Welcome to European Tribune. It's gone a bit quiet around here these days, but it's still going.

Lavabit and the Strong Arm of Big Brother USA

by Oui Fri Aug 9th, 2013 at 05:05:31 AM EST

.
Do we need to say more than publishing the letter of a Texas entrepreneur ... his has been hit by a gag order and a choice to become complicit in crimes against the American people. He has chosen to fold his company encrypting email of US citizens.

From Lavabit website

My Fellow Users,

I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit. After significant soul searching, I have decided to suspend operations. I wish that I could legally share with you the events that led to my decision. I cannot. I feel you deserve to know what's going on--the first amendment is supposed to guarantee me the freedom to speak out in situations like this. Unfortunately, Congress has passed laws that say otherwise. As things currently stand, I cannot share my experiences over the last six weeks, even though I have twice made the appropriate requests.

What's going to happen now? We've already started preparing the paperwork needed to continue to fight for the Constitution in the Fourth Circuit Court of Appeals. A favorable decision would allow me resurrect Lavabit as an American company.

This experience has taught me one very important lesson: without congressional action or a strong judicial precedent, I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.

Sincerely,
Ladar Levison
Owner and Operator, Lavabit LLC

Defending the constitution is expensive! Help us by donating to the Lavabit Legal Defense Fund.


ZD Net: Snowden's privacy-oriented email provider shuts down under U.S. government pressure

Before and after Edward Snowden engineered the NSA document heist, he had been in touch via e-mail with several journalists scattered around the world. As part of the communication process, Snowden insisted on encrypting his correspondence using PGP software. He also used Lavabit, which offered "Security Through Asymmetric Encryption" as a key part of its service. In a white paper explaining its technology, Lavabit said "Lavabit has developed a system so secure that it prevents everyone, including us, from reading the e-mail of the people that use it."

(The whitepaper is no longer available online, but a copy is still available in the Internet Archive.)

IRS manual detailed DEA's use of hidden intel evidence

(Reuters) - Details of a U.S. Drug Enforcement Administration program that feeds tips to federal agents and then instructs them to alter the investigative trail were published in a manual used by agents of the Internal Revenue Service for two years.

The practice of recreating the investigative trail, highly criticized by former prosecutors and defence lawyers after Reuters reported it this week, is now under review by the Justice Department. Two high-profile Republicans have also raised questions about the procedure.

A 350-word entry in the Internal Revenue Manual instructed agents of the U.S. tax agency to omit any reference to tips supplied by the DEA's Special Operations Division, especially from affidavits, court proceedings or investigative files. The entry was published and posted online in 2005 and 2006, and was removed in early 2007. The IRS is among two dozen arms of the government working with the Special Operations Division, including the Federal Bureau of Investigation, the National Security Agency and the Central Intelligence Agency.

An IRS spokesman had no comment on the entry or on why it was removed from the manual. Reuters recovered the previous editions from the archives of the Westlaw legal database, which is owned by Thomson Reuters Corp, the parent of this news agency.

As Reuters reported Monday, the Special Operations Division of the DEA funnels information from overseas NSA intercepts, domestic wiretaps, informants and a large DEA database of telephone records to authorities nationwide to help them launch criminal investigations of Americans. The DEA phone database is distinct from a NSA database disclosed by former NSA contractor Edward Snowden.

Display:
From the Juan Cole article:

Where is our Amsterdam? Lavabits, Snowden & Wikileaks Censorship recall age of Absolutism | Informed Comment

The long struggle against censorship in the 18th century at the time of oppressive kings in Europe involved the hand-copying and circulation of unpublished anonymous manuscripts. Sometimes dangerous or proscribed books were printed in places beyond the reach of the French kings, in Amsterdam or Geneva.

These printers in Amsterdam and Geneva was by the proper printers with royal charter in Paris called buccaneers, pirates and bandits.

Sweden's finest (and perhaps only) collaborative, leftist e-newspaper Synapze.se

by A swedish kind of death on Fri Aug 9th, 2013 at 08:35:03 AM EST
I fear that the Whistleblower Protection Under US Constitution In 1778 did not make it through the Constitutional Convention and into the Constitution and Bill of Rights that was adopted by the United States of America. Even then the interests of central authority and executive power prevailed.

"It is not necessary to have hope in order to persevere."
by ARGeezer (ARGeezer a in a circle eurotrib daught com) on Fri Aug 9th, 2013 at 01:33:25 PM EST
[ Parent ]
It is commonly acknowledged that there is no encryption that the NSA can not crack. However, when faced with strong encryption, you have to know whether it's worth the effort or not. The NSA's datamining operation is based on trawling everything, everywhere, in order to see if it's interesting, and strong encryption defeats that.

So, the need for a backdoor. The theory is "OK you can have strong encryption, but the NSA gets to look at your content".

It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II

by eurogreen on Fri Aug 9th, 2013 at 11:58:09 AM EST
The really serious question is that of under which national jurisdiction could Lavabit operate in the interests of its subscribers? Is there any?

"It is not necessary to have hope in order to persevere."
by ARGeezer (ARGeezer a in a circle eurotrib daught com) on Fri Aug 9th, 2013 at 01:11:13 PM EST
Hm, that would be a jurisdiction that is both lacking a sufficiently strong deep state of its own and at the same time is strong enough to withstand pressure from the US or other major powers.

