NSA Surveillance Can Penetrate VPNs (2024)

The National Security Agency has a system that allows it to collect pretty much everything a user does on the Internet, according to a report published by The Guardian on Wednesday, apparently even when those activities are done under the presumed protection of a virtual private network (VPN).

The Guardian's information comes from whistleblower Edward Snowden, the former NSA contractor now seeking asylum in Russia from U.S. authorities for revealing classified documents about the NSA's intelligence-gathering capabilities to the media. The news organization's report suggests that Snowden's claim that he could wiretap anyone from his desk, dismissed by U.S. lawmakers as false, was essentially accurate.

Described in a 2008 presentation, the system, called XKeyscore, can reportedly track email addresses, logins, phone numbers, IP addresses and online activities — files, email contents, Facebook chats, for example — and can cross-reference this information with other metadata.

Even after weeks of revelations about the scope and breadth of NSA data gathering, news that XKeyscore can penetrate VPNs comes as a something of a shock.

"This is huge: XKeyscore slides also suggest NSA regularly decrypts encrypted VPN traffic," said security researcher Ashkan Soltani via Twitter.

[ Want to be a Web photographer? Read Google's Photo Sphere Community Wants You. ]

Responding to Soltani, CDT senior staff technologist Joseph Lorenzo Hall expressed skepticism that the NSA can break all VPN encryption. But Soltani contends the NSA at least has the capability to crack weak cipher implementations on Windows machines common in the Middle East, such as PPTP and MS-Chap. He points to a 2012 post from security researcher Moxie Marlinspike that states, "PPTP traffic should be considered unencrypted."

Whether or not the NSA is able to crack more robust implementations remains to be seen. Given the resources available to the NSA, the issue may be how much the NSA wants to break a given code rather than its ability to do so. After all, in cases where codes cannot be broken, people can be. As Danish developer Poul-Henning Kamp argues in ACM Queue, politics trumps cryptography.

The White House, trying to contain discontent with its surveillance programs, chose Wednesday to release formerly classified documents about the NSA's domestic phone surveillance program as a Senate Judiciary Committee meeting convened to address the oversight of Foreign Intelligence Surveillance Act programs.

The documents, published by the Office of the Director of National Intelligence, detail the collection of telephone metadata under Section 215 of the Patriot Act.

Senate Judiciary Committee chair Sen. Patrick J. Leahy (D-Vt.) said in a statement that if the government's collection of phone records is not effective, the program should be discontinued. He suggested that NSA chief Gen. Keith Alexander's prior claim that Section 215 surveillance programs have led to the disruption of 54 terrorist plots is not supported by the classified documentation he was provided.

A 2008 presentation states, "Over 300 terrorists [have been] captured using intelligence generated from XKeyscore."

Gen. Alexander contended with skeptical hecklers Wednesday at the Black Hat USA 2013 security conference in Las Vegas, where he defended NSA surveillance as necessary for national security.

In prepared remarks presented during the Judiciary Committee meeting, Stewart A. Baker, a partner in the Washington office of Steptoe & Johnson, LLP, and former assistant secretary for policy at the Department of Homeland Security, dismissed worries about civil liberties concerns.

"[I]t appears that law enforcement has been gaining access to our call metadata for as long as billing records have existed — nearly a century," he said. "If this were the road to Orwell's 1984, surely we'd be there by now, and without any help from NSA's 300 searches."

Baker advocates protecting privacy by, paradoxically, embracing big data and subjecting government employees to more effective surveillance.

"We need systems that audit for data misuse, that flag questionable searches, and that require employees to explain why they are seeking unusual data access," he said. "That's far more likely to provide effective protection against misuse of private data than trying to keep cheap data out of government hands. ... A proper system for auditing access to restricted data would not just improve privacy enforcement, it likely would have flagged both Bradley Manning and Edward Snowden for their unusual network browsing habits."

