Staying off NSA radar

At the U.K Guardian, Bruce Schneier offers five pieces strategies for staying off the NSA radar. Excellent article with real advice, including caveats Here are a few excerpts:

1) Hide in the network. 2) Encrypt your communications. Use TLS. Use IPsec. 3) Assume that while your computer can be compromised, it would take work and risk on the part of the NSA – so it probably isn't. If you have something really important, use an air gap. 4) Be suspicious of commercial encryption software, especially from large vendors. My guess is that most encryption products from large US companies have NSA-friendly back doors, and many foreign ones probably do as well. 5) Try to use public-domain encryption that has to be compatible with other implementations.

Continue ReadingStaying off NSA radar

Surveillance state run amok: Another reason most decent people won’t run for public office

What if you were a reasonably smart and good-hearted person who was willing to run for national political office? You most likely wouldn't because of numerous financial, social and institutional hurdles, some of which I've described here. If you were undeterred by those hurdles, you would be somewhat likely to be a psychopath, and you shouldn't be allowed to serve in a position of public trust. But let's say you were one of those rare people who was ready to persevere through all of these hurdles. Well, there would be one more hurdle for you, one that was described by Glenn Greenwald back in November 2012, well before the Edward Snowden Story broke. The situation was the affair of General Petraeus, particularly the vast invasion and public outing of his emails to and from Paula Broadwell. All of this occurred, courtesy of the security state in a situation where no crime had been alleged. This is a disturbing example of how, at a push of a button, one's emails are easily accessible, and that the surveillance state doesn't give a crap about personal privacy. More recent revelations related to Edward Snowden's disclosures indicate that the surveillance state grabs virtually all of our emails and stores them for later analysis, meaning that they are available to dissuade one from running for office whenever the surveillance state decides to promulgate the most private aspects of your life. Here's is an excerpt from Greenwald's description of this real life problem, illustrated by the affair of General Petraeus:

So all based on a handful of rather unremarkable emails sent to a woman fortunate enough to have a friend at the FBI, the FBI traced all of Broadwell's physical locations, learned of all the accounts she uses, ended up reading all of her emails, investigated the identity of her anonymous lover (who turned out to be Petraeus), and then possibly read his emails as well. They dug around in all of this without any evidence of any real crime - at most, they had a case of "cyber-harassment" more benign than what regularly appears in my email inbox and that of countless of other people - and, in large part, without the need for any warrant from a court. But that isn't all the FBI learned. It was revealed this morning that they also discovered "alleged inappropriate communication" to Kelley from Gen. Allen, who is not only the top commander in Afghanistan but was also just nominated by President Obama to be the Commander of US European Command and Supreme Allied Commander Europe (a nomination now "on hold"). Here, according to Reuters, is what the snooping FBI agents obtained about that [emphasis added]:
"The U.S. official said the FBI uncovered between 20,000 and 30,000 pages of communications - mostly emails spanning from 2010 to 2012 - between Allen and Jill Kelley . . . . "Asked whether there was concern about the disclosure of classified information, the official said, on condition of anonymity: 'We are concerned about inappropriate communications. We are not going to speculate as to what is contained in these documents.'"
So not only did the FBI - again, all without any real evidence of a crime - trace the locations and identity of Broadwell and Petreaus, and read through Broadwell's emails (and possibly Petraeus'), but they also got their hands on and read through 20,000-30,000 pages of emails between Gen. Allen and Kelley. This is a surveillance state run amok. It also highlights how any remnants of internet anonymity have been all but obliterated by the union between the state and technology companies.
Therefore, no matter who you are, even if you are a decent and intelligent person, the system has all but guaranteed that you won't run for prominent public office. After all, if you have lived a real life, a meaningful life, you likely have at least a few skeletons in your closet. If you doubt this, go ahead and run for high political office and we'll see what falls out.

Continue ReadingSurveillance state run amok: Another reason most decent people won’t run for public office

Lavabit shuts down rather than comply with U.S. government coercion

From Democracy Now:

Lavabit, an encrypted email service believed to have been used by National Security Agency leaker Edward Snowden, has abruptly shut down. The move came amidst a legal fight that appeared to involve U.S. government attempts to win access to customer information. In a Democracy Now! broadcast exclusive, we are joined by Lavabit owner Ladar Levison and his lawyer, Jesse Binnall. "Unfortunately, I can’t talk about it. I would like to, believe me," Levison says. "I think if the American public knew what our government was doing, they wouldn’t be allowed to do it anymore." In a message to his customers last week, Levison said: "I have been forced to make a difficult decision: to become complicit in crimes against the American people, or walk away from nearly 10 years of hard work by shutting down Lavabit." Levison said he was barred from discussing the events over the past six weeks that led to his decision. Soon after, another secure email provider called Silent Circle also announced it was shutting down.

Continue ReadingLavabit shuts down rather than comply with U.S. government coercion

Foxes guarding the NSA henhouse

Stunning news by The Atlantic:

Last Friday, President Obama promised a review of current government surveillance practice by an independent group of outside experts. Turns out that the review group will be established by the Director of National Intelligence, James Clapper, who's come under fire from Congress for erroneously telling legislators that the U.S. doesn't "collect any type of data at all on millions or hundreds of million of Americans."

Continue ReadingFoxes guarding the NSA henhouse

I have nothing to hide . . .

You hear this so often: I have nothing to hide (so it's OK for the NSA to read my email). Really? What if they spy on you without any probable cause, find out that you possess drugs, then they turn this information over to the DEA, which pretends it didn't get this information from the NSA, then recreates the path necessary to put you in prison? Far fetched?

A secretive U.S. Drug Enforcement Administration unit is funneling information from intelligence intercepts, wiretaps, informants and a massive database of telephone records to authorities across the nation to help them launch criminal investigations of Americans. Although these cases rarely involve national security issues, documents reviewed by Reuters show that law enforcement agents have been directed to conceal how such investigations truly begin - not only from defense lawyers but also sometimes from prosecutors and judges. The undated documents show that federal agents are trained to "recreate" the investigative trail to effectively cover up where the information originated, a practice that some experts say violates a defendant's Constitutional right to a fair trial. If defendants don't know how an investigation began, they cannot know to ask to review potential sources of exculpatory evidence - information that could reveal entrapment, mistakes or biased witnesses.
What else could happen to those of you who have never committed a crime? How about identity theft? How about some NSA contractor stealing your passwords to your financial institutions? This is an agency with no accountability, with hundreds of thousands of employees with the technical ability to read all of your most private information. How about screwing up your computer as they search through it with the viruses they manufacture? Far Fetched? Why should we be concerned? Check out this video. http://www.huffingtonpost.com/2013/08/05/dea-surveillance-cover-up_n_3706207.html

Continue ReadingI have nothing to hide . . .