Re: [liberationtech] Why we can't go back to business as usual post-PRISM.

2013-06-10 Thread Aaron Greenspan
All,

I am still trying to digest the full significance of everything that has been 
disclosed and discussed in the past 72 hours, but the issues that I keep coming 
back to in my head, and which I will likely write more about, are:

1. This scandal, and the financial crisis that happened not long after it 
really began, represent major situations where all three branches of government 
failed, both in their own capacities, and in their role as checks on the other 
branches of government.
2. President Obama's defense of PRISM as being court-sanctioned, entirely 
consistent with what we would do, for example, in a criminal investigation, is 
so blatantly disingenuous that it truly staggers me. Criminal investigations do 
not take place in secret courts that issue secret orders. Some do involve 
documents under seal, but to argue, as Obama did, that the FISC is just like 
any other court is just wrong. Secondly, (and I have read this point 
elsewhere), his implication that members of Congress should have just spoken up 
if they were concerned, when doing so would have been considered a crime of the 
highest order, is unbelievable. (If you missed it, his speech on PRISM is 
transcribed here: 
http://blogs.wsj.com/washwire/2013/06/07/transcript-what-obama-said-on-nsa-controversy/.)

Generally, I am not surprised by any of this. I, like many, already knew that 
Palantir does work for the NSA, that the NSA oversteps its reach regularly, and 
that government is severely broken. I don't have a cell phone and never have, 
this type of scenario being a major reason why.

But to hear the President of the United States--and not George W. Bush--defend 
such brazenly unconstitutional activities is deeply, deeply disturbing to me, 
and leaves me feeling as though the nation has finally completed its slide into 
a larger-than-average third-world autocracy, run by small-minded men who mainly 
fear the unknown. Given that I'm a person who asks a lot of questions, it makes 
me incredibly anxious knowing for certain that I live there.

Aaron
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] What PRISM means for Europe / Brussels

2013-06-10 Thread Kirsten
Hi,

Just a short note from Brussels where we're now seeing (and starting to
explain) the massive US lobbying under a different light... Last year,
the Commission presented a legislative proposal to update privacy laws
in Europe. EDRi has been reporting on this for a while now and since
then, lobbying efforts have only intensified: http://www.edri.org/US-DPR
and http://www.edri.org/us-eudatap. A year ago, we were particularly
worried about the fact that Article 42 on access to European data in the
absence of an EU legal framework disappeared from in the first draft of
the proposal. Even though this article has been re-introduced by the
European Parliament, pressure is high to kick it out again.

It would now be interesting to see what amendments to the data
protection reform have actually been written by the companies that are
cooperating with the NSA - to weaken Europe's standards: see
http://lobbyplag.eu/docs and http://lobbyplag.eu/map.

Best,
Kirsten

-- 
| @kirst3nf
| edri.org

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] OSS Devs: Talk about metadata!

2013-06-10 Thread Tom Ritter
On 8 June 2013 22:04, Nadim Kobeissi na...@nadim.cc wrote:
 I want to encourage all the open source, communication and security software 
 developers on this list to start talking about metadata.

 1. Start raising awareness on what metadata is given to your software and how 
 it's handled.
 2. Don't limit your privacy policy to content but also clarify what's done 
 with metadata.

 [Shameless plug] We've already done this at Cryptocat. Our table can serve as 
 a template:
 https://blog.crypto.cat/2013/06/cryptocat-who-has-your-metadata/


Something I would add (there's no comments enabled, or I missed them)
is that most online messaging protocols (XMPP, Email, OTR, IRC,
Cryptocat I think, etc) enable attackers to de-anonymize recipients if
they have a publicly accessible point of contact that accepts data
from unknown senders, and the attacker can watch the network.  Stated
more simply, if the Syrian government sends 5MB emails to
syriandissidentx...@yahoo.com, they just have to look for who receives
that much data from the appropriate server at appropriate
intervals.[0]  This can work over Tor too, although it's a tad more
difficult.  This may be obvious to us... but then again, that table is
obvious to us also, we're aiming this at everyone else ;)

The solution is something as complex as Pond (which requires users to
be authorized) or possibly XMPP contact lists requests (I'm not
actually sure if those prevent you from sending lots of data to a user
before they accept you.)

-tom

[0] I mention this briefly in https://crypto.is/blog/tagging_attacks,
but owe a better blog post to it.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Boundless Informant: the NSA's secret tool to track global surveillance data

2013-06-10 Thread Rich Kulawiec
On Mon, Jun 10, 2013 at 01:30:19AM -0700, x z wrote:
 First of all, I don't feel offended by Jacob's reply to my email at all,
 probably because I know and expect his style of wording. So far I think the
 discussion is still pretty civil.

I concur.  This is what spirited discussion looks like.  It's healthy.

Let's dig in.

 - The PRISM slides do not prove such direct access (as we interpret it)
 exists.  [snip]

You're correct.   To take your point further, they don't prove *anything*,
they...well, for lack of a better word, they indicate.  They point in
a general direction, omitting significant details -- which is of course
why we're debating just what those details are.

But, that said: the NSA (and every other similar agency) has a long
history of engineering for their convenience over engineering for due
process and safeguards.  And certainly direct access is far more convenient
for them than multistep processes.  So I think it's pretty safe to say
that the NSA would very much *like* direct access if they can get it.
Which leaves us with the question of whether or not they have.  Yet.

 - The firms (Apple, Google, Facebook, etc) do not have any incentive to
 participate in such a program to offer direct access to NSA.

A, but I think they do.  There's a message I noticed on this list
this morning, which was forwarded from Dave Farber's excellent IP
(Interesting People) mailing list and explains one such incentive:


https://mailman.stanford.edu/pipermail/liberationtech/2013-June/008815.html

 Then, what kind of power do people think NSA possesses that
 can secretly coerce these firms into cooperation?? 

That kind of power.  (see link, just above).  To paraphrase an old
saying, you can get much more with a kind word and a hide nailed to
the wall than you can with just a kind word.

 Will these firm's CEO or Chief Legal Officer go to jail, for not providing
 direct access?

Maybe.  See above.  But jail is not the only possible unhappy outcome.
There are other kinds of pressure that can be brought to bear as well.

Consider the set S of {all Cxx executives at all the tech companies
mentioned so far plus the ones involved but not yet mentioned}.

Now consider the number N of members of set S who (a) are in financial
difficulty (b) have a monkey on their back (c) have something in their
past (d) did something dubious on their tax returns (e) failed to disclose
something to the SEC (f) etc.

As the size of set S increases, the probability that N=0 decreases.
And whatever N is, it provides N opportunities for leverage.

I think it's also safe to say that some of those people would do it
merely because they're asked: it appeals to their sense of patriotism.
We might argue that this is wrong, that it violates the Constitution and
thus is about as unpatriotic as it's possible to be; but they would not
agree with us.

And there's another approach: large companies like this are very
sensitive to bad press, or even the possibility of bad press.
None of them want any part of this potential future story:

US law enforcement: we could have stopped [name of future
attack], but Internet giant Blah, Inc. wouldn't cooperate.

Yeah, that's a longshot, but to risk-averse Cxx people, it might be
enough of a nonzero probability to convince them.  (And there's
already a long history of blame the Internet narratives, so it
would dovetail nicely.)  Blah, Inc.'s stock would drop a kazillion
points in the minutes after that story broke and thus so would the
personal fortunes of many.  Then there would follow recriminations
and the blame game, board meetings and firings, and in the end,
suitably obedient people would be put in place to make sure that
it never happened again.

 - If all these participating firms have built such a system to feed NSA's
 request automatically, many people would have got involved. This is not a
 trivial task, the executives need to find engineers to make it happen. And
 the number of engineers won't be small, given the diversity of data
 mentioned here. 

I think this is the strongest argument in support of your proposition.
I've spent some time over the past few days trying to figure out how
this could be done and haven't yet figured out a method that would be
likely to succeed.

On the other hand, the NSA has had years, billions of dollars, and
thousands of people to throw at the problem, so if a solution within
those constraints exists, they're far more likely to have found it
than I'll ever be.

But let me requote something you wrote:

[...] the executives need to find engineers to make it happen.

Not if the executives weren't involved.

The NSA *could* go directly to the NOC engineers, for example, and
there are certain advantages to doing so: for one, these are people
with a lot less wealth and power, thus perhaps more readily manipulated.
For another, these are the people who actually need to do the work --
unlike the Cxx-level people who don't need to be 

[liberationtech] Canadian phone and Internet surveillance program revealed

2013-06-10 Thread Nadim Kobeissi
Some news in Canada similar to the NSA revelations in the US:

Defence Minister Peter MacKay approved a secret electronic eavesdropping 
program that scours global telephone records and Internet data trails – 
including those of Canadians – for patterns of suspicious activity.

Mr. MacKay signed a ministerial directive formally renewing the government’s 
“metadata” surveillance program on Nov. 21, 2011, according to records obtained 
by The Globe and Mail. The program had been placed on a lengthy hiatus, 
according to the documents, after a federal watchdog agency raised concerns 
that it could lead to warrantless surveillance of Canadians.

http://www.theglobeandmail.com/news/national/data-collection-program-got-green-light-from-mackay-in-2011/article12444909/

NK
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Canadian phone and Internet surveillance program revealed

2013-06-10 Thread David Golumbia
the buried lede in all these stories is that cooperation agreements mean
Canadians can spy on US citizens (but are only ever asked about Canadians,
 Canadian pols only talk about protections for their citizens), US can spy
on Canadians (but are only asked about US,  US pols only talk about
protections for their citizens), etc., etc.--esp. for UK, NZ, and Aus-- 
share the info as they like. and not spy on their own citizens and (kind
of) tell the truth when they say it. or a half-truth that makes them feel
better and appears to comply with letter of the law.


On Mon, Jun 10, 2013 at 11:48 AM, Nadim Kobeissi na...@nadim.cc wrote:

 Some news in Canada similar to the NSA revelations in the US:

 Defence Minister Peter MacKay approved a secret electronic eavesdropping
 program that scours global telephone records and Internet data trails –
 including those of Canadians – for patterns of suspicious activity.

 Mr. MacKay signed a ministerial directive formally renewing the
 government’s “metadata” surveillance program on Nov. 21, 2011, according to
 records obtained by The Globe and Mail. The program had been placed on a
 lengthy hiatus, according to the documents, after a federal watchdog agency
 raised concerns that it could lead to warrantless surveillance of Canadians.


 http://www.theglobeandmail.com/news/national/data-collection-program-got-green-light-from-mackay-in-2011/article12444909/

 NK
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech




-- 
David Golumbia
dgolum...@gmail.com
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Mechanisms of intercepting service provider internal connectivity

2013-06-10 Thread Andrés Leopoldo Pacheco Sanfuentes
Another application for the deep packet inspection technique..
On Jun 9, 2013 6:32 PM, Gregory Maxwell g...@xiph.org wrote:

 On Fri, Jun 7, 2013 at 6:47 AM, Eugen Leitl eu...@leitl.org wrote:
  but the ability to assemble intelligence out of taps on providers'
 internal connections
  would require reverse engineering the ever changing protocols of all of
 those providers.

 This is somewhat less difficult than some people think.

