Re: [liberationtech] Designing the best network infrastructure for a.Human Rights NGO

2013-02-28 Thread Bill Woodcock

Ah, yes, those expensive man-hours.  Security is so much easier when you don't 
give it time and attention.  It also doesn't work. 


-Bill


On Feb 28, 2013, at 8:09, anonymous2...@nym.hush.com 
anonymous2...@nym.hush.com wrote:

 I knew this was coming at some point. Yes I am starting with 
 Windows, it's more functional (awaits incoming) and costs less in 
 terms of expensive man hours (the hidden cost vs software) for an 
 Linux guru to run and monitor the network.
 
 On Thu, 28 Feb 2013 13:03:00 + Bill Woodcock wo...@pch.net 
 wrote:
 You want to do this securely, and you're _starting_ with Windows?
 
 
   -Bill
 
 
 On Feb 28, 2013, at 7:40, anonymous2...@nym.hush.com 
 anonymous2...@nym.hush.com wrote:
 
 Hi, 
 We are a human rights NGO that is looking to invest in the best 
 possible level of network security (protection from high-level 
 cyber-security threats, changing circumvention/proxy to protect
 IP 
 address etc, encryption on endpoints and server, IDS/Physical
 and 
 Software Firewall/File Integrity Monitoring, Mobile Device 
 Management, Honeypots) we can get for a our internal network. I
 was 
 wondering if people would critique the following network, add 
 comments, suggestions and alternative methods/pieces of
 software. 
 (Perhaps if it goes well we could make a short paper out of it,
 for 
 others to use.)
 
 -Windows 2012 Server
 -VMWare virtual machines running Win 8 for remote access
 -Industry standard hardening and lock down of all OS systems.
 -Constantly changing proxies
 -PGP email with BES
 -Cryptocard tokens
 -Sophos Enterprise Protection, Encryption and Patch management
 -Sophos mobile management
 -Encrypted voice calls for mobile and a more secure alternative
 to 
 Skype via Silent Circle.
 -TrueCrypt on all drives - set to close without use after a 
 specific time
 -Easily controlled kill commands
 -False and poison pill files
 -Snort IDS
 -Honeypots
 -Tripwire
 -Cisco Network Appliance
 -No wifi
 -Strong physical protection in a liberal country as regards
 human 
 rights
 
 I know there are many other factors, good training, constant 
 monitoring, avoiding spearfishing, penetration testing, etc but
 if 
 possible I would please like to keep the conversation on the 
 network design and software.
 
 Thanks guys.
 -Anon
 
 --
 Too many emails? Unsubscribe, change to digest, or change
 password by emailing moderator at compa...@stanford.edu or 
 changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 --
 Too many emails? Unsubscribe, change to digest, or change password 
 by emailing moderator at compa...@stanford.edu or changing your 
 settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Designing the best network infrastructure for a.Human Rights NGO

2013-02-28 Thread anonymous2013
Can we please get back to the issue at hand

On Thu, 28 Feb 2013 13:16:03 + Bill Woodcock wo...@pch.net 
wrote:
Ah, yes, those expensive man-hours.  Security is so much easier 
when you don't give it time and attention.  It also doesn't work. 


-Bill


On Feb 28, 2013, at 8:09, anonymous2...@nym.hush.com 
anonymous2...@nym.hush.com wrote:

 I knew this was coming at some point. Yes I am starting with 
 Windows, it's more functional (awaits incoming) and costs less 
in 
 terms of expensive man hours (the hidden cost vs software) for 
an 
 Linux guru to run and monitor the network.
 
 On Thu, 28 Feb 2013 13:03:00 + Bill Woodcock 
wo...@pch.net 
 wrote:
 You want to do this securely, and you're _starting_ with 
Windows?
 
 
   -Bill
 
 
 On Feb 28, 2013, at 7:40, anonymous2...@nym.hush.com 
 anonymous2...@nym.hush.com wrote:
 
 Hi, 
 We are a human rights NGO that is looking to invest in the 
best 
 possible level of network security (protection from high-level 

 cyber-security threats, changing circumvention/proxy to 
protect
 IP 
 address etc, encryption on endpoints and server, IDS/Physical
 and 
 Software Firewall/File Integrity Monitoring, Mobile Device 
 Management, Honeypots) we can get for a our internal network. 
I
 was 
 wondering if people would critique the following network, add 
 comments, suggestions and alternative methods/pieces of
 software. 
 (Perhaps if it goes well we could make a short paper out of 
it,
 for 
 others to use.)
 
 -Windows 2012 Server
 -VMWare virtual machines running Win 8 for remote access
 -Industry standard hardening and lock down of all OS systems.
 -Constantly changing proxies
 -PGP email with BES
 -Cryptocard tokens
 -Sophos Enterprise Protection, Encryption and Patch management
 -Sophos mobile management
 -Encrypted voice calls for mobile and a more secure 
alternative
 to 
 Skype via Silent Circle.
 -TrueCrypt on all drives - set to close without use after a 
 specific time
 -Easily controlled kill commands
 -False and poison pill files
 -Snort IDS
 -Honeypots
 -Tripwire
 -Cisco Network Appliance
 -No wifi
 -Strong physical protection in a liberal country as regards
 human 
 rights
 
 I know there are many other factors, good training, constant 
 monitoring, avoiding spearfishing, penetration testing, etc 
but
 if 
 possible I would please like to keep the conversation on the 
 network design and software.
 
 Thanks guys.
 -Anon
 
 --
 Too many emails? Unsubscribe, change to digest, or change
 password by emailing moderator at compa...@stanford.edu or 
 changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 --
 Too many emails? Unsubscribe, change to digest, or change 
password 
 by emailing moderator at compa...@stanford.edu or changing your 

 settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech


--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Looking for collaborators for free-range voting project

2013-02-28 Thread Rich Kulawiec
On Thu, Feb 28, 2013 at 02:19:11PM +0100, Ruben Bloemgarten wrote:
 It seems I might have jumped the gun, assuming the discussion was about
 voting systems for use in political elections. Disclosing all voter
 data, including voter identity would solve much if not all issues
 regarding verifiability, however would that not also restrict the use of
 such a system to topics that have no political or social consequences ?
 Otherwise it seems that the removal of secrecy/anonymity would be
 extremely problematic if not out-right dangerous. 

