Content deleted Content added
Mor.nitesh (talk | contribs) No edit summary |
Mor.nitesh (talk | contribs) mNo edit summary |
||
Line 5:
Ball, James, Borger, Julian, and Greenwald, Glenn}}</ref><ref name="pp20130905">{{cite news|url=http://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption|title=The NSA’s Secret Campaign to Crack, Undermine Internet Security|date=September 5, 2013|publisher=[[ProPublica]]|author=Perlroth, Nicole, Larson, Jeff, and Shane, Scott|quote=This story has been reported in partnership between The New York Times, the Guardian and ProPublica based on documents obtained by The Guardian. For the Guardian: James Ball, Julian Borger, Glenn Greenwald; For the New York Times: Nicole Perlroth, Scott Shane; For ProPublica: Jeff Larson}}</ref> The British signals intelligence agency [[Government Communications Headquarters]] (GCHQ) has a similar program codenamed '''Edgehill'''. According to the BULLRUN classification guide published by [[The_Guardian|The Guardian]], the program uses multiple sources including [https://www.schneier.com/blog/archives/2014/03/computer_networ.html Computer Network Exploitation], [[Interdiction|interdiction]], industry relationships, collaboration with other [[Integrated_circuit|IC]] entities, and advanced mathematical techniques.
Information about the program's existence was [[news leak|leaked]] in 2013 by [[Edward Snowden]]. Although Snowden's documents do not contain technical information on exact cryptanalytic capabilities because Snowden did not have clearance access to such information,<ref>{{cite web|author=Sean Michael Kerner |url=http://www.eweek.com/blogs/security-watch/nsa-bullrun-911-and-why-enterprises-should-walk-before-they-run.html |title=NSA Bullrun, 9/11 and Why Enterprises Should Walk Before They Run |publisher=Eweek.com |date=2013-09-09 |accessdate=2014-01-23}}</ref> they do contain a 2010 GCHQ presentation which claims that "vast amounts of encrypted Internet data which have up till now been discarded are now exploitable".<ref name=guardian20130905/> A number of technical details regarding the program found in Snowden's documents were additionally censored by the press at the behest of US intelligence officials.<ref name="nytimes1">http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?pagewanted=2&_r=0</ref> Out of all the programs that have been leaked by Edward Snowden, the Bullrun Decryption Program is by far the most expensive. Snowden claims that since 2011, expenses devoted to Bullrun amount to $800 million.The leaked documents reveal that Bullrun seeks to "defeat the encryption used in specific network communication technologies."
==Naming and access==
|