 Various equipment manufacturers have implemented passive monitoring
 support on their interfaces specifically for these applications.  You
 configure the interface to go into UP/UP state and to listen in a half
 duplex manner.  This way you get the compatibility advantage of using
 standard network equipment to implement the interception, and so it
 will likely speak the same link-layer protocols the device being
 intercepted speaks.

 (E.g. here is some of the relevant documentation for Juniper:
 http://kb.juniper.net/InfoCenter/index?page=contentid=KB23036 and

 https://www.juniper.net/techpubs/en_US/junos11.2/topics/concept/flowmonitoring-passive-overview-solutions.html
 )

 A lot of the mechanisms— the protocols, techniques, equipment
 features— for mass surveillance are easily visible to the public but
 the things visible to the public are all technical minutia dealing
 with the practical engineering challenges (Like the one you raise
 here— how the heck do you keep up with the ever changing layer 1/2
 protocols used by service providers) that most people wouldn't even
 think to ask about.

 Using commodity hardware gets you compatibility, lower costs, and fast
 deployment. Even though budgets for massive surveillance no doubt
 allow for all kinds of specialized hardware— you can get more of it
 faster if you use commodity stuff with a few tweaks where you can.

 Here's another tidbit in public docs:

 Another challenge in implementing massive surveillance is the sheer
 volumes of traffic involved.  People do seem to be aware of this one,
 but they argue that it makes the task impossible but there are few
 technical challenges which can't be solved by the suitable application
 of ingenuity and money. (_Lots_ of money: but keep in mind defense
 spending is just on another order of magnitude from regular spending.
 How much does a fighter jet cost? A one time use smart munition?  How
 much more valuable is a good network tap than these devices? In light
 of that— how much is a fair defense industry price for one?)

 One way that the traffic volume problems gets solved is to realize
 that the vast majority of traffic is uninteresting.  If you can
 rapidly filter the traffic you can throw out the 99% of uninteresting
 stuff and capture all of the rest.  Filtering is, of course,
 computationally expensive—  but it turns out that the power of
 'commodity' technology can come to the rescue again:   The same
 standard networking equipment that you need to speak the L1/L2
 protocols on your optical taps also has built in line-rate packet
 filtering with scalability to millions of filter criteria (at no extra
 cost! :) ).

 The filtering in these devices has not historically been DPI grade:
 you can do stateless range/prefix matches on the packet headers, not
 free-form regex (although this is changing and the latest generation
 of hardware is more powerful— the need for NAT everywhere, if nothing
 else, is mandating it).  But, if you can update those filters very
 fast— say, in under 50ms— then it doesn't matter that the filters
 aren't very powerful:   Configure the filters to catch all known
 interesting hosts, the beginning of every new connection, and some
 small fraction (say, 1:1 of all packets) and then feed that data
 to analysis systems which trigger updates to the filters when they
 spot something interesting.  They only need to be powerful enough to
 limit a terabit of traffic to tens of gigabits, and that level of
 filtering can be accomplished just on 5-tuples..

 You can go even further, then, by having two sets of filters with a
 delay line— say implemented using the 100ms of delay-product packet
 buffers in high end commodity networking hardware— in between them.
 The first set of filters catches enough so that your analysis systems
 can identify and track interesting flows, and by the time the traffic
 makes it through the delay line the second set of filters has been
 updated to capture the entirety of the interesting flow.  ... though
 the persistence of traffic and the delay created by the TCP three way
 handshake make going this far not terribly necessary.

 Of course, using filtering in this way would require a protocol
 between the network elements and the analysis systems so that they
 could rapidly and dynamically 'task' the filters like you task
 surveillance satellites... And it sure would be convenient if the
 protocol was standardized so you could get many kinds of devices
 speaking it. ... something like:
 

Re: [liberationtech] NSA whistleblower revealed

2013-06-10 Thread The Doctor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 06/09/2013 05:43 PM, Matt Johnson wrote:
 I have to say going to Hong Kong for free speech and safety seems
 like a very odd choice to me. What was he thinking?

The articles state that he was assigned to and living in Hawaii.  It
is possible that he caught the first flight out of US territory
available to him at that time - Hong Kong.

- -- 
The Doctor [412/724/301/703] [ZS]
Developer, Project Byzantium: http://project-byzantium.org/

PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F  DD89 3BD8 FF2B 807B 17C1
WWW: https://drwho.virtadpt.net/

TOYNBEE IDEA IN Kubrick's 2001 RESURRECT DEAD ON PLANET JUPITER

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlG2BIoACgkQO9j/K4B7F8EU5gCghGluvYEXYSBPWr1CHXeHYf6u
mSwAoIDbYrRasjB2MWm58f2Xr22oxihJ
=6Xct
-END PGP SIGNATURE-
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] NSA whistleblower revealed

2013-06-10 Thread The Doctor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 06/09/2013 06:04 PM, Anthony Papillion wrote:

 Still, I have to wonder why he didn't go somewhere like Iceland. To
 me, that would have been a no-brainer.

He would probably have had to make at least one, possibly more
layovers in the United States by doing so.  It's been mentioned that
his home has already been visited by LEA's, meaning that they were
looking for him already.  That implies that LEAs elsewhere on US soil
were keeping eyes open for him just in case he tried flying eastward
rather than westward.  In such a scenario, agents looking for
someone + layover in the US could very likely == arrested

- -- 
The Doctor [412/724/301/703] [ZS]
Developer, Project Byzantium: http://project-byzantium.org/

PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F  DD89 3BD8 FF2B 807B 17C1
WWW: https://drwho.virtadpt.net/

TOYNBEE IDEA IN Kubrick's 2001 RESURRECT DEAD ON PLANET JUPITER

-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlG2BSMACgkQO9j/K4B7F8FEaACg7qwRoif3bjKJbzAh8ZuQDe+a
cMoAoJZmnX068X1ndFTvaj2iF6yjWvXg
=gn+g
-END PGP SIGNATURE-
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] NSA whistleblower revealed

2013-06-10 Thread The Doctor
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

On 06/09/2013 08:40 PM, Raven Jiang CX wrote:

 than us. My guess is that asylum in Iceland is ideal if everything 
 worked out, but he doesn't think it is strong enough to resist
 U.S. pressure.

Hypothetically speaking, would being granted asylum /really/ prevent
extraordinary rendition?  It sort of follows that if someone is
sufficiently honked off at someone to warrant their getting a squad
(in-house, third party, whatever) to gank someone, throw a black sack
over their head, and haul them off to a secret prison then a little
thing like political asylum isn't much of a deterrent.

- -- 
The Doctor [412/724/301/703] [ZS]
Developer, Project Byzantium: http://project-byzantium.org/

PGP: 0x807B17C1 / 7960 1CDC 85C9 0B63 8D9F  DD89 3BD8 FF2B 807B 17C1
WWW: https://drwho.virtadpt.net/

For my next trick: anvils.  --Harry Dresden
-BEGIN PGP SIGNATURE-
Version: GnuPG v2.0.20 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iEYEARECAAYFAlG2B0UACgkQO9j/K4B7F8HjAQCfWO0AdJP9gBPh1bXAoYDYe6oq
MREAoLz+Cn+4X1oZukgtfcpPZcmRmo7y
=s4rW
-END PGP SIGNATURE-
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] NSA whistleblower revealed

2013-06-10 Thread Shava Nerad
You have to love the reply:  We've come a long way since the Pentagon
Papers were sidelined by Tricia Nixon's garden wedding party  ROFLMAO!

SN

On Sun, Jun 9, 2013 at 8:35 PM, Nadim Kobeissi na...@nadim.cc wrote:

 Check out this screenshot of the front page of the New York Times right
 now. Unbelievable:

 https://twitter.com/kaepora/status/343888967554457600

 NK

 On 2013-06-09, at 8:17 PM, Matt Johnson railm...@gmail.com wrote:

  Snowden says he wants asylum in Iceland. Why not go there directly?
 
  Going to Hong Kong makes him vulnerable to accusations of working for
 the PRC.
 
  None of that makes sense to me, but what do I know. I will watch, and
 learn.
 
  --
  Matt
 
  On Sun, Jun 9, 2013 at 3:52 PM, Raven Jiang CX j...@stanford.edu wrote:
  There is a strong resistance against Chinese strong-arming in Hong Kong,
  plus I am not sure that it is actually in the interest of the Chinese
  government to help the US do anything about this. I think you can make a
  case for why it's a better choice, though it is definitely debatable.
 
 
  On 9 June 2013 15:10, Sheila Parks sheilaruthpa...@comcast.net wrote:
 
  I agree with what you say about Hong Kong
 
  He does say he would like to end up in Iceland
 
  Wonder why he did not go there in the first place
 
  Such an immensely brave and honest person
 
  Sheila
 
 
  At 06:04 PM 6/9/2013, you wrote:
 
  On 06/09/2013 04:43 PM, Matt Johnson wrote:
  I have to say going to Hong Kong for free speech and safety seems
 like
  a very odd choice to me. What was he thinking?
 
  Actually, and I think this is pointed out in either the video or an
  article somewhere, Hong Kong doesn't generally suffer the speech
  restrictions mainland China does. Sure, they aren't completely free
 but
  protests and unpopular political speech happen quite frequently and
 are
  generally well tolerated by the government.
 
  Still, I have to wonder why he didn't go somewhere like Iceland. To
 me,
  that would have been a no-brainer.
 
  Anthony
 
 
 
  --
  Anthony Papillion
  Phone:   1.918.533.9699
  SIP: sip:cajuntec...@iptel.org
  iNum:+883510008360912
  XMPP:cypherpun...@jit.si
 
  www.cajuntechie.org
  --
  Too many emails? Unsubscribe, change to digest, or change password by
  emailing moderator at compa...@stanford.edu or changing your
 settings at
  https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 
  Sheila Parks, Ed.D.
  Founder
  Center for Hand-Counted Paper Ballots
  Watertown, MA  02472
  617 744 6020
  DEMOCRACY IN OUR HANDS
  www.handcountedpaperballots.org
  she...@handcountedpaperballots.org
 
  --
  Too many emails? Unsubscribe, change to digest, or change password by
  emailing moderator at compa...@stanford.edu or changing your settings
 at
  https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 
 
  --
  Too many emails? Unsubscribe, change to digest, or change password by
  emailing moderator at compa...@stanford.edu or changing your settings
 at
  https://mailman.stanford.edu/mailman/listinfo/liberationtech
  --
  Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech




-- 

Shava Nerad
shav...@gmail.com
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] PRISM vs Tor | The Tor Blog

2013-06-10 Thread Yosem Companys
https://blog.torproject.org/blog/prism-vs-tor

By now, just about everybody has heard about the PRISM surveillance
program, and many are beginning to speculate on its impact on Tor.

Unfortunately, there still are a lot of gaps to fill in terms of
understanding what is really going on, especially in the face of
conflicting information between the primary source material and
Google, Facebook, and Apple's claims of non-involvement.

This apparent conflict means that it is still hard to pin down exactly
how the program impacts Tor, and is leading many to assume worst-case
scenarios.

For example, some of the worst-case scenarios include the NSA using
weaponized exploits to compromise datacenter equipment at these firms.
Less severe, but still extremely worrying possibilities include
issuing gag orders to mid or low-level datacenter staff to install
backdoors or monitoring equipment without any interaction what-so-ever
with the legal and executive staff of the firms themselves.

We're going to save analysis of those speculative and invasive
scenarios for when more information becomes available (though we may
independently write a future blog post onthe dangers of the government
use of weaponized exploits).

