Tag Archives: nsa

The Amazing, Hypnotic Appeal of Rand Paul

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

So Rand Paul filed a lawsuit yesterday against the NSA’s phone record collection program, and he’s already getting flack for parachuting in and trying to steal the limelight from a guy who filed a similar suit months ago. Some other awkward questions are being raised too, including one from Steve Benen, who wonders why this entire effort is being run through his campaign operation instead of his Senate office.

I think the answer to that is pretty obvious, but it also gives me a chance to mention something: Is anyone in Congress right now more of a genius at self-promotion than Rand Paul? Sure, Ted Cruz gets some attention for being an asshole, but that’s ephemeral. Nobody’s really very interested in Cruz.

But despite the fact that Paul’s political views make him wildly implausible as a candidate for higher office, everyone finds him endlessly fascinating. He mounts a meaningless “filibuster” and suddenly everyone wants to Stand With Rand. He wants to end the Fed and the tea partiers go gaga. He starts talking about Monica Lewinsky and it prompts a thousand thumbsuckers in the Beltway media. He opposes foreign interventions and somehow manages to hypnotize the punditocracy into thinking that maybe dovishness represents the future foreign policy of the Republican Party. He gets caught plagiarizing and shakes it off. He gets caught hiring an aide who turns out to be a former radio shock jock who specialized in neo-Confederate rants, and it just adds color to his resume.

It’s remarkable. Is he just an amazing, intuitive self-promoter, like Sarah Palin? Is he a case study in how being a nice guy (which apparently he is) gets you way more sympathetic coverage than being a lout (which apparently Ted Cruz really is)? Is this just an example of how bored the media is and how desperate they are for even small bits of sideshow amusement?

Beats me. But backbench senators sure don’t normally attract the kind of coverage that Rand Paul gets unless they’re legitimate presidential prospects. Which Paul isn’t. Not by a million miles, and everyone knows it. Don’t make me waste my time by pretending otherwise and demanding that I explain why he’s obviously unelectable.

But he sure does have the knack of entertaining bored reporters.

View original article – 

The Amazing, Hypnotic Appeal of Rand Paul

Posted in ATTRA, FF, GE, LAI, LG, ONA, Uncategorized, Venta | Tagged , , , , , , , , , , , | Comments Off on The Amazing, Hypnotic Appeal of Rand Paul

How Hackers and Software Companies are Beefing Up NSA Surveillance

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

This story first appeared on the TomDispatch website.

Imagine that you could wander unseen through a city, sneaking into houses and offices of your choosing at any time, day or night. Imagine that, once inside, you could observe everything happening, unnoticed by others—from the combinations used to secure bank safes to the clandestine rendezvous of lovers. Imagine also that you have the ability to silently record everybody’s actions, whether they are at work or play without leaving a trace. Such omniscience could, of course, make you rich, but perhaps more important, it could make you very powerful.

That scenario out of some futuristic sci-fi novel is, in fact, almost reality right now. After all, globalization and the Internet have connected all our lives in a single, seamless virtual city where everything is accessible at the tap of a finger. We store our money in online vaults; we conduct most of our conversations and often get from place to place with the help of our mobile devices. Almost everything that we do in the digital realm is recorded and lives on forever in a computer memory that, with the right software and the correct passwords, can be accessed by others, whether you want them to or not.

Continue Reading »

Visit link:  

How Hackers and Software Companies are Beefing Up NSA Surveillance

Posted in alo, Anchor, Cyber, FF, G & F, GE, LAI, LG, ONA, Oster, ProPublica, Radius, Smith's, Uncategorized, Venta | Tagged , , , , , , , , , , | Comments Off on How Hackers and Software Companies are Beefing Up NSA Surveillance

How NSA Surveillance Fits Into a Long History of American Global Political Strategy

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

This story first appeared on the TomDispatch website.

For more than six months, Edward Snowden’s revelations about the National Security Agency (NSA) have been pouring out from the Washington Post, the New York Times, the Guardian, Germany’s Der Spiegel, and Brazil’s O Globo, among other places. Yet no one has pointed out the combination of factors that made the NSA’s expanding programs to monitor the world seem like such a slam-dunk development in Washington. The answer is remarkably simple. For an imperial power losing its economic grip on the planet and heading into more austere times, the NSA’s latest technological breakthroughs look like a bargain basement deal when it comes to projecting power and keeping subordinate allies in line— like, in fact, the steal of the century. Even when disaster turned out to be attached to them, the NSA’s surveillance programs have come with such a discounted price tag that no Washington elite was going to reject them.

