The US National Security Agency (NSA) has been able to crack much of the encryption which protects the privacy of emails, documents, web searches, internet chats, and phone calls of Americans and others around the world. The agency used a wide rage of tactics including technical trickery, court orders, and behind-the-scenes persuasion to overcome the privacy of private citizens, businesses and governments. Encryption is the digital scrambling of information to prevent surveillance.
Major encryption systems include Secure Sockets Layer, or SSL, virtual private networks, or VPNs, and the protection used on fourth generation, or 4G, smartphones. The NSA has also been looking for ways into the protected traffic of major internet companies like Google, Yahoo, Facebook, Hotmail, etc. Google was penetrated by 2012.
The NSA wants users to think that their information is safe from prying eyes through assurances of their internet companies. The highly classified, billion dollar program known as Bullrun was exposed to media companies by Edward Snowden. Since 2000 the agency has stealthily developed the tools to crack the codes.
At least some encryption companies even cooperated with the NSA to introduce entry points into their software so that the agency could access the flow of information.
“For the past decade, NSA has led an aggressive, multi-pronged effort to break widely used internet encryption technologies,” said a 2010 memo describing a briefing about NSA accomplishments…
“The agency’s success in defeating many of the privacy protections offered by encryption… shows that the agency… cannot necessarily be restrained by privacy technology.” The agency wants the capability in order to read emails of terrorists and investigate rogue governments. We are in the “golden age of spying.”
The only countries that have access to the Bullrun program beside the U.S. are those that are part of the so-called “five-eyes” countries and have parallel programs are Britain, Canada, Australia and New Zealand.
Total surveillance is key to developing the consolidation of power and control. It also blurs the U.S. Constitution’s privacy protections. The inquisition would have loved to have these capabilities. Worldly governments are preparing for the final crisis. They use terrorism as the reason for building their massive systems that will one day be used on another target: those who don’t go along with global religion. See Revelation 13:8