I'm with Ruben on this one.  There are serious problems (in many cases)
with disclosure of how someone voted; there are even problems disclosing
*if* they voted or possibly if they were *eligible* to vote, even if
that disclosure only (putatively) is done to the voter.

---rsk
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Designing the best network infrastructure for a.Human Rights NGO

2013-02-28 Thread Bill Woodcock

Sorry, thought you'd asked for advice about the best possible way to do it. 
Didn't realize you meant best possible with no time or attention.  But, wait, 
that's not quite it either, is it?  You meant that you don't want to invest 
_your_ time and attention, but you think people on the list can solve that for 
you by contributing _our_ time and attention?  I'm not sure it works that way, 
but perhaps someone who's feeling more charitable than I am right now can 
suggest the best possible solution that requires none of your time and 
attention and runs on Windows. 

Since I'm now 34 hours into an Ottawa-bound itinerary for the CIF, a tip of the 
hat to Canada: As secure as possible, under the circumstances.

-Bill


On Feb 28, 2013, at 8:22, anonymous2...@nym.hush.com 
anonymous2...@nym.hush.com wrote:

 Can we please get back to the issue at hand
 
 On Thu, 28 Feb 2013 13:16:03 + Bill Woodcock wo...@pch.net 
 wrote:
 Ah, yes, those expensive man-hours.  Security is so much easier 
 when you don't give it time and attention.  It also doesn't work. 
 
 
   -Bill
 
 
 On Feb 28, 2013, at 8:09, anonymous2...@nym.hush.com 
 anonymous2...@nym.hush.com wrote:
 
 I knew this was coming at some point. Yes I am starting with 
 Windows, it's more functional (awaits incoming) and costs less
 in 
 terms of expensive man hours (the hidden cost vs software) for
 an 
 Linux guru to run and monitor the network.
 
 On Thu, 28 Feb 2013 13:03:00 + Bill Woodcock
 wo...@pch.net 
 wrote:
 You want to do this securely, and you're _starting_ with
 Windows?
 
 
  -Bill
 
 
 On Feb 28, 2013, at 7:40, anonymous2...@nym.hush.com 
 anonymous2...@nym.hush.com wrote:
 
 Hi, 
 We are a human rights NGO that is looking to invest in the
 best 
 possible level of network security (protection from high-level
 
 cyber-security threats, changing circumvention/proxy to
 protect
 IP 
 address etc, encryption on endpoints and server, IDS/Physical
 and 
 Software Firewall/File Integrity Monitoring, Mobile Device 
 Management, Honeypots) we can get for a our internal network.
 I
 was 
 wondering if people would critique the following network, add 
 comments, suggestions and alternative methods/pieces of
 software. 
 (Perhaps if it goes well we could make a short paper out of
 it,
 for 
 others to use.)
 
 -Windows 2012 Server
 -VMWare virtual machines running Win 8 for remote access
 -Industry standard hardening and lock down of all OS systems.
 -Constantly changing proxies
 -PGP email with BES
 -Cryptocard tokens
 -Sophos Enterprise Protection, Encryption and Patch management
 -Sophos mobile management
 -Encrypted voice calls for mobile and a more secure
 alternative
 to 
 Skype via Silent Circle.
 -TrueCrypt on all drives - set to close without use after a 
 specific time
 -Easily controlled kill commands
 -False and poison pill files
 -Snort IDS
 -Honeypots
 -Tripwire
 -Cisco Network Appliance
 -No wifi
 -Strong physical protection in a liberal country as regards
 human 
 rights
 
 I know there are many other factors, good training, constant 
 monitoring, avoiding spearfishing, penetration testing, etc
 but
 if 
 possible I would please like to keep the conversation on the 
 network design and software.
 
 Thanks guys.
 -Anon
 
 --
 Too many emails? Unsubscribe, change to digest, or change
 password by emailing moderator at compa...@stanford.edu or 
 changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 --
 Too many emails? Unsubscribe, change to digest, or change
 password 
 by emailing moderator at compa...@stanford.edu or changing your
 
 settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Designing the best network infrastructure for a.Human Rights NGO

2013-02-28 Thread anonymous2013
Frankly your whats wrong with a small minority of the people on 
LibTech. NGO's have to balance cost, security, people, user needs, 
current infrastructure, software/hardware donation programs, man 
hours etc etc...Every idiot knows Linux is more secure in many ways 
than Windows yet sometimes other factors come into play that 
require the use of MS. 

This topic is a genuine topic that has not been looked at to my 
knowledge by the movement - we have tons of material on VOIP 
safety, encryption, device management etc but not much on actually 
network design...I hope your glad that your smart-ass comments have 
dragged it sideways within the first two posts, to the detriment of 
the group.

I have no interest in being trolled. Is there anyone on the list 
that wants to talk through this and give me some direct advice on 
how to implement a safe NGO operational network?

On Thu, 28 Feb 2013 13:35:26 + Bill Woodcock wo...@pch.net 
wrote:
Sorry, thought you'd asked for advice about the best possible 
way to do it. Didn't realize you meant best possible with no time 
or attention.  But, wait, that's not quite it either, is it?  You 
meant that you don't want to invest _your_ time and attention, but 
you think people on the list can solve that for you by 
contributing _our_ time and attention?  I'm not sure it works that 
way, but perhaps someone who's feeling more charitable than I am 
right now can suggest the best possible solution that requires 
none of your time and attention and runs on Windows. 

Since I'm now 34 hours into an Ottawa-bound itinerary for the CIF, 
a tip of the hat to Canada: As secure as possible, under the 
circumstances.

-Bill


On Feb 28, 2013, at 8:22, anonymous2...@nym.hush.com 
anonymous2...@nym.hush.com wrote:

 Can we please get back to the issue at hand
 
 On Thu, 28 Feb 2013 13:16:03 + Bill Woodcock 
wo...@pch.net 
 wrote:
 Ah, yes, those expensive man-hours.  Security is so much easier 

 when you don't give it time and attention.  It also doesn't 
work. 
 