The second demand rules out most smaller states. The first demand rules out at least USA, China, Russia, France, Britain and Germany. India?

Or with ample back-ups run it from several smaller countries at once, moving on if thrown out at one place. Though both Wikileaks and Pirate Bay shows that the empire has some ways to try to get at that too. Attacking the income (Wikileaks) or domain names (Pirate Bay). Reminds me, way back when Pirate Bay's first crew was also involved in hosting Chechen oppositional pages. This was around 2006 and Russia was still not so unfriendly, so PRQ (the hosting company run by the Pirate Bay crew) got a visit form cops and prosecutors and a stern warning not to mess with Russia.

But still ample back-ups and several smaller jurisdictions is probable the way to go.

Sweden's finest (and perhaps only) collaborative, leftist e-newspaper Synapze.se

by A swedish kind of death on Fri Aug 9th, 2013 at 02:24:10 PM EST
[ Parent ]
what about Kim Dot Com's encryption system?

and, are German businessmen encrypting their emails for nothing as the NSA would likely zoom in on those intended for the head of R&D of Siemens, for example?

by stevesim on Fri Aug 9th, 2013 at 04:28:03 PM EST
[ Parent ]
.
First Lavabit, now Silent Circle: Another U.S. secure email service closes to protect users

(Gigaom) - Silent Circle, the provider of a range of secure communications services, has pre-emptively closed its Silent Mail email service in order to stop U.S. authorities from spying on its customers. The closures strongly suggest that secure hosted email services cannot be sited in the U.S. without being compelled to compromise users' privacy if asked to do so by the authorities there.  

Pre-emptive measure

The National Harbor, M.D.-based Silent Circle team said in their blog post that no-one had contacted them in this way, but they could "see the writing on the wall". Silent Circle's remaining services include secure phone, video and text facilities, largely aimed at enterprise mobile users, that can boast full end-to-end encryption. Unless someone has managed to break this encryption -- unlikely albeit not impossible -- these are genuinely secure services that leave no traces for the FBI or NSA to requisition. The authorities can't even go after the encryption keys, because these are stored on the users' devices.

Link:

    Kim Dotcom @KimDotcom  
    #Mega's open encrypted email service outside of #NSA reach will
    change the way people use email forever. You'll see. Coming 2014.
Obama touts NSA privacy safeguards at press conference - live


'Sapere aude'
by Oui (Oui) on Fri Aug 9th, 2013 at 05:01:48 PM EST
[ Parent ]
As a five or ten year domestic industrial development plan, something like this could be built by a consortium of the South American leftist powers.  They already have a strand of anti Imperialism in their political DNA.
by Zwackus on Fri Aug 9th, 2013 at 11:02:49 PM EST
[ Parent ]
.
I expect the American people will realize the present situation of expanded surveillance under the Patriot Act breaches the US Constitution. Obama may try to manage the damage, but with the flight of Snowden he has lost all control. How the White House has handled the issue will get more criticism, hurt Obama's popularity rating and challenges the Democrats in the midterm-election of 2014.

Obama's Reassurances about Domestic Surveillance are not Reassuring

(Informed Comment) - President Obama gave a news conference on Friday in which he addressed the controversy over Edward Snowden's revelations regarding NSA spying on the American people.

...
Among the more shameful episodes in the Obama presidency has been his vindictiveness toward whistleblowers and his and Eric Holder's eagerness to use the fascistic 1917 Espionage Act against them. Seymour Hersh, who provoked the last big reforms of US intelligence, would have been charged with espionage by Barack Obama and would either have been executed or would have been given life in prison. In this regard, Obama's record is worse than Nixon's.

The 1917 Espionage Act was enacted just after the US went to war with Imperial Germany. It was twinned with a Sedition Act a year later, as this site explains: "Congress passed the Sedition Act of 1918, which made it a federal offense to use "disloyal, profane, scurrilous, or abusive language" about the Constitution, the government, the American uniform, or the flag. The government prosecuted over 2,100 people under these acts."

In other words, the Espionage Act deployed against Bradley Manning and Edward Snowden is a manifestation of war fever and nationalist fascism from the early 20th century, and likely is unconstitutional, just as most of the Sedition Act has been ruled to be. It does not speak well of Mr. Obama that he is using this sort of tool to govern.

Mr. Obama at one point in his press conference called on Edward Snowden to come back to the United States and argue his case. I mean, really. This kind of disinformation and grandstanding can't possibly be necessary, even given the constraints mentioned at the beginning of this essay. Mr. Obama knows very well that if Snowden returned to the US, we would never ever hear from him ever again. He'd go straight to a maximum security prison for the rest of his days on earth and die there.

Bradley Manning was held at a brig by the Marines and was falsely declared a suicide risk so that he could be tortured by being chained naked to his bed for a year and woken up several times a night (sleep deprivation is a torture tactic, as is humiliation via making a prisoner nude. These same techniques were used by the US military on Iraqi prisoners at Abu Ghraib). There is no reason to believe that Snowden would be treated better. Note that Obama's own spokesman, P. J. Crowley, publicly criticized Manning's treatment and was fired for it. Obama had been in a position to stop the torture but did not.

