“Building in vulnerabilities in security products,” one of several methods the N.S.A. and G.C.H.Q. used to unlock encryption methods previously thought secure, according to the Guardian.co.uk, NYTimes.com and ProPublica.org. When the Canadian company BlackBerry updated its encryption in 2009, for example, the N.S.A. cracked it in mere months, according to a Spiegel.de article headlined “Champagne!”
These two large agencies and their partners in e.g. the Five Eyes alliance have also been benefiting from encryption cracking via supercomputers, targeted hacking committees, strange U.S. letters and court orders that forbid the ordered from ever mentioning the order, an N.S.A. Computer Solutions Center that “provided security testing” for tech products, subversion of international security standards used by developers but especially persuasion of tech companies, whose names remain most secret.
Tagesschau.de reported on 06 Sep 2013 that the “Bankenverband“—the name indicates an association of banks but the reporter did not define it more specifically—announced that N.S.A. employees and contractors can only view Germans’ online banking but cannot transfer money out of (“plunder”) their accounts. German consumers will not be reassured by this.
Brazil’s TV Globo on 08 Sep 2013 added to the list of snooped targets the international S.W.I.F.T. bank transfer network, the closed computer networks of “airlines, foreign governments, power companies and financial institutions” and the state-owned Brazilian oil company Petrobras, increasing fears of industrial espionage by the U.S.A. and its allies.
The Guardian.co.uk article on the targeted placement of back doors into encryption software was very angry about how vulnerable to criminals this makes everyone (called “the consumer and other adversaries” in one Snowden trove document). Weakening software causes people to commit crimes who wouldn’t normally have done so.
(Sh VOCHH shtell en in ZICHH ah heights prod OOK teh EYE n bough en.)