For well over a century, from the pacification of the Philippines in 1898 to trade negotiations with the European Union today, surveillance and its kissing cousins, scandal and scurrilous information, have been key weapons in Washington’s search for global dominion. Not surprisingly, in a post-9/11 bipartisan exercise of executive power, George W. Bush and Barack Obama have presided over building the NSA step by secret step into a digital panopticon designed to monitor the communications of every American and foreign leaders worldwide.

What exactly was the aim of such an unprecedented program of massive domestic and planetary spying, which clearly carried the risk of controversy at home and abroad? Here, an awareness of the more than century-long history of US surveillance can guide us through the billions of bytes swept up by the NSA to the strategic significance of such a program for the planet’s last superpower. What the past reveals is a long-term relationship between American state surveillance and political scandal that helps illuminate the unacknowledged reason why the NSA monitors America’s closest allies.

Continue Reading »

Original source: 

How NSA Surveillance Fits Into a Long History of American Global Political Strategy

Posted in FF, GE, LG, ONA, Pines, Uncategorized, Venta | Tagged , , , , , , , , , | Comments Off on How NSA Surveillance Fits Into a Long History of American Global Political Strategy

President Obama Finally Releases His Surveillance Reform Plan, and It’s Pretty Weak Tea

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

President Obama gave his big surveillance speech today, and it was pretty limited. Aside from some fairly vague promises about new oversight and greater transparency, here were his most important concrete proposals:

  1. The Director of National Intelligence will conduct an annual review of FISA court opinions with the aim of declassifying opinions that have “broad privacy concerns.”
  2. Obama will ask Congress to create a “panel of advocates” that will represent the public’s privacy interests in FISA cases.
  3. New restrictions will be placed on the use of “incidental” collection of surveillance of US persons in criminal cases.
  4. National Security Letters will remain secret, but secrecy won’t be indefinite unless the government demonstrates a “real need” to a judge. Companies receiving NSLs will be allowed to release broad reports about the number of requests they get.
  5. Bulk telephone records will continue to be collected. However, in the future the database can be queried only after getting FISA approval. The NSA will be allowed to perform only 2-hop chaining rather than the current 3-hop standard. A new group will investigate alternative approaches to the government itself holding the telephone database.
  6. Within some unspecified limits, there will be no more bugging of foreign leaders.

This is fairly weak tea. Nonetheless, I’m pretty certain that we wouldn’t have gotten even this much if it weren’t for Edward Snowden. This is why I support Snowden’s disclosures despite the fact that I’m not happy about every last thing he’s disclosed. Obama’s attempt to suggest that he would have done all this stuff even without Snowden’s disclosures strikes me as laughable.

You can read a full copy of the presidential directive accompanying Obama’s speech here.

UPDATE: I should be a little clearer about why I think this is weak tea. Of these items, only the first five concern domestic surveillance. #1 and #2 are pretty hazy, with the DNI apparently having full control over this new declassification regime and the public being represented in FISA cases only by a “panel of advocates,” a phrase that somehow strikes me as a bit weaselly. But we’ll see.

#3 is very important if the new restrictions are pretty tight. But that’s not clear yet.

#4 is nice, but doesn’t go very far. At a minimum, I’d like to see much tighter standards for issuing secret NSLs in the first place.

#5, if it’s implemented well, could be a genuine improvement. Records retention per se is something the government often mandates, and as long as the records are truly kept away from the intelligence community, accessible only via court order with an advocate aggressively arguing the public’s case, this is a useful reform.

Julian Sanchez tweets: “Initial verdict: A decent start, better than I expected, but we really need legislation to cement this, & the details will matter a lot.” That’s a little more optimistic than my initial verdict, but it’s probably fair. We really won’t be able to fully evaluate all this until we see what the detailed rules look like. Good intentions aren’t enough.

