
removingtheencryptionofothersontheInternetwhereverpossible.In2013,theNSAhadabudget
ofmorethan$10billion.AccordingtotheUSintelligencebudgetfor2013,themoneyallocatedforthe
NSAdepartmentcalledCryptanalysisandExploitationServices(CES)alonewas$34.3million.
Lastyear,theGuardian,NewYorkTimesandProPublicareportedonthecontentsofa2010
presentationontheNSA'sBULLRUNdecryptionprogram,butleftoutmanyspecificvulnerabilities.The
presentationstatesthat,"forthepastdecade,NSAhasledanaggressive,multiprongedefforttobreak
widelyusedInternetencryptiontechnologies,"and"vastamountsofencryptedInternetdatawhich
haveuptillnowbeendiscardedarenowexploitable."Decryption,itturnsout,worksretroactively
onceasystemisbroken,theagenciescanlookbackintimeintheirdatabasesandreadstuffthey
couldnotreadbefore.
ThenumberofInternetusersconcernedaboutprivacyonlinehasrisendramaticallysincethefirst
Snowdenrevelations.Butpeoplewhoconsciouslyusestrongendtoendencryptiontoprotecttheir
datastillrepresentaminorityoftheInternetusingpopulation.Thereareanumberofreasonsforthis:
Somebelieveencryptionistoocomplicatedtouse.Ortheythinktheintelligenceagencyexpertsare
alreadysomanystepsaheadofthemthattheycancrackanyencryptionprogram.
StillSafefromtheNSA
Thisisn'ttrue.AsonedocumentfromtheSnowdenarchiveshows,theNSAhadbeenunsuccessfulin
attemptstodecryptseveralcommunicationsprotocols,atleastasof2012.AnNSApresentationfora
conferencethattookplacethatyearliststheencryptionprogramstheAmericansfailedtocrack.Inthe
process,theNSAcryptologistsdividedtheirtargetsintofivelevelscorrespondingtothedegreeofthe
difficultyoftheattackandtheoutcome,rangingfrom"trivial"to"catastrophic."
Monitoringadocument'spaththroughtheInternetisclassifiedas"trivial."RecordingFacebookchatsis
considereda"minor"task,whilethelevelofdifficultyinvolvedindecryptingemailssentthrough
MoscowbasedInternetserviceprovider"mail.ru"isconsidered"moderate."Still,allthreeofthose
classificationsdon'tappeartoposeanysignificantproblemsfortheNSA.
Thingsfirstbecometroublesomeatthefourthlevel.ThepresentationstatesthattheNSAencounters
"major"problemsinitsattemptstodecryptmessagessentthroughheavilyencryptedemailservice
providerslikeZohoorinmonitoringusersoftheTornetwork*,whichwasdevelopedforsurfingthe
webanonymously.Tor,otherwiseknownasTheOnionRouter,isfreeandopensourcesoftwarethat
allowsuserstosurfthewebthroughanetworkofmorethan6,000linkedvolunteercomputers.The
softwareautomaticallyencryptsdatainawaythatensuresthatnosinglecomputerinthenetworkhas
allofauser'sinformation.Forsurveillanceexperts,itbecomesverydifficulttotracethewhereaboutsof
apersonwhovisitsaparticularwebsiteortoattackaspecificpersonwhiletheyareusingTortosurf
theWeb.
TheNSAalsohas"major"problemswithTruecrypt,aprogramforencryptingfilesoncomputers.
Truecrypt'sdevelopersstoppedtheirworkontheprogramlastMay,promptingspeculationabout
pressuresfromgovernmentagencies.AprotocolcalledOfftheRecord(OTR)forencryptinginstant
messaginginanendtoendencryptionprocessalsoseemstocausetheNSAmajorproblems.Bothare
programswhosesourcecodecanbeviewed,modified,sharedandusedbyanyone.Expertsagreeitis
farmoredifficultforintelligenceagenciestomanipulateopensourcesoftwareprogramsthanmanyof
theclosedsystemsdevelopedbycompanieslikeAppleandMicrosoft.Sinceanyonecanviewfreeand
opensourcesoftware,itbecomesdifficulttoinsertsecretbackdoorswithoutitbeingnoticed.
