How could the NSA's snooping be foiled?
December 21, 2005 10:57 AM   Subscribe

Could the US government's efforts to scan the contents of everyone's email be overloaded by everyone routinely using encryption for every message?

Is there some strong encryption software that could be used transparently with Google Mail and other common mail systems to encrypt everything sent and received? Something that could be distributed and installed automatically with, say, Firefox? What percentage of everyday email users would have to use such encryption to make it impossible for the NSA or anyone else to keep up with its scanning? (And, by the way, how about encrypting all Skype phone calls?)
posted by pracowity to Computers & Internet (26 answers total)
 
This was the idea behind PGP and most projects undertaken by ypherpunks.
posted by phrontist at 11:07 AM on December 21, 2005


What percentage of everyday email users would have to use such encryption to make it impossible for the NSA or anyone else to keep up with its scanning?

It's highly unlikely the NSA even attempts to crack messages automatically. Far more likely is certain keywords being used to "tag" emails for perusal by human analysts. I remember a few year's back someone came up with a list of words the NSA would likely be watching out for and advocated appending this list to every email and website to "jam" the hypothetical system.
posted by phrontist at 11:08 AM on December 21, 2005


If the transport of everything was encryption, the gov't would attempt to move their interception point to another part of the chain - your browser, client, or keyboard. Be happy that the extent, currently, allows you to selectively encrypt what should be secret without their interference (as far as we know).
posted by kcm at 11:11 AM on December 21, 2005


There is a Gmail S/MIME Firefox extension.
But if you are interested in ongoing private communication with one person, I'd use a one-time pad, like a large sheaf of random numbers you exchanged at some point.

But as phrontist says, if you just want to avoid a keyword scan anything basic will do - even pig latin.
posted by vacapinta at 11:13 AM on December 21, 2005


Previous thread on e-mail encryption.
posted by smackfu at 11:13 AM on December 21, 2005


vacapinta: One time pads are really impractical, because you have to either physicaly deliver the pad to the person, and you have to be certan that they destroy the pad after use.

Really, you can be very certan encrypted email will not be read if you use RSA public key crypto.
posted by delmoi at 11:22 AM on December 21, 2005


But as phrontist says, if you just want to avoid a keyword scan anything basic will do - even pig latin.

Ugh, come on Public key crypto isn't good enough, but pig latin is? What is up with people suggesting non-standard crypto methods? Stop being retarded.

PGP will solve all your problems. This is a known solution, and you should be able to integrate it with almost any mail client.
posted by delmoi at 11:24 AM on December 21, 2005


PGP introduces the problem of being extremely difficult to use both conceptually (do you understand the difference between the choices of ciphers?) and operationally. Getting people to use an appropriate method, which MAY be pig latin, is better than not using a heavyweight monster method.

Just skip DES. Always.
posted by kcm at 11:28 AM on December 21, 2005


i suspect that the level of encrpyted email is so low that it can be given special treatment. if i were the nsa and i had to manage limited resources, i would probably give extra attention to encrypted email.

so there's a trade-off. if you use encrypted email you're probably flagging yourself for extra treament, which probably means additional traffic analysis (perhaps a deeper ply search for connections with known targets?) and, in very extreme cases, more detailed work (including, presumably, attempts to access your private keys and/or change your software).

of course, if everyone used it, then that argument wouldn't be correct.

but anyway, the answer to the question is smime or pgp, and vacapinta's reply implies that smime can be integrated with gmail.
posted by andrew cooke at 11:35 AM on December 21, 2005


The idea that the government reads even a small percentage of internet traffic is completely silly.

oh, i didn't think of that. is it reasonable to assume that all international communication is monitored? (echelon?).
posted by andrew cooke at 11:37 AM on December 21, 2005


Then.. if you used overt encryption to divert attention from your actual communication, which may be covertly encrypted (i.e. steganography) or non-encrypted (code words in plain Hotmail messages), you would be a rank yet bright junior agent.
posted by kcm at 11:37 AM on December 21, 2005


vacapinta, sorry for calling you retarded. :P
posted by delmoi at 11:44 AM on December 21, 2005


If you do decide on a plan to foil the NSA, you'd better hope they never find this thread. For all we know, they're reading it right now, snickering to themselves.
posted by driveler at 11:46 AM on December 21, 2005


Response by poster: is it reasonable to assume that all international communication is monitored?

Looking at the news, it is reasonable to assume that the current US administration would like to monitor all international communication. If they can't quite do it yet, I'm sure it isn't for lack of trying or lack of secret billions in funding.