For now, let's review what Tor can do, what tools go well with Tor to
give you defense-in-depth for your communications, and what work needs
to be done so we can make it easier to protect communications from
instances where the existing centralized communications infrastructure
is compromised by the NSA, China, Iran, or by anyone else who manages
to get ahold of the keys to the kingdom.


The core Tor software's job is to conceal your identity from your
recipient, and to conceal your recipient and your content from
observers on your end. By itself, Tor does not protect the actual
communications content once it leaves the Tor network. This can make
it useful against some forms of metadata analysis, but this also means
Tor is best used in combination with other tools.

Through the use of HTTPS-Everywhere in Tor Browser, in many cases we
can protect your communications content where parts of the Tor network
and/or your recipients' infrastructure are compromised or under
surveillance. The EFF has created an excellent interactive graphic to
help illustrate and clarify these combined properties.

Through the use of combinations of additional software like TorBirdy
and Enigmail, OTR, and Diaspora, Tor can also protect your
communications content in cases where the communications
infrastructure (Google/Facebook) is compromised.


However, the real interesting use cases for Tor in the face of dragnet
surveillance like this is not that Tor can protect your gmail/facebook
accounts from analysis (in fact, Tor could never really protect
account usage metadata), but that Tor and hidden services are actually
a key building block to build systems where it is no longer possible
to go to a single party and obtain the full metadata, communications
frequency, *or* contents.

Tor hidden services are arbitrary communications endpoints that are
resistant to both metadata analysis and surveillance.

A simple (to deploy) example of a hidden service based mechanism to
significantly hinder exactly this type of surveillance is an XMPP
client that also ships with an XMPP server and a Tor hidden service.
Such a P2P communication system (where the clients are themselves the
servers) is both end-to-end secure, and does *not* have a single
central server where metadata is available. This communication is
private, pseudonymous, and does not have involve any single central
party or intermediary.

More complex examples would include the use of Diaspora and other
decentralized social network protocols with hidden service endpoints.


Despite these compelling use cases and powerful tool combination
possibilities, the Tor Project is under no illusion that these more
sophisticated configurations are easy, usable, or accessible by the
general public.

We recognize that a lot of work needs to be done even for the basic
tools like Tor Browser, TorBirdy, EnigMail, and OTR to work seamlessly
and securely for most users, let alone complex combinations like XMPP
or Diaspora with Hidden Services.

Additionally, hidden services themselves are in need of quite a bit of
development assistance just to maintain their originally designed
level of security, let alone scaling to support large numbers of
endpoints.

Being an Open Source project with limited resources, we welcome
contributions from the community to make any of this software work
better with Tor, or to help improve the Tor software itself.

If you're not a developer, but you would still like to help us succeed
in our mission of securing the world's communications, please donate!
It is a rather big job, after all.


We will keep you updated as we learn more about the exact capabilities
of this program.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at 

[liberationtech] Privacy Promises and Client-Side Betrayal.

2013-06-10 Thread Karl Fogel
Hi.  I thought this might be of interest here:

http://www.rants.org/2013/06/09/privacy-promises-and-client-side-betrayal/

Thesis: Apps that promise self-destructing data, promise emails that can
be un-sent, etc, are making promises they cannot keep -- at least not if
they are to work with recipients who use open source software (but in
principle they can't work reliably even in proprietary environments).

We can't expect most users to follow these things at the level of detail
we do -- so it's all the more important that we try hard to avoid making
users promises that we can't keep.  (I'm aware that we is a fuzzy term
here and doesn't always include the people who most often make such
promises... But we can call it when we see it, at least.)

Best,
­Karl
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] NSA whistleblower revealed

2013-06-10 Thread Shava Nerad
Regarding extraordinary renditions:  I have to note that there has been
phenomenally zip in the news media on these since Obama got smacked on the
nose about them a few years ago.  Most of the FBI news stories regarding
domestic terrorism have been show trials regarding sting operations of
Muslim men, usually seeming to have mental health issues, who were
entrapped by a network of operatives into planting a fake bomb and then put
on some trial with a grand jury and put away on felony charges in some form
of War on Terror theater.

It is hard for me to believe that, in the interim of the administration
getting its nose smacked and now, that nothing but the Boston bombing has
erupted (pardon the term) on the domestic terrorism front.  So I have to
assume DHS has quietly been continuing with renditions.  Much more quietly.
 To God knows where, since they seem to be doing overtures to shut down
Gitmo now.  When that gets revealed, it will make Prism look like a
sideshow -- sending US citizens to foreign prisons without trial for
interminable imprisonment?  Tasty.  Honestly it's hard for me to imagine it
hasn't been happening.  The absence of news nearly proves it.  I can't
believe that the terrorists have just...given up.  Well, except for two
boys in Boston, unanticipated.

This is a big country, and we have at least as many enemies as Israel and
other places that are quite rife with violence.  I'm sure there is gang
violence being misreported and other things being spun.  But I am equally
sure we are disappearing people.  It can't have stopped, and there are no
real trials.  Strategically, as risk management, historically,
statistically -- it makes no sense.  This is my assessment.

Yet several journalists I've asked about it (one of whom is on this list)
have told me, Find evidence and we'll report it.  Oddly, I used to think
that was the job of investigative journalists -- to find the gaps in logic
and find the facts to fit them.  I don't have those resources, but then,
neither do the newsrooms these days.  And some of them won't jeopardize
sources if they did, so it's on the back of...whistleblowers, traitors, the
semantics get ever more complicated.

Every year as I age I get more and more compassion for the current elder
generation in Germany.  It makes me sad.  What color rose shall the
American resistance pick -- blue perhaps?   We have them now.

yrs,
-- 

Shava Nerad
shav...@gmail.com
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Why we can't go back to business as usual post-PRISM.

2013-06-10 Thread timothy holmes
I don't know who you are or what work you do; perhaps it is the greatest
work ever done in law and the digital age.

You were linked on Hacker
Newshttps://mailman.stanford.edu/pipermail/liberationtech/2013-June/008839.html,
so I will assume what you are concerned with is important. There is an
aspect of this story worth mentioning.

It is how *little* power the government has used to protect and provide for
the poor and disadvantaged.

 And just when the economy was improving, just when health care for all
could be possible, just when the *evidence* that government

could work not just for the privileged, this  story, important in it's own
right, has the potential to undermine this progress.

Government has to begin to work for the collective good of the people and
not be exploited by private interests.

 Yes. We need to protect the people from abusive government power. But it
is as much of a problem of how

private interests, through law and economics, limit the  governments power
to achieve a public good.

Health care, education, infrastructure, and jobs, are some of the areas
that increased, not less, government power could be effectively

utilized. I worry that governments ability to work for our common good, is
going to be undermined through recent news. I hope all will keep in mind

the richness and complexity of the issues at hand.

Thanks.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] 2nd Ethics of Surveillance Conference: Moving towards Ubiquitous Surveillance?

2013-06-10 Thread Yosem Companys
From: h.herzogenrath-amel...@leeds.ac.uk

We're sure you all agree that the most recent developments in the US have
confirmed again the importance of continuing critical scholarly debate on
the scope and implications of current surveillance practices.

The Leeds Humanities Research Institute is jointly with the Centre for
Interdisciplinary Ethics Applied and the Institute of Communications
Studies holding the 2nd Ethics of Surveillance Conference at the University
of Leeds on the 24th and 25th of June:

Confirmed keynote speakers:

Prof. Gary Marx
Professor Emeritus of Sociology, M.I.T., United States

Prof. Christian Fuchs
Professor of Social Media at the University of Westminster's Communication
and Media Research Institute and the Centre for Social Media Research

Dr. Kirstie Ball
Reader in Surveillance and Organisation at the Open University Business
School, Milton Keynes

Dr. Mark Andrejevic
Deputy Director of the Centre for Critical and Cultural Studies at the
University of Queensland, Australia

Prof. Charles Raab
Professor of Government at the University of Edinburgh School of Social and
Political Science

A detailed programme is available at http://bit.ly/12eZLEA

The deadline for registration is June the 14th.

Registration is available at http://tinyurl.com/surveillanceethics

The registration fee for both days is £50.00, for one day £30.00 and
includes lunches and refreshments.

We anticipate a very lively discussion and hope to welcome as many of you
as possible.

The conference organizers.

---
Heidi Herzogenrath-Amelung,
PhD Researcher at the University of Leeds' Institute of Communications
Studies

Kevin Macnish
PhD Researcher and Teaching Fellow at the University of Leeds' Centre for
Interdisciplinary Applied Ethics

Pinelopi Troullinou
PhD Researcher at the Open University Business School

Conference coordinators
Founders of the research group IC ICTs: Research Group on ICTs, Surveillance
 Society
http://icicts.wordpress.com/
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] NSA whistleblower revealed

2013-06-10 Thread Andrés Leopoldo Pacheco Sanfuentes
Assange is still living at the Ecuadorean Embassy in London,  coming
up on his first anniversary, despite being granted asylum.. so..
Best Regards | Cordiales Saludos | Grato,

Andrés L. Pacheco Sanfuentes
a...@acm.org
+1 (817) 271-9619


On Mon, Jun 10, 2013 at 12:29 PM, Shava Nerad shav...@gmail.com wrote:
 Regarding extraordinary renditions:  I have to note that there has been
 phenomenally zip in the news media on these since Obama got smacked on the
 nose about them a few years ago.  Most of the FBI news stories regarding
 domestic terrorism have been show trials regarding sting operations of
 Muslim men, usually seeming to have mental health issues, who were entrapped
 by a network of operatives into planting a fake bomb and then put on some
 trial with a grand jury and put away on felony charges in some form of War
 on Terror theater.

 It is hard for me to believe that, in the interim of the administration
 getting its nose smacked and now, that nothing but the Boston bombing has
 erupted (pardon the term) on the domestic terrorism front.  So I have to
 assume DHS has quietly been continuing with renditions.  Much more quietly.
 To God knows where, since they seem to be doing overtures to shut down Gitmo
 now.  When that gets revealed, it will make Prism look like a sideshow --
 sending US citizens to foreign prisons without trial for interminable
 imprisonment?  Tasty.  Honestly it's hard for me to imagine it hasn't been
 happening.  The absence of news nearly proves it.  I can't believe that the
 terrorists have just...given up.  Well, except for two boys in Boston,
 unanticipated.

 This is a big country, and we have at least as many enemies as Israel and
 other places that are quite rife with violence.  I'm sure there is gang
 violence being misreported and other things being spun.  But I am equally
 sure we are disappearing people.  It can't have stopped, and there are no
 real trials.  Strategically, as risk management, historically, statistically
 -- it makes no sense.  This is my assessment.

 Yet several journalists I've asked about it (one of whom is on this list)
 have told me, Find evidence and we'll report it.  Oddly, I used to think
 that was the job of investigative journalists -- to find the gaps in logic
 and find the facts to fit them.  I don't have those resources, but then,
 neither do the newsrooms these days.  And some of them won't jeopardize
 sources if they did, so it's on the back of...whistleblowers, traitors, the
 semantics get ever more complicated.