TranscriptsofinterceptedchatsusingOTRencryptionhandedovertotheintelligenceagencybya
partnerinPrismanNSAprogramthataccessesdatafromatleastnineAmericaninternetcompanies
suchasGoogle,FacebookandAppleshowthattheNSA'seffortsappeartohavebeenthwartedin
thesecases:"NodecryptavailableforthisOTRmessage."ThisshowsthatOTRatleastsometimes
makescommunicationsimpossibletoreadfortheNSA.
Thingsbecome"catastrophic"fortheNSAatlevelfivewhen,forexample,asubjectusesa
combinationofTor,anotheranonymizationservice,theinstantmessagingsystemCSpaceanda
systemforInternettelephony(voiceoverIP)calledZRTP.Thistypeofcombinationresultsina"near
totalloss/lackofinsighttotargetcommunications,presence,"theNSAdocumentstates.
ZRTP,whichisusedtosecurelyencryptconversationsandtextchatsonmobilephones,isusedinfree
andopensourceprogramslikeRedPhoneandSignal."It'ssatisfyingtoknowthattheNSAconsiders

encryptedcommunicationfromourappstobetrulyopaque,"saysRedPhonedeveloperMoxie
Marlinspike.
TooRobustforFortMeade
Also,the"Z"inZRTPstandsforoneofitsdevelopers,PhilZimmermann,thesamemanwhocreated
PrettyGoodPrivacy,whichisstillthemostcommonencryptionprogramforemailsanddocumentsin
usetoday.PGPismorethan20yearsold,butapparentlyitremainstoorobustfortheNSAspiesto
crack."NodecryptavailableforthisPGPencryptedmessage,"afurtherdocumentviewedbySPIEGEL
statesofemailstheNSAobtainedfromYahoo.
PhilZimmermannwrotePGPin1991.TheAmericannuclearweaponsfreezeactivistwantedtocreate
anencryptionprogramthatwouldenablehimtosecurelyexchangeinformationwithotherlikeminded
individuals.Hissystemquicklybecameverypopularamongdissidentsaroundtheworld.Givenitsuse
outsidetheUnitedStates,theUSgovernmentlaunchedaninvestigationintoZimmermannduringthe
1990sforallegedlyviolatingtheArmsExportControlAct.Prosecutorsarguedthatmakingencryption
softwareofsuchcomplexityavailableabroadwasillegal.Zimmermannrespondedbypublishingthe
sourcecodeasabook,anactthatwasconstitutionallyprotectedasfreespeech.
PGPcontinuestobedevelopedandvariousversionsareavailabletoday.ThemostwidelyusedisGNU
PrivacyGuard(GnuPG),aprogramdevelopedbyGermanprogrammerWernerKoch.Onedocument
showsthattheFiveEyesintelligenceservicessometimesusePGPthemselves.Thefactisthathackers
obsessedwithprivacyandtheUSauthoritieshavealotmoreincommonthanonemightinitially
believe.TheTorProject*,wasoriginallydevelopedwiththesupportoftheUSNavalResearch
Laboratory.
Today,NSAspiesandtheiralliesdotheirbesttosubvertthesystemtheirownmilitaryhelpedconceive,
asanumberofdocumentsshow.TordeanonymizationisobviouslyhighonthelistofNSApriorities,
butthesuccessachievedhereseemslimited.OneGCHQdocumentfrom2011evenmentionstryingto
decrypttheagencies'ownuseofTorasatestcase.
Toacertainextent,theSnowdendocumentsshouldprovidesomelevelofrelieftopeoplewhothought
nothingcouldstoptheNSAinitsunquenchablethirsttocollectdata.Itappearssecurechannelsstill
existforcommunication.Nevertheless,thedocumentsalsounderscorejusthowfartheintelligence
agenciesalreadygointheirdigitalsurveillanceactivities.
InternetsecuritycomesatvariouslevelsandtheNSAanditsalliesobviouslyareableto"exploit"
i.e.crackseveralofthemostwidelyusedonesonascalethatwaspreviouslyunimaginable.
VPNSecurityonlyVirtual
Oneexampleisvirtualprivatenetworks(VPN),whichareoftenusedbycompaniesandinstitutions
operatingfrommultipleofficesandlocations.AVPNtheoreticallycreatesasecuretunnelbetweentwo
pointsontheInternet.Alldataischanneledthroughthattunnel,protectedbycryptography.Whenit
comestothelevelofprivacyofferedhere,virtualistherightword,too.ThisisbecausetheNSA
operatesalargescaleVPNexploitationprojecttocracklargenumbersofconnections,allowingitto
interceptthedataexchangedinsidetheVPNincluding,forexample,theGreekgovernment'suseof
VPNs.TheteamresponsiblefortheexploitationofthoseGreekVPNcommunicationsconsistedof12
people,accordingtoanNSAdocumentSPIEGELhasseen.