[Links added are mine - Oui]

Under Obama, we have been subjected to a Patriot Act on steroids - 2012

See my diary @BooMan - Obama: Lesson In Statesmanship to Build a Relationship.

'Sapere aude'

by Oui (Oui) on Sat Aug 10th, 2013 at 11:21:34 AM EST
Americans haven't cared about domestic spying before, the only reason people are shouting about it now is the GOP formula of God, Guns, and Gays has run out of steam, they are facing electoral disaster in 2014, and they need a way to stir up the nincompoops.

She believed in nothing; only her skepticism kept her from being an atheist. -- Jean-Paul Sartre
by ATinNM on Sat Aug 10th, 2013 at 11:55:59 AM EST
[ Parent ]
You beat me to it.  The only reason this is getting coverage is the GOP needs a new issue.  It isn't getting traction, though (The fan base still only cares about the same, old "Obummer is a commie, fascist, Muslim, Kenyan who's gonna take our guns" bilge), which is no surprise since, as you note, we've never cared about domestic surveillance.  J. Edgar Hoover would have fit into any totalitarian secret police, but he was (and remains for the majority) lionized.
by rifek on Sat Aug 10th, 2013 at 12:32:24 PM EST
[ Parent ]
Sad but true for this and ATinNM's preceding remark. We have been signally unwilling to pay the price of liberty.

"It is not necessary to have hope in order to persevere."
by ARGeezer (ARGeezer a in a circle eurotrib daught com) on Sun Aug 11th, 2013 at 12:08:21 AM EST
[ Parent ]
The vast majority is scared spitless of it.
by rifek on Wed Aug 14th, 2013 at 10:41:27 PM EST
[ Parent ]
Easier to penetrate a computer to read the plain text before encryption than messing around with decryption.  To start approaching secure email a person would need one computer to enter plain text and run the encryption that is never, ever, hooked directly to the internet and another linked to the internet for sending and receiving.  Load the incoming message on a disk and transfer to the 'air-firewalled' machine for reading.  Even then it is possible to adjoin spyware to incoming messages and when the user transfers the disk over to a reader the spyware defeats the encryption by attaching the plain text to the "encrypted" message.

So, somebody needs three machines:

  1.  Dedicated Encryption Machine - never attached to the internet

  2.  Sending and Receiving Machine

  3.  Dedicated Decryption Machine - never attached to the internet

Surprisingly, perhaps, this system could be a single device retailing for around $150 (US.)    

She believed in nothing; only her skepticism kept her from being an atheist. -- Jean-Paul Sartre
by ATinNM on Sat Aug 10th, 2013 at 11:48:54 AM EST
But massive overkill. Unless the hypothesis is that the NSA already has a backdoor into your computer and/or mine, run-of-the-mill encryption enables us to communicate without being subject to their deep-sea trawling. Obviously, if you or I should be targeted for special attention by the NSA, then the extra steps are justified.

I think it's probable that secure-mail services offered by European ISPs are secure from the NSA's trawling. Not necessarily secure from national trawling, however. Also, the degree of exchange of information between national spy services needs to be examined : wholesale? (UK/US), retail? (Germany/US)...

It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II

by eurogreen on Mon Aug 12th, 2013 at 03:59:49 AM EST
[ Parent ]
"Run of the mill" encryption may very well mark you for special attention. So few people use it that they can probably dedicate some extra more-or-less automated muscle to follow up.

And you can assume they have a backdoor into your machine as well.

by Colman (colman at eurotrib.com) on Mon Aug 12th, 2013 at 04:20:28 AM EST
[ Parent ]
My working assumption is that the US/UK security services are reading all my e-mail. Has been for ages.

If I was up to anything that needed to be hidden from them or from any well connected organisations I'd think very, very carefully about how to both secure communications and avoid attracting attention to the security:  by obviously securing your communications you mark yourself as someone of interest when no-one else is doing it. Very carefully thought through stenography is required here. Hide your messages in kitten pictures and who'd even notice?

by Colman (colman at eurotrib.com) on Mon Aug 12th, 2013 at 04:33:48 AM EST
[ Parent ]
Indeed. The idea that competent trrrists would be using email to communicate is idiotic.

But then this isn't about trrrists - it's about industrial espionage, and profiling of political dissent.

by ThatBritGuy (thatbritguy (at) googlemail.com) on Mon Aug 12th, 2013 at 07:16:36 AM EST
[ Parent ]
So, obviously the way to defeat the trawling strategy is by widespread adoption of run-of-the-mill encryption (aka "helping the trrrrists").

It's a long shot.

It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II

by eurogreen on Mon Aug 12th, 2013 at 08:52:47 AM EST
[ Parent ]
Yeah, except the NSA could scoop up 95% of email by using a list of pet names to guess passwords.
by Colman (colman at eurotrib.com) on Mon Aug 12th, 2013 at 09:32:49 AM EST
[ Parent ]
I'd think very, very carefully about how to both secure communications and avoid attracting attention to the security:  by obviously securing your communications you mark yourself as someone of interest when no-one else is doing it.

