Report: NSA Mimics Google to Monitor “Target” Web Users

“Man in the middle” attacks would let the spy agency gather data without breaking encryption.

Fight disinformation: Sign up for the free Mother Jones Daily newsletter and follow the news that matters.


Buried in a Brazilian television report on Sunday was the disclosure that the NSA has impersonated Google and possibly other major internet sites in order to intercept, store, and read supposedly secure online communications. The spy agency accomplishes this using what’s known as a “man-in-the-middle (MITM) attack,” a fairly well-known exploit used by elite hackers. This revelation adds to the growing list of ways that the NSA is believed to snoop on ostensibly private online conversations.

In what appears to be a slide taken from an NSA presentation that also contains some GCHQ slides, the agency describes “how the attack was done” on “target” Google users. According to the document, NSA employees log into an internet router—most likely one used by an internet service provider or a backbone network. (It’s not clear whether this was done with the permission or knowledge of the router’s owner.) Once logged in, the NSA redirects the “target traffic” to an “MITM,” a site that acts as a stealthy intermediary, harvesting communications before forwarding them to their intended destination.

The brilliance of an MITM attack is that it defeats encryption without actually needing to crack any code. If you visit an impostor version of your bank’s website, for example, the NSA could harvest your login and password, use that information to establish a secure connection with your real bank, and feed you the resulting account information—all without you knowing.

Browsers are supposed to automatically foil MITM attacks, John Hopkins University cryptography expert Matthew Green told me. They rely on data from of certificate authorities, which verify the legitimacy of websites and issue them certificates, or digital stamps of approval. Browsers automatically ask for these certificates and alert you if they don’t exist—you may have encountered such pop-up warnings.

“This is actually relatively easy to do,” but it’s also risky, says cryptography expert Matthew Green.

But here’s where that system breaks down: Not all certificate authorities are completely trustworthy. “If you are big enough and spend enough money,” Green says, “you can actually get them to give you your own signing key”—the signature that they use to certify websites. With that, the NSA could create a fake certificate for any site on the internet, which is probably what it did when it impersonated Google, Green says. “This is actually relatively easy to do,” he adds, “because there are so many certificate authorities”—between 100 and 200.

Major MITM attacks are rare, as far as anyone knows, but they’ve happened before. In 2011, hackers breached the Dutch certificate authority DigiNotar and used stolen certificates to spy on internet users in Iran for weeks, an investigation later found. The Dutch government eventually seized DigiNotar—and Google, Microsoft, and Mozilla blocked all of its certificates.

MITM attacks also have downsides for attackers. For instance, Google Chrome maintains its own list of the public keys for Google webpages; the browser sends an alarm to Google headquarters if it detects any attempts to forge those sites. It has detected at least two MITM attacks this way, Green told me. “MITM is a really risky attack,” he says. “You have to know that nobody is looking at those services in order to make it work.”

The use of MITM attacks by the NSA was discovered by journalist Glenn Greenwald among the thousands of documents given to him by Edward Snowden in June. The story aired this past weekend on the Brazilian news station TV Globo, and was cowritten by local reporter Sonia Bridi. It detailed NSA’s use of MITM attacks against Brazil’s state-owned oil company, Petrobras, but also mentioned that they’d been used to intercept information from Google servers.

Google has been redoubling its efforts to thwart NSA snooping, though its not clear whether those efforts include new ways to thwart MITM attacks. The company responded to detailed questions from Mother Jones with a short statement: “As for recent reports that the US government has found ways to circumvent our security systems, we have no evidence of any such thing ever occurring,” said spokesman Jay Nancarrow. “We provide our user data to governments only in accordance with the law.”

Correction: An earlier version of this story incorrectly identified “Flying Pig,” a surveillance program run by the UK Government Communications Headquarters (GCHQ), as being run by the NSA. The story also incorrectly described the way that certificate authorities authenticate websites.

WE'LL BE BLUNT.

We have a considerable $390,000 gap in our online fundraising budget that we have to close by June 30. There is no wiggle room, we've already cut everything we can, and we urgently need more readers to pitch in—especially from this specific blurb you're reading right now.

We'll also be quite transparent and level-headed with you about this.

In "News Never Pays," our fearless CEO, Monika Bauerlein, connects the dots on several concerning media trends that, taken together, expose the fallacy behind the tragic state of journalism right now: That the marketplace will take care of providing the free and independent press citizens in a democracy need, and the Next New Thing to invest millions in will fix the problem. Bottom line: Journalism that serves the people needs the support of the people. That's the Next New Thing.

And it's what MoJo and our community of readers have been doing for 47 years now.

But staying afloat is harder than ever.

In "This Is Not a Crisis. It's The New Normal," we explain, as matter-of-factly as we can, what exactly our finances look like, why this moment is particularly urgent, and how we can best communicate that without screaming OMG PLEASE HELP over and over. We also touch on our history and how our nonprofit model makes Mother Jones different than most of the news out there: Letting us go deep, focus on underreported beats, and bring unique perspectives to the day's news.

You're here for reporting like that, not fundraising, but one cannot exist without the other, and it's vitally important that we hit our intimidating $390,000 number in online donations by June 30.

And we hope you might consider pitching in before moving on to whatever it is you're about to do next. It's going to be a nail-biter, and we really need to see donations from this specific ask coming in strong if we're going to get there.

payment methods

WE'LL BE BLUNT.

We have a considerable $390,000 gap in our online fundraising budget that we have to close by June 30. There is no wiggle room, we've already cut everything we can, and we urgently need more readers to pitch in—especially from this specific blurb you're reading right now.

We'll also be quite transparent and level-headed with you about this.

In "News Never Pays," our fearless CEO, Monika Bauerlein, connects the dots on several concerning media trends that, taken together, expose the fallacy behind the tragic state of journalism right now: That the marketplace will take care of providing the free and independent press citizens in a democracy need, and the Next New Thing to invest millions in will fix the problem. Bottom line: Journalism that serves the people needs the support of the people. That's the Next New Thing.

And it's what MoJo and our community of readers have been doing for 47 years now.

But staying afloat is harder than ever.

In "This Is Not a Crisis. It's The New Normal," we explain, as matter-of-factly as we can, what exactly our finances look like, why this moment is particularly urgent, and how we can best communicate that without screaming OMG PLEASE HELP over and over. We also touch on our history and how our nonprofit model makes Mother Jones different than most of the news out there: Letting us go deep, focus on underreported beats, and bring unique perspectives to the day's news.

You're here for reporting like that, not fundraising, but one cannot exist without the other, and it's vitally important that we hit our intimidating $390,000 number in online donations by June 30.

And we hope you might consider pitching in before moving on to whatever it is you're about to do next. It's going to be a nail-biter, and we really need to see donations from this specific ask coming in strong if we're going to get there.

payment methods

We Recommend

Latest

Sign up for our free newsletter

Subscribe to the Mother Jones Daily to have our top stories delivered directly to your inbox.

Get our award-winning magazine

Save big on a full year of investigations, ideas, and insights.

Subscribe

Support our journalism

Help Mother Jones' reporters dig deep with a tax-deductible donation.

Donate