 Every year as I age I get more and more compassion for the current elder
 generation in Germany.  It makes me sad.  What color rose shall the American
 resistance pick -- blue perhaps?   We have them now.

 yrs,
 --

 Shava Nerad
 shav...@gmail.com

 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] Mobile Payments, Bitcoin and the Law

2013-06-10 Thread Aaron Greenspan
Hello again…

I'm giving a talk/book signing on mobile payments, Bitcoin and the law on June 
20th in downtown Palo Alto. Liberationtech folks welcome.

http://legalforce52.eventbrite.com

Registration (which I don't control) appears to be open for the next two days.

Aaron
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] Use of PRISM corporations by social activists campaigns

2013-06-10 Thread Yosem Companys
From: Charles Lenchner clench...@organizing20.org, the well known sell
out and corporate shill from Organizing 2.0

I'll never give up using FB and gmail. I want the government to know what
I'm up to at all times so it's completely transparent and I'll never be
suspected of anything.

Then, if I want to cause mayhem, I'll use all those Tor/darknet/burner
phone stuff on the side.

Switching now would just make me look suspicious!

Serious revolutionaries need to appear to be cheerful do-gooders.

Charles
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] So, I was buying my nephew a bond...

2013-06-10 Thread Travis McCrea
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

I was going to buy my nephew a savings bond for his birthday (he is one,
what else can you really get him?) and I was trying to sign up on
treasurydirect.gov and was appauled by the security so I thought I would
share.

First they have all these different rules regarding what you must have
in your password (which I always think is dumb, let me pick my own
password), however they limit you to 16 characters.

Then I go to login and find out that the password isn't case sensitive
(which makes me question if it's being hashed), and their security is
that you can't type your password you have to use their onscreen
keyboard (which can easily be fixed by opening up web dev tools and
removing readonly=readonly  from the input field.

http://cl.ly/PYNw

I am just saying that I wish the government body which is in charge of
money stuff would be a little smarter with their development.
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCgAGBQJRthu0AAoJEES9cOv0A0l0Me8IALPQPYYSdrriOxg0iw0n8xAV
y0pzSChhl0GUvDA9GtD5WEgmEBrQD/Sarj8cly8txfUrxdXtQk1cZcw4dvlIVY/K
Knbfwqgsg+IZl+kret818eo3ZuNPRbI3uJkO5Kb1DK1jT3E7tV7Go9EsCZCHFzlv
bD5X7LpOQZruiwLMQ/DRGfQjeHTBRkrfJzJwRJUwGlHFqxRh4gRF8zycVDA/eQz1
lbf1O1ooxEX1Jj2anj8KImpRGAQk+yhl3g4/zgmLtZ8jtDXzh9hq91xLk5pUHI5a
JS4l7MuhZHdpnT+kHsxx00ta+ZBaZsBEuKqXbz3knkwM01db2R36YRimISxqZFc=
=3+jt
-END PGP SIGNATURE-
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] A Taxonomy of PRISM Possibilities « Unhandled Exception

2013-06-10 Thread Yosem Companys
A Taxonomy of PRISM Possibilities
June 7, 2013
By Alex Stamos

I have been fielding a decent number of calls and emails from reporters on the 
NSA PRISM scandal. A lot of people are trying to synthesize reasonable 
technical explanations for how the NSA could implement the program described in 
the leaked PowerPoint deck and keep it secret for so long. In an effort to 
improve the quality of the public discussion, I have decided to create a 
taxonomy of the theories that I have seen floated and supply my own commentary 
in italics.

To be clear, I have no special knowledge or insight into this program. 
Everything listed below is based upon data contained in the news articles I 
have seen. I also recognize that many of these theories sound far-fetched, 
although I have to admit that my personal Overton Window for crazy conspiracy 
theories has shifted in the last 24 hours.

My goal is to keep this list up to date as more information is published, so 
please let me know if you have any corrections or additions by leaving a 
comment or via email. My GPG key is available here.

The list is below the fold…

http://unhandled.com/2013/06/07/a-taxonomy-of-prism-possibilities/--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Use of PRISM corporations by social activists campaigns

2013-06-10 Thread Andrés Leopoldo Pacheco Sanfuentes
OK, but now the government knows you're one of them faux cheerful
do-gooders! xd
Best Regards | Cordiales Saludos | Grato,

Andrés L. Pacheco Sanfuentes
a...@acm.org
+1 (817) 271-9619


On Mon, Jun 10, 2013 at 1:26 PM, Yosem Companys compa...@stanford.edu wrote:
 From: Charles Lenchner clench...@organizing20.org, the well known sell out
 and corporate shill from Organizing 2.0

 I'll never give up using FB and gmail. I want the government to know what
 I'm up to at all times so it's completely transparent and I'll never be
 suspected of anything.

 Then, if I want to cause mayhem, I'll use all those Tor/darknet/burner phone
 stuff on the side.

 Switching now would just make me look suspicious!

 Serious revolutionaries need to appear to be cheerful do-gooders.

 Charles

 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Boundless Informant: the NSA's secret tool to track global surveillance data

2013-06-10 Thread Maxim Kammerer
On Mon, Jun 10, 2013 at 12:01 PM, x z xhzh...@gmail.com wrote:
 Occam's razor would give us the following is what has actually happened in
 the past three days: a semi-clueless whistle blower fed an overzealous
 journalist a low-quality powerpoint deck, which met the privacy-paranoia and
 exploded.

I agree. I also don't understand what's the big deal. It is well-known
that the NSA (with cooperation with SIGINT agencies of other
countries) scans all communication channels it can get to. By reaching
popular communication methods like webmail and social media, it is
just doing its job. What apparently is at the core of the hysterical
public reaction is that the NSA spies on Americans, who think that
they are special, and should be treated differently. The reason they
think they are special is that the huge geopolitical / economic /
military-industrial complex influence of the United States elevates
and accustoms them to a position that's completely out of proportion
with their actual value to the world — utterly un-democratic, if you
think about it. Well, your spy agencies are more democratic than you
guys — they spy on you, too. If that wouldn't have been the case, it
would mean that your military-industrial complex is not that powerful,
which would imply that you are not special anymore, which, ironically,
rejects the original premise. Hopefully someone else can appreciate
the irony as well (hence writing this).

--
Maxim Kammerer
Liberté Linux: http://dee.su/liberte
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Boundless Informant: the NSA's secret tool to track global surveillance data

2013-06-10 Thread Jacob Appelbaum
Maxim Kammerer:
 On Mon, Jun 10, 2013 at 12:01 PM, x z xhzh...@gmail.com wrote:
 Occam's razor would give us the following is what has actually happened in
 the past three days: a semi-clueless whistle blower fed an overzealous
 journalist a low-quality powerpoint deck, which met the privacy-paranoia and
 exploded.
 
 I agree. I also don't understand what's the big deal. It is well-known
 that the NSA (with cooperation with SIGINT agencies of other
 countries) scans all communication channels it can get to. By reaching
 popular communication methods like webmail and social media, it is
 just doing its job. What apparently is at the core of the hysterical
 public reaction is that the NSA spies on Americans, who think that
 they are special, and should be treated differently. The reason they
 think they are special is that the huge geopolitical / economic /
 military-industrial complex influence of the United States elevates
 and accustoms them to a position that's completely out of proportion
 with their actual value to the world — utterly un-democratic, if you
 think about it. Well, your spy agencies are more democratic than you
 guys — they spy on you, too. If that wouldn't have been the case, it
 would mean that your military-industrial complex is not that powerful,
 which would imply that you are not special anymore, which, ironically,
 rejects the original premise. Hopefully someone else can appreciate
 the irony as well (hence writing this).

Occam's razor doesn't work the way that it is presented here. All things
being equal, the multi-billion dollar spy agency really does the spying
and it was really just revealed.

And yes, it really does shatter the idea American exceptionalism - that
is actually the best part of the entire discussion. Americans need this
wakeup call - with our drone strikes that kill people based on their
metadata (eg: signature strikes) surveillance programs and with our
death camp (eg: Gitmo) in Cuba. We as a nation should be ashamed of
these things and the first step to such shame is the inability to deny
what is being done in our name.

It is now the case that it is impossible to deny the dragnet
surveillance order published about Verizon. Our leaders have
acknowledged it. It is also impossible to deny the massive surveillance
as a whole - the DNI, the White House and other agencies have confirmed
it. It is also now impossible to deny the existence of specific programs
named UPSTREAM, PRISM and BOUNDLESSINFORMANT.

The open questions are merely about scope. In time, we'll learn the
details - but we need not debate that this is just the tip of the
iceberg - it is obviously the case that we don't have all the details.

To attack Glenn and Snowden is pointless. Without a doubt, if anyone
knows less than them - it is all of us. Unless you hold a TS/SCI
clearance, of course. In which case, please do feel free to speak up -
we'd love to hear some clarifications on the matter! Though overall - we
should all be speaking up - but lets be clear that not all voices here
have access to the same information, or the same understanding even when
presented with the same information.

All the best,
Jacob
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Use of PRISM corporations by social activists campaigns

2013-06-10 Thread Jonathan Wilkes


From: Yosem Companys compa...@stanford.edu
To: Liberation Technologies liberationtech@lists.stanford.edu 
Cc: Charles Lenchner clench...@organizing20.org 
Sent: Monday, June 10, 2013 2:26 PM
Subject: [liberationtech] Use of PRISM corporations by social activists  
campaigns
 


From: Charles Lenchner clench...@organizing20.org, the well known sell out 
and corporate shill from Organizing 2.0

I'll never give up using FB and gmail. I want the government to know what I'm 
up to at all times so it's completely transparent and I'll never be suspected 
of anything.

Then, if I want to cause mayhem, I'll use all those Tor/darknet/burner phone 
stuff on the side.

Switching now would just make me look suspicious!

Serious revolutionaries need to appear to be cheerful do-gooders. 

Regardless of whether that's a parody or not, it's a technically incompetent 
statement.  If I understand
it correctly, Tor is freely available by design because the wider the 
availability the greater the (potential) cover traffic.  I assume this is why 
the Naval Research Laboratory didn't fund a system that would only provide 
access to people with certain credentials-- that would remove all cover traffic 
and threaten to undermine the entire purpose for the system.

That statement also wrongly assumes government intrusion is the only attack 
vector.  I'm currently migrating from Yahoo Mail not because of the reported 
actions of a spy agency, but because the _next_ time someone hacks Yahoo Mail's 
crummy security I don't want to waste any of my time worrying about what data I 
had stored there and what could be used from it to run a confidence scam on me.

To me, the real tragedy is that there isn't some super-simple tool for running 
the equivalent of Google Docs using a Tor hidden service.  It has nothing to do 
with anonymous mayhem, and everything to do with breaking through NAT's so 
that I can host my own cloud and have control and access over it from 
anywhere in the world that I can connect my laptop to the internet.  No 
unwanted changes to the interface, no dropping of unpopular services, just an 
economy of one that responds to my needs and my needs only.  I know there are 
plenty of people who want similar control over the tools they use, and they'd 
happily take the performance hit of Tor for that.  (And for text documents it 
shouldn't be such a big deal anyway.)

-Jonathan
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Boundless Informant: the NSA's secret tool to track global surveillance data

2013-06-10 Thread Guido Witmond

On 10-06-13 21:36, Jacob Appelbaum wrote:

Maxim Kammerer:

On Mon, Jun 10, 2013 at 12:01 PM, x zxhzh...@gmail.com  wrote:

Occam's razor would give us the following is what has actually
happened in the past three days: a semi-clueless whistle blower
fed an overzealous journalist a low-quality powerpoint deck,
which met the privacy-paranoia and exploded.