 
   -Bill
 
 
 On Feb 28, 2013, at 8:09, anonymous2...@nym.hush.com 
 anonymous2...@nym.hush.com wrote:
 
 I knew this was coming at some point. Yes I am starting with 
 Windows, it's more functional (awaits incoming) and costs less
 in 
 terms of expensive man hours (the hidden cost vs software) for
 an 
 Linux guru to run and monitor the network.
 
 On Thu, 28 Feb 2013 13:03:00 + Bill Woodcock
 wo...@pch.net 
 wrote:
 You want to do this securely, and you're _starting_ with
 Windows?
 
 
  -Bill
 
 
 On Feb 28, 2013, at 7:40, anonymous2...@nym.hush.com 
 anonymous2...@nym.hush.com wrote:
 
 Hi, 
 We are a human rights NGO that is looking to invest in the
 best 
 possible level of network security (protection from high-
level
 
 cyber-security threats, changing circumvention/proxy to
 protect
 IP 
 address etc, encryption on endpoints and server, 
IDS/Physical
 and 
 Software Firewall/File Integrity Monitoring, Mobile Device 
 Management, Honeypots) we can get for a our internal 
network.
 I
 was 
 wondering if people would critique the following network, 
add 
 comments, suggestions and alternative methods/pieces of
 software. 
 (Perhaps if it goes well we could make a short paper out of
 it,
 for 
 others to use.)
 
 -Windows 2012 Server
 -VMWare virtual machines running Win 8 for remote access
 -Industry standard hardening and lock down of all OS 
systems.
 -Constantly changing proxies
 -PGP email with BES
 -Cryptocard tokens
 -Sophos Enterprise Protection, Encryption and Patch 
management
 -Sophos mobile management
 -Encrypted voice calls for mobile and a more secure
 alternative
 to 
 Skype via Silent Circle.
 -TrueCrypt on all drives - set to close without use after a 
 specific time
 -Easily controlled kill commands
 -False and poison pill files
 -Snort IDS
 -Honeypots
 -Tripwire
 -Cisco Network Appliance
 -No wifi
 -Strong physical protection in a liberal country as regards
 human 
 rights
 
 I know there are many other factors, good training, constant 

 monitoring, avoiding spearfishing, penetration testing, etc
 but
 if 
 possible I would please like to keep the conversation on the 

 network design and software.
 
 Thanks guys.
 -Anon
 
 --
 Too many emails? Unsubscribe, change to digest, or change
 password by emailing moderator at compa...@stanford.edu or 
 changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 --
 Too many emails? Unsubscribe, change to digest, or change
 password 
 by emailing moderator at compa...@stanford.edu or changing 
your
 
 settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech


--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Designing the best network infrastructure for?a.Human Rights NGO

2013-02-28 Thread Julian Oliver
..on Thu, Feb 28, 2013 at 01:08:54PM +, anonymous2...@nym.hush.com wrote:
 I knew this was coming at some point. Yes I am starting with 
 Windows, it's more functional (awaits incoming) and costs less in 
 terms of expensive man hours (the hidden cost vs software) for an 
 Linux guru to run and monitor the network.

You really don't have to be a Linux guru to run host a server running Linux.
I'm sure many people would be happy to help you in getting going however, if you
are worried as to entry barriers.

In all honesty and without meaning to insult your choice, choosing Windows 2012
Server is simply a bad idea. In fact, you are actually inviting trouble.

I have known people that target Windows Server as a matter of perverse
principle. It is not used by any that care for or understand network security.
Although Windows Server 2012 is better than previous versions, the remote
exploits for Microsoft's servers are numerous, from terminal services to MSSQL
and MS XML core services remote code execution. More so, it's famously easy to
push over with a Denial of Service attack.

You really are better to spend the time setting up a GNU/Linux server. Again,
I'd be happy to advise. Like many on this list, I have administered GNU/Linux
systems for a long time and run my own servers.

Cheers,

Julian

 
 On Thu, 28 Feb 2013 13:03:00 + Bill Woodcock wo...@pch.net 
 wrote:
 You want to do this securely, and you're _starting_ with Windows?
 
 
 -Bill
 
 
 On Feb 28, 2013, at 7:40, anonymous2...@nym.hush.com 
 anonymous2...@nym.hush.com wrote:
 
  Hi, 
  We are a human rights NGO that is looking to invest in the best 
  possible level of network security (protection from high-level 
  cyber-security threats, changing circumvention/proxy to protect 
 IP 
  address etc, encryption on endpoints and server, IDS/Physical 
 and 
  Software Firewall/File Integrity Monitoring, Mobile Device 
  Management, Honeypots) we can get for a our internal network. I 
 was 
  wondering if people would critique the following network, add 
  comments, suggestions and alternative methods/pieces of 
 software. 
  (Perhaps if it goes well we could make a short paper out of it, 
 for 
  others to use.)
  
  -Windows 2012 Server
  -VMWare virtual machines running Win 8 for remote access
  -Industry standard hardening and lock down of all OS systems.
  -Constantly changing proxies
  -PGP email with BES
  -Cryptocard tokens
  -Sophos Enterprise Protection, Encryption and Patch management
  -Sophos mobile management
  -Encrypted voice calls for mobile and a more secure alternative 
 to 
  Skype via Silent Circle.
  -TrueCrypt on all drives - set to close without use after a 
  specific time
  -Easily controlled kill commands
  -False and poison pill files
  -Snort IDS
  -Honeypots
  -Tripwire
  -Cisco Network Appliance
  -No wifi
  -Strong physical protection in a liberal country as regards 
 human 
  rights
  
  I know there are many other factors, good training, constant 
  monitoring, avoiding spearfishing, penetration testing, etc but 
 if 
  possible I would please like to keep the conversation on the 
  network design and software.
  
