mersenneforum.org

mersenneforum.org (https://www.mersenneforum.org/index.php)
-   Soap Box (https://www.mersenneforum.org/forumdisplay.php?f=20)
-   -   Government snooping, backdoors and #necessaryhashtags (https://www.mersenneforum.org/showthread.php?t=18271)

chalsall 2013-08-26 22:07

[QUOTE=kladner;350949].....or hush payments to "plumbers".[/QUOTE]

Same thing.

ewmayer 2013-08-26 23:23

Note that the esteemed Mr. Eric "what me, evil?" Schmidt is also the star of a [url=http://www.zerohedge.com/news/2013-08-26/julian-assange-reveals-googles-covert-role-foaming-uprisings]related perspective[/url] by Julian Assange - although I believe the fellow credited with the "foaming" quote therein actually intended "fomenting", as "foaming" implies a more-literal yeasty "ferment" than the societal one described in the piece.

[And now I'm longing for a brewsky, but it's at least 4 hours too early here in sunny CA on this workday Monday.]

xilman 2013-08-27 19:50

Facebook statistics
 
Facebook has recently released [URL="http://www.bbc.co.uk/news/technology-23852230"]statistics[/URL] on which governments requested information.
Strangely enough, USG refused to allow an exact figure to be produced. HMG's number is 2,337,outnumbered by India at 4,144 and slightly ahead those four Italy and the 4th Reich.

Some one might like to attempt to set more precise error bars on the USG requests.

Paul

xilman 2013-09-02 18:18

From the whoda thoughtit dept.
 
[URL="http://www.bbc.co.uk/news/world-latin-america-23929257"]NSA 'spied on Brazil and Mexico'[/URL] --- film at 11.

chalsall 2013-09-02 18:55

[URL="http://news.slashdot.org/story/13/09/02/1240250/att-maintains-call-database-for-the-dea-going-back-to-1987"]Hmmmmm...[/URL]

ewmayer 2013-09-05 19:24

o The omni-ogling issue is making for some interesting bedfellows:

[url=www.reuters.com/article/2013/09/05/us-usa-legal-nra-idUSBRE98401920130905?feedType=RSS&feedName=domesticNews]Fears of gun registry prompt NRA to back lawsuit against surveillance[/url]
[quote]NEW YORK (Reuters) - The National Rifle Association said on Wednesday it supports a lawsuit brought by civil rights groups to strike down the U.S. government's broad telephone surveillance program, citing potential violations of gun owners' privacy rights.
...
The ACLU said it welcomed the support from the NRA in its suit against Clapper and other officials filed in U.S. District Court for the Southern District of New York.

"Americans from across the political spectrum value individual privacy," said Jameel Jaffer, one of the ACLU lawyers on the suit. "The philosophical roots may differ, but I think that is a widely shared American value."[/quote]


o Update on the NSA/DEA "fake the evidence trail" program - this is so blatantly unconstitutional [and perjurious on the part of the fakers] it's rather appalling that there even needs to be a "national debate" on it:

[url=www.reuters.com/article/2013/09/05/us-dea-hearings-idUSBRE9840EJ20130905?feedType=RSS&feedName=domesticNews]Civil-liberties groups seek hearings on DEA's use of intelligence[/url]: [i](Reuters) - A coalition of two dozen civil-liberties groups called Thursday for broad congressional hearings on the Drug Enforcement Administration, citing recent revelations by Reuters about the DEA's use of National Security Agency data to build non-terrorism cases against Americans.[/i]
[quote]Last month, Reuters reported that the DEA funnels tips from overseas NSA intercepts, informants, court-ordered wiretaps and a massive telephone database to police and federal agents nationwide, including tax investigators at the Internal Revenue Service.

The DEA instructs the agents and police to never reveal the source of the information and to instead "recreate" the investigative trail, records seen by Reuters show. This DEA process, which agents call "parallel construction," disturbs some judges, former prosecutors and defense lawyers, who say it systematically eliminates potential evidence that defendants may need to ensure a fair trial.[/quote]

kladner 2013-09-05 22:06

NSA and GCHQ unlock encryption used to protect emails, banking and medical
 
[url]http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security[/url]

[QUOTE]US and British intelligence agencies have successfully cracked much of the online encryption relied upon by hundreds of millions of people to protect the [URL="http://www.theguardian.com/world/privacy"]privacy[/URL] of their personal data, online transactions and emails, according to top-secret documents revealed by former contractor Edward Snowden.

The files show that the National Security Agency and its UK counterpart [URL="http://www.theguardian.com/uk/gchq"]GCHQ[/URL] have broadly compromised the guarantees that [URL="http://www.theguardian.com/technology/internet"]internet[/URL] companies have given consumers to reassure them that their communications, online banking and medical records would be indecipherable to criminals or governments.[/QUOTE]

Nick 2013-09-05 23:03

In the early days of the Internet (when Jon Postel was still around) protocol design concentrated on sound engineering. These days, protocol design is often more influenced by commercial considerations: getting a protocol standardized which requires all users to license a patent, for example, is seen as a way to make money.
And now we learn that it is apparently also steered to facilitate surveillance.

The current marketing push towards devices and services will only make this easier.
How many people with a smartphone are the system administrator of the device they own? How many "browsers" on smartphones are completely implemented within the phone, rather than just being a graphical shell talking to the real browser somewhere in the network? When protocols are no longer open but proprietary, how will we even check?

kladner 2013-09-06 03:03

[QUOTE]How many people with a smartphone are the system administrator of the device they own?[/QUOTE]

Much less masters of their fates, or captains of their (hypothetical) souls.

xilman 2013-09-06 07:48

[QUOTE=kladner;352061][url]http://www.theguardian.com/world/2013/sep/05/nsa-gchq-encryption-codes-security[/url][/QUOTE]This little snippet
[quote]Another program, codenamed Cheesy Name, was aimed at singling out encryption keys, known as 'certificates', that might be vulnerable to being cracked by GCHQ supercomputers.[/quote] from that article ties in with rumours I've been hearing about a facility out in deepest Utah.

Arjen Lenstra [i]et al.[/i] paper last year (a search on ' Ron was wrong, Whit is right' will find it) dug out many thousands of vulnerable certificates.

ewmayer 2013-09-06 20:42

Piece on the NSA/GCHQ backdooring programs from the Guardian [here via Reuters] today - probably duplicates stuff linked above, but I like to include a reader-friendly summary excerpt rather than just tossing links out:

[url=www.reuters.com/article/2013/09/05/net-us-usa-security-snowden-encryption-idUSBRE98413720130905?feedType=RSS&feedName=domesticNews]New Snowden documents say NSA can break common Internet encryption[/url]: [i](Reuters) - The U.S. National Security Agency has secretly developed the ability to crack or circumvent commonplace Internet encryption used to protect everything from email to financial transactions, according to media reports citing documents obtained by former NSA contractor Edward Snowden.[/i]
[quote]The Guardian, The New York Times and journalistic nonprofit ProPublica reported on Thursday that the U.S. intelligence agency used a variety of means, ranging from the insertion of "back doors" in popular tech products and services, to supercomputers, secret court orders and the manipulation of international processes for setting encryption standards.

The publications said the NSA and its British partner Government Communications Headquarters (GCHQ) reported making strides against Secure Sockets Layer technology, which protects millions of websites beginning in "Https," and virtual private networks, which are common for remote office workers and for people seeking to obscure their locations.

Privacy advocates have succeeded in convincing Google Inc, Facebook Inc and other popular service providers to turn on SSL for all of their users, but the new disclosures suggest that the effort could be futile against the NSA.

The Times and ProPublica cited an intelligence document saying the NSA spends more than $250 million a year on its "Sigint Enabling Project," which "actively engages the U.S. and foreign IT industries to covertly influence and/or overtly leverage their commercial products' designs" to make them "exploitable."

It is unclear from the articles how often technology companies voluntarily agreed to allow covert access to their offerings through back doors and how often the NSA compelled them to do so through secret court orders.

The New York Times and ProPublica said they were asked not to publish their findings by intelligence officials who argued that their foreign targets might switch to newer forms of encryption or communications if the NSA tactics were revealed.

"Some specific facts" were removed, the New York Times said. The articles do not say which mainstream encryption systems have been effectively broken.

The undertaking, codenamed Bullrun, followed the abandonment in 1990s of a U.S. effort to force back doors into services through what was called the Clipper Chip.

Back doors in software or hardware allow for access that is typically unseen by the user.

Because the NSA has great expertise and is charged with protecting U.S. assets as well as spying electronically, it has been a frequent contributor to public processes for choosing security techniques. That could now come to a halt.

The disclosure that the NSA succeeded in subverting some unspecified processes for setting security standards is likely to enrage those who were willing to allow the defensive experts from the agency to participate in vetting proposals.[/quote]


All times are UTC. The time now is 22:37.

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2021, Jelsoft Enterprises Ltd.