I agree. I also don't understand what's the big deal.


The big deal is that now it's become impossible to believe the lies, and
that you [Americans] are forced to accept the truth.

And truth hurts! Especially when you want to believe the lies. Wanting
to believe is easier than facing the truth, even when deep in your heart
you've known the truth for a long time.

Now is the time to come clear with your conscience, end this abusive
relationship and kick the abusive partner out of your life. (ie: repeal
the unjust laws.)


Cheers, Guido.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Boundless Informant: the NSA's secret tool to track global surveillance data

2013-06-10 Thread Griffin Boyce
Nadim Kobeissi na...@nadim.cc wrote:

 What qualifies a journalist as overzealous? Is it passion and hard work?
 When this passion produces a consistent stream of intelligent arguments and
 debate, is it still overzealous? Ask yourself these questions.


I don't think Glenn Greenwald is overzealous, but I think his passion is...
untempered at times.  Not a bad thing at all.  But not everyone's going to
like his work.

~Griffin
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] NSA whistleblower revealed

2013-06-10 Thread Tom Ritter
On 9 June 2013 17:43, Matt Johnson railm...@gmail.com wrote:
 I have to say going to Hong Kong for free speech and safety seems like
 a very odd choice to me. What was he thinking?

I actually think Hong Kong seems pretty smart. Parroting the news
organizations, Hong Kong has some extradition protection against
political crimes.  Likewise, Hong Kong is pretty free, it's not
mainland China.  It has a high quality of living, tolerates a lot of
political dissent, and it'd be pretty easy to stay lost there (well,
if you hadn't told people where you were going anyway.)

Plus, the fact that it's China.  HK is a Special Administrative
Region, but Capital-C China would not take kindly to any mucking about
there.  It seems like it would cause a pretty big incident if the US
snatched him from there or tried to inappropriately exert pressure.
China is on the UN Security Council and is not likely to play nice if
the US affronted it's sovereignty. And they have a lot of ways they
can hit the US back too: UNSC, trade sanctions, debt or currency
manipulation, the North Korean situation, not to mention (more) cyber
espionage on the government or corporations. (I refuse to say
cyberwar, it's espionage.)  Compare than to Iceland: if the US pisses
off Iceland, what's Iceland going to do about it?

The major disadvantages I see are that 1) it makes him look a little
bit more like a Chinese actor/spy/etc.  And 2) There is probably a
decent chance the Chinese would hand him over as part of a handshake
and a nod type deal where they're going to get... something, but we
may never know what.  Anything from tarif exemptions, returning
Chinese spies, backing off on some US military (cyber?) operation or
something else.

-tom
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Canadian phone and Internet surveillance program revealed

2013-06-10 Thread Travis McCrea
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

The Pirate Party of Canada has issued a release on this, due to
Canadians interest in themselves we are focusing on Canadian
surveillance of Canadians rather than foreign cooperation.

https://www.pirateparty.ca/newsletter/warrantless-surveillance/

David Golumbia wrote:
 the buried lede in all these stories is that cooperation agreements
 mean Canadians can spy on US citizens (but are only ever asked about 
 Canadians,  Canadian pols only talk about protections for their 
 citizens), US can spy on Canadians (but are only asked about US, 
 US pols only talk about protections for their citizens), etc.,
 etc.--esp. for UK, NZ, and Aus--  share the info as they like. and
 not spy on their own citizens and (kind of) tell the truth when
 they say it. or a half-truth that makes them feel better and appears
 to comply with letter of the law.
 
 
 On Mon, Jun 10, 2013 at 11:48 AM, Nadim Kobeissi na...@nadim.cc 
 mailto:na...@nadim.cc wrote:
 
 Some news in Canada similar to the NSA revelations in the US:
 
 Defence Minister Peter MacKay approved a secret electronic 
 eavesdropping program that scours global telephone records and 
 Internet data trails – including those of Canadians – for patterns of
 suspicious activity.
 
 Mr. MacKay signed a ministerial directive formally renewing the 
 government’s “metadata” surveillance program on Nov. 21, 2011, 
 according to records obtained by The Globe and Mail. The program had 
 been placed on a lengthy hiatus, according to the documents, after a 
 federal watchdog agency raised concerns that it could lead to 
 warrantless surveillance of Canadians.
 
 http://www.theglobeandmail.com/news/national/data-collection-program-got-green-light-from-mackay-in-2011/article12444909/

  NK -- Too many emails? Unsubscribe, change to digest, or change
 password by emailing moderator at compa...@stanford.edu 
 mailto:compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 
 
 
 -- David Golumbia dgolum...@gmail.com mailto:dgolum...@gmail.com
 
 -- Too many emails? Unsubscribe, change to digest, or change password
 by emailing moderator at compa...@stanford.edu or changing your
 settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
-BEGIN PGP SIGNATURE-
Version: GnuPG/MacGPG2 v2.0.19 (Darwin)
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQEcBAEBCgAGBQJRtkQ6AAoJEES9cOv0A0l0q34IAIgqfyKCLtgjWjH4UWiP0IPA
3aFTRbQxZmIsoWb5R0IEVJhftpSFD76PyHjR3+qPTExVJzRGnqjNKKuSsH5v42xw
zww62bOoNvWFADxQ0sBVChy4ghHI+xG7qIzEbfvLwG24EM63brdsp66VN6i+qT0l
wQhPrQtcFDYuXgTRJJuVgdmVhIz216kQUG/nP4/Z9bzWjmiyiXoI3C/vSPIIhYkY
LRlRMO0YQ2gMSfpsKvJ3jfhrHQV3TXDPugzM4Omk8e9NuYUUTSO2Mw+VRakMr/T7
7zI4H+p0FoibZPmSdZfH5Gt+fZu3gbphCqUSe/w6Mqn3aH/5lbN+ou5IaQE6wWo=
=m6UH
-END PGP SIGNATURE-
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Cryptocat: Translation Volunteers Needed

2013-06-10 Thread Nadim Kobeissi
Thanks so much to everyone who helped! The translations are now all up to date.

I'd like to extend special thanks to Dragana Kaurin from OpenITP. OpenITP is 
launching a localization management platform soon, too, so I hope working with 
them will make this stuff easier in the future. :-)

NK


On 2013-05-24, at 10:23 PM, Buddhadeb Halder bhalder...@gmail.com wrote:

 Hi Nadim,
 I have done with the Bengali translation.
 Thanks,
 Buddha
 
 
 
 On Fri, May 24, 2013 at 6:36 PM, Nadim Kobeissi na...@nadim.cc wrote:
 Hi everyone,
 An entire Cryptocat translation is less than 300 words.
 
 You can view translations here. There is an easy-to-use interface that can 
 help you input your translations:
 https://www.transifex.com/projects/p/Cryptocat/resource/cryptocat/
 
 Priority lies with the following languages. The rest is good to go:
   • Czech
   • Estonian
   • Urdu
   • Tibetan
   • Khmer
   • Uighur
   • Chinese (Hong Kong)
   • Bengali
   • Latvian
 
 Thanks again to everyone who already helped! :-)
 
 
 
 NK
 
 
 On Fri, May 24, 2013 at 6:53 AM, Moritz Bartl mor...@torservers.net wrote:
 On 24.05.2013 11:09, Sjoerd de Vries wrote:
  About how much is needed to translate. Are you talking about 1.000 words
  or more about 1.000.000 words. If it isn't to much I'm willing to help
  you translate to Dutch
 
 Nadim should have made this more clear: All translations and texts are
 readily available. Anyone can add or refine translations of sentences.
 There's no need to send anything else, everything is at the following link:
 
 https://www.transifex.com/projects/p/Cryptocat/resource/cryptocat/
 
 To work on a translation, just create a Transifex account and add
 yourself to the translation team.
 
 --
 Moritz Bartl
 https://www.torservers.net/
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Boundless Informant: the NSA's secret tool to track global surveillance data

2013-06-10 Thread Jacob Appelbaum
x z:
 @Jacob, I agree with your points regarding American exceptionalism.
 @Eugen, to prepare for the worst scenario is one thing, to advocate some
 shady rumor as fact is another.
 @Rich, those are good movie scripts :-). But it does not work for 9 firms,
 and hundreds of execs all with diverse values and objectives.
 @Nadim, when you say we all always 'knew' this was happening, I don't
 know what this refers to. Is it NSA surveillance, or is it the direct
 access bit?
 
 To me, the crucial point is the *direct access*, and also Guardian's
 claim of these firms willingly participating in PRISM. I argued that
 direct access is untrue in my previous email, but none of your replies
 (except Rich's) are relevant to my arguments.

What would you call a FISA API for government agents to query a system
and return data on a target? Would you call that direct access or an
indirect access? If Google runs the FISA API server, does that make it
more or less direct than if the FISA API server is a blackbox run by the
NSA?

 
 The direct access bit is what made this story sensational. Without this
 bit, the story would be much less juicy but more true. In the long run,
 truth gives more power than lies. Washington Post has backed down to
 reality, for which I applaud their judgment. Guardian has not, and keeps on
 defending their misinformation and bad reporting, for which I resent deeply.
 

You don't know the truth and you seem to think you do. The story that is
important is that Google makes one claim, while the NSA slide makes
another. Note that the law doesn't allow Google to even tell the press
the whole truth.

 If Snowden and Greenwald do not mislead the world on 'direct access and
 just report it rationally, I'd applaud their courage. Now I think Snowden
 is not more than a self-aggrandizing douche.
 

I'm sorry, did you watch his video interview? On what grounds to you
call him a self-aggrandizing douche exactly?

 I hope internet freedom can advance with accurate awareness, not by public
 paranoia.

You take issue with a very weird semantic bit of the larger story. How
does such semantic nitpicking, where you don't actually even know the
facts behind your speculations, help advance any cause, anywhere?

All the best,
Jacob
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Cryptocat: Translation Volunteers Needed

2013-06-10 Thread Nadim Kobeissi
Catherine,
Opera is not shut out. It's simply difficult to develop for Opera due to its 
limited browser extension API. Your email made it sound as if Cryptocat had 
something against the Opera browser.

We have a ticket open for Opera compatibility in our code base. If you'd like 
to, you can contribute to Cryptocat for Opera development here:
https://github.com/cryptocat/cryptocat/issues/190

NK

On 2013-06-10, at 6:10 PM, Catherine Roy ecr...@catherine-roy.net wrote:

 Congrats. But, as I asked in a private email to which I got not response, is 
 there any reason why Opera is shut out ?
 
 Best,
 
 
 Catherine
 
 -- 
 Catherine Roy
 http://www.catherine-roy.net
 
 
 
 On 2013-06-10 17:44, Nadim Kobeissi wrote:
 Thanks so much to everyone who helped! The translations are now all up to 
 date.
 
 I'd like to extend special thanks to Dragana Kaurin from OpenITP. OpenITP is 
 launching a localization management platform soon, too, so I hope working 
 with them will make this stuff easier in the future. :-)
 
 NK
 
 
 On 2013-05-24, at 10:23 PM, Buddhadeb Halder bhalder...@gmail.com wrote:
 
 Hi Nadim,
 I have done with the Bengali translation.
 Thanks,
 Buddha
 
 
 
 On Fri, May 24, 2013 at 6:36 PM, Nadim Kobeissi na...@nadim.cc wrote:
 Hi everyone,
 An entire Cryptocat translation is less than 300 words.
 
