{"id":29666,"date":"2015-03-12T14:41:00","date_gmt":"2015-03-12T18:41:00","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/did-gchq-crack-encryption-parliaments-security-committee-suggests-gchq-can-read-encrypted-communications.php"},"modified":"2015-03-12T14:41:00","modified_gmt":"2015-03-12T18:41:00","slug":"did-gchq-crack-encryption-parliaments-security-committee-suggests-gchq-can-read-encrypted-communications","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/did-gchq-crack-encryption-parliaments-security-committee-suggests-gchq-can-read-encrypted-communications.php","title":{"rendered":"Did GCHQ crack encryption? Parliament&#8217;s security committee suggests GCHQ can read encrypted communications"},"content":{"rendered":"<p><p>    Today's report from Parliament's Intelligence and Security    Committee has suggested that GCHQ has broken computer    encryption systems and is able to read messages that ought to    be secure.  <\/p>\n<p>    The admission is made at the bottom of page 67 of the report.  <\/p>\n<p>    Under the headline, \"Reading Encrypted Communications\", it    states: \"Terrorists, criminals and hostile states increasingly    use encryption to protect their communications. The ability to    decrypt these communications is core to GCHQ's work, and    therefore they have designed a programme of work - [redacted] -    to enable them to read encrypted communications.\"  <\/p>\n<p>    The report states that there are three main strands to GCHQ's    work, two of which are redacted in the report, but the third    simply reads \"developing decryption capabilities\". The wording    of the report, though, suggests that GCHQ has already achieved    this, although how efficiently and quickly it is able to do so,    and what encryption systems it refers to, remains open to    question.  <\/p>\n<p>    The report claims that such encryption-cracking is legal under    section three of the Intelligence Services Act, which empowers    the security services to, \"monitor or interfere with    electromagnetic, acoustic and other emissions and any equipment    producing such emissions and to obtain and provide information    derived from or related to such emissions or equipment and from    encrypted material\".  <\/p>\n<p>    No additional ministerial or judicial authorisation is required    for these activities, claims the report, although there is an    internal procedure that the committee redacted from the report.  <\/p>\n<p>    \"Many people believe, based on the Snowden leaks, that GCHQ    systematically undermine and weaken common internet encryption    products,\" claims the committee. But under questioning,    representatives of GCHQ claimed that they \"have increasingly    taken into account the interests of members of the public who    will use relevant products\".  <\/p>\n<p>    One of the early claims arising from the disclosures by US    National Security Agency (NSA) whistleblower Edward Snowden was    that the NSA had \"circumvented or cracked\" internet    encryption.  <\/p>\n<p>    One of the ways in which it did this was by nobbling an    encryption standards-setting committee to incorporate    technology it knew to be flawed. It could then exploit those    flaws when the technology was commercially deployed.  <\/p>\n<p>    It also paid RSA Security, one of the best-known    security software companies, $10m to incorporate flawed    technology in its products and NSA-compromised technology was later found in a    second security tool, the Bsafe security suite, sold by    RSA.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View original post here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/feeds.computing.co.uk\/c\/554\/f\/538923\/s\/4452ca36\/sc\/21\/l\/0L0Scomputing0O0Cctg0Cnews0C23994670Cdid0Egchq0Ecrack0Eencryption0Eparliaments0Esecurity0Ecommittee0Esuggests0Egchq0Ecan0Eread0Eencrypted0Ecommunications\/story01.htm\/RK=0\/RS=3NzIcLm61iTMbsI_DKB1D75xVkk-\" title=\"Did GCHQ crack encryption? Parliament's security committee suggests GCHQ can read encrypted communications\">Did GCHQ crack encryption? Parliament's security committee suggests GCHQ can read encrypted communications<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Today's report from Parliament's Intelligence and Security Committee has suggested that GCHQ has broken computer encryption systems and is able to read messages that ought to be secure. The admission is made at the bottom of page 67 of the report. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-29666","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29666"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=29666"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29666\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=29666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=29666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=29666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}