Absolutely.  Once in the "person of interest" file the battle is half lost.  If they want to crack the communication bad enough, they will. Either through clever decryption techniques or the good, old, standby:



She believed in nothing; only her skepticism kept her from being an atheist. -- Jean-Paul Sartre

by ATinNM on Mon Aug 12th, 2013 at 10:51:06 AM EST
[ Parent ]
Examples from today here.

http://storify.com/erinmcunningham/press-under-fire-in-egypt-as-security-forces-clear

Read down to Mike Giglio tweets

Any idiot can face a crisis - it's day to day living that wears you out.

by ceebs (ceebs (at) eurotrib (dot) com) on Wed Aug 14th, 2013 at 11:49:42 AM EST
[ Parent ]
Complete unless the machines have a Chinese microprocessor with the built in backdoor.

</paranoia>

:-)

She believed in nothing; only her skepticism kept her from being an atheist. -- Jean-Paul Sartre

by ATinNM on Mon Aug 12th, 2013 at 10:35:31 AM EST
[ Parent ]
.
Thanks for all the heads up, much appreciated!

I came across this great video by EFF from June 2013 and wrote a diary @BooMan ...

Video NSA Debate: Obama '13 vs. Biden '06 - Guess Who Lost?

(EFF) - June 14, 2013 - After a leaked FISA court document revealed that the National Security Agency (NSA) is vacuuming up private data on millions of innocent Americans by collecting all the phone records of Verizon customers, President Obama responded by saying "let's have a debate" about the scope of US surveillance powers.

...
Watch this video, as Senator Biden from 2006 directly refutes each point President Obama made about the NSA surveillance program at his news conference last week.

Original article at Electronic Frontier Foundation (EFF) - here - and the video link to YouTube.



'Sapere aude'
by Oui (Oui) on Sat Aug 10th, 2013 at 02:26:57 PM EST
Of course there's no perfect way to keep your email private unless you have complete control over your own server. As noted by the EFF, this takes time and effort - and unless you're in dire need to keeping quiet, you might just have to trust somebody along the way.

    "MyKolab is hosted in Switzerland and benefits from the strong Swiss privacy laws. It is run exclusively with free software and using the service supports the development of Kolab. Also, it lets you export all your data at any time." - EFF

In addition to Kolab, the EFF lends their endorsement to Riseup and Autistici/Inventati. The first is a set of secure communications tools which requires an invitation, the second is a range of "privacy-aware" services for everything from email to webpage hosting services - that group also requires unique approval, which should be expected if you're aiming to have truly trustworthy service in the privacy-conscious realm (as sad as that is to say today.)

http://www.slashgear.com/lavabit-and-silent-circle-are-dead-encrypted-email-alternatives-still-activ e-09293394/



Maybe it's because I'm a Londoner - that I moved to Nice.
by Ted Welch (tedwelch-at-mac-dot-com) on Sat Aug 10th, 2013 at 05:21:28 PM EST
In order to have secure communication, you not only need secure software (and secure endpoint hardware), you need confidence that your host is not collaborating with the listeners.

There is perhaps, indeed, a market opportunity for Swiss providers, trading on the nation's reputation for independence (the Swiss reputation for secrecy is somewhat tainted these day!). It would be high on the list of jurisdictions which can just say no, if it should choose to. But I have no idea what federal (or cantonal) policy about data privacy is like, and whether or not they already provide a feed to the NSA.

There's an excellent catalogue of free/secure software linked from that article : the cleverly-named Prism break. I will try to spread it around, indeed I may adopt some of it.

It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II

by eurogreen on Mon Aug 12th, 2013 at 04:27:51 AM EST
[ Parent ]
You're assuming Prism-break isn't a security service front, of course.
by Colman (colman at eurotrib.com) on Mon Aug 12th, 2013 at 04:36:14 AM EST
[ Parent ]
... wot, along with Debian, OpenBSD, Firefox, everything Tor, etc?

Righto. Paralysis through paranoia.

(I'm mildly distressed to discover that Ubuntu is no longer in odour of sanctity, so I suppose I'll have to do Debian.)

It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II

by eurogreen on Mon Aug 12th, 2013 at 11:26:36 AM EST
[ Parent ]
What about Iceland?  Don't they have the strongest privacy laws?  

She believed in nothing; only her skepticism kept her from being an atheist. -- Jean-Paul Sartre
by ATinNM on Mon Aug 12th, 2013 at 10:54:30 AM EST
[ Parent ]
More revelations:

Update: Researchers say Tor-targeted malware phoned home to NSA:

Malware planted on the servers of Freedom Hosting--the "hidden service" hosting provider on the Tor anonymized network brought down late last week--may have de-anonymized visitors to the sites running on that service. This issue could send identifying information about site visitors to an Internet Protocol address that was hard-coded into the script the malware injected into browsers. And it appears the IP address in question belongs to the National Security Agency (NSA).

This revelation comes from analysis done collaboratively by Baneki Privacy Labs, a collective of Internet security researchers, and VPN provider Cryptocloud. When the IP address was uncovered in the JavaScript exploit--which specifically targets Firefox Long-Term Support version 17, the version included in Tor Browser Bundle--a source at Baneki told Ars that he and others reached out to the malware and security community to help identify the source.

This stuff gets murky real fast.  Intelligence agencies have used private companies as fronts since, like, forever and they've also simply purchased good and services from private companies.  

She believed in nothing; only her skepticism kept her from being an atheist. -- Jean-Paul Sartre

by ATinNM on Mon Aug 12th, 2013 at 11:03:09 AM EST
Here the case seems clear that the private company wasn't used as a front but was hacked.

