Washington: US and British intelligence agencies have cracked the encryption that secures a wide range of online communications -- including emails, banking transactions and phone conversations, according to newly leaked documents.
The documents provided by former US intelligence contractor Edward Snowden to The New York Times, ProPublica and The Guardian suggest that the spy agencies are able to decipher data even with the supposedly secure encryption designed to make it private.
The US National Security Agency, working with its British counterpart, GCHQ, accomplished the feat by using supercomputers, court orders, and some cooperation from technology companies, the documents indicate.
The Guardian report said the two spy agencies had "covert partnerships" with technology companies and Internet providers which allows the insertion of "secret vulnerabilities -- known as backdoors or trapdoors -- into commercial encryption software."
The British paper said the NSA spends $250 million a year on a program which works with technology companies to "covertly influence" their product designs.
The reports did not indicate which companies cooperated with the spy agencies, but they suggested that Britain's intelligence agency was able to gain access to people's Hotmail, Google, Yahoo and Facebook accounts.
If the reports are accurate, the highly secretive program would defeat much of the protection that is used to keep data secure and private on the Internet, from emails to chats to communications using smartphones.
"Today's revelations indicate that the NSA appears to have engaged in a concerted hacking campaign that dwarfs anything Anonymous has ever done," said Sascha Meinrath of the New America Foundation's Open Technology Institute, which works with people in authoritarian countries to avoid government tracking.
"Their actions have created back doors in numerous, supposedly secure, applications -- online services we use every day... undermining the integrity of communications on a global scale," Meinrath said in an email.
Joseph Hall of the Centre for Democracy and Technology, a digital rights organization, called the latest reports "shocking."
If the reports are true, "it means that the elements that keep information secure in transit are fundamentally undermined," Hall told AFP.
Bruce Schneier, a cryptographic specialist who follows national security issues, described the revelations as "explosive."
"Basically, the NSA is able to decrypt most of the Internet. They're doing it primarily by cheating, not by mathematics," Schneier wrote on his blog.
"This is not the Internet the world needs, or the Internet its creators envisioned. We need to take it back," Schneier wrote in a commentary on the British newspaper's website.
The reports noted that US intelligence officials asked the news organizations not to publish articles on the subject, fearing it would prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read.
ProPublica, an independent, non-profit organization devoted to investigative journalism which has partnered with The Guardian and The New York Times to review documents from Snowden, said it decided to go ahead with the article because of its importance to the public.
"The story, we believe, is an important one. It shows that the expectations of millions of Internet users regarding the privacy of their electronic communications are mistaken," ProPublica's editors said in a note.
"These expectations guide the practices of private individuals and businesses, most of them innocent of any wrongdoing. The potential for abuse of such extraordinary capabilities for surveillance, including for political purposes, is considerable."
The reports said the NSA has been working on breaking Internet encryption for more than a decade after the agency lost a battle to force technology companies to provide encryption "keys."
The New York Times report noted that while the ability to break encryption can be used to thwart terror plots, it can have unintended effects by weakening the security of communications.
"The risk is that when you build a back door into systems, you're not the only one to exploit it," cryptography researcher Matthew Green told the daily. "Those back doors could work against US communications, too."
Contacted by AFP, US intelligence officials had no immediate comment on the reports.