View original article: 

President Obama Finally Releases His Surveillance Reform Plan, and It’s Pretty Weak Tea

Posted in FF, GE, LG, ONA, Uncategorized, Venta | Tagged , , , , , , , , , , | Comments Off on President Obama Finally Releases His Surveillance Reform Plan, and It’s Pretty Weak Tea

NSA’s Harshest Critics Meeting With White House Officials Tomorrow

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

On Thursday, a number of civil liberties groups that have harshly criticized the NSA surveillance practices disclosed by Edward Snowden, are meeting with President Obama’s top lawyer, Kathy Ruemmler. This White House session is one of several this week with lawmakers, tech groups, and members of the intelligence community that will help the President soon decide whether to keep the controversial surveillance programs intact.

Among groups that are reportedly attending the meeting are the Center for Democracy and Technology, the Electronic Privacy Information Center (EPIC), and the Federation of American Scientists. According to Caitlin Hayden, a spokesperson for the White House, the purpose of the meeting with Ruemmler “is to have a broad discussion regarding privacy and civil liberties protections and transparency initiatives.” According to a source with knowledge of the meeting, the meeting is likely the “next phase” of the Obama Administration’s attempt to decide “exactly how much of the Surveillance Review Group’s fairly radical recommendations they’re going to get behind.”

In December, this independent panel took a hard look at NSA snooping and issued 46 recommendations for reform, such as having phone carriers store domestic telephone records, rather than the NSA. Marc Rotenberg, the executive director of EPIC, tells Mother Jones that, “We support many of the recommendations contained in the report of the Review Group, particularly the proposal to end the NSA’s bulk collection of telephone records….But we think the President needs to do more.” He adds, “Privacy protection is not simply about NSA reform. We also need strong consumer safeguards.”

On Wednesday, President Obama is meeting with “leaders of the Intelligence community” and members of the Privacy and Civil Liberties Oversight Board, an independent agency that advises the President, according to Hayden. He will also meet with members of the House and Senate on Thursday to discuss surveillance issues. The Associated Press reports that he is expected to issue a final decision on NSA surveillance programs as early as next week.

Original link:

NSA’s Harshest Critics Meeting With White House Officials Tomorrow

Posted in FF, GE, LG, ONA, PUR, Uncategorized, Venta | Tagged , , , , , , , , , , , | Comments Off on NSA’s Harshest Critics Meeting With White House Officials Tomorrow

Nine Gifts the NSA Will Hate

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

In the wake of the Edward Snowden-enabled revelations about the reach of the surveillance state, your more privacy-sensitive loved ones may have spent the year discovering TOR, making the jump to mesh networks or encrypted email, or mumbling about converting their nest egg to Bitcoin.

But now that gift-giving season is well upon us, what’s left to get the security-obsessed person who already has it all? Tin foil hats have a timeless appeal, but here’s a short list of slightly more practical devices:

Camera-Detecting Armor

Surveillance Spaulder Demonstration

stml/Vimeo

London artist James Bridle has thought up a wearable device known as a “surveillance spaulder,” which—through infrared detection—would alert the wearer to surveillance cameras by triggering a small muscle reaction. While not “currently a functioning device,” he claims the device is more than possible given the correct components, power supply, and a little bit of tinkering.

Anti-Facial Recognition Hats

The Perfect Anti-Surveillance Hat?

CafePress

Concerned about having your face detected in photos or by security cameras? If Anonymous’ advice of wearing a mask or continuously tilting your head more than 15 degrees seems a little cumbersome, try the hactivists’ suggested DIY project of making an infrared LED-fitted hat to tuck under the Christmas tree.

Camera-Confusing Eyewear

Anti-Facial Recognition Glasses

Isao Echizen/National Institute of Informatics

Not the DIY type? Professor Isao Echizen at Japan’s National Institute of Informatics may have the answer: eyewear that transmits near-infrared rays to render the wearer’s face undetectable to cameras. Not only will this give someone on your list that cool cyberpunk look, but by keeping their image from being captured it will be harder to track their movements.


Face-Disgusing Makeover

CV Dazzle Make-Up

Adam Harvey/ahprojects.com

For the more fashion-conscious, consider a haircut and makeup using style advice derived from WWI and WWII camouflage techniques. The project, created by NY designer Adam Harvey and known as CV Dazzle, uses “cubist-inspired designs” to break up symmetry and tonal contours, creating an “anti-face” technique the designer claims will confuse the detection algorithms of most facial recognition software.