Tor (anonymity network) - Wikipedia, the free encyclopedia

In August 2013, it was discovered that the Firefox browsers in many older versions of the Tor Browser Bundle were vulnerable to a JavaScript attack, which was being exploited to send user's IP address and Windows computer name to the attackers. News reports linked this to an FBI operation targeting Freedom Hosting's owner, Eric Eoin Marques. He was arrested on a provisional extradition warrant issued by a US court on July 29. The FBI is seeking to extradite Marques to Maryland on four charges: distributing, conspiring to distribute and advertising child pornography - as well as aiding and abetting advertising of child pornography. The warrant alleges that Marques is "the largest facilitator of child porn on the planet."[42][43]


*Lunatic*, n.
One whose delusions are out of fashion.
by DoDo on Wed Aug 14th, 2013 at 02:29:08 PM EST
[ Parent ]
Assuming the FBI link is correct and the charges of distribution of child pornography are legitimate, how objectionable is the use of hacking by law enforcement organisations?
by Bjinse on Thu Aug 15th, 2013 at 06:06:36 AM EST
[ Parent ]
Breaking into your computer is about as objectionable as breaking into your home. If they had enough evidence ex ante to merit breaking into his home or his data, then they should also have had enough to get the French police to break into his home and make copies of his hard drives.

If they didn't have enough evidence to convince the French to break into his home and his computers, then they were effectively breaking in and then making up charges based on what they happened to find. That is a very objectionable practice: Any house you go through with a sufficiently fine-toothed comb will contain sufficient illegalities to retroactively justify breaking in.

But of course even that isn't what they did here. What they did here was to break into a whole apartment bloc, rummage through every apartment in the bloc, and then break the door locks on the way out. Without telling anybody that they had done it, or, as far as can be determined from available evidence, intending to notify any of the residents that they might want to check their locks once the operation was over.

Off the top of my head, I can't think of anything that doesn't produce megaton yields which would justify that sort of dragnet operation.

- Jake

Friends come and go. Enemies accumulate.

by JakeS (JangoSierra 'at' gmail 'dot' com) on Thu Aug 15th, 2013 at 07:30:19 AM EST
[ Parent ]
Good use of PsyOps.  Hack into a distributor of child porn and widely publicize the fact.  This creates the subliminal equation:

Privacy Advocates = Child Porn

in people's minds.  

That may seem silly.  It is silly.  It also works.


She believed in nothing; only her skepticism kept her from being an atheist. -- Jean-Paul Sartre

by ATinNM on Thu Aug 15th, 2013 at 11:38:03 AM EST
[ Parent ]
Schneier: when the NSA comes to your company's door, fight! - Boing Boing
Bruce Schneier has advice for America's tech companies: when the NSA comes to you and asks you to spy on your users, say NO. They'll promise you that no one will ever find out that you were helping them break the law, but they can't keep that promise. They'll put your company's name in PowerPoint presentations that they show to thousands of employees and contractors and suppliers, and the next whistleblower will out you for your cowardly complicity -- just like Snowden did for Microsoft, Apple, Google, and so many others. If you think not complying with the NSA will cost you the business, recognize that complying with them could also destroy you.


It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II
by eurogreen on Tue Aug 13th, 2013 at 04:18:05 AM EST
Apple patents tech that lets government disable iPhone video, camera and wi-fi - Boing Boing

Apple has a patent to disable "one or more functional or operational aspects of a wireless device, such as upon the occurrence of a certain event." For instance, the patent states, "Covert police or government operations may require complete 'blackout' conditions."

Larry Press has posted example photos of police or government operations that would have benefited from a such a kill switch. (Via IP)



It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II
by eurogreen on Tue Aug 13th, 2013 at 04:27:18 AM EST
Does this mean that other companies won't be able to let the government disable them because Apple has a patent?
by gk (gk (gk quattro due due sette @gmail.com)) on Tue Aug 13th, 2013 at 04:33:01 AM EST
[ Parent ]
Nono, it means that when the political police demands that they build in such a back-door, they will also have to pay royalties to Apple.

You will get the privilege of paying for the loss of your ability to film police at work.

- Jake

Friends come and go. Enemies accumulate.

by JakeS (JangoSierra 'at' gmail 'dot' com) on Tue Aug 13th, 2013 at 04:46:10 AM EST
[ Parent ]
This is another, in a long series, of absurd patents granted by the USPTO that will, eventually, be over-turned at a cost of millions in legal fees.  

She believed in nothing; only her skepticism kept her from being an atheist. -- Jean-Paul Sartre
by ATinNM on Tue Aug 13th, 2013 at 12:09:49 PM EST
[ Parent ]
Digital telephone switches have had this capability since the first switches were manufactured.  If you think about it, it's the same thing as turning off service to a dead-beat customer.  Turning a hardware function off is a sub-routine to turning it one during a power-up sequence.  

My guess is Apple protected it in order to be able to patent-troll.

She believed in nothing; only her skepticism kept her from being an atheist. -- Jean-Paul Sartre

by ATinNM on Tue Aug 13th, 2013 at 12:05:25 PM EST
[ Parent ]
DAMN!

"turn it on"

(My English language skills seem to have evaporated.)