TheNSAalsotargetedSecurityKiss,aVPNserviceinIreland.ThefollowingfingerprintforXkeyscore,
theagency'spowerfulspyingtool,wasreportedtobetestedandworkingagainsttheservice:
fingerprint('encryption/securitykiss/x509')=$pkcsand(($tcpandfrom_port(443))or($udp
and(from_port(123)orfrom_por(5000)orfrom_port(5353))))and(not
(ip_subnet('10.0.0.0/8'or'172.16.0.0/12'or'192.168.0.0/16')))and'RSAGeneratedServer
Certificate'cand'Dublin1'cand'GLCA'c
AccordingtoanNSAdocumentdatingfromlate2009,theagencywasprocessing1,000requestsan
hourtodecryptVPNconnections.Thisnumberwasexpectedtoincreaseto100,000perhourbythe
endof2011.Theaimwasforthesystemtobeabletocompletelyprocess"atleast20percent"of
theserequests,meaningthedatatrafficwouldhavetobedecryptedandreinjected.Inotherwords,by
theendof2011,theNSA'splanscalledforsimultaneouslysurveilling20,000supposedlysecureVPN
communicationsperhour.
VPNconnectionscanbebasedonanumberofdifferentprotocols.Themostwidelyusedonesarecalled
PointtoPointTunnelingProtocol(PPTP)andInternetProtocolSecurity(Ipsec).Bothseemtoposefew

problemsfortheNSAspiesiftheyreallywanttocrackaconnection.ExpertshaveconsideredPPTP
insecureforsometimenow,butitisstillinuseinmanycommercialsystems.TheauthorsofoneNSA
presentationboastofaprojectcalledFOURSCOREthatstoresinformationincludingdecryptedPPTPVPN
metadata.
Usinganumberofdifferentprograms,theyclaimtohavesucceededinpenetratingnumerous
networks.AmongthosesurveilledweretheRussiancarrierTransaeroAirlines,RoyalJordanianAirlines
aswellasMoscowbasedtelecommunicationsfirmMirTelematiki.AnothersuccesstoutedistheNSA's
surveillanceoftheinternalcommunicationsofdiplomatsandgovernmentofficialsfromAfghanistan,
PakistanandTurkey.
Ipsecasaprotocolseemstocreateslightlymoretroubleforthespies.ButtheNSAhastheresources
toactivelyattackroutersinvolvedinthecommunicationprocesstogettothekeystounlockthe
encryptionratherthantryingtobreakit,courtesyoftheunitcalledTailoredAccessOperations:"TAO
gotontherouterthroughwhichbankingtrafficofinterestflows,"itsaysinonepresentation.
AnythingButSecure
EvenmorevulnerablethanVPNsystemsarethesupposedlysecureconnectionsordinaryInternet
usersmustrelyonallthetimeforWebapplicationslikefinancialservices,ecommerceoraccessing
webmailaccounts.Alayusercanrecognizetheseallegedlysecureconnectionsbylookingatthe
addressbarinhisorherWebbrowser:Withtheseconnections,thefirstlettersoftheaddressthereare
notjusthttpforHypertextTransferProtocolbuthttps.The"s"standsfor"secure".Theproblemis
thatthereisn'treallyanythingsecureaboutthem.
TheNSAanditsalliesroutinelyinterceptsuchconnectionsbythemillions.AccordingtoanNSA
document,theagencyintendedtocrack10millioninterceptedhttpsconnectionsadaybylate2012.
Theintelligenceservicesareparticularlyinterestedinthemomentwhenausertypeshisorher
password.Bytheendof2012,thesystemwassupposedtobeableto"detectthepresenceofatleast
100passwordbasedencryptionapplications"ineachinstancesome20,000timesamonth.
Foritspart,Britain'sGCHQcollectsinformationaboutencryptionusingtheTLSandSSLprotocolsthe
protocolshttpsconnectionsareencryptedwithinadatabasecalled"FLYINGPIG."TheBritishspies
produceweekly"trendsreports"tocatalogwhichservicesusethemostSSLconnectionsandsave
detailsaboutthoseconnections.SiteslikeFacebook,Twitter,Hotmail,YahooandApple'siCloudservice
topthecharts,andthenumberofcataloguedSSLconnectionsforoneweekisinthemanybillions
forthetop40sitesalone.