 You can view translations here. There is an easy-to-use interface that can 
 help you input your translations:
 https://www.transifex.com/projects/p/Cryptocat/resource/cryptocat/
 
 Priority lies with the following languages. The rest is good to go:
 • Czech
 • Estonian
 • Urdu
 • Tibetan
 • Khmer
 • Uighur
 • Chinese (Hong Kong)
 • Bengali
 • Latvian
 
 Thanks again to everyone who already helped! :-)
 
 
 
 NK
 
 
 On Fri, May 24, 2013 at 6:53 AM, Moritz Bartl mor...@torservers.net wrote:
 On 24.05.2013 11:09, Sjoerd de Vries wrote:
 About how much is needed to translate. Are you talking about 1.000 words
 or more about 1.000.000 words. If it isn't to much I'm willing to help
 you translate to Dutch
 Nadim should have made this more clear: All translations and texts are
 readily available. Anyone can add or refine translations of sentences.
 There's no need to send anything else, everything is at the following link:
 
 https://www.transifex.com/projects/p/Cryptocat/resource/cryptocat/
 
 To work on a translation, just create a Transifex account and add
 yourself to the translation team.
 
 --
 Moritz Bartl
 https://www.torservers.net/
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Boundless Informant: the NSA's secret tool to track global surveillance data

2013-06-10 Thread Nadim Kobeissi

On 2013-06-10, at 6:09 PM, Jacob Appelbaum ja...@appelbaum.net wrote:

 x z:
 @Jacob, I agree with your points regarding American exceptionalism.
 @Eugen, to prepare for the worst scenario is one thing, to advocate some
 shady rumor as fact is another.
 @Rich, those are good movie scripts :-). But it does not work for 9 firms,
 and hundreds of execs all with diverse values and objectives.
 @Nadim, when you say we all always 'knew' this was happening, I don't
 know what this refers to. Is it NSA surveillance, or is it the direct
 access bit?
 
 To me, the crucial point is the *direct access*, and also Guardian's
 claim of these firms willingly participating in PRISM. I argued that
 direct access is untrue in my previous email, but none of your replies
 (except Rich's) are relevant to my arguments.
 
 What would you call a FISA API for government agents to query a system
 and return data on a target? Would you call that direct access or an
 indirect access? If Google runs the FISA API server, does that make it
 more or less direct than if the FISA API server is a blackbox run by the
 NSA?
 
 
 The direct access bit is what made this story sensational. Without this
 bit, the story would be much less juicy but more true. In the long run,
 truth gives more power than lies. Washington Post has backed down to
 reality, for which I applaud their judgment. Guardian has not, and keeps on
 defending their misinformation and bad reporting, for which I resent deeply.
 
 
 You don't know the truth and you seem to think you do. The story that is
 important is that Google makes one claim, while the NSA slide makes
 another. Note that the law doesn't allow Google to even tell the press
 the whole truth.
 
 If Snowden and Greenwald do not mislead the world on 'direct access and
 just report it rationally, I'd applaud their courage. Now I think Snowden
 is not more than a self-aggrandizing douche.
 
 
 I'm sorry, did you watch his video interview? On what grounds to you
 call him a self-aggrandizing douche exactly?

I can't believe I was actually feeling bad for this guy yesterday. Dismissing 
one of the greatest whistleblowers of century as a self-aggrandizing douche 
is just beyond words. Maybe we're being trolled.

NK

 
 I hope internet freedom can advance with accurate awareness, not by public
 paranoia.
 
 You take issue with a very weird semantic bit of the larger story. How
 does such semantic nitpicking, where you don't actually even know the
 facts behind your speculations, help advance any cause, anywhere?
 
 All the best,
 Jacob
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Boundless Informant: the NSA's secret tool to track global surveillance data

2013-06-10 Thread Nadim Kobeissi
On 2013-06-10, at 6:26 PM, Yosem Companys compa...@stanford.edu wrote:

 The distinction between direct or indirect access is semantic, not 
 substantive, and likely irrelevant to most Americans.  What Americans want to 
 know is whether there is access to their personal data, and I would bet focus 
 groups would show that's the key takeaway of this incident.

Hear hear. And not just Americans want to know this — due to the fact that most 
Big Data is centred in the US, these secret programs affect the privacy of 
world citizens as well, just as much, and in the same way, as they affect 
Americans

NK

 
 As I said, a recent NY Times article spoke specifically of the embedding of 
 NSA employees at US tech firms via firms' corporate legal departments, and we 
 know how it happened at ATT, with the employee getting cart blanche to do 
 whatever he wanted at the firm and take as much data as he wanted with no 
 questions asked.  
 
 On Mon, Jun 10, 2013 at 3:09 PM, Jacob Appelbaum ja...@appelbaum.net wrote:
 x z:
  @Jacob, I agree with your points regarding American exceptionalism.
  @Eugen, to prepare for the worst scenario is one thing, to advocate some
  shady rumor as fact is another.
  @Rich, those are good movie scripts :-). But it does not work for 9 firms,
  and hundreds of execs all with diverse values and objectives.
  @Nadim, when you say we all always 'knew' this was happening, I don't
  know what this refers to. Is it NSA surveillance, or is it the direct
  access bit?
 
  To me, the crucial point is the *direct access*, and also Guardian's
  claim of these firms willingly participating in PRISM. I argued that
  direct access is untrue in my previous email, but none of your replies
  (except Rich's) are relevant to my arguments.
 
 What would you call a FISA API for government agents to query a system
 and return data on a target? Would you call that direct access or an
 indirect access? If Google runs the FISA API server, does that make it
 more or less direct than if the FISA API server is a blackbox run by the
 NSA?
 
 
  The direct access bit is what made this story sensational. Without this
  bit, the story would be much less juicy but more true. In the long run,
  truth gives more power than lies. Washington Post has backed down to
  reality, for which I applaud their judgment. Guardian has not, and keeps on
  defending their misinformation and bad reporting, for which I resent deeply.
 
 
 You don't know the truth and you seem to think you do. The story that is
 important is that Google makes one claim, while the NSA slide makes
 another. Note that the law doesn't allow Google to even tell the press
 the whole truth.
 
  If Snowden and Greenwald do not mislead the world on 'direct access and
  just report it rationally, I'd applaud their courage. Now I think Snowden
  is not more than a self-aggrandizing douche.
 
 
 I'm sorry, did you watch his video interview? On what grounds to you
 call him a self-aggrandizing douche exactly?
 
  I hope internet freedom can advance with accurate awareness, not by public
  paranoia.
 
 You take issue with a very weird semantic bit of the larger story. How
 does such semantic nitpicking, where you don't actually even know the
 facts behind your speculations, help advance any cause, anywhere?
 
 All the best,
 Jacob
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] NSA whistleblower revealed

2013-06-10 Thread Gregory Foster

On 6/10/13 4:40 PM, Tom Ritter wrote:

On 9 June 2013 17:43, Matt Johnson railm...@gmail.com wrote:

I have to say going to Hong Kong for free speech and safety seems like
a very odd choice to me. What was he thinking?

I actually think Hong Kong seems pretty smart. Parroting the news
organizations, Hong Kong has some extradition protection against
political crimes.


Christian Science Monitor (Jun 10) - Edward Snowden: Why the NSA 
whistleblower fled to Hong Kong by Peter Ford (Beijing):

http://www.csmonitor.com/World/Asia-Pacific/2013/0610/Edward-Snowden-Why-the-NSA-whistleblower-fled-to-Hong-Kong

Has details on recent changes in Hong Kong's asylum law relevant to this 
case.


HT @douglasmcnabb,
https://twitter.com/douglasmcnabb/status/344216800227119104

gf

--
Gregory Foster || gfos...@entersection.org
@gregoryfoster  http://entersection.com/

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] Spin alerts

2013-06-10 Thread Todd Davies
Two issues that are tending to get conflated in the wider discourse 
about PRISM, Boundless Informant, etc. are:

(1) Are these programs justifieid?
(2) Was it justified to keep the existence of these programs secret?

Snowden has said his primary judgment was about question (2), but 
proponents of surveillance are acting as if all we need to address is (1). 
This is an important distinction because even conservatives like David 
Brooks have said they think the existence of these programs should be 
public knowledge (The secrecy of the program was a mistake. I agree with 
that. - 
http://www.pbs.org/newshour/bb/politics/jan-june13/politicalwrap_06-07.html#transcript). 
How can this mistake be corrected without whistleblowers like Snowden, 
when Congressional oversight is as deferential as it is?


On (1), there is a poll out today that focuses just on phone records, 
which the Washington Post headline summarizes as Most Americans back NSA 
tracking phone records, prioritize probes over privacy 
(http://www.washingtonpost.com/politics/most-americans-support-nsa-tracking-phone-records-prioritize-investigations-over-privacy/2013/06/10/51e721d6-d204-11e2-9f1a-1a7cdee20287_story.html).


But once you read it, you see that these opinions depend heavily on 
whether the respondent's own party is in power:


In early 2006, 37 percent of Democrats found the agency’s activities
acceptable; now nearly twice that number — 64 percent — say the use of
telephone records is okay. By contrast, Republicans slumped from 75
percent acceptable to 52 percent today.

So rather than looking at overall public support at a given time, a better 
number to look at when assessing public support is the one from people 
whose party does not control the White House, averaged across different 
parties, which puts support well below 50% in this case. People don't get 
to remove the effects of their support for surveillance when presidents 
they don't trust take power.


Todd--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Boundless Informant: the NSA's secret tool to track global surveillance data

2013-06-10 Thread x z
I argue that direct access or not is is substantive, not semantic. We have
the following two versions of the story:

*A: The Guardian story alleges that NSA has direct access to user data from
major internet firms, and these firms are willingly cooperating with NSA
for the capability of en masse data pull. It indicates that NSA can pull
whatever data they feel like, and that NSA has such dark power that all the
internet firms have to kowtow.*

*B: On the other hand, NSA and these companies' statement is consistent to
what most of us have already known, that NSA can request data from these
firms on the basis of FISA. And the data pull is quite limited. (By the
way, it doesn't really matter it's US or non-US citizens to me, there's
nothing special about America).*

Do you think the difference between the two is merely semantic? Also, if
you believe in A, then everybody on the NSA/corporation side are liars, and
we are truly living in a police state. This, is, not, semantic.

@Jacob, if your hypothetical FISA API thingy works only on the limited data
the firms knowingly disclose to NSA, then it's not big deal. This FISA
API thing is semantic, not substantive, to use your classification scheme.

@Yosem, I always applaud the accurate disclosure of the ATT and Verizon
cases. That is one thing that we need to change.

Let me stress it again, I am not rooting for B, I think it need more
transparency and FISA need revision. But let's not pretend that the
government is so powerful, that *is* paranoia.



2013/6/10 Jacob Appelbaum ja...@appelbaum.net

 Yosem Companys:
  The distinction between direct or indirect access is semantic, not
  substantive, and likely irrelevant to most Americans.  What Americans
 want
  to know is whether there is access to their personal data, and I would
 bet
  focus groups would show that's the key takeaway of this incident.

 Indeed.