She believed in nothing; only her skepticism kept her from being an atheist. -- Jean-Paul Sartre

by ATinNM on Tue Aug 13th, 2013 at 12:06:30 PM EST
[ Parent ]
NSA firing 90% of its sysadmins to eliminate potential Snowdens - Boing Boing

The NSA is going to cut 90% of its 1,000 sysadmins in a bid to reduce the risk of leaks. NSA whistleblower Edward Snowden was a network administrator, charged with keeping the machines running on the network of vast data-centers used by the NSA to harvest, store and analyze unimaginably large quantities of data.

So, after this change, the NSA -- which now has nearly every compromising communication about every human alive -- will no longer have to worry about its sysadmins leaking its secrets. But it will have downsized its operational staff (and thus its capability to repel hackers and attackers) by 90 percent. I feel better already.

This is like a plutonium storehouse reducing the risk of guards selling fissiles on the black market by firing all of them and leaving a couple of dudes at the door with walkie-talkies.



It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II
by eurogreen on Tue Aug 13th, 2013 at 04:38:45 AM EST
No, your data isn't secure in the cloud:

While online data storage services claim your data is encrypted, there are no guarantees. With recent revelations that the federal government taps into Internet search engines, email and cloud service providers, any myth about data "privacy" on the Internet has been busted.

Experts say there's simply no way to ever be completely sure your data will remain secure once you've moved it to the cloud.

When ComputerWorld talks corporate Decision Makers listen. Non-US companies are already pulling back from buying Cloud services from US companies.  One fall-out from NSA spying may very be a complete shut-out of US companies from the $111 to $131 billion/year (US) Cloud market.  

She believed in nothing; only her skepticism kept her from being an atheist. -- Jean-Paul Sartre

by ATinNM on Tue Aug 13th, 2013 at 11:58:53 AM EST
.
From your article in Computerworld:

"There are also companies that have friendlier policies...that demonstrate they fight for users and try to push back against unreasonable government requests for data," Auerbach said. "Who's got your back? Does this company require a warrant for customer data? We give companies stars based on whether they meet that criteria."

The EFF, a privacy advocacy group, has filed a lawsuit challenging the NSA's spy program. It has also created a website that rates 19 of largest Internet companies on how hard they try to protect your data. The EFF site "Who Has Your Back " awards companies gold stars based on each of six criteria ...

Not surprising the telecom companies [like AT&T, Verizon - zero stars] had made earlier provisions with the Bush administration to provide all support needed in the WOT.

'Sapere aude'

by Oui (Oui) on Tue Aug 13th, 2013 at 01:02:42 PM EST
[ Parent ]
Fascinating article about Glenn Greenwald's partner, doc filmmaker Laura Poitras, in the NY Times.


This past January, Laura Poitras received a curious e-mail from an anonymous stranger requesting her public encryption key. For almost two years, Poitras had been working on a documentary about surveillance, and she occasionally received queries from strangers. She replied to this one and sent her public key -- allowing him or her to send an encrypted e-mail that only Poitras could open, with her private key -- but she didn't think much would come of it.

The stranger responded with instructions for creating an even more secure system to protect their exchanges. Promising sensitive information, the stranger told Poitras to select long pass phrases that could withstand a brute-force attack by networked computers. "Assume that your adversary is capable of a trillion guesses per second," the stranger wrote.

Before long, Poitras received an encrypted message that outlined a number of secret surveillance programs run by the government. She had heard of one of them but not the others. After describing each program, the stranger wrote some version of the phrase, "This I can prove."

(and how about this...)

"They took my bags and checked them," Poitras said. “They asked me what I was doing, and I said I was showing a movie in Sarajevo about the Iraq war. And then I sort of befriended the security guy. I asked what was going on. He said: `You're flagged. You have a threat score that is off the Richter scale. You are at 400 out of 400.' I said, `Is this a scoring system that works throughout all of Europe, or is this an American scoring system?' He said. `No, this is your government that has this and has told us to stop you.' "
....
After being detained repeatedly, Poitras began taking steps to protect her data, asking a traveling companion to carry her laptop, leaving her notebooks overseas with friends or in safe deposit boxes. She would wipe her computers and cellphones clean so that there would be nothing for the authorities to see. Or she encrypted her data, so that law enforcement could not read any files they might get hold of. These security preparations could take a day or more before her travels.

It wasn't just border searches that she had to worry about. Poitras said she felt that if the government was suspicious enough to interrogate her at airports, it was also most likely surveilling her e-mail, phone calls and Web browsing. "I assume that there are National Security Letters on my e-mails," she told me, referring to one of the secretive surveillance tools used by the Department of Justice. A National Security Letter requires its recipients -- in most cases, Internet service providers and phone companies -- to provide customer data without notifying the customers or any other parties. Poitras suspected (but could not confirm, because her phone company and I.S.P. would be prohibited from telling her) that the F.B.I. had issued National Security Letters for her electronic communications.

this woman is obviously at the very center of such an civilization-changing story. Here filming the Utah NSA center...