I would love it if something as silly as a piglatinizer/depiglatinizer plug-in for Firefox and used by millions would mess with the snoopers at the NSA and prepare users for adopting real encryption when needed.
posted by pracowity at 12:03 PM on December 21, 2005


you people realize that anything with a finite, definable input-output mapping (domain/image if you will) is not going to "mess with the NSA".. right?
posted by kcm at 12:13 PM on December 21, 2005


Just pointing this out without any comment....
posted by Arthur Dent at 1:18 PM on December 21, 2005


Processing 10 gigabits per second is not totally outlandish -- the Large Hadron Collider, coming online in a couple of years, is going to produce about that much.

To be sure, dealing with that much output is a hard problem -- I believe data is being farmed out to computing centers all over the world. Still, the total budget for the LHC is "only" about $6 billion, so the amount of resources required doesn't seem to be prohibitive if one is really motivated.
posted by em at 2:41 PM on December 21, 2005


I think the more realistic scenario is that the government will request records from your ISP. It's much easier for the ISP to keep records/copies of your email, and there may be laws in place requiring them to do so for a certain period of time. If your name gets on one of those secret lists, then the gag orders and records requests start flowing, and they read your email retroactively.

I think email encryption would only cause them problems if many people that they choose to target in this manner have encrypted email. For every such person they'd have to crack the encryption, which will cost them a lot in CPU time.
posted by breath at 2:45 PM on December 21, 2005


One might think that applying COTS stock hardware to a large, secret, well-funded gov't project plan could be the wrong approach.
posted by kcm at 2:48 PM on December 21, 2005


Who has some of the most extensive computing power in the world?

That's right, the NSA.

If they're reading everyone's internet traffic, all the time, you can be sure it's not being done by just one computer somewhere. There's bound to be subsidiary nodes scattered around that do an initial pass on the traffic to look for interesting data. Then, the mounds of interesting data get sent higher up the food chain, where it gets filtered again.

Rinse, repeat.
posted by bshort at 3:46 PM on December 21, 2005


I linked earlier to the Libertarian Party as an answer to this, and my comment was deleted as being too abstract, so I'll elaborate.

If you're concerned about the NSA reading your email, no technological solution will help you, and you need to strongly participate in creating a government that simply won't spy on its citizens, and doesn't have the legal power (secret or not) to do so.
posted by Caviar at 4:11 PM on December 21, 2005


So if you (or the NSA) wanted to monitor a international fiber link, you would need something that could process at least 10 gb/sec of data in real time

Something like this?

(asking, not telling)
posted by pompomtom at 5:07 PM on December 21, 2005


OTP encryption is not practical for most purposes. You need an actual random source to generate the pad (pseudorandom number generators won't cut it) There isn't a good way to revoke the key if it's compromised, historical communications are exposed if the key is exposed, and it can't be used with multiple parties.

Also, you need a secure channel to transmit a pad of equal size to your plaintext. If you have that on a regular basis, you might as well just use it to transmit the plaintext in the first place.
posted by Caviar at 7:25 PM on December 21, 2005


Response by poster: All encryption will do is draw attention to your data.

Obviously, but my intention was to have so many people encrypting everything they send to everyone else that the government couldn't keep up with it and wouldn't know where to start.
posted by pracowity at 2:08 AM on December 22, 2005


no technological solution will help you

If there isn't a technical solution, there isn't a solution at all.

All encryption will do is draw attention to your data.

Hence the entire bloody field of steganography, which is often just as important as the actual encryption.

There is really only one reasonable theory as to how the big bad three letter agency at Fort Meade works. They perform a "digital wiretap" (terribly, terribly, stupid term) when you've done something to arouse their suspicion. It could be an inter-library loan request for the little red book, a few too many parking tickets near government buildings, visiting a compromised "terrorist" coordination website, or having a name with too many consonants in a row. The NSA can read anything, but not everything.

The easiest way to avoid all of this is to never call attention to yourself.

So, in conclusion, the basic premise of your question is flawed. It is highly, highly, unlikely the NSA tries to filter even a tiny portion of net traffic, as the signal to noise ratio would not work out in their favor.
posted by phrontist at 5:36 AM on December 22, 2005


the whole point of filtering is to deal with signal to noise. i don't see the argument there at all (but i do see the problems with both volume and access).
posted by andrew cooke at 6:41 AM on December 23, 2005


« Older How do I find publishing interest in a poem?   |   What can I do with a Sociology degree? Newer »
This thread is closed to new comments.