On Apr 4, 2013, at 4:51 PM, ianG <[email protected]> wrote:

> On 4/04/13 21:43 PM, Jon Callas wrote:
>> -----BEGIN PGP SIGNED MESSAGE-----
>> Hash: SHA1
>> 
>> 
>> On Apr 4, 2013, at 6:27 AM, ianG <[email protected]> wrote:
>> 
>>> In a project similar to Wikileaks, ICIJ comments on tools it used to secure 
>>> its team-based project work:
>>> 
>>>         "ICIJ’s team of 86 investigative journalists from 46 countries 
>>> represents one of the biggest cross-border investigative partnerships in 
>>> journalism history. Unique digital systems supported private document and 
>>> information sharing, as well as collaborative research. These included a 
>>> message center hosted in Europe and a U.S.-based secure online search 
>>> system.  Team members also used a secure, private online bulletin board 
>>> system to share stories and tips."
>>> 
>>>         "The project team’s attempts to use encrypted e-mail systems such 
>>> as PGP (“Pretty Good Privacy”) were abandoned because of complexity and 
>>> unreliability that slowed down information sharing. Studies have shown that 
>>> police and government agents – and even terrorists – also struggle to use 
>>> secure e-mail systems effectively.  Other complex cryptographic systems 
>>> popular with computer hackers were not considered for the same reasons.  
>>> While many team members had sophisticated computer knowledge and could use 
>>> such tools well, many more did not."
>>> 
>>> 
>>> http://www.icij.org/offshore/how-icijs-project-team-analyzed-offshore-files
>>> 
>> 
>> Thanks!
>> 
>> This is great. It just drives home that usability is all.
> 
> 
> Just to underline Jon's message for y'all, they should have waited for 
> iMessage:
> 
> 
> 
>      "Encryption used in Apple's iMessage chat service has stymied attempts 
> by federal drug enforcement agents to eavesdrop on suspects' conversations, 
> an internal government document reveals.
> 
>      "An internal Drug Enforcement Administration document seen by CNET 
> discusses a February 2013 criminal investigation and warns that because of 
> the use of encryption, "it is impossible to intercept iMessages between two 
> Apple devices" even with a court order approved by a federal judge.
> 
>      "The DEA's warning, marked "law enforcement sensitive," is the most 
> detailed example to date of the technological obstacles -- FBI director 
> Robert Mueller has called it the "Going Dark" problem -- that police face 
> when attempting to conduct court-authorized surveillance on non-traditional 
> forms of communication.
> 
>      "When Apple's iMessage was announced in mid-2011, Cupertino said it 
> would use "secure end-to-end encryption." It quickly became the most popular 
> encrypted chat program in history: Apple CEO Tim Cook said last fall that 300 
> billion messages have been sent so far, which are transmitted through the 
> Internet rather than as more costly SMS messages carried by wireless 
> providers.
> 
> http://news.cnet.com/8301-13578_3-57577887-38/apples-imessage-encryption-trips-up-feds-surveillance/
> 
> 
There's a long thread on Twitter (look for Julian Sanchez, @normative) on this, 
with comments from me, Matt Blaze, Nick Weaver, and others.  Also see Julian's 
blog post at http://www.cato.org/blog/untappable-apple-or-dea-disinformation



                --Steve Bellovin, https://www.cs.columbia.edu/~smb





_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to