"Life shrinks or expands in proportion to one's courage." - Anaïs Nin

by Crazy Horse on Tue Aug 13th, 2013 at 04:07:35 PM EST
Addendum (in case you weren't sure who we are dealing with)


These precautions might seem paranoid -- Poitras describes them as "pretty extreme" -- but the people she has interviewed for her film were targets of the sort of surveillance and seizure that she fears. William Binney, a former top N.S.A. official who publicly accused the agency of illegal surveillance, was at home one morning in 2007 when F.B.I. agents burst in and aimed their weapons at his wife, his son and himself. Binney was, at the moment the agent entered his bathroom and pointed a gun at his head, naked in the shower. His computers, disks and personal records were confiscated and have not yet been returned. Binney has not been charged with any crime.

the article is spell-binding. read at own risk. (even tho NYT.)

"Life shrinks or expands in proportion to one's courage." - Anaïs Nin

by Crazy Horse on Tue Aug 13th, 2013 at 04:22:09 PM EST
[ Parent ]
the revelation that she has done much of her work (since meeting the source of the revelations in Hong Kong) in BERLIN, where she now works, will make this even more of a story in Yurp...

...and could influence the upcoming election.

"Life shrinks or expands in proportion to one's courage." - Anaïs Nin

by Crazy Horse on Tue Aug 13th, 2013 at 04:43:03 PM EST
[ Parent ]
Notice that this comment preceeded Bjinse's Diary by nearly a day. This story needs as many legs as it can find.

"Life shrinks or expands in proportion to one's courage." - Anaïs Nin
by Crazy Horse on Thu Aug 15th, 2013 at 07:25:05 AM EST
[ Parent ]
.
Of course I noticed. A well earned h/t to you!

I took parts of your comment and the diary by Bjinse to do a follow up @Booman - Follow-up Diary About Lavabit and the Security State.

I made some additions about Laura Poitras as she has made some crucial documentaries as early as 2006 about the US occupation of Iraq. Harassments by federal agents started after her first film "My Country, My Country".

'Sapere aude'

by Oui (Oui) on Thu Aug 15th, 2013 at 09:30:34 AM EST
[ Parent ]
.
Democracy Now Exclusive: Owner of Snowden's Email Service on Why He Closed Lavabit Rather Than Comply With Gov't

AMY GOODMAN: Glenn Greenwald also wrote, "What is particularly creepy about the Lavabit self-shutdown is that the company is gagged by law even from discussing the legal challenges it has mounted and the court proceeding it has engaged. In other words, the American owner of the company believes his Constitutional rights and those of his customers are being violated by the US Government, but he is not allowed to talk about it."

Greenwald goes on to write, quote, "Just as is true for people who receive National Security Letters under the Patriot Act, Lavabit has been told [that] they would face serious criminal sanctions if they publicly discuss what is being done to their company."

LADAR LEVISON: Well, just to add one thing to Greenwald's comments, I mean, there's information that I can't even share with my lawyer, let alone with the American public. So if we're talking about secrecy, you know, it's really been taken to the extreme. And I think it's really being used by the current administration to cover up tactics that they may be ashamed of.

Glenn Greenwald: Email service used by Snowden shuts itself down, warns against using US-based companies

Lavabit's Ladar Levison: 'If You Knew What I Know About Email, You Might Not Use It'

(Forbes) - Lavabit was created in 2004, in response to the Patriot Act, says Levison. He and friends from Southern Methodist University decided to create an email service by geeks for geeks. Levison was concerned that the FBI could send a company a national security letter (NSL) that would force them to turn over information about a customer without going through a court first. "I wanted to put myself in the position of not having information to turn over," he said. "I didn't want to be put in the position of compromising people's privacy without due process."



'Sapere aude'
by Oui (Oui) on Wed Aug 14th, 2013 at 03:32:55 AM EST
is that it is the meta-surveillance which led to the whistleblowing.

It seems likely to me that as long as the NSA and cohorts were content to analyse data in order to detect terrorist threats, nobody was too bothered about it -- no doubt ISPs, Google, etc routinely comply.

But when it became obvious that they were targeting people -- Poitras, Appelbaum, and Uncle Tom Cobbley and all -- who were clearly not terrorists but were concerned about surveillance, then some of these companies drew the line, it seems.

It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II

by eurogreen on Wed Aug 14th, 2013 at 04:18:15 AM EST
[ Parent ]
NZ prime minister John Key: We have to spy on you because al-Qaeda has training camps here. Also: FISH! - Boing Boing
The New Zealand Prime Minister John Key is trying to ram through legislation to legalize the kind of domestic surveillance that the US NSA and the UK GCHQ have engaged in. When asked whether he thought he had popular support for allowing the government to spy on New Zealanders' entire online lives, he refused to answer the question and kept changing the subject to fishing quotas (seriously).

But there is pushback...


It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II

by eurogreen on Wed Aug 14th, 2013 at 04:58:12 AM EST
.
Part of an earlier diary - Obama and the NSA Winning the War Against Journalists?.

NZ disputes report that it spied on journalist

The strongest evidence against the idea again comes from the AP, in the form of a partial admission from the New Zealand government -- one that even the reporter for the Star-Times called "unsettling" to his story.

    New Zealand Defense Minister Jonathan Coleman acknowledged the existence of an embarrassing confidential order that lists investigative journalists alongside spies and terrorists as potential threats to New Zealand's military. That document was leaked to Hager, who provided a copy to The Associated Press. Coleman said the order will be modified to remove references to journalists.

    He also said the New Zealand Defense Force had conducted an extensive search of its records over the weekend and had found no evidence that either it or any other agency had spied on Stephenson.