  Thanks guys.
  -Anon
  
  --
  Too many emails? Unsubscribe, change to digest, or change 
 password by emailing moderator at compa...@stanford.edu or 
 changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 --
 Too many emails? Unsubscribe, change to digest, or change password 
 by emailing moderator at compa...@stanford.edu or changing your 
 settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

-- 
Julian Oliver
http://julianoliver.com
http://criticalengineering.org
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Designing the best network infrastructure for a Human Rights NGO

2013-02-28 Thread Tom Ritter
On 28 February 2013 07:39,  anonymous2...@nym.hush.com wrote:
 Hi,
 We are a human rights NGO that is looking to invest in the best
 possible level of network security (protection from high-level
 cyber-security threats, changing circumvention/proxy to protect IP
 address etc, encryption on endpoints and server, IDS/Physical and
 Software Firewall/File Integrity Monitoring, Mobile Device
 Management, Honeypots) we can get for a our internal network. I was
 wondering if people would critique the following network, add
 comments, suggestions and alternative methods/pieces of software.
 (Perhaps if it goes well we could make a short paper out of it, for
 others to use.)

 -Windows 2012 Server
 -VMWare virtual machines running Win 8 for remote access

Windows doesn't scare me, full remote access scares me.  (I'm amazed
at how many people are saying X is insecure with no explanations how
or why an alternative is more secure.) Obviously you'll need something
for remote workers, but see the next section...

 -Industry standard hardening and lock down of all OS systems.

Industry 'Standard' hardening isn't particularly good because
'Standard' is 'Standard' and 'Standard' is also hacked over and over
again.  Upgrading your RDP authentication level is a good idea and
'Standard' - but what you want most of all is separation of privilege.
 I don't mean Bob the sysadmin is the only person who can administer
the mailserver I mean Bob the sysadmin is the only person who can
administer the mailserver, and he can only do it from a separate
computer that's on a separate airgapped network and he doesn't use USB
keys.

Airgapping brings thoughts of crazy military-levels of paranoia - but
it's not all that difficult and it's getting more and more important.
Get a couple cheapish laptops, a separate consumer-level broadband
connection, and run red cables plus blue to a few people's desks.

Think about it terms of compartmentalisation, both airgapped and
non-airgapped-but-separate-Domains/VLANs/Authorisation contexts. Draw
out your network, and then fill an entire section with Red - that's
what the attacker controls.  How does he move to another section? What
data does he get?  Brainstorm this part heavily, consider putting it
up on a permanent whiteboard and referring to it every time someone
comes in and needs access to X group's fileserver, or what-have-you.

 -Constantly changing proxies

I have no idea what you intend to accomplish with this.  Performing
*more* logging of your employees, or not disabling WPAD sounds like
the opposite of what you'd want.  (And a note on the WPAD item:
disable IPv6 too.)

 -Sophos Enterprise Protection, Encryption and Patch management
 -Sophos mobile management

Uh, I guess.  I guess I shouldn't disparage something I've never
reviewed and haven't worked with... But my opinion of Enterprise
Protection products isn't too high until I've seen an independent
security firm see how secure the product is and how much it attack
surface it adds.

 -Encrypted voice calls for mobile and a more secure alternative to
 Skype via Silent Circle.

So I guess that's RedPhone?

 -TrueCrypt on all drives - set to close without use after a
 specific time

Bitlocker is a fine alternative, and probably easier to manage/query
via Group Policy.

 -False and poison pill files
 -Honeypots

Ooookay.  This isn't a bad idea, but it's pretty damn complicated to
set up - you're moving more and more towards something that requires a
24/7 SOC (Security Operations Center) and further away from
Architecting a secure network.

 -Snort IDS
 -Tripwire

And someone full time (or 2 people, really probably a team of folks
operating 24/7) to monitor these?  Cause this stuff doesn't help you
if no one's looking at it.

 -Easily controlled kill commands

... Huh?

 -No wifi

Good luck with that.  I guess no one's going to have any productive
meetings or use any MacBook airs, tablets, or phones for work
purposes.  (Unlikely.)  Having everyone use the cell towers isn't a
great idea either.  This sounds like you haven't done a requirements
gathering phase with your users.

-tom
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Designing the best network infrastructure for a Human Rights NGO

2013-02-28 Thread cantona7
Thanks excellent advice - much to think about.

On Thu, 28 Feb 2013 14:09:39 + Tom Ritter t...@ritter.vg 
wrote:
On 28 February 2013 07:39,  anonymous2...@nym.hush.com wrote:
 Hi,
 We are a human rights NGO that is looking to invest in the best
 possible level of network security (protection from high-level
 cyber-security threats, changing circumvention/proxy to protect 
IP
 address etc, encryption on endpoints and server, IDS/Physical 
and
 Software Firewall/File Integrity Monitoring, Mobile Device
 Management, Honeypots) we can get for a our internal network. I 
was
 wondering if people would critique the following network, add
 comments, suggestions and alternative methods/pieces of 
software.
 (Perhaps if it goes well we could make a short paper out of it, 
for
 others to use.)

 -Windows 2012 Server
 -VMWare virtual machines running Win 8 for remote access

Windows doesn't scare me, full remote access scares me.  (I'm 
amazed
at how many people are saying X is insecure with no explanations 
how
or why an alternative is more secure.) Obviously you'll need 
something
for remote workers, but see the next section...

 -Industry standard hardening and lock down of all OS systems.

Industry 'Standard' hardening isn't particularly good because
'Standard' is 'Standard' and 'Standard' is also hacked over and 
over
again.  Upgrading your RDP authentication level is a good idea and
'Standard' - but what you want most of all is separation of 
privilege.
 I don't mean Bob the sysadmin is the only person who can 
administer
the mailserver I mean Bob the sysadmin is the only person who 
can
administer the mailserver, and he can only do it from a separate
computer that's on a separate airgapped network and he doesn't use 
USB
keys.

Airgapping brings thoughts of crazy military-levels of paranoia - 
but
it's not all that difficult and it's getting more and more 
important.
Get a couple cheapish laptops, a separate consumer-level broadband
connection, and run red cables plus blue to a few people's desks.

Think about it terms of compartmentalisation, both airgapped and
non-airgapped-but-separate-Domains/VLANs/Authorisation contexts. 
Draw
out your network, and then fill an entire section with Red - 
that's
what the attacker controls.  How does he move to another section? 
What
data does he get?  Brainstorm this part heavily, consider putting 
it
up on a permanent whiteboard and referring to it every time 
someone
comes in and needs access to X group's fileserver, or what-have-
you.