HMAS Yarris in Dazzle Camouflage, WWII

Wikimedia Commons

Drone-Proof Clothing

Adam Harvey’s Stealth Wear

Adam Harvey/ahprojects.com

The stylish options don’t stop at simple facial recognition. Harvey’s more recent Stealth Wear project puts together a series of heat-reflecting burqas, scarfs, and hoodies purported to limit potential drone surveillance. Simply put the clothing on, and you’re blacked out to most thermal imaging. According to the website’s rather garbled recounting of Islamic tradition, the clothing reflects “the rationale behind the traditional hijab and burqa,” acting as a veil to separate women from God—only in this case, “replacing God with drone.”

Reflective Drone Survival Guide

Drone Survival Guide

A field guide to various Unmanned Aerial Vehicles and tactics for hiding from drones printed on an aluminum paper reflective enough to “interfere with the drone’s sensors.” While the price is cheap ($15 or €10), the information is also downloadable for free.

M-65 Jackets

Military Camouflage

SPC Gerald James/Wikimedia Commons

Does your giftee need a new coat? Some military-inspired jackets—already made with a camouflage pattern known as Disruptive Pattern Material—also have infrared reflective coatings that make them harder to spot in certain lights.

Bug Detectors and Noise Generators

All-in-One RF Bug Detector

brickhousesecurity.com

For the slightly more gadget-oriented, noise generators, surveillance bug detectors, and virtually invisible bluetooth earpieces could all make great stocking stuffers—especially for those particularly concerned with being followed or having their conversations tracked. The downside? They all come with hefty price tags.

Abandoned Missile Silo

Minuteman III Silo
Department of Defense/Wikimedia Commons

Of course, if all else fails, you could buy a “luxury survival condo” in a converted Atlas missile silo for the strangely reasonable cost of $750,000 to $1.5 million. The company’s press release promises “extended off-grid living” and walls “designed to withstand a nuclear blast.” At this point, going inside a bunker and unplugging might be the only way to completely remove yourself from the NSA’s all-seeing eye.

Originally from:

Nine Gifts the NSA Will Hate

Posted in Cyber, FF, GE, LAI, LG, ONA, PUR, Radius, Uncategorized, Venta | Tagged , , , , , , , , , , , | Comments Off on Nine Gifts the NSA Will Hate

Silicon Valley Takes On the NSA

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

The titans of Silicon Valley have finally banded together to tell Washington they’re tired of the NSA ruining public trust in the internet by hoovering up every gigabit of data ever created. It’s all very polite, and naturally they’ve made their views public via a website that promotes the following five principles:

  1. Governments should codify sensible limitations on their ability to compel service providers to disclose user data that balance their need for the data in limited circumstances, users’ reasonable privacy interests, and the impact on trust in the Internet. In addition, governments should limit surveillance to specific, known users for lawful purposes, and should not undertake bulk data collection of Internet communications.
  2. Intelligence agencies seeking to collect or compel the production of information should do so under a clear legal framework in which executive powers are subject to strong checks and balances. Reviewing courts should be independent and include an adversarial process, and governments should allow important rulings of law to be made public in a timely manner so that the courts are accountable to an informed citizenry.
  3. Transparency is essential to a debate over governments’ surveillance powers and the scope of programs that are administered under those powers. Governments should allow companies to publish the number and nature of government demands for user information. In addition, governments should also promptly disclose this data publicly.
  4. The ability of data to flow or be accessed across borders is essential to a robust 21st century global economy. Governments should permit the transfer of data and should not inhibit access by companies or individuals to lawfully available information that is stored outside of the country. Governments should not require service providers to locate infrastructure within a country’s borders or operate locally.
  5. In order to avoid conflicting laws, there should be a robust, principled, and transparent framework to govern lawful requests for data across jurisdictions, such as improved mutual legal assistance treaty — or “MLAT” — processes. Where the laws of one jurisdiction conflict with the laws of another, it is incumbent upon governments to work together to resolve the conflict.

This is a good start. Next up: whether these guys are really serious, or whether they’re going to call it a day after creating a website and not really try very hard to harness public opinion to fight for these principles. Stay tuned.