This is one of the side effects of the Snowden revelations. There was a time when a flat denial by a government would be sufficient. Now, governments that are complicit in the NSA's surveillance are far less likely to get the benefit of the doubt. And it may take some time before we learn if that skepticism is warranted.

But please, please don't spy on me - Murder Inc..

Cases involving foreign spies from "friendly" countries are even more rare. It is a given that the US, Britain and Australia have Intelligence officers operating here, usually under diplomatic cover. But nothing has ever been done about them, even when there have been demonstrable instances of meddling in NZ's internal political affairs, most notably by the US Central Intelligence Agency (CIA).

Our "friends" the French went too far with the 1985 fatal bombing, in Auckland Harbour, of the Rainbow Warrior by its agents. Routine Police work and the sheer nosiness of ordinary Kiwis led to two of those agents being arrested, tried and imprisoned (and released in an indecently short time, as a result of crude political pressure applied by France). But that was the only previous occasion where foreign spies (not to mention bombers and killers) have been actually prosecuted.

Until 2004. One of the sensations of last year was the unmasking of an Israeli Intelligence operation in Auckland, the arrest of two operatives of Mossad (that country's external security agency), followed by their conviction, imprisonment and deportation. The whole scandal caused major outrage right across the NZ political spectrum; a diplomatic breach with Israel that remains unresolved, at the time of writing; and attracted media and political attention right around the world because of the blatant nature of the operation and the serious implications for Israel's dealings with all other "friendly" nations.

US and UK at first - later joined by Canada, New Zealand and Australia -  make up the the so-called "Five Eyes"

I'm working on a new diary to illustrate Obama's flawed thinking on whistleblowers and journalists and which advisors led to this new US trauma.

'Sapere aude'

by Oui (Oui) on Wed Aug 14th, 2013 at 07:12:40 AM EST
[ Parent ]
The NZ journalist who was targeted for surveillance, Jon Stephenson, features in this documentary about an ugly episode of NZ army's involvement in Afghanistan, precisely the story for which he was snooped upon (and defamed by the head of the Army).

The documentary was first screened last weekend. I'll watch it when I get time.

It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II

by eurogreen on Wed Aug 14th, 2013 at 12:13:47 PM EST
[ Parent ]
Oops, I'm not able to edit diary.
In first sentence one bad link, should be: encrypting email of US citizens [ZDNet link].

'Sapere aude'
by Oui (Oui) on Fri Aug 16th, 2013 at 05:07:43 AM EST
Try editing again? It should be fixed now.
by afew (afew(a in a circle)eurotrib_dot_com) on Fri Aug 16th, 2013 at 07:21:51 AM EST
[ Parent ]
Yes, that's nice and could be very helpful. Thanks!

'Sapere aude'
by Oui (Oui) on Fri Aug 16th, 2013 at 07:50:12 AM EST
[ Parent ]
.
New revelations puts Obama, US Congress and the NSA intelligence community under more pressure. I love this snippet in the news ... President Obama will keep Congress informed of compliance issues as they arise.

Newest revelations of domestic spying by NSA stir up anger

White House deputy press secretary Josh Earnest said that the NSA documents showed that NSA's Compliance Office established in 2009 "is monitoring, detecting, addressing and reporting compliance incidents," and that "the majority of the compliance incidents are unintentional." In a statement from the Massachusetts island of Martha's Vineyard, where the president is vacationing, he added that the administration is "keeping the Congress appropriately informed of compliance issues as they arise."



'Sapere aude'
by Oui (Oui) on Sat Aug 17th, 2013 at 05:18:16 AM EST
[Meta-comment : Snowden is spreading his goodies among different media -- very smart! Apparently he gave these docs to the Post a while ago]
The full executive summary of Q1-2012 violations

The immense value of leaking raw data (suitably redacted) :

NSA broke privacy rules thousands of times per year, audit finds - The Washington Post

The documents, provided earlier this summer to The Washington Post by former NSA contractor Edward Snowden, include a level of detail and analysis that is not routinely shared with Congress or the special court that oversees surveillance. In one of the documents, agency personnel are instructed to remove details and substitute more generic language in reports to the Justice Department and the Office of the Director of National Intelligence.

In one instance, the NSA decided that it need not report the unintended surveillance of Americans.

This sort of report provides crucial elements that are not reported to the overseers...

This underlines the truth of Snowden's famous allegation that he could access the correspondance of any US citizen. Probably it would have been easy to subsequently class the unauthorised search as a typing error or whatever.

It is rightly acknowledged that people of faith have no monopoly of virtue - Queen Elizabeth II

by eurogreen on Sat Aug 17th, 2013 at 03:06:28 PM EST
[ Parent ]
The immense value of leaking raw data (suitably redacted) :

Though more for propaganda reasons than any actual danger to people involved.

As some wit on the twitters remarked: The Department of Defence would really like to publish a list with all the people killed by Manning's leaks but doing so would expose them to further danger.

Seriously, the outrage about insufficiently vetted disclosures seems like a way for journalists to prove they aren't secret Soviet sympathisers.

by generic on Sun Aug 18th, 2013 at 02:40:15 PM EST
[ Parent ]


Display:
Go to: [ European Tribune Homepage : Top of page : Top of comments ]