 
  As I said, a recent NY Times article spoke specifically of the embedding
 of
  NSA employees at US tech firms via firms' corporate legal departments,
 and
  we know how it happened at ATT, with the employee getting cart blanche
 to
  do whatever he wanted at the firm and take as much data as he wanted with
  no questions asked.

 The word stasi comes to mind with this kind of DIRECT ACCESS. The
 server, taps and likely API itself are almost irrelevant details when we
 consider HUMAN INFILTRATION as part of the NSA strategy.

 Land of the free... refill?

 All the best,
 Jacob
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Spin alerts

2013-06-10 Thread Andrés Leopoldo Pacheco Sanfuentes
Of course they're not justified, unless you want to flush civil liberties
down the drain.
On Jun 10, 2013 6:03 PM, Todd Davies dav...@stanford.edu wrote:

 Two issues that are tending to get conflated in the wider discourse about
 PRISM, Boundless Informant, etc. are:
 (1) Are these programs justifieid?
 (2) Was it justified to keep the existence of these programs secret?

 Snowden has said his primary judgment was about question (2), but
 proponents of surveillance are acting as if all we need to address is (1).
 This is an important distinction because even conservatives like David
 Brooks have said they think the existence of these programs should be
 public knowledge (The secrecy of the program was a mistake. I agree with
 that. - http://www.pbs.org/newshour/**bb/politics/jan-june13/**
 politicalwrap_06-07.html#**transcripthttp://www.pbs.org/newshour/bb/politics/jan-june13/politicalwrap_06-07.html#transcript).
 How can this mistake be corrected without whistleblowers like Snowden,
 when Congressional oversight is as deferential as it is?

 On (1), there is a poll out today that focuses just on phone records,
 which the Washington Post headline summarizes as Most Americans back NSA
 tracking phone records, prioritize probes over privacy (
 http://www.washingtonpost.**com/politics/most-americans-**
 support-nsa-tracking-phone-**records-prioritize-**
 investigations-over-privacy/**2013/06/10/51e721d6-d204-11e2-**
 9f1a-1a7cdee20287_story.htmlhttp://www.washingtonpost.com/politics/most-americans-support-nsa-tracking-phone-records-prioritize-investigations-over-privacy/2013/06/10/51e721d6-d204-11e2-9f1a-1a7cdee20287_story.html
 ).

 But once you read it, you see that these opinions depend heavily on
 whether the respondent's own party is in power:

 In early 2006, 37 percent of Democrats found the agency’s activities
 acceptable; now nearly twice that number — 64 percent — say the use of
 telephone records is okay. By contrast, Republicans slumped from 75
 percent acceptable to 52 percent today.

 So rather than looking at overall public support at a given time, a better
 number to look at when assessing public support is the one from people
 whose party does not control the White House, averaged across different
 parties, which puts support well below 50% in this case. People don't get
 to remove the effects of their support for surveillance when presidents
 they don't trust take power.

 Todd
 --
 Too many emails? Unsubscribe, change to digest, or change password by
 emailing moderator at compa...@stanford.edu or changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Boundless Informant: the NSA's secret tool to track global surveillance data

2013-06-10 Thread Jacob Appelbaum
x z:
 I argue that direct access or not is is substantive, not semantic. We have
 the following two versions of the story:
 
 *A: The Guardian story alleges that NSA has direct access to user data from
 major internet firms, and these firms are willingly cooperating with NSA
 for the capability of en masse data pull. It indicates that NSA can pull
 whatever data they feel like, and that NSA has such dark power that all the
 internet firms have to kowtow.*
 

That is correct.


 *B: On the other hand, NSA and these companies' statement is consistent to
 what most of us have already known, that NSA can request data from these
 firms on the basis of FISA. And the data pull is quite limited. (By the
 way, it doesn't really matter it's US or non-US citizens to me, there's
 nothing special about America).*

This sounds like semantic bickering. If the FISA order says to pull data
on your account, your account is pulled; Twitter did not automate it,
others did.

 
 Do you think the difference between the two is merely semantic? Also, if
 you believe in A, then everybody on the NSA/corporation side are liars, and
 we are truly living in a police state. This, is, not, semantic.

Yes. It is semantic. The reason is because under FISA, basically any and
all data is fair game. Thus, a FISA API may be only limited in what it
might say and as we see from Verizon, well, gosh, some limit! However,
UPSTREAM tells us how they complete the picture.

So in the case of the Verizon order, if they installed a tapping device
on a span port in Verizon's network - does that count as direct access?
I'd say yes.

 
 @Jacob, if your hypothetical FISA API thingy works only on the limited data
 the firms knowingly disclose to NSA, then it's not big deal. This FISA
 API thing is semantic, not substantive, to use your classification scheme.
 

The firms don't know it, perhaps some agent might know but say, the CEO
of Google? Is he read into the program and cleared? If not, actually,
I'd argue that the firm doesn't know it. Nor would the board.

 @Yosem, I always applaud the accurate disclosure of the ATT and Verizon
 cases. That is one thing that we need to change.

 
 Let me stress it again, I am not rooting for B, I think it need more
 transparency and FISA need revision. But let's not pretend that the
 government is so powerful, that *is* paranoia.
 

FISA needs to be torn down. It is a disgrace.

The US Government is powerful and what we see is that the only thing
you're grasping at here is about direct versus indirect access
semantics. In good time, I think you will find that you were seriously
mistaken by your read on all of these things. I look forward to hearing
your suggestions on what to do next - once you accept the seriously
awful reality that is reflected in these leaks and in places like Bluffdale.

All the best,
Jacob
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Boundless Informant: the NSA's secret tool to track global surveillance data

2013-06-10 Thread fukami
Heu! 

On 11.06.2013, at 01:11, x z xhzh...@gmail.com wrote:
 I argue that direct access or not is is substantive, not semantic. We have
 the following two versions of the story:
 
 *A: The Guardian story alleges that NSA has direct access to user data from
 major internet firms, and these firms are willingly cooperating with NSA
 for the capability of en masse data pull. It indicates that NSA can pull
 whatever data they feel like, and that NSA has such dark power that all the
 internet firms have to kowtow.*
 
 *B: On the other hand, NSA and these companies' statement is consistent to
 what most of us have already known, that NSA can request data from these
 firms on the basis of FISA. And the data pull is quite limited. (By the
 way, it doesn't really matter it's US or non-US citizens to me, there's
 nothing special about America).*
 
 Do you think the difference between the two is merely semantic? Also, if
 you believe in A, then everybody on the NSA/corporation side are liars, and
 we are truly living in a police state. This, is, not, semantic.

Taking a look how this works in other countries, I'm sure it works pretty
much the same way in the US. I.e. in Germany there is traffic duplication 
at provider level where the data gets send over so called SINA boxes - 
nowadays even without any sort of real safe guards, and providers simply 
don't know anymore what's really going on in their networks (so far for the 
Upstream part for LI and homeland secret service). 

For direct data access there are in fact known APIs for everything, be 
it Swift, PNR or whatever. You shouln't need much fantasy to get an idea 
of the actual implementation at service level. So I agree 100% with Jake.
And really: At the end it doesn't matter how exactly it works - it just 
does and it is widely used. 

As a side note: An interesting story popped up today in the German press 
where a 18 year old Au Pair got send back home because of her private Facebook 
conversations. So it seems that even the DHS has this kind of capabilities. 
Giving the fact that there are thousands of people entering the US every day,
do you really think they don't get this information in an automated fashion
via API? I seriously doubt that.  

 @Jacob, if your hypothetical FISA API thingy works only on the limited data
 the firms knowingly disclose to NSA, then it's not big deal. This FISA
 API thing is semantic, not substantive, to use your classification scheme.

Jake made the most important point already: The laws doesn't allow the 
companies to even tell the whole story. Although it might look like a weak 
argumentation, it is in fact a strong one. 

Also do you *really* believe a guy like Zuckerberg more than internal training 
material of the NSA? I don't for a simple reason: Why should they lie on these 
slides? It makes no sense at all. These were not made with a public audience 
in mind. This has nothing to do with paranoia of any sort but common sense.


Take care,
  fukami


--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Cryptocat: Translation Volunteers Needed

2013-06-10 Thread Catherine Roy

On 10/06/2013 6:18 PM, Nadim Kobeissi wrote:

Catherine,
Opera is not shut out. It's simply difficult to develop for Opera due to its 
limited browser extension API. Your email made it sound as if Cryptocat had something 
against the Opera browser.


My email is simply stating that Opera is shut out. How else should I 
interpret this message : Cryptocat is not available for your browser.


See screenshot : http://www.flickr.com/photos/zazie/9010759541/

I sent you a message off-list to inquire about this and received no 
response.




We have a ticket open for Opera compatibility in our code base. If you'd like 
to, you can contribute to Cryptocat for Opera development here:
https://github.com/cryptocat/cryptocat/issues/190


I am not a developer. Must we all be developers to have a significant 
influence on these types of issues ?


Best regards,


Catherine

--
Catherine Roy
http://www.catherine-roy.net





NK

On 2013-06-10, at 6:10 PM, Catherine Roy ecr...@catherine-roy.net wrote:


Congrats. But, as I asked in a private email to which I got not response, is 
there any reason why Opera is shut out ?

Best,


Catherine

--
Catherine Roy
http://www.catherine-roy.net



--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Cryptocat: Translation Volunteers Needed

2013-06-10 Thread Moritz Bartl
On 11.06.2013 02:21, Catherine Roy wrote:
 We have a ticket open for Opera compatibility in our code base. If
 you'd like to, you can contribute to Cryptocat for Opera development
 here:
 I am not a developer. Must we all be developers to have a significant
 influence on these types of issues ?

In capitalism, you can also pay someone to do it for you.

Given that Opera has roughly 1-2% market share, only introduced plugins
(too) late, and now decided to switch to Webkit in the future, why would
there be much incentive for anyone to support a more-or-less legacy
browser? It involves a lot of work.

-- 
Moritz Bartl
https://www.torservers.net/
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Cryptocat: Translation Volunteers Needed

2013-06-10 Thread Dragana Kaurin
 you're the best nadim. thank you so much :)


On Monday, June 10, 2013 17:44 EDT, Nadim Kobeissi na...@nadim.cc wrote: 
 
 Thanks so much to everyone who helped! The translations are now all up to 
 date.
 