Jameel Jaffer, deputy legal director of the American Civil Liberties Union Foundation, offered testimony in the opposite direction. He called for Congress to amend the Foreign Intelligence Surveillance Act "to prohibit suspicionless, 'dragnet' monitoring or tracking of Americans' communications," to require more disclosure about Foreign Intelligence Surveillance Court opinions, and to ensure that government surveillance activities are subject to reasonable judicial scrutiny.

NSA Surveillance Can Penetrate VPNs (2024)

FAQs

NSA Surveillance Can Penetrate VPNs? ›

National Security Agency's XKeyscore system can collect just about everything that happens online, even things encrypted by VPNs, according to Edward Snowden.

Do VPNs protect you from surveillance? ›

A VPN stops your ISP from being able to log what you do online, and is therefore highly effective at stopping untargeted government surveillance of your online activity.

Can the government see through your VPN? ›

Can police track online purchases made with a VPN? There is no way to track live, encrypted VPN traffic. That's why police or government agencies who need information about websites you visited have to contact your internet service provider (ISP for short), and only then your VPN provider.

Can a VPN provider spy on you? ›

Any VPN service can monitor your browsing history, but reputable ones won't and will ensure they have no logs of your browsing history that could be handed over to third parties. That way, if they receive a court order to share information, it's impossible for them to comply.

What are the NSA VPN recommendations? ›

Top hardening recommendations include using tested and validated VPN products on the National Information Assurance Partnership (NIAP) Product Compliant List, employing strong authentication methods like multi-factor authentication, promptly applying patches and updates, and reducing the VPN's attack surface by ...

Can the FBI track a VPN? ›

The FBI and other law enforcement agencies cannot track encrypted VPN traffic, even if they have a court order. However, they may force your internet service provider (ISP) to disclose your connection and usage logs, which will show that you use a VPN.

Can you be monitored through VPN? ›

Encrypts your data

A VPN creates an encrypted channel between your device and the VPN server. As data passes through the VPN server, the encryption software scrambles the information, making it impossible to read to anyone monitoring the communication channel.

Can NSA see through VPN? ›

Even after weeks of revelations about the scope and breadth of NSA data gathering, news that XKeyscore can penetrate VPNs comes as a something of a shock. "This is huge: XKeyscore slides also suggest NSA regularly decrypts encrypted VPN traffic," said security researcher Ashkan Soltani via Twitter.

Can the police find you if you use a VPN? ›

The good news is that there is almost no way to track live, encrypted VPN traffic. Law enforcement can only obtain data, if available, about websites visited and so on. Otherwise, hackers and snooping government agencies are generally blocked by the fact that the data is encrypted.

Can governments block VPN access? ›

Yes, a VPN can be banned. Governments and corporations implement VPN restrictions for reasons that range from enforcing internet censorship to protecting internal networks.

What does a VPN not hide? ›

However, they can't protect against cookies, website-level tracking, malware or the information you voluntarily share online. Despite their limitations, VPNs remain an essential tool for enhancing online privacy.

Does a VPN make you untraceable? ›

No, a VPN cannot make you anonymous. They help secure what you're doing, but your ISP still knows when you're using the internet.

Can a VPN see Google searches? ›

A VPN hides your internet traffic by encrypting it, masking your real IP address, and protecting your personal data from hackers. Can a VPN hide my search history? A VPN can't hide your browser's search history or prevent your browser from logging it.

What is the most hidden VPN? ›

5 Best VPNs to use to become Anonymous in 2024
  • ExpressVPN. Editor's Choice | June 2024. www.expressvpn.com. ...
  • NordVPN. www.nordvpn.com. NordVPN is the best value anonymous VPN. ...
  • Private Internet Access. www.privateinternetaccess.com. ...
  • PrivateVPN. www.privatevpn.com. ...
  • VyprVPN. www.vyprvpn.com.

Is there anything more secure than a VPN? ›

One of the best alternatives to a VPN is a proxy server. A proxy server acts as a gateway that sits between a user's device and the internet. The user can activate the server in their web browser and proceed to reroute their traffic through it. This helps to hide their IP address from any web servers that they visit.

What is the most secure VPN location? ›

Key Takeaways. Switzerland, Iceland, Estonia, Canada, Singapore, Spain, the UK, Panama, Romania, and Germany are top countries for VPN connections due to their strong privacy laws, robust internet infrastructures, and high-speed connectivity.

What will VPN not protect you from? ›

While they will protect your IP and encrypt your internet history, but that is as much as they can do. They won't keep you safe, for instance, if you visit phishing websites or download compromised files. When you use a VPN, you are still at risk of: Trojans.

Does VPN stop spying? ›

A VPN encrypts your data and changes your apparent IP address, thereby hiding your activities from your ISP and potentially from eavesdroppers. However, cookies are stored and used by your web browser, separate from the network connection that your VPN is protecting.

What does a VPN actually protect you from? ›

A VPN creates a secure tunnel between a user's computer and the VPN server, which hides their online activity and location. VPN security enables users to protect their online privacy and prevent their internet service provider (ISP) from tracking their browsing activity.

Top Articles
Basic Foods Checklist: How to Stock Your Kitchen for Simple Meals
Download Microsoft Authenticator - Microsoft Support
Elleypoint
Mychart Mercy Lutherville
DL1678 (DAL1678) Delta Historial y rastreo de vuelos - FlightAware
Ub Civil Engineering Flowsheet
What is international trade and explain its types?
Jc Post News
Lax Arrivals Volaris
Tcgplayer Store
Loves Employee Pay Stub
Costco Great Oaks Gas Price
Tyler Sis University City
Forest Biome
*Price Lowered! This weekend ONLY* 2006 VTX1300R, windshield & hard bags, low mi - motorcycles/scooters - by owner -...
Woodmont Place At Palmer Resident Portal
Ceramic tiles vs vitrified tiles: Which one should you choose? - Building And Interiors
Rogue Lineage Uber Titles
3569 Vineyard Ave NE, Grand Rapids, MI 49525 - MLS 24048144 - Coldwell Banker
O'reilly's In Mathis Texas
Unity Webgl Car Tag
Scott Surratt Salary
Pokemon Inflamed Red Cheats
Pokémon Unbound Starters
How rich were the McCallisters in 'Home Alone'? Family's income unveiled
Ipcam Telegram Group
Imagetrend Elite Delaware
Tokioof
Rogold Extension
2487872771
Where Can I Cash A Huntington National Bank Check
SOC 100 ONL Syllabus
Mandy Rose - WWE News, Rumors, & Updates
Hebrew Bible: Torah, Prophets and Writings | My Jewish Learning
Sam's Club Gas Prices Florence Sc
Frommer's Philadelphia & the Amish Country (2007) (Frommer's Complete) - PDF Free Download
Husker Football
Xxn Abbreviation List 2023
Great Clips Virginia Center Commons
Powerboat P1 Unveils 2024 P1 Offshore And Class 1 Race Calendar
Reli Stocktwits
Spreading Unverified Info Crossword Clue
Sherwin Source Intranet
Rocket League Tracker: A useful tool for every player
UNC Charlotte Admission Requirements
60 Days From August 16
Mail2World Sign Up
Used Auto Parts in Houston 77013 | LKQ Pick Your Part
Razor Edge Gotti Pitbull Price
ESPN's New Standalone Streaming Service Will Be Available Through Disney+ In 2025
Appsanywhere Mst
Karen Kripas Obituary
Latest Posts
Article information

Author: Carmelo Roob

Last Updated:

Views: 6477

Rating: 4.4 / 5 (45 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Carmelo Roob

Birthday: 1995-01-09

Address: Apt. 915 481 Sipes Cliff, New Gonzalobury, CO 80176

Phone: +6773780339780

Job: Sales Executive

Hobby: Gaming, Jogging, Rugby, Video gaming, Handball, Ice skating, Web surfing

Introduction: My name is Carmelo Roob, I am a modern, handsome, delightful, comfortable, attractive, vast, good person who loves writing and wants to share my knowledge and understanding with you.