Hockeysitesmonitored
Canada'sCommunicationsSecurityEstablishment(CSEC)evenmonitorssitesdevotedtothecountry's
nationalpastime:"Wehavenoticedalargeincreaseinchatactivityonthehockeytalksites.Thisis
likelyduetothebeginningofplayoffseason,"itsaysinonepresentation.
TheNSAalsohasaprogramwithwhichitclaimsitcansometimesdecrypttheSecureShellprotocol
(SSH).Thisistypicallyusedbysystemsadministratorstologintoemployees'computersremotely,
largelyforuseintheinfrastructureofbusinesses,coreInternetroutersandothersimilarlyimportant
systems.TheNSAcombinesthedatacollectedinthismannerwithotherinformationtoleverage
accesstoimportantsystemsofinterest.
WeakeningCryptographicStandards
ButhowdotheFiveEyesagenciesmanagetobreakalltheseencryptionstandardsandsystems?The
shortansweris:Theyuseeverymeansavailable.
Onemethodisconsciouslyweakeningthecryptographicstandardsthatareusedtoimplementthe
respectivesystems.DocumentsseenbySPIEGELshowthatNSAagentstraveltothemeetingsofthe
InternetEngineeringTaskForce(IETF),anorganizationthatdevelopssuchstandards,togather
informationbutpresumablyalsotoinfluencethediscussionsthere."Newsessionpolicyextensionsmay
improveourabilitytopassivelytargettwosidedcommunications,"saysabriefwriteupofanIETF
meetinginSanDiegoonanNSAinternalWiki.
Thisprocessofweakeningencryptionstandardshasbeengoingonforsometime.Aclassificationguide,
adocumentthatexplainshowtoclassifycertaintypesofsecretinformation,labels"thefactthat
NSA/CSSmakescryptographicmodificationstocommercialorindigenouscryptographicinformation
securitydevicesorsystemsinordertomakethemexploitable"asTopSecret.
Cryptographicsystemsactivelyweakenedthiswayorfaultytobeginwitharethenexploitedusing

supercomputers.TheNSAmaintainsasystemcalledLonghaul,an"endtoendattackorchestration
andkeyrecoveryserviceforDataNetworkCipherandDataNetworkSessionCiphertraffic."Basically,
LonghaulistheplacewheretheNSAlooksforwaystobreakencryption.AccordingtoanNSA
document,itusesfacilitiesattheTordellaSupercomputerBuildingatFortMeade,Maryland,andOak
RidgeDataCenterinOakRidge,Tennessee.ItcanpassdecrypteddatatosystemssuchasTurmoila
partofthesecretnetworktheNSAoperatesthroughouttheworld,usedtosiphonoffdata.Thecover
termforthedevelopmentofthesecapabilitiesisValientsurf.AsimilarprogramcalledGallantwaveis
meantto"breaktunnelandsessionciphers."
Inothercases,thespiesusetheirinfrastructuretostealcryptographickeysfromtheconfigurationfiles
foundonInternetrouters.ArepositorycalledDiscoroutecontains"routerconfigurationdatafrom
passiveandactivecollection"onedocumentstates.Activeheremeanshackingorotherwiseinfiltrating
computers,passivereferstocollectingdataflowingthroughtheInternetwithsecretNSAoperated
computers.
AnimportantpartoftheFiveEyes'effortstobreakencryptionontheInternetisthegatheringofvast
amountsofdata.Forexample,theycollectsocalledSSLhandshakesthatis,thefirstexchanges
betweentwocomputersbeginninganSSLconnection.Acombinationofmetadataaboutthe
connectionsandmetadatafromtheencryptionprotocolsthenhelptobreakthekeyswhichinturn
allowreadingorrecordingthenowdecryptedtraffic.
Ifallelsefails,theNSAanditsalliesresorttobruteforce:Theyhacktheirtarget'scomputersor
Internetrouterstogettothesecretencryptionortheyinterceptcomputersonthewaytotheir
targets,openthemandinsertspygearbeforetheyevenreachtheirdestination,aprocesstheycall
interdiction.
