The NSA Broke the Internet

image
Published: 06 Sep, 2013
2 min read

While companies like Facebook and Google strain themselves to convince users that their private information is safe, even from the government, a recent article published by The New York Times may not go over well.

According to the NYT, a recently disclosed document reveals that the NSA has the resources and knowhow to get passed the encryption that "guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats, and phone calls of Americans and others around the world..."

In other words, the NSA has cracked the Internet.

Ever since Edward Snowden leaked classified information on the surveillance programs conducted by the NSA, questions concerning the state of privacy in America have pervaded throughout the country. As more information is revealed on the dirty secrets of the intelligence community, the public trust in the federal government to protect privacy rights is waning.

The program used by the NSA that carves out its own "back door" in online encryptions, code-named Bullrun, "deployed custom-built, superfast computers to break codes." But, the agency didn't accomplish this on its own.

According to the leaked document, courtesy of Snowden, The NSA worked with technology companies in the US and around the world to create entry points into their products. Some companies claim they were coerced by the government to build a back door for them or hand over their "master encryption keys."

The document, however, does not reveal specific company names.

The NSA says its ability to crack encryptions is vital to its mission. The agency's efforts are still governed by laws that forbid it from deliberately targeting Americans without a warrant, but if nothing else, the document on "Bullrun" reveals that privacy protections cannot necessarily deter the intelligence community from not only collecting data, but reading the information it collects.

Agency officials are correct to some degree. The NSA must be able to decipher encrypted messages from known terrorists or terrorist cells, foreign spies, and enemies of the state. However, there must be safeguards to ensure that the rights of the American people are protected and preserved. When the NSA breaks those barriers down, Americans and people around the world are right to be skeptical of the agency and its actions.

IVP Donate

It's not just about transparency in government. The NSA can find a way around that. It is about accountability.

You Might Also Like

Ballrooms, Ballots, and a Three-Way Fight for New York
Ballrooms, Ballots, and a Three-Way Fight for New York
The latest Independent Voter Podcast episode takes listeners through the messy intersections of politics, reform, and public perception. Chad and Cara open with the irony of partisan outrage over trivial issues like a White House ballroom while overlooking the deeper dysfunctions in our democracy. From California to Maine, they unpack how the very words on a ballot can tilt entire elections and how both major parties manipulate language and process to maintain power....
30 Oct, 2025
-
1 min read
California Prop 50 gets an F
Princeton Gerrymandering Project Gives California Prop 50 an 'F'
The special election for California Prop 50 wraps up November 4 and recent polling shows the odds strongly favor its passage. The measure suspends the state’s independent congressional map for a legislative gerrymander that Princeton grades as one of the worst in the nation....
30 Oct, 2025
-
3 min read
bucking party on gerrymandering
5 Politicians Bucking Their Party on Gerrymandering
Across the country, both parties are weighing whether to redraw congressional maps ahead of the 2026 midterm elections. Texas, California, Missouri, North Carolina, Utah, Indiana, Colorado, Illinois, and Virginia are all in various stages of the action. Here are five politicians who have declined to support redistricting efforts promoted by their own parties....
31 Oct, 2025
-
4 min read