Read more:

Silicon Valley Takes On the NSA

Posted in Citizen, FF, GE, LG, ONA, PUR, Uncategorized, Venta | Tagged , , , , , , , , | Comments Off on Silicon Valley Takes On the NSA

Spy Camp: Photos From East Germany’s Secret Intelligence Files

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

Stasi agents learned how to don (supposedly) inconspicuous disguises.
Simon Menner and BStU, 2013.

Like most government agencies, the NSA lacks a sense of humor; instead, it has paranoia, which can be unintentionally comic. Case in point: The agency’s recent cease-and-desist letter to Dan McCall, an online vendor whose parody t-shirts raised NSA hackles. The agency, along with the Department of Homeland Security, cites copyright infringement—it’s illegal to appropriate the NSA logo for commercial use (especially after it’s been “mutilated”). Depending on your mood, the crackdown on satire is either disproportionate enough to be amusing, or totalitarian enough to be, well, totalitarianism.

Simon Menner’s new photobook, Top Secret: Images from the Stasi Archive, reminds us that the difference between terror and kitsch is mostly one of proximity. Per the book’s subtitle, the images were culled from the vast archives of East Germany’s secret police, the Stasi, which spied on, bugged, interrogated, intimidated, murdered, and otherwise bullied its citizenry for 40 years. According to Simon Wiesenthal, the Holocaust survivor turned Nazi-hunter, the Stasi was “much, much worse than the Gestapo, if you consider only the oppression of its own people.”

Indeed, the numbers are staggering: When the Berlin Wall fell in 1989, Stasi records show that it had 91,000 employees on the payroll, along with around 173,000 unofficial collaborators. Given East Germany’s population of 17 million, this amounts to one informer per 6.5 citizens—or, as author John O. Koehler more viscerally puts it, “It would not have been unreasonable to assume that at least one Stasi informer was present in any party of 10 or 12 dinner guests.” In Koehler’s book Stasi: The Untold Story of the East German Secret Police, former Stasi Colonel Rainer Wiegand estimated that the total number of informers was as high as two million.

Think about what that means. Phones were tapped, mail was intercepted and read, families betrayed each other, apartment buildings and hotels crawled with informers, surveillance cameras abounded. A special division was tasked with inspecting garbage, while holes drilled into walls became the unofficial calling card of Stasi spooks. On the threshold of German reunification, approximately six million people were under surveillance.

From the Stasi’s catalog of disguises. Simon Menner and BStU, 2013.

All of this was part of a more systematic program called zersetzung (“decomposition”) that wreaked psychological havoc across East Germany. The idea was to disrupt people’s sense of normalcy by employing “soft torture” techniques. “Tactics included removing pictures from walls, replacing one variety of tea with another, and even sending a vibrator to a target’s wife,” noted the Guardian. “Usually victims had no idea the Stasi were responsible. Many thought they were going mad; some suffered breakdowns; a few killed themselves.”

Repressive regimes around the globe turned to the Stasi for its surveillance bona fides: The secret police of Angola, Cuba, Egypt, Ethiopia, Ghana, Mozambique, Syria, Uganda, and Yemen were all clients. In the 1980s, the Stasi and the KGB collaborated to spread propaganda that HIV/AIDS originated in US government laboratories (PDF). And an investigation leaked in 2011 suggested a link between the Stasi and Horst Mahler, a founding member of West Germany’s Red Army Faction (also known as Baader-Meinhof), raising questions about just how deeply the spy agency had infiltrated its anti-communist neighbor.

Agents learned to trail a target without being noticed. Simon Menner and BStU, 2013.

From a film showing agents how to shadow suspects. Simon Menner and BStU, 2013.

Once it became apparent that the Iron Curtain was fraying, Stasi agents scrambled to destroy incriminating documents, including thousands of photographs. On January 15, 1990, protestors stormed Stasi headquarters and prevented a complete wipeout. That October, a newly reunified Germany established a government agency, BStU, to preserve the old records, which were declassified two years later. Millions of Germans have been able to share the surreal experience of perusing their own surveillance reports.

An agent learns to apply facial hair.
Simon Menner and BStU, 2013.

An image damaged in the Stasi purge.
Simon Menner and BStU, 2013.