AGraveThreattoSecurity
FortheNSA,thebreakingofencryptionmethodsrepresentsaconstantconflictofinterest.Theagency
anditsalliesdohavetheirownsecretencryptionmethodsforinternaluse.ButtheNSAisalsotasked
withprovidingtheUSNationalInstituteofStandardsandTechnology(NIST)with"technicalguidelines
intrustedtechnology"thatmaybe"usedincosteffectivesystemsforprotectingsensitivecomputer
data."Inotherwords:CheckingcryptographicsystemsfortheirvalueispartoftheNSA'sjob.One
encryptionstandardtheNISTexplicitlyrecommendsistheAdvancedEncryptionStandard(AES).The
standardisusedforalargevarietyoftasks,fromencryptingthePINnumbersofbankingcardstohard
diskencryptionforcomputers.
OneNSAdocumentshowsthattheagencyisactivelylookingforwaystobreaktheverystandardit
recommendsthissectionismarkedas"TopSecret"(TS):"Electroniccodebooks,suchasthe
AdvancedEncryptionStandard,arebothwidelyusedanddifficulttoattackcryptanalytically.TheNSA
hasonlyahandfulofinhousetechniques.TheTUNDRAprojectinvestigatedapotentiallynew
techniquetheTaustatistictodetermineitsusefulnessincodebookanalysis."
ThefactthatlargeamountsofthecryptographicsystemsthatunderpintheentireInternethavebeen
intentionallyweakenedorbrokenbytheNSAanditsalliesposesagravethreattothesecurityof
everyonewhoreliesontheInternetfromindividualslookingforprivacytoinstitutionsand
companiesrelyingoncloudcomputing.Manyoftheseweaknessescanbeexploitedbyanyonewho
knowsaboutthemnotjusttheNSA.
Insidetheintelligencecommunity,thisdangeriswidelyknown:Accordingtoa2011document,832
individualsatGCHQalonewerebriefedintotheBULLRUNproject,whosegoalisalargescaleassaulton
Internetsecurity.
ByJacobAppelbaum,AaronGibson,ChristianGrothoff,AndyMllerMaguhn,LauraPoitras,Michael
SontheimerandChristianStcker

*Twocoauthorsofthisarticle,JacobAppelbaumandAaronGibson,workontheTorProject.
AppelbaumalsoworksontheOTRproject,aswellascontributingtootherencryptionprograms.
URL:
http://www.spiegel.de/international/germany/insidethensaswaroninternetsecuritya
1010361.html
RelatedSPIEGELONLINElinks:
NSADocuments:AttacksonVPN,SSL,TLS,SSH,Tor(12/28/2014)
http://www.spiegel.de/international/world/nsadocumentsattacksonvpnssltlssshtora

1010525.html
Obama'sLists:ADubiousHistoryofTargetedKillingsinAfghanistan(12/28/2014)
http://www.spiegel.de/international/world/secretdocsrevealdubiousdetailsoftargetedkillingsin
afghanistana1010358.html
TreasureMap:TheNSABreachofTelekomandOtherGermanFirms(09/14/2014)
http://www.spiegel.de/international/world/snowdendocumentsindicatensahasbreacheddeutsche
telekoma991503.html
ATwoFacedFriendship:TurkeyIs'PartnerandTarget'fortheNSA(08/31/2014)
http://www.spiegel.de/international/world/documentsshownsaandgchqspiedonpartnerturkeya
989011.html
TargetingTurkey:HowGermanySpiesonItsFriends(08/18/2014)
http://www.spiegel.de/international/germany/germanconsidersturkeytobeofficialtargetforspying
a986656.html
InsideTAO:DocumentsRevealTopNSAHackingUnit(12/29/2013)
http://www.spiegel.de/international/world/thensausespowerfultoolboxinefforttospyonglobal
networksa940969.html
Relatedinternetlinks
"ProPublica":Revealed:TheNSAsSecretCampaigntoCrack,UndermineInternetSecurity
(05.09.2013)
http://www.propublica.org/article/thensassecretcampaigntocrackundermineinternetencryption
Guardian:HowNSAandGCHQDefeatInternetPrivacyandSecurity
http://www.theguardian.com/world/2013/sep/05/nsagchqencryptioncodessecurity
'NYT":IntelligenceBudgetmitAntiVerschlsselungsProgramm
http://www.nytimes.com/interactive/2013/09/05/us/documentsrevealnsacampaignagainst
encryption.html?_r=0
SPIEGELONLINEisnotliableforthecontentofexternalwebpages.

SPIEGELONLINE2014
AllRightsReserved
ReproductiononlyallowedwiththepermissionofSPIEGELnetGmbH

Das könnte Ihnen auch gefallen