 -Constantly changing proxies

I have no idea what you intend to accomplish with this.  
Performing
*more* logging of your employees, or not disabling WPAD sounds 
like
the opposite of what you'd want.  (And a note on the WPAD item:
disable IPv6 too.)

 -Sophos Enterprise Protection, Encryption and Patch management
 -Sophos mobile management

Uh, I guess.  I guess I shouldn't disparage something I've never
reviewed and haven't worked with... But my opinion of Enterprise
Protection products isn't too high until I've seen an independent
security firm see how secure the product is and how much it attack
surface it adds.

 -Encrypted voice calls for mobile and a more secure alternative 
to
 Skype via Silent Circle.

So I guess that's RedPhone?

 -TrueCrypt on all drives - set to close without use after a
 specific time

Bitlocker is a fine alternative, and probably easier to 
manage/query
via Group Policy.

 -False and poison pill files
 -Honeypots

Ooookay.  This isn't a bad idea, but it's pretty damn complicated 
to
set up - you're moving more and more towards something that 
requires a
24/7 SOC (Security Operations Center) and further away from
Architecting a secure network.

 -Snort IDS
 -Tripwire

And someone full time (or 2 people, really probably a team of 
folks
operating 24/7) to monitor these?  Cause this stuff doesn't help 
you
if no one's looking at it.

 -Easily controlled kill commands

... Huh?

 -No wifi

Good luck with that.  I guess no one's going to have any 
productive
meetings or use any MacBook airs, tablets, or phones for work
purposes.  (Unlikely.)  Having everyone use the cell towers isn't 
a
great idea either.  This sounds like you haven't done a 
requirements
gathering phase with your users.

-tom
--
Too many emails? Unsubscribe, change to digest, or change password 
by emailing moderator at compa...@stanford.edu or changing your 
settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Designing the best network infrastructure for?a.Human Rights NGO

2013-02-28 Thread Rich Kulawiec
On Thu, Feb 28, 2013 at 01:43:38PM +, anonymous2...@nym.hush.com wrote:
 Every idiot knows Linux is more secure in many ways 
 than Windows yet sometimes other factors come into play that 
 require the use of MS. 

No.  MS is never required.  I've heard that contention for decades and
it's never been true.  There's ALWAYS a better way to anyone who has
the intelligence, the resourcefulness, the diligence to find one.

(And this gets easier all the time: finding alternatives is much
easier in 2013 than it was in 2003.  The problem now, in some ways,
is not are there vastly superior alternatives? but which of the
many is right for this instance?  Good problem to have, though.)

So you have a choice: you can either stubbornly persist with this, or you
can go back through your checklist and remove every single item that's
not open-source.  (For starters.  That's by no means a sufficient change,
but it's a necessary one, and would at least dispense with some of the
most egregiously poor choices, of which operating system is not the
only one.)

And Linux is far from the only choice available, and it probably
would not be the one that I recommend first.

But -- to back up quite a bit -- actually making a serious recommendation
would require seeing your design goals, and we haven't.  If we presume,
for the sake of argument, that you have powerful, clueful enemies who
are well-funded and somewhat ruthless, then other changes might also be
in order.

For example, you list:

Strong physical protection in a liberal country as regards human rights

If you build according to that model, then you are doing your adversaries
the favor of constructing a single, centralized, easily-identifiable,
fixed target for them to aim at.  I don't think that's a good
architecture, regardless of what you install in it.

So if you really want serious thinking applied to this at the
architectural, design, and implementation levels, then we probably need
to see some kind of documentation that goes into what you're trying
to accomplish along with some assessment of the capabilities of your
adversaries.  How large an operation is this?  How global (or not)?
What's your hardware/software budget?  What functions are you trying
to provide?  We also probably need to know what your assets are: what
are your personnel resources?  What's your training budget?  And so on.

You may also need to recognize that you're not up to this.  Could be.
Can't tell.  But it's certainly possible.  I've seen many people try
to build things that they really, truly weren't capable of building,
with disastrous results.  If that's the case, then it would be a poor
choice indeed to proceed without serious reconsideration.

---rsk
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Designing the best network infrastructure for a Human Rights NGO

2013-02-28 Thread Andreas Bader
drone_guinness1 borgnet:
 ...end users using Linux :-D  (good one)
so you say that android users aren't end users?

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Designing the best network infrastructure for a Human Rights NGO

2013-02-28 Thread SiNA Rabbani
Speaking of GUNE/Linux operating systems, I am personally a big fan of
LiveCDs such as Tails (https://tails.boum.org/), where you don't need to
install any software on a computer and loose all data (almost all data)
on a reboot.

Journalists, activists in high risk countries can have multiple copies
of a LiveCD at home, work or school. Instead of carrying their
activities in their laptops, they can load the CD and perform their
tasks with little or no trace.

--SiNA

Julian Oliver:
 ..on Thu, Feb 28, 2013 at 03:00:11PM +, anonymous2...@nym.hush.com wrote:
 If you think you can get a board member or a finance person in an NGO to use
 Linux then you are detached from the reality of how most NGO's work. The use
 will simply ignore it.
 
 Really? Have you tried a recent desktop Linux distribution? What about 
 Android?
 While not a fan of Ubuntu myself, I've seen both an 11yr old girl and a 70yr 
 old
 retired farmer installing packages and watching videos, making documents in
 Ubuntu. One quite often hears many people find it far less confusing than
 Windows.
 
 Linux is just a kernel. GNU tools, applications and the UI are what make it a
 Desktop OS - and they vary in usability.
 
 Anyway, to be a little more constructive on the topic, check out Tactical 
 Tech's
 NGO-in-a-box. All built on free and open software:
 
 Everyday tools for NGOs Base NGO in-a-box is a collection of tools for the
 day-to-day running of small to medium sized NGOs. Produced by Tactical Tech in
 association with WomensNet, this toolkit aims to make it easier to set up 
 base,
 find the right software and learn how to use it. Targeted primarily at NGOs 
 and
 advocacy organisations in developing countries the Box contains a set of
 peer-reviewed Free and Open Source Software tools, with associated guides and
 tutorials.
 
 http://archive.tacticaltech.org/ngo-in-a-box-base.html
 
 Testimonials:
 
 http://archive.tacticaltech.org/whatpeoplesayaboutus.html
 
 Cheers,
 
 Julian
 

 On Thu, 28 Feb 2013 14:50:08 + Andreas Bader 
 noergelpi...@hotmail.de wrote:
 anonymous2...@nym.hush.com:
 Hi, 
 We are a human rights NGO that is looking to invest in the best 
 possible level of network security (protection from high-level 
 cyber-security threats, changing circumvention/proxy to protect 
 IP 
 address etc, encryption on endpoints and server, IDS/Physical 
 and 
 Software Firewall/File Integrity Monitoring, Mobile Device 
 Management, Honeypots) we can get for a our internal network. I 
 was 
 wondering if people would critique the following network, add 
 comments, suggestions and alternative methods/pieces of 
 software. 
 (Perhaps if it goes well we could make a short paper out of it, 
 for 
 others to use.)
 I also work for a human rights NGO.
 First don't use an internal network, you need a decentral 
 communication
 and information network.
 Second, Windows is not easier than Linux, compare Windows 8 and 
 Debian
 with Gnome 2.
 I would probably use a SEL Kernel like in SL 6, when possible a 
 Live-System.
 Forget all the closed-source software.
 Now the Software:
 -Firefox with Torbutton
 -Thunderbird with Torbirdy and OpenPGP
 -Vidalia
 Encrypt your systems with LUKS, its also FDE. Truecrypt doesn't 
 work
 with Linux as FDE.
 You can possibly try Liberte Linux, someone on this list presented 
 it to
 us, its made for secure communication.
 And if you are unsure about Linux and Windows in High Level 
 Security
 Systems, then you should probably go and get a real
 Sysadmin/Security-Fanatic.
 How good are you with IT-Sec?
 I don't want to offend you, but you sound like a beginner.

 Andreas

 (P.S.: Skype? You can't be serious. ICQ and Facebookchat is more 
 secure.
 Use IRC).
 --
 Too many emails? Unsubscribe, change to digest, or change password 
 by emailing moderator at compa...@stanford.edu or changing your 
 settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

 --
 Too many emails? Unsubscribe, change to digest, or change password by 
 emailing moderator at compa...@stanford.edu or changing your settings at 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 


-- 
“Be the change you want to see in the world.” Gandhi

XMPP: i...@jabber.ccc.de a5dae15f45a37e9768f6deae7b54807fc4942ec9
twitter.com/wwwiretap
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] The Myopia of excluding censors: The tale of a self-defeating petition - Opinion - Al Jazeera English

2013-02-28 Thread kseel28440


I want to be dropped from subscription but have forgotten my password. Please 
advise.

-Original Message-
From: x z xhzh...@gmail.com
To: liberationtech liberationtech@lists.stanford.edu
Sent: Fri, Feb 8, 2013 2:17 pm
Subject: Re: [liberationtech] The Myopia of excluding censors: The tale of a 
self-defeating petition - Opinion - Al Jazeera English


Libtech,


I am an ardent supporter for that GFW petition, and I feel compelled to write 
about it *again*, in reply to Tricia Wang's article.


There are three major issues in this piece.


1. The intent of the petition is badly interpreted and exaggerated by Tricia 
even in the literal sense. Tricia claiming This petition would deny all CNNIC 
researchers and officials the opportunity to come to the US for conferences and 
events is appalling. The petition is for those people who help internet 
censorship. Tricia herself argues using several paragraphs that many tasks in 
CNNIC are not censorship related!


2. A lot of people, including Tricia and many on this list, misunderstand the 
spirit of the petition. It is naive to perceive that many people, including 
many of the signatories of this petition, realistically think such a petition 
can make US government to actually adopt such an entry-denial policy. Like I 
mentioned in my previous email on this topic, this petition is a *symbolic* 
one. Its goal is to show to the world that many of Chinese netizens care, and 
it is a way to mobilize (and hopefully organize) us.


3. This article repeated again and again that engagement with China officials 
(including Fang Binxing) is beneficial. I don't disagree with this, but Tricia 
greatly overestimated such benefit. Most of China's officials, especially those 
overseeing censorship, know very well what an open society looks like. This 
knowledge *reinforces* their belief in their censorship policies, contrary to 
what Tricia may think. The present China is not Soviet Union in the cold war 
era. China's ideology system is way more robust.


Regards,


2013/2/8 Collin Anderson col...@averysmallbird.com


Libtech,


I appreciated the short articulation of this counterargument at the time of the 
petition being posted and this article summarizes it well. Firstly, 
unfortunately while Libtech has fostered an impression of being a private 
network, it has grown beyond that over the past three years, into a very public 
community -- at times it still often feels like a closed, personal community. I 
think we all agree that State Department employees are entailed to a right of 
an independent opinion, and the only misstep was perhaps sending from a work 
email address with an automatic signature. A brief history of the drama of 
Internet Freedom programs and China makes it clear that this is something that 
the US Government would never have the political will to adopt, much less 
endorse. We may do well to give such people the benefit of the doubt that they 
had intended to provoke conversation and reach out to the community, rather 
than encourage participation. Otherwise, a perspective may be lost.


That being said, the post and petition should have, but did not, provoked a 
legitimate discussion about incongruences in American foreign policy toward 
states that practice repression of media and Internet communications. Case in 
point, on the exact day that Tricia Wang, of whom I am a longtime fan, 
published her argument, the Department of Treasury announced the designation of 
Islamic Republic of Iran Broadcasting (IRIB), Iranian Cyber Police, 
Communications Regulatory Authority (CRA), Iran Electronics Industries (IEI) 
and Ezzatollah Zarghami, head of IRIB, for their participation in activities 
that restrict or deny the free flow of information to or from the Iranian 
people. These listings follow previous designations by companies and persons 
responsible for the surveillance and disruption of information networks under 
American laws, such as the TRA, CISADA and GHRAVITY EO. 


I was a vocal advocate for these actions and wrote extensively on their 
justification, however, I was also left questioning whether it is morally 
justifiable that I have not spoke out with similar passion against the Bahraini 
MOI. I would ask whether Ms. Wang feels that Treasury's actions on Wednesday 
are similarly unjustifiable within her philosophical argument?


Of minor importance, I do believe that the article over-interprets the extent 
of the applicability of institutional sanctions on employees, particularly 
low-level individuals. However, the tragedy of Treasury sanctions is that they 
are specifically designed to be unclear, and so let's allow that it may chill 
interactions with said researchers.


However, more broadly. At the time of its original attention, the notion of 
travel restrictions was referred to as coercive force -- a label which I 
fundamentally disagree with. States and publics have a fundamental right to 
determine what activities that they 

Re: [liberationtech] Designing the best network infrastructure for a Human Rights NGO

2013-02-28 Thread anonymous2013
Thanks, yes I also have seen young and old people use linux but I've also seen 
hundreds of people trained to use it and as soonas they have to update a 
package in Linux, get confused and reach for a windows machine. The NGO in a 
box stuff is ok but not what I am asking about at all, I'm speaking about a 
network for a Western NGO with significant operations and exposure from 
high-level threats and on the ground in 3rd world countries. 

Most of what I have gotten so far are lectures and rhetoric.


On Thu, Feb 28 at 06:26 PM (UTC), Julian Oliver jul...@julianoliver.com 
wrote:

 ..on Thu, Feb 28, 2013 at 03:00:11PM +,
 anonymous2...@nym.hush.com wrote:
  If you think you can get a board member or a finance person
 in an NGO to use
  Linux then you are detached from the reality of how most
 NGO's work. The use
  will simply ignore it.
 
 Really? Have you tried a recent desktop Linux distribution? What
 about Android?
 While not a fan of Ubuntu myself, I've seen both an 11yr old
 girl and a 70yr old
 retired farmer installing packages and watching videos, making
 documents in
 Ubuntu. One quite often hears many people find it far less
 confusing than
 Windows.
 
 Linux is just a kernel. GNU tools, applications and the UI are
 what make it a
 Desktop OS - and they vary in usability.
 
 Anyway, to be a little more constructive on the topic, check out
 Tactical Tech's
 NGO-in-a-box. All built on free and open software:
 
 Everyday tools for NGOs Base NGO in-a-box is a collection
 of tools for the
 day-to-day running of small to medium sized NGOs. Produced by
 Tactical Tech in
 association with WomensNet, this toolkit aims to make it easier
 to set up base,
 find the right software and learn how to use it. Targeted
 primarily at NGOs and
 advocacy organisations in developing countries the Box contains
 a set of
 peer-reviewed Free and Open Source Software tools, with
 associated guides and
 tutorials.
 
 http://archive.tacticaltech.org/ngo-in-a-box-base.html
 
 Testimonials:
 
 http://archive.tacticaltech.org/whatpeoplesayaboutus.html
 
 Cheers,
 
 Julian
 
  
  On Thu, 28 Feb 2013 14:50:08 + Andreas
 Bader 
  noergelpi...@hotmail.de wrote:
  anonymous2...@nym.hush.com:
   Hi, 
   We are a human rights NGO that is looking to
 invest in the best 
   possible level of network security (protection
 from high-level 
   cyber-security threats, changing
 circumvention/proxy to protect 
  IP 
   address etc, encryption on endpoints and server,
 IDS/Physical 
  and 
   Software Firewall/File Integrity Monitoring,
 Mobile Device 
   Management, Honeypots) we can get for a our
 internal network. I 
  was 
   wondering if people would critique the following
 network, add 
   comments, suggestions and alternative
 methods/pieces of 
  software. 
   (Perhaps if it goes well we could make a short
 paper out of it, 
  for 
   others to use.)
  I also work for a human rights NGO.
  First don't use an internal network, you need a
 decentral 
  communication
  and information network.
  Second, Windows is not easier than Linux, compare
 Windows 8 and 
  Debian
  with Gnome 2.
  I would probably use a SEL Kernel like in SL 6, when
 possible a 
  Live-System.
  Forget all the closed-source software.
  Now the Software:
  -Firefox with Torbutton
  -Thunderbird with Torbirdy and OpenPGP
  -Vidalia
  Encrypt your systems with LUKS, its also FDE. Truecrypt
 doesn't 
  work
  with Linux as FDE.
  You can possibly try Liberte Linux, someone on this
 list presented 
  it to
  us, its made for secure communication.
  And if you are unsure about Linux and Windows in
 High Level 
  Security
  Systems, then you should probably go and get a
 real
  Sysadmin/Security-Fanatic.
  How good are you with IT-Sec?
  I don't want to offend you, but you sound like a
 beginner.
  
  Andreas
  
  (P.S.: Skype? You can't be serious. ICQ and
 Facebookchat is more 
  secure.
  Use IRC).
  --
  Too many emails? Unsubscribe, change to digest, or
 change password 
  by emailing moderator at compa...@stanford.edu or
 changing your 
  settings at 
 
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
  
  --
  Too many emails? Unsubscribe, change to digest, or change
 password by emailing moderator at compa...@stanford.edu or
 changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech
 
 -- 
 Julian Oliver
 http://julianoliver.com
 http://criticalengineering.org
 --
 Too many emails? Unsubscribe, change to digest, or change
 password by emailing moderator at compa...@stanford.edu or
 changing your settings at
 https://mailman.stanford.edu/mailman/listinfo/liberationtech

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Is cryptography becoming less important?

2013-02-28 Thread Richard Brooks
 So organizations get compromised by well-meaning users who click on a
 link in an email or slip up and use an insecure connection, and while
 we can ameloriate that to a certain extent with code, we really need
 to think more about how to make it easier for users to make the
 right choices versus the wrong choices.


Too often this is phrased as users should know better. But,
to be honest, I think most anyone could be fooled by a well
planned spear-phishing attack. Last year it got RSA security,
ORNL, Lockheed-Martin, and the entire state of South Carolina.

The use of email in normal business practices far exceeds
what should be done, given the lack of authentication and
the ease of slipping malicious payloads into innocuous
looking URLs, PDFs, etc.
-- 
===
R. R. Brooks

Associate Professor
Holcombe Department of Electrical and Computer Engineering
Clemson University

313-C Riggs Hall
PO Box 340915
Clemson, SC 29634-0915
USA

Tel.   864-656-0920
Fax.   864-656-5910
email: r...@acm.org
web:   http://www.clemson.edu/~rrb

--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] How Copyright Works at Stanford

2013-02-28 Thread Yosem Companys
May be of interest.  Document was recently updated.  See:

http://stanford.edu/group/univ-librarian/2013_Copyright_Reminder.pdf
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Is cryptography becoming less important?

2013-02-28 Thread Kyle Maxwell
On Thu, Feb 28, 2013 at 5:30 PM, Richard Brooks r...@acm.org wrote:
 So organizations get compromised by well-meaning users who click on a
 link in an email or slip up and use an insecure connection, and while
 we can ameloriate that to a certain extent with code, we really need
 to think more about how to make it easier for users to make the
 right choices versus the wrong choices.


 Too often this is phrased as users should know better. But,
 to be honest, I think most anyone could be fooled by a well
 planned spear-phishing attack. Last year it got RSA security,
 ORNL, Lockheed-Martin, and the entire state of South Carolina.

State-affiliated actors use this frequently, yes, as I'm sure many on
this list can attest. But if we make it more difficult for users to do
the wrong thing, then the attackers have a more difficult time.
Hopefully we eventually change the cost/benefit calculation, but
that's probably best for another separate discussion.

On topic, though, if attackers can easily convince a user to run code
through deception or similar means, then all the crypto in the world
won't matter. And I hope that the linked article missed some context,
because if Rivest et al. only realize recently that the CA PKI is
irretrievably broken, we're way behind.

-- 
Kyle Maxwell [krmaxw...@gmail.com]
http://www.xwell.org
Twitter: @kylemaxwell
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


[liberationtech] Additional References on Hacking as Activism, for Social Change, for Empowerment

2013-02-28 Thread Yosem Companys
From: Kishonna Gray klg...@asu.edu

Hello all! I am looking for additional references similar to Gabriella's
work here (awesome book btw).  A student is looking for information on
hacking as activism, hacking for social change, hacking for empowerment,
etc.

Any and all citations are welcome!

Thanks
Kishonna

*Kishonna L. Gray, PhD*
*Assistant Professor*
School of Justice Studies
Eastern Kentucky University
Email: kishonna.g...@eku.edu
Office: Stratton 313
Phone: 859-622-8880

*Recent scholarship on Xbox Live: *

Gray, K.L. (2013) Diffusion of Innovation Theory and Xbox Live: Examining
Minority Gamers Responses and Rate of Adoption to Changes in Xbox
Live. *Bulletin
of Science, Technology,  Society*, 32(6): 463-470.

Gray, K.L. (2012) Deviant Bodies, Stigmatized Identities, and Racist Acts:
Examining the Experiences of African-American Gamers in Xbox Live.  *New
Review of Hypermedia and Multimedia, *18(4): 261-276.
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Looking for collaborators for free-range voting project

2013-02-28 Thread Michael Allan
Ruben and Rich,

Ruben Bloemgarten said:
 It seems I might have jumped the gun, assuming the discussion was
 about voting systems for use in political elections. Disclosing all
 voter data, including voter identity would solve much if not all
 issues regarding verifiability, however would that not also restrict
 the use of such a system to topics that have no political or social
 consequences ?  Otherwise it seems that the removal of
 secrecy/anonymity would be extremely problematic if not out-right
 dangerous.

Rich Kulawiec said:
 I'm with Ruben on this one.  There are serious problems (in many
 cases) with disclosure of how someone voted; there are even problems
 disclosing *if* they voted or possibly if they were *eligible* to
 vote, even if that disclosure only (putatively) is done to the
 voter.

I guess the main concern is coercion and vote buying.  I've discussed
this with others and we foresee some important mitigations.  (These
aren't obvious BAM, and it took us some time to see them.)  *

  (a) Continuous primary voting: Vote sellers can shift their votes
  after taking the money, perhaps re-selling them to other buyers.
  This makes vote buying a poor investment.

  (b) Full disclosure: Buyers, sellers and systematic pressure by
  others (employers, unions, churches, and so forth) are
  detectable by statistical pattern analysis of vote shifts and
  dispositions in correlation with facts (known buyers and
  sellers, workforce structure and dynamics, and so forth).

  (c) Separation of primary from decision systems: Public and private
  voting may be interrelated through separate electoral systems: a
  public vote in the run-up (primary system) culminates in a
  private vote on election day (decision system).  The final
  private vote (secret ballot) filters out instances of individual
  vote buying and coercion.

  A similar strategy may be applied to normative decisions.  Here
  the decisive vote is often not private, but instead restricted
  to a small number of people, such as elected assembly members.
  Concerns of coercion and vote buying are thus *also* restricted
  to that smaller group of people, who may therefore be closely
  monitored and scrutinized.

These should at least prevent skewing of decisions and other serious
harm.  Or have we overlooked something?

I used to point to the harm caused by our faith in the secret ballot,
but now I feel it's the wrong approach.  Whatever we suffer on account
of our political arrangements (we in the West, who have so much else
to be thankful for) is our own fault.  We have the wherewithal to fix
things, and could even proceed a little faster if we wished.


  * From this footnote, which also links to discussions
http://zelea.com/project/votorola/d/theory.xht#fn-2

Mike
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech


Re: [liberationtech] Designing the best network infrastructure for a Human Rights NGO

2013-02-28 Thread Andreas Bader
anonymous2...@nym.hush.com:
 Thanks, yes I also have seen young and old people use linux but I've also 
 seen hundreds of people trained to use it and as soonas they have to update a 
 package in Linux, get confused and reach for a windows machine. The NGO in a 
 box stuff is ok but not what I am asking about at all, I'm speaking about a 
 network for a Western NGO with significant operations and exposure from 
 high-level threats and on the ground in 3rd world countries. 

In that case you should contact a microsoft advoser, he will help you to
build your secure infrastructure basing on MS.
If you ask the people here what they would use then you get the answers
you get right now.
You sound like you want security in a corporate structure.

Andreas
--
Too many emails? Unsubscribe, change to digest, or change password by emailing 
moderator at compa...@stanford.edu or changing your settings at 
https://mailman.stanford.edu/mailman/listinfo/liberationtech