Menner spent two years combing the vast archives—a combined 50 miles of shelving that included 1.4 million photographs, slides, and negatives. His book is divided into chapters with innocuous titles such as “Wigs and their Application,” “How to Apply Fake Facial Hair,” and “Disguising as Western Tourists.” There’s a tension—which these titles exploit—between our inclination to read the photos as kitsch and the ominous history they represent. The photos were rehearsals for surveillance, arrest, interrogation, and blackmail; they are unnerving mementos of a government intoxicated by control. And what seems quaint or campy or mundane at first blush is harrowing in retrospect.

Case in point: the Polaroids that Stasi agents took during their routine home break-ins. These shots of kitchens, living rooms, and bedrooms, which depict life in a typical East German apartment, have a bland predatory quality—a knowingness—that’s disturbing. Equally so is Menner’s note that agents used the Polaroids as a reference for returning a room to its prior state after ransacking it. The artlessness of the images only intensifies their eeriness.

Elsewhere, the book offers a field guide for espionage. Agents demonstrate secret hand signals, shadow suspects, and rendezvous on desolate roads. Mock arrests are staged in dismal rooms, the agents’ faces inexpertly redacted with a black Sharpie. Houses are searched and possessions cataloged. Unease tinges a photo of a teenager’s bedroom wallpapered with Madonna clippings—Western sympathies, if simply of the pop-culture variety, could be cause for an investigation, or worse.

An agent transmits a secret hand sign.
Simon Menner and BStU, 2013.

A mock arrest.
Simon Menner and BStU, 2013.

Contents of a confiscated package.
Simon Menner and BStU, 2013.

Top Secret is a timely rejoinder to those who argue that the NSA is a necessary evil, and it’s even more timely in light of the revelation that the NSA targeted German Chancellor Angela Merkel for eavesdropping. The US is not East Germany, and the NSA is not the Stasi, but they share a common taproot of fear. While the NSA may not resort to the Stasi’s cruelest methods, it lords over one of the most sophisticated and pervasive intelligence apparatuses on the planet. Would it be surprising if, decades from now, someone found similar relics in the NSA archive?

But the NSA recently offered this comforting nugget to the Washington Post: “The notion of constant, unchecked, or senseless growth is a myth.” So relax, your secrets are safe.

Stasi agents amused themselves by dressing up as their enemies—in this case, the Church.
Simon Menner and BStU, 2013.

From the Stasi handbook of disguises.
Simon Menner and BStU, 2013.

Continue reading: 

Spy Camp: Photos From East Germany’s Secret Intelligence Files

Posted in alo, Citizen, FF, G & F, GE, LG, ONA, PUR, Uncategorized, Venta | Tagged , , , , , , , , , | Comments Off on Spy Camp: Photos From East Germany’s Secret Intelligence Files

Twitter Just Made it Harder for the NSA to Read Your Private Tweets

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

On Friday, Twitter announced that it has enabled a new form of Internet security, already used by Google and Facebook, that makes it considerably more difficult for the NSA to read private messages. With this new security, there isn’t one pair of master “keys” that unlock an entire website’s encryption, instead, new keys are produced and destroyed for each login session.

“If an adversary is currently recording all Twitter users’ encrypted traffic, and they later crack or steal Twitter’s private keys, they should not be able to use those keys to decrypt the recorded traffic,” Twitter wrote on its blog. To put that into simple terms, that would be like giving a new set of keys to each visitor coming to your house, melting them down after the person gets inside, and changing the locks. The method is called “Perfect Forward Secrecy,” and while it has been around for at least two decades, it hasn’t been picked up by tech giants until recently, following the allegations of vast government surveillance by former NSA contractor Edward Snowden.

This security system specifically takes aim at the NSA’s alleged practice of scooping up the encrypted communications of millions of users—either through hacking or top-secret national security orders—and then storing them until the agency is able to get a company’s keys to access all of the data.â&#128;&#139; While Twitter was never implicated in the NSA’s vast online surveillance program, PRISM, there is still quite a bit of private information the US government could be interested in on Twitter for its counterterrorism efforts—direct messages, time zones, user passwords, and email addresses, for example.

To get a peek at how this security might play out in real life, look no further than the legal battle the Department of Justice is currently waging against Lavabit, an alternative email provider that was reportedly used by Snowden. When the founder of Lavabit refused to give up its master encryption keys to the US government—because it would have had access to thousands of email accounts—the company was held in contempt of court. If Lavabit had installed Perfect Forward Secrecy, however, the company wouldn’t have been able to give up its master keys, since they would have already been destroyed.

The Electronic Frontier Foundation, an Internet privacy group, supports Perfect Forward Secrecy, arguing that “against the known threat of “upstream” data collection, supporting perfect forward secrecy is an essential step.” However, as EFF notes, this doesn’t necessarily make a company completely NSA-proof, since it doesn’t protect data that’s stored on a server (and NSA still managed to hack into Google, by breaking into its front end server, according to documents in the Washington Post.)

The New York Times says that this new security will slow traffic down by about 150 milliseconds in the United States, and Tweeters are unlikely to notice. But it will “make the National Security Agency’s job much, much harder,” the paper said.

Original source: 

Twitter Just Made it Harder for the NSA to Read Your Private Tweets

Posted in FF, GE, LG, ONA, Uncategorized, Venta | Tagged , , , , , , , , , , , | Comments Off on Twitter Just Made it Harder for the NSA to Read Your Private Tweets

Google, Yahoo, Facebook, and Twitter Have a New Lobbying Target—the NSA

Mother Jones

<!DOCTYPE html PUBLIC “-//W3C//DTD HTML 4.0 Transitional//EN” “http://www.w3.org/TR/REC-html40/loose.dtd”>

Not a month goes by without former National Security Agency contractor Edward Snowden dropping another explosive bombshell about the US government’s vast surveillance programs. In response, lawmakers have proposed a flurry of bills that aim to clamp down on NSA spying. But tech companies aren’t just sitting on the sidelines—the latest lobbying disclosure forms filed by Google, Facebook, Yahoo, and Twitter reveal that their lobbyists are keeping an eye on a number of these anti-NSA bills. And although most of the companies won’t say which specific bills they support or oppose, some new bills have popped up on their lobbying forms just as the companies are publicly demanding surveillance reform.

The lobbying disclosure forms cover the period from July 1 to September 30, the months immediately following the first Snowden disclosure about the PRISM program in June. Bills introduced after those dates, such as the tech industry-backed USA Freedom Act proposed by Senate Judiciary Committee Chairman Patrick Leahy (D-Vt.) and Rep. Jim Sensenbrenner (R-Wis.), aren’t included. There are also some bills that were introduced pre-Snowden.

In total, during this period, Facebook spent $1.44 million on lobbying, Yahoo spent $630,000, Google spent $3.37 million, and Twitter spent $40,000. The forms don’t break down whether a company poured thousands of dollars into lobbying for one bill, or had one brief conversation about it with a lawmaker or an aide. Nor do the forms reveal whether companies have lobbied for or against a given bill. And for now, most US tech companies are keeping their positions about specific bills secret, so they can present a unified front against NSA spying and keep their options open.

Representatives of the most important tech companies have, however, made public statements indicating that they’re likely to support bills that allow them to shed more light on government surveillance. “I was shocked that the NSA would do this—perhaps a violation of law but certainly a violation of mission,” Google Executive Chairman Eric Schmidt told CNN last week, in response to an October 30 Washington Post report that the NSA was tapping into Google’s servers without the company’s consent. “From a Google perspective, any internal use of Google services is unauthorized and almost certainly illegal.” Niki Fenwick, a spokesperson for Google, said that the company doesn’t comment on whether it supports specific bills, but Bloomberg News reported last week that the company, which has bulked up its lobbying presence on Capitol Hill, “seeks to end National Security Agency intrusions into its data.”

“Defending and respecting the user’s voice is a natural commitment for us and is why we are so committed to freedom of expression,” Colin Crowell, Twitter’s vice president for global public policy, tells Mother Jones. A Twitter representative noted that the company is actively supporting two of the bills below, S. 607 and HR 1852, which require law enforcement to obtain a warrant before accessing private emails. “For the others, at any given moment, bills are in a state of change so it is rare to emphatically state that we formally support or oppose any given bill until it is nearer a point of final passage,” the representative added.

Without further ado, here are eight pro-transparency bills that some of the biggest names in tech are watching:

Continue Reading »

Visit link:

Google, Yahoo, Facebook, and Twitter Have a New Lobbying Target—the NSA

Posted in FF, GE, LG, ONA, Uncategorized, Venta | Tagged , , , , , , , , , , , | Comments Off on Google, Yahoo, Facebook, and Twitter Have a New Lobbying Target—the NSA