 I'd like to extend special thanks to Dragana Kaurin from OpenITP. OpenITP is 
 launching a localization management platform soon, too, so I hope working 
 with them will make this stuff easier in the future. :-)
 
 NK
 
 
 On 2013-05-24, at 10:23 PM, Buddhadeb Halder bhalder...@gmail.com wrote:
 
  Hi Nadim,
  I have done with the Bengali translation.
  Thanks,
  Buddha
 On Fri, May 24, 2013 at 6:36 PM, Nadim Kobeissi na...@nadim.cc 
 wrote:
  Hi everyone,
  An entire Cryptocat translation is less than 300 words.
   You can view translations here. There is an easy-to-use interface that 
   can help you input your translations:
  https://www.transifex.com/projects/p/Cryptocat/resource/cryptocat/
   Priority lies with the following languages. The rest is good to go:
  • Czech
  • Estonian
  • Urdu
  • Tibetan
  • Khmer
  • Uighur
  • Chinese (Hong Kong)
  • Bengali
  • Latvian
   Thanks again to everyone who already helped! :-)
 NK
On Fri, May 24, 2013 at 6:53 AM, Moritz Bartl mor...@torservers.net 
wrote:
  On 24.05.2013 11:09, Sjoerd de Vries wrote:
   About how much is needed to translate. Are you talking about 1.000 words
   or more about 1.000.000 words. If it isn't to much I'm willing to help
   you translate to Dutch
   Nadim should have made this more clear: All translations and texts are
  readily available. Anyone can add or refine translations of sentences.
  There's no need to send anything else, everything is at the following link:
   https://www.transifex.com/projects/p/Cryptocat/resource/cryptocat/
   To work on a translation, just create a Transifex account and add
  yourself to the translation team.
   --
  Moritz Bartl
  https://www.torservers.net/
  --
  Too many emails? Unsubscribe, change to digest, or change password by 
  emailing moderator at compa...@stanford.edu or changing your settings at 
  https://mailman.stanford.edu/mailman/listinfo/liberationtech
--
  Too many emails? Unsubscribe, change to digest, or change password by 
  emailing moderator at compa...@stanford.edu or changing your settings at 
  https://mailman.stanford.edu/mailman/listinfo/liberationtech
   --
  Too many emails? Unsubscribe, change to digest, or change password by 
  emailing moderator at compa...@stanford.edu or changing your settings at 
  https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 
 
 
-- 
Dragana Kaurin
Program Associate
OpenITP
kau...@openitp.org
(937) 626 3617 


--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

[liberationtech] DNI Clapper's NBC interview

2013-06-10 Thread Gregory Foster
Office of the Director of National Intelligence (Jun 10) - Director 
James R. Clapper Interview with Andrea Mitchell, NBC News Chief Foreign 
Affairs Correspondent (Liberty Crossing, Tyson's Corner, VA: Jun 8, 1pm):

http://www.dni.gov/index.php/newsroom/speeches-and-interviews/195-speeches-interviews-2013/874-director-james-r-clapper-interview-with-andrea-mitchell

NBC (Jun 8) - Clapper: Surveillance leaks fallout is 'gut-wrenching':
http://www.nbcnews.com/id/21134540/vp/52144169#52144169

Ms. Mitchell: Senator Wyden made quite a lot out of your exchange with 
him last March during the hearings. Can you explain what you meant 
when you said there was not data collection on millions of Americans?


Director Clapper: First, as I said, I have great respect for Senator 
Wyden. I thought though in retrospect I was asked when are you going 
to start--stop beating your wife kind of question which is, meaning 
not answerable necessarily, by a simple yes or no. So I responded in 
what I thought was the most truthful or least most untruthful manner, 
by saying, “No.” And again, going back to my metaphor, what I was 
thinking of is looking at the Dewey Decimal numbers of those books in 
the metaphorical library. To me collection of U.S. Persons data would 
mean taking the books off the shelf, opening it up and reading it.


Amongst unrelated psychological hypotheses, I have encountered no better 
proof that the NSA's operating legal definition of the verb to collect 
stipulates a human being requesting specific information.  This is the 
legal cover NSA whistleblower Bill Binney has emphasized as enabling the 
NSA's automated *collection* of digital content.


And yes, Director Clapper compared the NSA's datastore to an electronic 
library - wherein you, and I, and all human beings are therefore: the 
books.


Does Director Clapper know you cannot judge a book by its cover? ...
gf

--
Gregory Foster || gfos...@entersection.org
@gregoryfoster  http://entersection.com/

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Android Full-Disk Encryption Cracked

2013-06-10 Thread Dev Random
It's important for the data-at-rest password to have lots of entropy.
But using a long password for unlocking the screen annoys the user, and
they will choose a shorter one. Therefore it's important to separate them.

See this open source app to set them separately:
https://play.google.com/store/apps/details?id=org.nick.cryptfs.passwdmanager

The screen unlock password is used for authentication while the OS is
running, so throttling is enough to defend against password guessing.

On 04/29/2013 12:09 PM, Seth David Schoen wrote:
 Griffin Boyce writes:
 
 Hashkill can now determine the master password for Android's full-disk
 encryption scheme.

 image showing the process: http://i.imgur.com/bFUf7lR.png
 script: https://github.com/gat3way/hashkill

 Thoughts?
 
 It seems like this is just a tool for doing dictionary and
 brute force attacks against these passwords, not a class-break
 that is inherently able to decrypt every single Android device.
 
 So, if your Android FDE passphrase is long and unpredictable
 enough, this tool should still not be able to crack it.
 
 There are a lot of problems about disk encryption on small
 mobile devices.  One that was highlighted by Belenko and
 Sklyarov at Black Hat EU 2012 is that mobile device CPUs are
 relatively slow, so it's difficult to do very large numbers of
 iterations of key derivation functions, which would make
 brute-force cracking slower.
 
 http://www.elcomsoft.com/WP/BH-EU-2012-WP.pdf
 https://en.wikipedia.org/wiki/Key_derivation_function
 
 The more KDF iterations that are used, the slower _both_
 unlocking by the legitimate authenticated user and offline
 cracking will be.  But if the legitimate user's device has
 a slow CPU, the user may not accept the human-perceptible
 delays that would result from using a lot of iterations.
 
 This tradeoff is a pretty fundamental problem.  The user
 wants to unlock their device using a very short, easy-to-
 remember code.  They want the device to be able to unlock
 quickly when this code is entered, using information that
 can be calculated from the code in a short time on a
 comparatively slow mobile CPU.  Then they also want someone
 with a very fast cracking device like a desktop GPU not to
 be able to brute-force that same code quickly.
 
 Belenko and Sklyarov also observed that some mobile crypto
 applications were just not using KDFs at all or were using
 them improperly, but I don't know of an indication that
 that's true of the official Android FDE.  Another problem
 is that, especially if people are using touchscreens, they
 may want a very short unlock PIN rather than a long
 passphrase, which will inherently favor cracking.  (For
 example, if you imagine a system with a 5-digit numeric
 PIN, you can quickly conclude that there is no number of
 KDF iterations that will be acceptable to the mobile device
 user and be a practical deterrent to a brute-force attacker
 with even a single desktop GPU, at least for KDFs that can
 be implemented efficiently on a GPU.)
 
 I don't think this problem is very well appreciated by
 mobile device crypto users!
 
 Two ways to address this that come to mind would be using
 tamper-resistant hardware (which apparently Apple is doing
 for crypto in iOS devices) to store or generate the
 decryption keys using cryptographic secrets kept inside
 the particular device itself, and finding some way for
 the user to somehow input a much higher entropy unlock
 password.
 

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Spin alerts

2013-06-10 Thread Matthew Finkel
On Mon, Jun 10, 2013 at 11:03 PM, Todd Davies dav...@stanford.edu wrote:

 Two issues that are tending to get conflated in the wider discourse about
 PRISM, Boundless Informant, etc. are:
 (1) Are these programs justifieid?
 (2) Was it justified to keep the existence of these programs secret?

 Snowden has said his primary judgment was about question (2), but
 proponents of surveillance are acting as if all we need to address is (1).
 This is an important distinction because even conservatives like David
 Brooks have said they think the existence of these programs should be
 public knowledge (The secrecy of the program was a mistake. I agree with
 that. - http://www.pbs.org/newshour/**bb/politics/jan-june13/**
 politicalwrap_06-07.html#**transcripthttp://www.pbs.org/newshour/bb/politics/jan-june13/politicalwrap_06-07.html#transcript).
 How can this mistake be corrected without whistleblowers like Snowden,
 when Congressional oversight is as deferential as it is?

 On (1), there is a poll out today that focuses just on phone records,
 which the Washington Post headline summarizes as Most Americans back NSA
 tracking phone records, prioritize probes over privacy (
 http://www.washingtonpost.**com/politics/most-americans-**
 support-nsa-tracking-phone-**records-prioritize-**
 investigations-over-privacy/**2013/06/10/51e721d6-d204-11e2-**
 9f1a-1a7cdee20287_story.htmlhttp://www.washingtonpost.com/politics/most-americans-support-nsa-tracking-phone-records-prioritize-investigations-over-privacy/2013/06/10/51e721d6-d204-11e2-9f1a-1a7cdee20287_story.html
 ).

 But once you read it, you see that these opinions depend heavily on
 whether the respondent's own party is in power:

 In early 2006, 37 percent of Democrats found the agency’s activities
 acceptable; now nearly twice that number — 64 percent — say the use of
 telephone records is okay. By contrast, Republicans slumped from 75
 percent acceptable to 52 percent today.

 So rather than looking at overall public support at a given time, a better
 number to look at when assessing public support is the one from people
 whose party does not control the White House, averaged across different
 parties, which puts support well below 50% in this case. People don't get
 to remove the effects of their support for surveillance when presidents
 they don't trust take power.

 Todd


An interesting statistic will be the long-term outcome of this. The cat's
out of the bag regarding (2), and public opinion of (1) appears to vary,
but will the public's opinion now change because the idea is no longer
hyperbole and paranoia? And will this be true regardless of on which side
of the isle you expect your representative to sit?

Also, to whom and by what standards are these programs justified? We can
all hypothesize the reasoning that is being used: known terrorists,
suspected terrorist, enemies of the state, etc. But this is another piece
of the puzzle that is still secret. Sure, it's all in the interest of
national security, but we really have no idea where this line is drawn.
Dianne Feinstein...went to the FISA court and asked that the FISA court
report more frequently, or at all, on what it is doing...and the court
refused. So, Clapper said that she's now asked him to report within a month
on ways where they could narrow the scope of what they're vacuuming up,
without hurting national security says Andrea Mitchell. [0] I'm not
holding my breath. Note, also, that these requests are not regarding the
same subject matter. What are you doing? vs. Tell us how can you 'spy'
less given that we don't know what you're doing. Great.

Remember, don't falsely yell TERRORIST! in a crowded theater, the
consequences could be worse than yelling fire. [1]

[0] http://video.msnbc.msn.com/msnbc/52144169#52144169 via Gregory Foster
[1] http://en.wikipedia.org/wiki/Shouting_fire_in_a_crowded_theater
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

Re: [liberationtech] Spin alerts

2013-06-10 Thread Todd Davies

On Mon, 10 Jun 2013, Gregory Maxwell wrote:


On Mon, Jun 10, 2013 at 4:03 PM, Todd Davies dav...@stanford.edu wrote:

Two issues that are tending to get conflated in the wider discourse about
PRISM, Boundless Informant, etc. are:
(1) Are these programs justifieid?
(2) Was it justified to keep the existence of these programs secret?


(1) can't be answered in a vacuum of secrecy because— as almost anyone
who finds the program concerning would agree— a fundamental concept of
democracy is no one person or small group of people has the general
moral authority to make that kind of decision— absent some kind of
immediate exigency ... uh, which is really hard to argue for something
which has gone on so long.

And so absent (2) we can't even have the conversation about (1).  I
think these two points are less distinct than you think they are:  (2)
was the question Snowden needed to answer for himself so that the rest
of us would be able to even consider (1).


I agree with your last sentence (after the colon), Gregory. And my own 
answer to both questions is a firm no. But if we want to convince enough 
others, we need to pay attention to what *they* think. My point was that 
there are lots of people who answer yes to (1) and no to (2). And that 
is an opening. The opinion poll I also mentioned shows us that people 
haven't really thought this through, because about half the U.S. 
population change their position on surveillance depending on who is in 
power at the moment.


Todd--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech