Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Security

Rss Feed Group items tagged

Paul Merrell

UN Backs Russia's War on US-Backed Syria Terrorists - 0 views

  • Russia’s diplomats have been as busy as Russia’s military.They have now obtained UN Security Council as well as Syrian government approval for Russia’s military campaign.They have also got the UN Security Council to scotch the myth of the “moderate jihadis” once and for all.Back in September, when it became clear the Russians were intending to act in Syria, Russia Insider predicted the Russians would try to get a Resolution from the UN Security Council to give additional legal cover for their military action.This is in contrast to the US, which avoids the Security Council whenever it can, and which usually prefers to act unilaterally without a UN Security Council mandate.Thus US bombing of the Islamic State in Syria was doubly illegal under international law because it was carried out without permission from either the UN Security Council or from the Syrian government.Russia's military action by contrast is completely legal. It has the permission of both the UN Security Council and the Syrian government for it.
  • It took weeks for the Russians to get their Security Council Resolution. This was because the US did everything it could to stand in the way. However, after weeks of hard work, Russia’s diplomats have finally got the Resolution Russia wanted.What changed the position was the terrorist outrage in Paris.  After the Paris attack the French backed Russia’s proposal for a UN Security Council Resolution. At that point the US could no longer block it. The US cannot veto a Resolution backed by its own ally France, especially in the immediate aftermath of a terrorist attack.Something that suggests some people in the US might be unhappy with this development is the absence from the Security Council table of one person who would normally be expected to be there for such an important vote.This was Samantha Power - the US’s UN ambassador - a hardline liberal interventionist and one of the most aggressive voices within the US administration calling for regime change in Syria and confrontation with Russia.  Her relations with Vitaly Churkin, Russia’s exceptionally able UN ambassador, are said to be poisonous (see the photo at the top of this article).It looks as if voting for the Resolution was more than Samantha Power could bear. That probably explains why she stayed away.  In her absence it was left to her deputy, Michele Sison - a career diplomat - to speak and vote for the US.  
  • The full text of the Resolution - which is not limited to Syria - is below.  The UN has also released - along with the full text of the Resolution - a summary of the debate in the Security Council that preceded the vote.The key words in the Resolution are these:
Paul Merrell

Documents Reveal N.S.A. Campaign Against Encryption - Document - NYTimes.com - 0 views

  • (U) HTTPS – HTTP traffic secured inside an SSL/TLS session, indicated by the https:// URL, commonly using TCP port 443 (U) IPSEC -- IPSec, or IP Security, is the Internet Engineering Task Force (IETF) standard for layer 3 real-time communication security. IPSec allows two hosts (or two gateways) to establish a secure connection, sometimes called a tunnel. All traffic is protected at the network layer. (U) SSH – Secure Shell. A common protocol used for secure remote computer access (U) SSL – Secure Sockets Layer. Commonly used to provide secure network communication. Widely used on the internet to provide secure web browsing, webmail, instant messaging, electronic commerce, etc. (U) TLS – Transport Layer Security. The follow-on to SSL, SSLv3 and TLSv1.0 are nearly identical. (U) VoIP – Voice over Internet Protocol. A general term for the using IP networks to make voice phone calls. The application layer protocol can be standards-based (e.g., H.323, SIP), or proprietary (e.g., Skype). (U) VPN – Virtual Private Network. A private network that makes use of the public telecommunications infrastructure, maintaining privacy via the use of a tunneling protocol and security procedures that typically include encryption. Common protocols include IPSEC and PPTP.
  •  
    An "example" non-exclusive list of encryption standards that the "patriots" at the NSA have compromised.  Select the "Bullrun Briefing Sheet" tab to view.
Paul Merrell

'This Week' Transcript: Ambassador Samantha Power - ABC News - 0 views

  • STEPHANOPOULOS: And we are joined now by the U.S. Ambassador to the United Nations Samantha Power. Thanks for coming back to This Week. And you know, the president said he's prepared to strike Syria. Those strikes could be imminent. Will the United States try to get UN Security Council authorization first? Or do you accept now that's just not going to be possible? SAMANTHA POWER, U.S. AMBASSADOR TO THE UNITED NATIONS: Well, let me say that Secretary Kerry just convened a meeting of the Security Council on Friday which showcased just how much support there is on the Security Council and in the broader international community for the anti-ISIL effort. STEPHANOPOULOS: But the Russia veto.
  • POWER: Russia has vetoed in the past, but on very different issues. I think Russia has made clear for a long time its opposition to ISIL. The Iraqis have appealed to the international community to come to their defense not only in Iraq, but also to go after safe havens in foreign countries. And what they mean by that of course is Syria. And they're quite explicit about that. So they have made an appeal to the international community for collective defense. And we think we have a legal basis we need if the president decides... STEPHANOPOULOS: Without a UN authorization. POWER: Consistent with the UN charter, we -- it will depend on the facts and circumstances of any particular strike in Syria, but we have a legal basis we need.
  •  
    Context: U.S. Ambassador to the U.N., Samantha Power, holds the U.N. Security Council's rotating chair this month. Powers'  claims a right for the U.S. to wage war against ISIL in Syria on grounds of the collective security exception to the U.N. Charter's prohibition; that is, that the U.S. has a collective security agreement with the nation of Iraq, that makes it lawful for the U.S. to strike ISIL. True enough as a matter of international law, ignoring the fact that Obama has yet to obtain permission from the U.S. Congress, which the U.S. Constitution requires him to do. But ISIL is not the nation of Syria; hence to attack ISIL in Syria, an additional exception is necessary for both Iraq and the U.S. The only other recognized exception that might seem to do deals with the situation when a nation in which a private organization inflicting harm on another nation  is "unwilling or unable" to protect the second nation (Iraq) from the depradations of the private organization. And that is where Powers' legal analysis dissembles because the U.S. has been actively attempting to overthrow the Syrian government via proxy terrorist organizations including ISIL. So the U.S. lacks clean hands in claiming any lawful right to invade Syria on the theory that the Syrian government is unwilling or unable to put down the ISIL organization. The Syrian government is certainly willing and has been attempting to do so. But its inability to do so thus far is entirely due to the U.S., its Gulf Coast state allies, and its ally Turkey continuing to supply ISIL and other terrorist groups in Syria with weapons, training, and supplies, aimed at overthrowing the Syrian government. The doctrine of unclean hands has limited applicability in international law governing human rights. See Lisa LaPlante, The Law of Remedies and the Clean Hands Doctrine: Exclusionary Reparation Policies in Peru's Political Transition, 23 Am Univ Int Law Rev 50 (2007), https://digitalcommons.wcl.american.edu/cg
Gary Edwards

Updated specs released for the Blackphone secure smartphone - 1 views

  •  
    Nice video. I want one! excerpt: "SGP Technologies has released updated tech specs for its Blackphone, a smartphone designed with user privacy in mind. The device was unveiled at Mobile World Congress in February as a secure smartphone for the mass market. It will feature an NVIDIA Tegra 4i mobile processor. The Tegra 4i processor is amongst the most powerful mobile processors available, running 60 custom GPU cores and a quad-core CPU. It clocks in at a top speed of 2.3 GHz, with 2 GB of RAM. The device has a fifth core for battery saving. The Blackphone runs PrivatOS, SGP's own custom operating system based on on the KitKat version of Android. Users are provided with 16 GB of internal memory and have the option of using additional microSD storage. It features an 8 MP camera on the rear and a 5 MP front-facing camera. It also has a 4.7 in HD display with a resolution of 1280 x 720. Users can purchase the phone unlocked for use on any network or can buy it through "selected partner carriers." A number of privacy tools will be pre-installed, such as secure voice and video calling, secure text messaging and encrypted storage of contacts. Anonymous search, private browsing, secure VPN connectivity and secure cloud storage are also featured. The first pre-sales run of the Blackphone is sold out, but more devices are expected to become available from June. The Blackphone is listed for US$629. The video below provides an introduction to the Blackphone."
Paul Merrell

Security Experts Oppose Government Access to Encrypted Communication - The New York Times - 0 views

  • An elite group of security technologists has concluded that the American and British governments cannot demand special access to encrypted communications without putting the world’s most confidential data and critical infrastructure in danger.A new paper from the group, made up of 14 of the world’s pre-eminent cryptographers and computer scientists, is a formidable salvo in a skirmish between intelligence and law enforcement leaders, and technologists and privacy advocates. After Edward J. Snowden’s revelations — with security breaches and awareness of nation-state surveillance at a record high and data moving online at breakneck speeds — encryption has emerged as a major issue in the debate over privacy rights.
  • That has put Silicon Valley at the center of a tug of war. Technology companies including Apple, Microsoft and Google have been moving to encrypt more of their corporate and customer data after learning that the National Security Agency and its counterparts were siphoning off digital communications and hacking into corporate data centers.
  • Yet law enforcement and intelligence agency leaders argue that such efforts thwart their ability to monitor kidnappers, terrorists and other adversaries. In Britain, Prime Minister David Cameron threatened to ban encrypted messages altogether. In the United States, Michael S. Rogers, the director of the N.S.A., proposed that technology companies be required to create a digital key to unlock encrypted data, but to divide the key into pieces and secure it so that no one person or government agency could use it alone.The encryption debate has left both sides bitterly divided and in fighting mode. The group of cryptographers deliberately issued its report a day before James B. Comey Jr., the director of the Federal Bureau of Investigation, and Sally Quillian Yates, the deputy attorney general at the Justice Department, are scheduled to testify before the Senate Judiciary Committee on the concerns that they and other government agencies have that encryption technologies will prevent them from effectively doing their jobs.
  • ...2 more annotations...
  • The new paper is the first in-depth technical analysis of government proposals by leading cryptographers and security thinkers, including Whitfield Diffie, a pioneer of public key cryptography, and Ronald L. Rivest, the “R” in the widely used RSA public cryptography algorithm. In the report, the group said any effort to give the government “exceptional access” to encrypted communications was technically unfeasible and would leave confidential data and critical infrastructure like banks and the power grid at risk. Handing governments a key to encrypted communications would also require an extraordinary degree of trust. With government agency breaches now the norm — most recently at the United States Office of Personnel Management, the State Department and the White House — the security specialists said authorities could not be trusted to keep such keys safe from hackers and criminals. They added that if the United States and Britain mandated backdoor keys to communications, China and other governments in foreign markets would be spurred to do the same.
  • “Such access will open doors through which criminals and malicious nation-states can attack the very individuals law enforcement seeks to defend,” the report said. “The costs would be substantial, the damage to innovation severe and the consequences to economic growth hard to predict. The costs to the developed countries’ soft power and to our moral authority would also be considerable.”
  •  
    Our system of government does not expect that every criminal will be apprehended and convicted. There are numerous values our society believes are more important. Some examples: [i] a presumption of innocence unless guilt is established beyond any reasonable doubt; [ii] the requirement that government officials convince a neutral magistrate that they have probable cause to believe that a search or seizure will produce evidence of a crime; [iii] many communications cannot be compelled to be disclosed and used in evidence, such as attorney-client communications, spousal communications, and priest-penitent communications; and [iv] etc. Moral of my story: the government needs a much stronger reason to justify interception of communications than saying, "some crooks will escape prosecution if we can't do that." We have a right to whisper to each other, concealing our communicatons from all others. Why does the right to whisper privately disappear if our whisperings are done electronically? The Supreme Court took its first step on a very slippery slope when it permitted wiretapping in Olmstead v. United States, 277 U.S. 438, 48 S. Ct. 564, 72 L. Ed. 944 (1928). https://goo.gl/LaZGHt It's been a long slide ever since. It's past time to revisit Olmstead and recognize that American citizens have the absolute right to communicate privately. "The President … recognizes that U.S. citizens and institutions should have a reasonable expectation of privacy from foreign or domestic intercept when using the public telephone system." - Brent Scowcroft, U.S. National Security Advisor, National Security Decision Memorandum 338 (1 September 1976) (Nixon administration), http://www.fas.org/irp/offdocs/nsdm-ford/nsdm-338.pdf   
Gary Edwards

Hussman Funds: Timothy Geithner Meets Vladimir Lenin - January 4, 2010 - 0 views

  • Rick Santelli of CNBC is exactly right. If this is how the U.S. government is going to operate in a democratic, free-market society, ‘we might as well put a hammer and sickle on the flag.'
  • Rick Santelli of CNBC is exactly right. If this is how the U.S. government is going to operate in a democratic, free-market society, ‘we might as well put a hammer and sickle on the flag.'
  • Rick Santelli of CNBC is exactly right. If this is how the U.S. government is going to operate in a democratic, free-market society, ‘we might as well put a hammer and sickle on the flag.'
  • ...12 more annotations...
  • “In effect, the Federal Reserve decided last week to overstep its legal boundaries – going beyond providing liquidity to the banking system and attempting to ensure the solvency of a non-bank entity. Specifically, the Fed agreed to provide a $30 billion “non-recourse loan” to J.P. Morgan, secured only by the worst tranche of Bear Stearns' mortgage debt. But the bank – J.P. Morgan – was in no financial trouble. Instead, it was effectively offered a subsidy by the Fed at public expense. Rick Santelli of CNBC is exactly right. If this is how the U.S. government is going to operate in a democratic, free-market society, ‘we might as well put a hammer and sickle on the flag.'
  • the Treasuries purchased by the Fed have always been accompanied directly or indirectly by revenue to the government that could be spent on behalf of its citizens for government programs that had the vote of Congress.
  • What has happened over the past two years is that the Federal Reserve has purchased about $1.25 trillion dollars in mortgage-backed securities issued by Fannie Mae and Freddie Mac – securities that the Treasury has now made an unlegislated (or at minimum, unintentionally legislated), bureaucratic decision to fully back.
  • Fiscal policy was always the domain of Congress alone.
  • Prior to 2008, the total amount of monetary base created in the history of the United States was about $800 billion.
  • the Treasury has committed to “allow the cap on Treasury's funding commitment under these agreements to increase as necessary to accommodate any cumulative reduction in net worth.”
  • In a sharp break from the past, the issuance of these Treasury securities will not be accompanied by any revenue to the government for Congressionally approved programs.
  • Every dollar of bad mortgage debt that should have been written off is now enshrined as two dollars of government-backed debt. One dollar as the original debt, which will now be made whole, and one dollar of new Treasury securities, which must be issued to make that original debt whole. Accordingly, the holders of both securities will have claims against our national assets and future wealth.
  • Rick Santelli of CNBC is exactly right. If this is how the U.S. government is going to operate in a democratic, free-market society, ‘we might as well put a hammer and sickle on the flag.'
  • Rick Santelli of CNBC is exactly right. If this is how the U.S. government is going to operate in a democratic, free-market society, ‘we might as well put a hammer and sickle on the flag.
  • “In effect, the Federal Reserve decided last week to overstep its legal boundaries – going beyond providing liquidity to the banking system and attempting to ensure the solvency of a non-bank entity. Specifically, the Fed agreed to provide a $30 billion “non-recourse loan” to J.P. Morgan, secured only by the worst tranche of Bear Stearns' mortgage debt. But the bank – J.P. Morgan – was in no financial trouble. Instead, it was effectively offered a subsidy by the Fed at public expense. Rick Santelli of CNBC is exactly right. If this is how the U.S. government is going to operate in a democratic, free-market society, ‘we might as well put a hammer and sickle on the flag.'
  • “The deal was made under duress, to the benefit of a private company, on the basis of financial assurances that the bureaucrats involved had no business making.
  •  
    the Fed is now engaging in unlegislated, back-door fiscal policy. excerpt:  "The best way to destroy the capitalist system is to debauch the currency." Vladimir Lenin, leader of the 1917 Russian Revolution Last week, while Congress and the nation were preoccupied with the holidays, the Treasury made a Christmas eve announcement that it would be providing Fannie Mae and Freddie Mac unlimited financial support for the next three years. Put simply, in a single, coordinated stroke, the Treasury and the Federal Reserve have encroached on spending powers that are enumerated for the Congress alone. Under the Housing and Economic Recovery Act of 2008 (HERA), the Treasury has no such open-ended authority. Indeed, the applicable portion of the Act explicitly limits the total amount of mortgage principal (not losses, but total principal) as follows: .......... In a sharp break from the past, the issuance of these Treasury securities will not be accompanied by any revenue to the government for Congressionally approved programs. The Treasuries will be issued, the money will be handed over the Fannie Mae and Freddie Mac, and those funds will go largely to the Federal Reserve and other holders of existing mortgage debt simply to replace the bad, but bailed-out agency securities with cash as they mature. The public gets nothing for something - the issuance of the Treasuries is in itself their expenditure.
Paul Merrell

Verizon's New, Encrypted Calling App Plays Nice With the NSA - Businessweek - 0 views

  • Verizon is the latest big company to enter the post-Snowden market for secure communication, and it's doing so with an encryption standard that comes with a way for law enforcement to access ostensibly secure phone conversations.Verizon Voice Cypher, the product introduced on Thursday with the encryption company Cellcrypt, offers business and government customers end-to-end encryption for voice calls on iOS, Android, or BlackBerry devices equipped with a special app. The encryption software provides secure communications for people speaking on devices with the app, regardless of their wireless carrier, and it can also connect to an organization's secure phone system. Cellcrypt and Verizon both say that law enforcement agencies will be able to access communications that take place over Voice Cypher, so long as they're able to prove that there's a legitimate law enforcement reason for doing so. Seth Polansky, Cellcrypt's vice president for North America, disputes the idea that building technology to allow wiretapping is a security risk. "It's only creating a weakness for government agencies," he says. "Just because a government access option exists, it doesn't mean other companies can access it." 
  • Phone carriers like Verizon are required by U.S. law to build networks that can be wiretapped. But the legislation known as the Communications Assistance for Law Enforcement Act requires phone carriers to decrypt communications for the government only if they have designed their technology to make it possible to do so. If Verizon and Cellcrypt had structured their encryption so that neither company had the information necessary to decrypt the calls, they would not have been breaking the law.
  • There has been increased interest in encryption from individual consumers, too, largely thanks to the NSA revelations leaked by Edward Snowden. Yahoo and Google began offering end-to-end encrypted e-mail services this year. Silent Circle, a startup catering to consumer and enterprise clients, has been developing end-to-end voice encryption for phones calls. Verizon's service, with a monthly price of $45 per device, isn't targeting individual buyers and won't be offered to average consumers in the near future.But Verizon's partner, Cellcrypt, looks upon selling to large organizations as the first step toward bringing down the price before eventually offering a consumer-level encryption service. "At the end of the day, we'd love to have this be a line item on your Verizon bill," says Polansky.
  • ...2 more annotations...
  • Other companies have designed their encryption in this way, including AT&T, which offers encrypted phone service for business customers. Apple and Android recently began protecting content stored on users's phones in a way that would keep the tech companies from being able to comply with requests from law enforcement. The move drew public criticism from FBI Director James Comey, and some security experts expect that a renewed effort to stir passage of legislation banning such encryption will accompany Silicon Valley's increased interest in developing these services. Verizon believes major demand for its new encryption service will come from governmental agencies conveying sensitive but unclassified information over the phone, says Tim Petsky, a senior product manager for Verizon Wireless. Corporate customers who are concerned about corporate espionage are also itching for answers. "You read about breaches in security almost every week in the press," says Petsky. "Enterprise customers have been asking about ways to secure their communications and up until this point, we didn't have a solution." 
  • Many people in the security industry believe that a designed access point creates a vulnerability for criminals or spies to exploit. Last year reports surfaced that the FBI was pushing legislation that would require many forms of Internet communication to be wiretap-ready. A group of prominent security experts responded strongly: "Requiring software vendors to build intercept functionality into their products is unwise and will be ineffective, with the result being serious consequences (PDF) for the economic well-being and national security of the United States," they wrote in a report issued in May. 
Gary Edwards

Benghazi report: Trinkets of treason - 1 views

  •  
    The truth is dribbling out, thn=anks to Douglas J. Hagmann and Canada Free Press .....................  We've been aligned and hostage to the Saudi Royal Family ever since FDR met with King Ibn Saud, Feb 14th, 1945 near the end of WWII.  It was at this meeting that FDR promised protection for the Saudi family in exchange for the right to develop Saudi oil and sell that oil exclusively in dollars.  Hence the "petro dollar" - backed by Saudi oil instead of GOLD. That agreement, and our subsequent history of our military and state departments acting to further Saudi interests has dominated America.  Our troops and military resources ae mercenaries fighting for Saudi dominance of the Globalist ruling elites.  Our politicians are bought and paid for by the Saudi Globalist Alliance.  They have sold their souls for power and money, with the destruction of the USA Constitution the only thing standing between the Globalist and their quest to rule the world. excerpt: We are witnessing one of the biggest government cover-ups since Watergate. A cover-up that involves murder, arms trafficking, and lies by high ranking officials under oath. It involves the murderous attacks in Benghazi, and congressional investigators just released a 46-page interim progress report that at least exposes Hillary Rodham Clinton and the White House lying under oath. Where's the accountability? Where's the outrage? Where's the media? A 46-page interim progress report of an ongoing investigation across five House Committees by the U.S. House of Representatives was released on Tuesday, April 23, 2013. The executive summary states that former Secretary of State Hillary Rodham Clinton signed off on a reduction of diplomatic security forces suggesting that this reduction of security was, in large part, to blame for the attack in Benghazi on September 11, 2012.  The report emphasizes that this is "inconsistent" with her sworn testimony of January 23, 2013. Simply stated, Hillary Rod
Gary Edwards

BENGHAZI - THE BIGGEST COVER-UP SCANDAL IN U.S. HISTORY? - WAS BENGHAZI A CIA GUN-RUNNI... - 0 views

  •  
    "LibertyNEWS.com - Editorial Team Special Report It's never fun to admit you've been lied to and duped. There is no comfort in realizing a high-level group in government has conned you. The wound created from such a realization would be deep and painful when paired with extraordinary insult when you realize the cons are people you not only trusted, but people who are tasked with protecting your rights, your liberty, your life. When these people betray you, you're in trouble - big trouble. Unfortunately, we believe America is being betrayed by powerful individuals tasked with our protection. These people are found in the White House, the Congress, the CIA and other government entities - and they're lying to you. Then they're covering it up on an epic scale, in a never-before-seen manner. Here are the basics of what the schemers in government and the complicit media would like for us all to focus on and buy into: Why wasn't there better security at the consulate (keep this misleading word in mind) in Benghazi? Why didn't authorization come to move special forces in for protection and rescue? Why was an obscure video blamed when everyone knew the video had nothing to do with it? Did Obama's administration cover-up the true nature of the attacks to win an election? Truth is, as we're starting to believe, the above questions are convenient, tactical distractions. And truth is, answers to these questions, if they ever come, will never lead to revelations of the REAL TRUTH and meaningful punishment of anyone found responsible. Rep. Darrell Issa knows this, members of the House Committee investigating the Benghazi attacks know this, the White House knows this, and much of the big corporate media infrastructure knows it, too. How do they know it? Because they know the truth. They know the truth, but cannot and/or will not discuss it in public. Here are the basics that we (America, in general) should be focusing on, but aren't: Why do media
Paul Merrell

E-Mails Show Flaws in JPMorgan's Mortgage Securities - NYTimes.com - 0 views

  • When an outside analysis uncovered serious flaws with thousands of home loans, JPMorgan Chase executives found an easy fix. Rather than disclosing the full extent of problems like fraudulent home appraisals and overextended borrowers, the bank adjusted the critical reviews, according to documents filed early Tuesday in federal court in Manhattan. As a result, the mortgages, which JPMorgan bundled into complex securities, appeared healthier, making the deals more appealing to investors.
  • The trove of internal e-mails and employee interviews, filed as part of a lawsuit by one of the investors in the securities, offers a fresh glimpse into Wall Street’s mortgage machine, which churned out billions of dollars of securities that later imploded. The documents reveal that JPMorgan, as well as two firms the bank acquired during the credit crisis, Washington Mutual and Bear Stearns, flouted quality controls and ignored problems, sometimes hiding them entirely, in a quest for profit.
  • The lawsuit, which was filed by Dexia, a Belgian-French bank, is being closely watched on Wall Street. After suffering significant losses, Dexia sued JPMorgan and its affiliates in 2012, claiming it had been duped into buying $1.6 billion of troubled mortgage-backed securities. The latest documents could provide a window into a $200 billion case that looms over the entire industry. In that lawsuit, the Federal Housing Finance Agency, which oversees Fannie Mae and Freddie Mac, has accused 17 banks of selling dubious mortgage securities to the two housing giants. At least 20 of the securities are also highlighted in the Dexia case, according to an analysis of court records.
  • ...3 more annotations...
  • Dexia’s lawsuit is part of a broad assault on Wall Street for its role in the 2008 financial crisis, as prosecutors, regulators and private investors take aim at mortgage-related securities. New York’s attorney general, Eric T. Schneiderman, sued JPMorgan last year over investments created by Bear Stearns between 2005 and 2007.
  • The Dexia lawsuit centers on complex securities created by JPMorgan, Bear Stearns and Washington Mutual during the housing boom. As profits soared, the Wall Street firms scrambled to pump out more investments, even as questions emerged about their quality.
  • In a statement shortly after he sued JPMorgan Chase, Mr. Schneiderman said the lawsuit was a template “for future actions against issuers of residential mortgage-backed securities that defrauded investors and cost millions of Americans their homes.”
Paul Merrell

UK Cryptographers Call For Publication of Deliberately Weakened Protocols, Products | T... - 0 views

  • A group of cryptographers in the UK has published a letter that calls on authorities in that country and the United States to conduct an investigation to determine which security products, protocols and standards have been deliberately weakened by the countries’ intelligence services. The letter, signed by a number of researchers from the University of Bristol and other universities, said that the NSA and British GCHQ “have been acting against the interests of the public that they are meant to serve.” The appeal comes a couple of weeks after leaked documents from the NSA and its UK counterpart, Government Communications Headquarters, showed that the two agencies have been collaborating on projects that give them the ability to subvert encryption protocols and also have been working with unnamed security vendors to insert backdoors into hardware and software products. Security experts have been debating in recent weeks which products, standards and protocols may have been deliberately weakened, but so far no information has been forthcoming.
  • “By weakening cryptographic standards, in as yet undisclosed ways, and by inserting weaknesses into products which we all rely on to secure critical infrastructure, we believe that the agencies have been acting against the interests of the public that they are meant to serve. We find it shocking that agencies of both the US and UK governments now stand accused of undermining the systems which protect us. By weakening all our security so that they can listen in to the communications of our enemies, they also weaken our security against our potential enemies,” the letter says.
  • Published on Monday, the letter is signed by cryptographers from the University of Bristol, University of London, University of Birmingham, University of Luxembourg, University of Southampton, University of Surrey, University of Kent, Newcastle University and University College London. In it, the researchers call on the relevant authorities to publicly name the products and standards that have been weakened in order to inform users which systems they should avoid. “We call on the relevant parties to reveal what systems have been weakened so that they can be repaired, and to create a proper system of oversight with well-defined public rules that clearly forbid weakening the security of civilian systems and infrastructures. The statutory Intelligence and Security Committee of the House of Commons needs to investigate this issue as a matter of urgency. In the modern information age we all need to have complete trust in the basic infrastructure that we all use,” the letter says.
  • ...1 more annotation...
  • In the weeks since the documents detailing the NSA’s cryptographic capabilities emerged, further details about exactly which protocols the agency can attack successfully and which standards it may have influenced have been scarce. NIST, the U.S. agency that develops technical standards for cryptography, among other things, as denied accusations that the NSA was able to weaken some of the NIST standards. However, at the same time, NIST officials have issued a recommendation that people no longer use one of the encryption standards it previously published.
Paul Merrell

Exclusive: Secret contract tied NSA and security industry pioneer | Reuters - 0 views

  • (Reuters) - As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned. Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products.Undisclosed until now was that RSA received $10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.
  • The earlier disclosures of RSA's entanglement with the NSA already had shocked some in the close-knit world of computer security experts. The company had a long history of championing privacy and security, and it played a leading role in blocking a 1990s effort by the NSA to require a special chip to enable spying on a wide range of computer and communications products.
  • The RSA deal shows one way the NSA carried out what Snowden's documents describe as a key strategy for enhancing surveillance: the systematic erosion of security tools. NSA documents released in recent months called for using "commercial relationships" to advance that goal, but did not name any security companies as collaborators.
  • ...2 more annotations...
  • The NSA came under attack this week in a landmark report from a White House panel appointed to review U.S. surveillance policy. The panel noted that "encryption is an essential basis for trust on the Internet," and called for a halt to any NSA efforts to undermine it.
  • From RSA's earliest days, the U.S. intelligence establishment worried it would not be able to crack well-engineered public key cryptography. Martin Hellman, a former Stanford researcher who led the team that first invented the technique, said NSA experts tried to talk him and others into believing that the keys did not have to be as large as they planned.
  •  
    Reuters gives the NSA's history of introducing backdoors in encryption standards a deep look, focusing on RSA's acceptance of a $10 million NSA bribe post-9/11 to implement the NSA-created Dual Elliptic Curve standard for generating "random" numbers, which had what Bruce Schneier described as a "back door." A tip of the hat to Miro for alerting me to this article.
Paul Merrell

Lavabit To Release Code As Open Source, As It Creates Dark Mail Alliance To Create Even... - 0 views

  • This whole morning, while all these stories of the NSA hacking directly into Google and Yahoo's network have been popping up, I've been at the Inbox Love conference, all about the future of email. The "keynote" that just concluded, was Ladar Levison from Lavabit (with an assist from Mike Janke from Silent Circle), talking about the just announced Dark Mail Alliance, between Lavabit and Silent Circle -- the other "security" focused communications company who shut down its email offering after Lavabit was forced to shut down. Levison joked that they went with "Dark Mail" because "Black Mail" might have negative connotations. Perhaps just as interesting, Levison is going to be releasing the Lavabit source code (and doing a Kickstarter project to support this), with the hope that many others can set up their own secure email using Lavabit's code, combined with the new Dark Mail Alliance secure technology which will be available next year. As noted, the Alliance is working on trying to create truly secure and surveillance-proof email. Of course, nothing is ever 100% surveillance proof -- and both members of the alliance have previously claimed that it was almost impossible to do surveillance-proof email. However, they're claiming they've had a "breakthrough" that will help.
  • The newly developed technology has been designed to look just like ordinary email, with an interface that includes all the usual folders—inbox, sent mail, and drafts. But where it differs is that it will automatically deploy peer-to-peer encryption, so that users of the Dark Mail technology will be able to communicate securely. The encryption, based on a Silent Circle instant messaging protocol called SCIMP, will apply to both content and metadata of the message and attachments. And the secret keys generated to encrypt the communications will be ephemeral, meaning they are deleted after each exchange of messages. For the NSA and similar surveillance agencies across the world, it will sound like a nightmare. The technology will thwart attempts to sift emails directly from Internet cables as part of so-called “upstream” collection programs and limit the ability to collect messages directly from Internet companies through court orders. Covertly monitoring encrypted Dark Mail emails would likely have to be done by deploying Trojan spyware on a targeted user. If every email provider in the world adopted this technology for all their users, it would render dragnet interception of email messages and email metadata virtually impossible.
  • Importantly, they're not asking everyone to just trust them to be secure -- even though both companies have the right pedigree to deserve some level of trust. Instead, they're going to release the source code for public scrutiny and audits, and they're hoping that other email providers will join the alliance. At the conference, Levison recounted much of what's happened over the last few months (with quite a bit of humor), joking about how he tried to be "nice" in giving the feds Lavabit's private keys printed out, by noting that he included line numbers to help (leaving unsaid that this would make OCR'ing the keys even more difficult). He also admitted that giving them the paper version was really just a way to buy time to shut down Lavabit.
  • ...1 more annotation...
  • Janke came up on stage to talk about the importance of changing the 40-year-old architecture of email, because it's just not designed for secure communications. The hope is that as many other email providers as possible will join the Alliance and that this new setup becomes the de facto standard for end-to-end secure email, which is where Levison's open sourcing of his code gets more interesting. In theory, if it all works out, it could be a lot easier for lots of companies to set up their own "dark mail" email providers. Either way, I would imagine that this development can't make the NSA all that happy.
  •  
    Oh, Goody!
Paul Merrell

Spy Chief James Clapper Wins Rosemary Award - 0 views

  • Director of National Intelligence James Clapper has won the infamous Rosemary Award for worst open government performance in 2013, according to the citation published today by the National Security Archive at www.nsarchive.org. Despite heavy competition, Clapper's "No, sir" lie to Senator Ron Wyden's question: "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" sealed his receipt of the dubious achievement award, which cites the vastly excessive secrecy of the entire U.S. surveillance establishment. The Rosemary Award citation leads with what Clapper later called the "least untruthful" answer possible to congressional questions about the secret bulk collection of Americans' phone call data. It further cites other Clapper claims later proved false, such as his 2012 statement that "we don't hold data on U.S. citizens." But the Award also recognizes Clapper's fellow secrecy fetishists and enablers, including:
  • Gen. Keith Alexander, director of the NSA, for multiple Rose Mary Woods-type stretches, such as (1) claiming that the secret bulk collection prevented 54 terrorist plots against the U.S. when the actual number, according to the congressionally-established Privacy and Civil Liberties Oversight Board (PCLOB) investigation (pp. 145-153), is zero; (2) his 2009 declaration to the wiretap court that multiple NSA violations of the court's orders arose from differences over "terminology," an explanation which the chief judge said "strains credulity;" and (3) public statements by the NSA about its programs that had to be taken down from its website for inaccuracies (see Documents 78, 85, 87 in The Snowden Affair), along with public statements by other top NSA officials now known to be untrue (see "Remarks of Rajesh De," NSA General Counsel, Document 53 in The Snowden Affair).
  • Robert Mueller, former FBI director, for suggesting (as have Gen. Alexander and many others) that the secret bulk collection program might have been able to prevent the 9/11 attacks, when the 9/11 Commission found explicitly the problem was not lack of data points, but failing to connect the many dots the intelligence community already had about the would-be hijackers living in San Diego. The National Security Division lawyers at the Justice Department, for misleading their own Solicitor General (Donald Verrilli) who then misled (inadvertently) the U.S. Supreme Court over whether Justice let defendants know that bulk collection had contributed to their prosecutions. The same National Security Division lawyers who swore under oath in the Electronic Frontier Foundation's Freedom of Information Act lawsuit for a key wiretap court opinion that the entire text of the opinion was appropriately classified Top Secret/Sensitive Compartmented Information (release of which would cause "exceptionally grave damage" to U.S. national security). Only after the Edward Snowden leaks and the embarrassed governmental declassification of the opinion did we find that one key part of the opinion's text simply reproduced the actual language of the 4th Amendment to the U.S. Constitution, and the only "grave damage" was to the government's false claims.
  • ...9 more annotations...
  • President Obama for his repeated misrepresentations about the bulk collection program (calling the wiretap court "transparent" and saying "all of Congress" knew "exactly how this program works") while in effect acknowledging the public value of the Edward Snowden leaks by ordering the long-overdue declassification of key documents about the NSA's activities, and investigations both by a special panel and by the Privacy and Civil Liberties Oversight Board. The PCLOB directly contradicted the President, pointing out that "when the only means through which legislators can try to understand a prior interpretation of the law is to read a short description of an operational program, prepared by executive branch officials, made available only at certain times and locations, which cannot be discussed with others except in classified briefings conducted by those same executive branch officials, legislators are denied a meaningful opportunity to gauge the legitimacy and implications of the legal interpretation in question. Under such circumstances, it is not a legitimate method of statutory construction to presume that these legislators, when reenacting the statute, intended to adopt a prior interpretation that they had no fair means of evaluating." (p. 101)
  • Even an author of the Patriot Act, Rep. Jim Sensenbrenner (R-WI), was broadsided by the revelation of the telephone metadata dragnet. After learning of the extent of spying on Americans that his Act unleashed, he wrote that the National Security Agency "ignored restrictions painstakingly crafted by lawmakers and assumed plenary authority never imagined by Congress" by cloaking its actions behind the "thick cloud of secrecy" that even our elected representatives could not breech. Clapper recently conceded to the Daily Beast, "I probably shouldn't say this, but I will. Had we been transparent about this [phone metadata collection] from the outset … we wouldn't have had the problem we had." The NSA's former deputy director, John "Chris" Inglis, said the same when NPR asked him if he thought the metadata dragnet should have been disclosed before Snowden. "In hindsight, yes. In hindsight, yes." Speaking about potential (relatively minimal) changes to the National Security Agency even the president acknowledged, "And all too often new authorities were instituted without adequate public debate," and "Given the unique power of the state, it is not enough for leaders to say: Trust us. We won't abuse the data we collect. For history has too many examples when that trust has been breached." (Exhibit A, of course, is the NSA "watchlist" in the 1960's and 1970's that targeted not only antiwar and civil rights activists, but also journalists and even members of Congress.)
  • The Archive established the not-so-coveted Rosemary Award in 2005, named after President Nixon's secretary, Rose Mary Woods, who testified she had erased 18-and-a-half minutes of a crucial Watergate tape — stretching, as she showed photographers, to answer the phone with her foot still on the transcription pedal. Bestowed annually to highlight the lowlights of government secrecy, the Rosemary Award has recognized a rogue's gallery of open government scofflaws, including the CIA, the Treasury Department, the Air Force, the FBI, the Federal Chief Information Officers' Council, and the career Rosemary leader — the Justice Department — for the last two years. Rosemary-winner James Clapper has offered several explanations for his untruthful disavowal of the National Security Agency's phone metadata dragnet. After his lie was exposed by the Edward Snowden revelations, Clapper first complained to NBC's Andrea Mitchell that the question about the NSA's surveillance of Americans was unfair, a — in his words — "When are you going to stop beating your wife kind of question." So, he responded "in what I thought was the most truthful, or least untruthful, manner by saying 'no.'"
  • After continuing criticism for his lie, Clapper wrote a letter to Chairman of the Senate Select Committee on Intelligence Dianne Feinstein, now explaining that he misunderstood Wyden's question and thought it was about the PRISM program (under Section 702 of the Foreign Intelligence Surveillance Act) rather than the telephone metadata collection program (under Section 215 of the Patriot Act). Clapper wrote that his staff "acknowledged the error" to Senator Wyden soon after — yet he chose to reject Wyden's offer to amend his answer. Former NSA senior counsel Joel Brenner blamed Congress for even asking the question, claiming that Wyden "sandbagged" Clapper by the "vicious tactic" of asking "Does the NSA collect any type of data at all on millions or hundreds of millions of Americans?" Meanwhile, Steve Aftergood of the Federation of American Scientists countered that "it is of course wrong for officials to make false statements, as DNI Clapper did," and that in fact the Senate Intelligence Committee "became complicit in public deception" for failing to rebut or correct Clapper's statement, which they knew to be untruthful. Clapper described his unclassified testimony as a game of "stump the chump." But when it came to oversight of the National Security Agency, it appears that senators and representatives were the chumps being stumped. According to Representative Justin Amash (R-Mich), the House Intelligence Committee "decided it wasn't worthwhile to share this information" about telephone metadata surveillance with other members of Congress. Classified briefings open to the whole House were a "farce," Amash contended, often consisting of information found in newspapers and public statutes.
  • The Emmy and George Polk Award-winning National Security Archive, based at the George Washington University, has carried out thirteen government-wide audits of FOIA performance, filed more than 50,000 Freedom of Information Act requests over the past 28 years, opened historic government secrets ranging from the CIA's "Family Jewels" to documents about the testing of stealth aircraft at Area 51, and won a series of historic lawsuits that saved hundreds of millions of White House e-mails from the Reagan through Obama presidencies, among many other achievements.
  • Director Clapper joins an undistinguished list of previous Rosemary Award winners: 2012 - the Justice Department (in a repeat performance, for failure to update FOIA regulations for compliance with the law, undermining congressional intent, and hyping its open government statistics) 2011- the Justice Department (for doing more than any other agency to eviscerate President Obama's Day One transparency pledge, through pit-bull whistleblower prosecutions, recycled secrecy arguments in court cases, retrograde FOIA regulations, and mixed FOIA responsiveness) 2010 - the Federal Chief Information Officers' Council (for "lifetime failure" to address the crisis in government e-mail preservation) 2009 - the FBI (for having a record-setting rate of "no records" responses to FOIA requests) 2008 - the Treasury Department (for shredding FOIA requests and delaying responses for decades) 2007 - the Air Force (for disappearing its FOIA requests and having "failed miserably" to meet its FOIA obligations, according to a federal court ruling) 2006 - the Central Intelligence Agency (for the biggest one-year drop-off in responsiveness to FOIA requests yet recorded).   ALSO-RANS The Rosemary Award competition in 2013 was fierce, with a host of government contenders threatening to surpass the Clapper "least untruthful" standard. These secrecy over-achievers included the following FOI delinquents:
  • Admiral William McRaven, head of the Special Operations Command for the raid that killed Osama Bin Laden, who purged his command's computers and file cabinets of all records on the raid, sent any remaining copies over to CIA where they would be effectively immune from the FOIA, and then masterminded a "no records" response to the Associated Press when the AP reporters filed FOIA requests for raid-related materials and photos. If not for a one-sentence mention in a leaked draft inspector general report — which the IG deleted for the final version — no one would have been the wiser about McRaven's shell game. Subsequently, a FOIA lawsuit by Judicial Watch uncovered the sole remaining e-mail from McRaven ordering the evidence destruction, in apparent violation of federal records laws, a felony for which the Admiral seems to have paid no price. Department of Defense classification reviewers who censored from a 1962 document on the Cuban Missile Crisis direct quotes from public statements by Soviet Premier Nikita Khrushchev. The quotes referred to the U.S. Jupiter missiles in Turkey that would ultimately (and secretly) be pulled out in exchange for Soviet withdrawal of its missiles in Cuba. The denials even occurred after an appeal by the National Security Archive, which provided as supporting material the text of the Khrushchev statements and multiple other officially declassified documents (and photographs!) describing the Jupiters in Turkey. Such absurd classification decisions call into question all of the standards used by the Pentagon and the National Declassification Center to review historical documents.
  • Admiral William McRaven memo from May 13, 2011, ordering the destruction of evidence relating to the Osama bin Laden raid. (From Judicial Watch)
  • The Department of Justice Office of Information Policy, which continues to misrepresent to Congress the government's FOIA performance, while enabling dramatic increases in the number of times government agencies invoke the purely discretionary "deliberative process" exemption. Five years after President Obama declared a "presumption of openness" for FOIA requests, Justice lawyers still cannot show a single case of FOIA litigation in which the purported new standards (including orders from their own boss, Attorney General Eric Holder) have caused the Department to change its position in favor of disclosure.
Paul Merrell

CSIS asked foreign agencies to spy on Canadians, kept court in dark, judge says - 0 views

  • OTTAWA — Canada’s foremost jurist on national security law has slammed CSIS for deliberately keeping the Federal Court of Canada “in the dark” about outsourcing its spying on Canadians abroad to foreign agencies, according to a redacted version of a classified court decision made public Friday.In a thundering rebuke, Federal Court Judge Richard Mosley said the Canadian Security Intelligence Service (CSIS) purposely misled him when he granted it numerous warrants beginning in 2009 to intercept the electronic communications of unidentified Canadians abroad suspected as domestic security threats.“This was a breach of the duty of candour owed by the service and their legal advisers to the court,” Mosley said in his Further Reasons for Order.CSIS also mistakenly assigned powers to the warrants that the court never authorized and which do not exist in law, he said.“It is clear that the exercise of the court’s warrant issuing authority has been used as protective cover for activities that it has not authorized,” Mosley wrote.Furthermore, tasking foreign security intelligence services to spy on Canadians overseas “carries the risk of the detention of or other harm to a Canadian person based on that information.“Given the unfortunate history of information sharing with foreign agencies over the past decade and the reviews conducted by several royal commissions, there can be no question that the Canadian agencies are aware of those hazards. It appears to me that they are using the warrants as authorization to assume those risks.”
  • Legal observers say this case and Mosley’s scolding will harm CSIS’s credibility and raise questions about whether the service has broken Criminal Code provisions dealing with the invasion of privacy.“When a judge says the government breached its duty of candour that is a very big ‘ouch’ moment,” Craig Forcese, a national security law scholar at the University of Ottawa, wrote in a recent blog posting.At the time the first warrants were issued, CSIS told the court “on clearly stated grounds” that the electronic intercepts would be carried out from within Canada by the Communications Security Establishment Canada (CSEC), the country’s foreign signals intelligence spy service.CSIS is largely restricted to domestic spying operations. If an investigation involves the use of intrusive techniques, such as electronic intercepts, Section 21 of the CSIS Act requires it to obtain a warrant approved by a Federal Court judge to guard the Charter right to a reasonable expectation of privacy.CSEC, meanwhile, is not allowed to spy on Canadians anywhere unless it is to provide technical and operational assistance to federal law enforcement and security agencies such as CSIS.And the federal court only has jurisdiction to authorize warrants under the CSIS Act as long as the communications in question are intercepted within Canada.
  • Yet once the so-called 30-08 warrants were approved by the court, CSEC, on behalf of CSIS, turned around and handed the jobs to one or more of its partners in the “Five Eyes” intelligence-gathering alliance between Canada, the United States, Great Britain, Australia and New Zealand.Mosley found out about the situation late this summer and summoned CSIS, CSEC and government officials and lawyers to court to explain themselves. The public version of his reasons for order was released Friday.
  • ...2 more annotations...
  • Some excerpts:• “I am satisfied that a decision was made by CSIS officials in consultation with their legal advisers to strategically omit information in applications for 30-08 warrants about their intention to seek the assistance of the foreign partners. As a result, the court was led to believe that all of the interception activity would take place in or under the control of Canada.”• “The principle of comity between nations that implies the acceptance of foreign laws and procedures when Canadian officials are operating abroad ends where clear violations of international law and human rights begin. In tasking the other members of the Five Eyes to intercept the communications of the Canadian targets, CSIS and CSEC officials knew ... this would involve the breach of international law by the requested second parties.”• “There is nothing in any of the material that I have read ... that persuades me that it was the intent of Parliament to give the service authority to engage the collection resources of the second party allies to intercept the private communications of Canadians.”• “It must be made clear, in any grant of a 30-08 warrant, that the warrant does not authorize the interception of the communications of a Canadian person by any foreign service on behalf of the service either directly or through the assistance of CSEC.”• “There must be no further suggestion in any reference to the use of second party assets by CSIS and CSEC, or their legal advisers, that it is being done under the authority of a (section) 21 warrant issued by this court.”
  • Forcese, meanwhile, raises some intriguing questions:• If Five Eyes assistance was not authorized, and CSEC and CSIS nevertheless sought it, are they still protected from Criminal Code, Part VI (invasion of privacy) culpability? Culpability, he writes, is only avoided where the intercept is lawfully authorized. If the parameters of the warrant were disregarded, does that vitiate the lawful access?• If CSEC and CSIS called on Five Eyes agencies to intercept communications, was the intercept still territorial, thus satisfying the international law concerns raised in the two warrant applications?“Outsourcing an international violation does not diminish state responsibility for that international violation. In a different context, that would be like asking bounty hunters to do your kidnapping of fugitives on the territory of a foreign state. Still a violation of international law.”CSIS has a choice, Forcese concludes: “Conduct extraterritorial spying without recourse to the courts, at risk of ultimately being called to account under domestic law, or honour the federal court’s construal of international law — and CSIS’s jurisdiction — and pull in its truly international surveillance operations, potentially blinding the country’s chief security intelligence agency.
  •  
    Canadian Security Intelligence Service is in politically explosive deep doo-doo. 
Paul Merrell

NSA Spying Inspires ProtonMail 'End-to-End' Encrypted Email Service | NDTV Gadgets - 0 views

  • ne new email service promising "end-to-end" encryption launched on Friday, and others are being developed while major services such as Google Gmail and Yahoo Mail have stepped up security measures.A major catalyst for email encryption were revelations about widespread online surveillance in documents leaked by Edward Snowden, the former National Security Agency contractor."A lot of people were upset with those revelations, and that coalesced into this effort," said Jason Stockman, a co-developer of ProtonMail, a new encrypted email service which launched Friday with collaboration of scientists from Harvard, the Massachusetts Institute of Technology and the European research lab CERN.Stockman said ProtonMail aims to be as user-friendly as the major commercial services, but with extra security, and with its servers located in Switzerland to make it more difficult for US law enforcement to access.
  • "Our vision is to make encryption and privacy mainstream by making it easy to use," Stockman told AFP. "There's no installation. Everything happens behind the scenes automatically."Even though email encryption using special codes or keys, a system known as PGP, has been around for two decades, "it was so complicated," and did not gain widespread adoption, Stockman said.After testing over the past few months, ProtonMail went public Friday using a "freemium" model a basic account will be free with some added features for a paid account.
  • As our users from China, Iran, Russia, and other countries around the world have shown us in the past months, ProtonMail is an important tool for freedom of speech and we are happy to finally be able to provide this to the whole world," the company said in a blog post.Google and Yahoo recently announced efforts to encrypt their email communications, but some specialists say the effort falls short."These big companies don't want to encrypt your stuff because they spy on you, too," said Bruce Schneier, a well-known cryptographer and author who is chief technology officer for CO3 Systems."Hopefully, the NSA debate is creating incentives for people to build more encryption."Stockman said that with services like Gmail, even if data is encrypted, "they have the key right next to it if you have the key and lock next to each other, so it's pretty much useless."
  • ...3 more annotations...
  • By locating in Switzerland, ProtonMail hopes to avoid the legal woes of services like Lavabit widely believed to be used by Snowden which shut down rather than hand over data to the US government, and which now faces a contempt of court order.Even if a Swiss court ordered data to be turned over, Stockman said, "we would hand over piles of encrypted data. We don't have a key. We never see the password."
  • Lavabit founder Ladar Levison meanwhile hopes to launch a new service with other developers in a coalition known as the "Dark Mail Alliance."Levison told AFP he hopes to have a new encrypted email system in testing within a few months and widely available later this year."The goal is to make it ubiquitous, so people don't have to turn it on," he said.But he added that the technical hurdles are formidable, because the more user-friendly the system becomes, "the more susceptible it is to a sophisticated attacker with fake or spoofed key information."Levison said he hopes Dark Mail will become a new open standard that can be adopted by other email services.
  • on Callas, a cryptographer who developed the PGP standard and later co-founded the secure communications firm Silent Circle, cited challenges in making a system that is both secure and ubiquitous."If you are a bank you have to have an email system that complies with banking regulations," Callas told AFP, which could allow, for example, certain emails to be subject to regulatory or court review."Many of the services on the Internet started with zero security. We want to start with a system that is totally secure and let people dial it down."The new email system would complement Silent Circle's existing secure messaging system and encrypted mobile phone, which was launched earlier this year."If we start competing for customers on the basis of maximum privacy, that's good for everybody," Callas said.
  •  
    They're already so swamped that you have to reserve your user name and wait for an invite. They say they have to add servers. Web site is at https://protonmail.ch/ "ProtonMail works on all devices, including desktops, laptops, tablets, and smartphones. It's as simple as visiting our site and logging in. There are no plugins or apps to install - simply use your favorite web browser." "ProtonMail works on all devices, including desktops, laptops, tablets, and smartphones.
Paul Merrell

Israel wants to "Settle Israeli Sovereignty over Syrian Golan Heights" | nsnbc internat... - 0 views

  • Israel’s Foreign Minister, Avigdor Lieberman, has publicly called for “settling the Israeli sovereignty over the Golan Heights within the framework of the Israeli – Palestinian negotiations” adding that “part of this comprehensive bargain has to cover an understanding between Israel, the international community and the USA” and adding that “the Golan is part and parcel with Israel”.
  • The statement prompted a response by the Syrian government to the UN Secretary General and the President of the Security Council. The statement confirms information nsnbc received from a Palestinian intelligence expert in 2011 and 2012, who warned that Israel plans to permanently annex the Golan, parts of southern Lebanon and most of the West Bank, while planning to recognize a Palestinian State in the Gaza Strip plus micro enclaves in the West Bank. The statement also substantiates Christof Lehmann’s warnings about joint Israeli – US plans to that effect, issued in 2011, after the 66th Session of the UN General Assembly. During the 66th Session, US President Obama refused to recognize Palestine as a State, saying that “a solution for Palestine only could be found within the framework of a comprehensive solution for the Middle East“.
  • On Wednesday, the Syrian Foreign and Expatriates Ministry responded by sending two identical letters to the offices of the UN Secretary General and the President of the US Security Council, reports the Syrian news agency SANA. The letters inform the UN Secretary General and the UNSC President, that Lieberman made the statement on 31 January 2014, while visiting the occupied Syrian Golan. In the letters, the Syrian Foreign Ministry stressed that the Israeli Foreign Minister’s statements embody an insolent approach to the events in Syria and recklessness with regard to relevant UN resolutions, such as UNSC resolution 497 (1981) and others, which call on Israel to end the occupation of the Syrian Golan and all Arab lands which Israel has occupied since 1967. The Syrian government quotes Lieberman as claiming that: ” The dangers to security, linked to our capability to defend the North of the country, require a recognition of Isrel’s sovereignty over the Golan Heights by the international community”. The Syrian Foreign Ministry stressed that Israel is sponsoring terrorism in Syria and that Israel seems as if it mistakenly believes that it can exploit its sponsorship of the terrorist war on Syria to achieve its expansionist ambitions. The Syrian Foreign Ministry also stressed that 47 years have passed since Israel’s occupation of the Syrian Golan Heights and that Israel has defied hundreds of resolutions and calls on ending the occupation and to stop its inhuman racial policies and its killing of civilians in the Israeli occupied territories.
  • ...2 more annotations...
  • The ministry added that Lieberman’s statements indicate an escalation of Israel’s recklessness and disregard for the UN Security Council and the UN General Assembly and stressed, that Israel must not be allowed to escape from compliance with international law, resolutions, and if necessary punishment. Syria requests that the UN Secretary General and the President of the UN Security Council guarantee that Israel respects the UN resolutions, to oblige Israel to end its occupation of the Syrian Golan, and to withdraw from the Golan according to the red line on 4 June 1967. The Foreign Ministry asserted, that the UN continuously deals with the Israeli occupation of the Syrian Golan “on a routine basis without any serious move to enforce the Security Council’s resolutions” and that this nonchalant posture encourages the illegal situation to continue” thus “undermining the credibility of the UN organization”.
  • It is worth reiterating, that Lehmann, already in 2011, warned that US President Obama’s statement pertaining the recognition of Palestine, and his article based on information from a Palestinian intelligence expert explicitly stated, that the US administration of Barak Obama and Israel are complicit in planning Israel’s permanent annexation of the Israeli occupied Syrian Golan Heights, parts of southern Lebanon and some 97 percent of the Palestinian West Bank, while establishing Palestinian small enclaves, dependent on Jordan, in the remaining 3 percent of the West Bank and a recognized Palestinian State in the Gaza Strip.
  •  
    The return of the occupied Golan Heights is absolutely required by the U.N. Charter, Geneva Conventions, and numerous U.N. Security Council resolutions.  Israel's purported security concerns do not create a lawful exception. What is really at stake in the Golan Heights and the occupied territories of Palestine is whether the U.N. Charter did in fact put an end to the right of Conquest. 
Paul Merrell

iSpy: The CIA Campaign to Steal Apple's Secrets - 0 views

  • ESEARCHERS WORKING with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept. The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released. By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought to thwart the company’s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both “physical” and “non-invasive” techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption.
  • The CIA declined to comment for this story. The security researchers also claimed they had created a modified version of Apple’s proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool. Xcode, which is distributed by Apple to hundreds of thousands of developers, is used to create apps that are sold through Apple’s App Store. The modified version of Xcode, the researchers claimed, could enable spies to steal passwords and grab messages on infected devices. Researchers also claimed the modified Xcode could “force all iOS applications to send embedded data to a listening post.” It remains unclear how intelligence agencies would get developers to use the poisoned version of Xcode. Researchers also claimed they had successfully modified the OS X updater, a program used to deliver updates to laptop and desktop computers, to install a “keylogger.”
  • Other presentations at the CIA conference have focused on the products of Apple’s competitors, including Microsoft’s BitLocker encryption system, which is used widely on laptop and desktop computers running premium editions of Windows. The revelations that the CIA has waged a secret campaign to defeat the security mechanisms built into Apple’s devices come as Apple and other tech giants are loudly resisting pressure from senior U.S. and U.K. government officials to weaken the security of their products. Law enforcement agencies want the companies to maintain the government’s ability to bypass security tools built into wireless devices. Perhaps more than any other corporate leader, Apple’s CEO, Tim Cook, has taken a stand for privacy as a core value, while sharply criticizing the actions of U.S. law enforcement and intelligence agencies. “If U.S. products are OK to target, that’s news to me,” says Matthew Green, a cryptography expert at Johns Hopkins University’s Information Security Institute. “Tearing apart the products of U.S. manufacturers and potentially putting backdoors in software distributed by unknowing developers all seems to be going a bit beyond ‘targeting bad guys.’ It may be a means to an end, but it’s a hell of a means.”
Paul Merrell

Exclusive: Major nations hold talks on ending U.N. sanctions on Iran - officials | Reuters - 0 views

  • (Reuters) - Major world powers have begun talks about a United Nations Security Council resolution to lift U.N. sanctions on Iran if a nuclear agreement is struck with Tehran, a step that could make it harder for the U.S. Congress to undo a deal, Western officials said. The talks between Britain, China, France, Russia and the United States — the five permanent members of the Security Council — plus Germany and Iran, are taking place ahead of difficult negotiations that resume next week over constricting Iran's nuclear ability.Some eight U.N. resolutions - four of them imposing sanctions - ban Iran from uranium enrichment and other sensitive atomic work and bar it from buying and selling atomic technology and anything linked to ballistic missiles. There is also a U.N. arms embargo.Iran sees their removal as crucial as U.N. measures are a legal basis for more stringent U.S. and European Union measures to be enforced. The U.S. and EU often cite violations of the U.N. ban on enrichment and other sensitive nuclear work as justification for imposing additional penalties on Iran.
  • U.S. Secretary of State John Kerry told Congress on Wednesday that an Iran nuclear deal would not be legally binding, meaning future U.S. presidents could decide not to implement it. That point was emphasized in an open letter by 47 Republican senators sent on Monday to Iran's leaders asserting any deal could be discarded once President Barack Obama leaves office in January 2017.But a Security Council resolution on a nuclear deal with Iran could be legally binding, say Western diplomatic officials. That could complicate and possibly undercut future attempts by Republicans in Washington to unravel an agreement.Iran and the six powers are aiming to complete the framework of a nuclear deal by the end of March, and achieve a full agreement by June 30, to curb Iran's most sensitive nuclear activities for at least 10 years in exchange for a gradual end to all sanctions on the Islamic Republic.So far, those talks have focused on separate U.S. and European Union sanctions on Iran's energy and financial sectors, which Tehran desperately wants removed. The sanctions question is a sticking point in the talks that resume next week in Lausanne, Switzerland, between Iran and the six powers.
  • But Western officials involved in the negotiations said they are also discussing elements to include in a draft resolution for the 15-nation Security Council to begin easing U.N. nuclear-related sanctions that have been in place since December 2006."If there's a nuclear deal, and that's still a big 'if', we'll want to move quickly on the U.N. sanctions issue," an official said, requesting anonymity.The negotiations are taking place at senior foreign ministry level at the six powers and Iran, and not at the United Nations in New York.
  • ...3 more annotations...
  • A senior U.S. administration official confirmed that the discussions were underway.The official said that the Security Council had mandated the negotiations over the U.N. sanctions and therefore has to be involved. The core role in negotiations with Iran that was being played by the five permanent members meant that any understanding over U.N. sanctions would likely get endorsed by the full council, the official added.Iran rejects Western allegations it is seeking a nuclear weapons capability.Officials said a U.N. resolution could help protect any nuclear deal against attempts by Republicans in U.S. Congress to sabotage it. Since violation of U.N. demands that Iran halt enrichment provide a legal basis for sanctioning Tehran, a new resolution could make new sanction moves difficult."There is an interesting question about whether, if the Security Council endorses the deal, that stops Congress undermining the deal," a Western diplomat said.
  • Other Western officials said Republicans might be deterred from undermining any deal if the Security Council unanimously endorses it and demonstrates that the world is united in favor of a diplomatic solution to the 12-year nuclear standoff.Concerns that Republican-controlled Congress might try to derail a nuclear agreement have been fueled by the letter to Iran's leaders and a Republican invitation to Israeli Prime Minister Benjamin Netanyahu to address Congress in a March 3 speech that railed against a nuclear deal with Iran.The officials emphasized that ending all sanctions would be contingent on compliance with the terms of any deal. They added that the International Atomic Energy Agency, the Vienna-based nuclear watchdog, will play a key role in verifying Iran's compliance with any agreement.
  • Among questions facing negotiators as they seek to prepare a resolution for the Security Council is the timing and speed of lifting U.N. nuclear sanctions, including whether to present it in March if a political framework agreement is signed next week or to delay until a final deal is reached by the end-June target.
  •  
    Soundslike it's official. U.N. Security Council Resolution is the chosen route past the Israel Firsters in Congress. But notice that Reuters is saying that "Republicans" in Congress are the barrier. Is that a sign that Repubswill be painted as the bad guys here? As in Israel's wants are now a partisan issue? It's factually incorrect. Plenty of Democrats also bow toward AIPAC headquarters  five times a day while praying for Zionist campaign contributions. 
Paul Merrell

News Roundup and Notes: August 18, 2014 | Just Security - 0 views

  • Over the weekend, the U.S. military carried out further airstrikes in Iraq, targeting Islamic State militants near the Mosul Dam, involving “a mix of fighter, bomber, attack and remotely piloted aircraft.” The nine strikes on Saturday and 14 strikes on Sunday were carried out under authority “to support humanitarian efforts in Iraq,” to protect U.S. personnel and facilities, and to support Iraqi and Kurdish defense forces [U.S. Central Command]. President Obama notified Congress of the latest American involvement yesterday, stating that “[t]he failure of the Mosul Dam could threaten the lives of large numbers of civilians, endanger U.S. personnel and facilities, including the U.S. Embassy in Baghdad.” Obama said the operations will be “limited in their scope and duration.” The significantly expanded air campaign, including the first reported use of U.S. bombers, has strengthened the Kurdish forces’ ground offensive to reclaim the strategic dam from Islamic State control [Wall Street Journal’s Matt Bradley et al.; Washington Post’s Liz Sly et al.]. Iraqi state television reported early today that Iraqi and Kurdish forces are now in control of the dam [Reuters], although there are reports of continued heavy fighting around the Mosul Dam [Al Jazeera]. Joe Parkinson [Wall Street Journal] covers how the U.S. has gained a “controversial new ally” in the Kurdistan Workers’ Party (PKK), as a number of PKK fighters joined the U.S.-backed Kurdish battle in northern Iraq over the weekend.
  • Israel-Palestine With the five-day truce between Israel and Hamas set to expire tonight, Israeli and Palestinian negotiators are continuing discussions in Cairo, although significant gaps remain between the two sides. While Israel is pushing for tougher security measures, Palestine is demanding an end to the Gaza blockade without preconditions [Associated Press; Reuters’ Nidal Al-Mughrabi and Jeffrey Heller]. Israeli troops have demolished the homes of two Palestinians suspected to have been behind the abduction and killing of the three Israeli teenagers in the West Bank in June [Haaretz’s Gili Cohen]. An IDF spokesperson said that the demolition “conveys a clear message to terrorists and their accomplices that there is a personal price to pay when engaging in terror and carrying out attacks against Israelis” [Al Jazeera]. Haaretz’s editorial board notes how the Israeli offensive in Gaza has generated “a very public crisis in relations between Israel and the United States” and warns that “Netanyahu must ease the tension with Washington and act to repair the rift with Obama.” The Wall Street Journal (Joshua Mitnick) explores how Israeli Prime Minister Benjamin Netanyahu’s “containment strategy” in the ongoing conflict is “a contrast from the tough talk against terrorism that fueled his political ascent.”
  • ulian Borger [The Guardian] notes how the potential International Criminal Court investigation into alleged war crimes in Gaza by both Israeli and Hamas forces has become a “fraught political battlefield.” Marwan Bishara [Al Jazeera] explains how and why the UN has been “sidelined” in the Middle East conflict. Meanwhile, the British government is facing a legal challenge over its decision to not suspend existing licenses for the sale of military hardware to Israel following the launch of Operation Protective Edge in Gaza last month [The Guardian’s Jamie Doward].
  • ...3 more annotations...
  • Texas Governor Rick Perry [Politico Magazine] writes that “[c]learly more strikes will be necessary, with nothing less than a sustained air campaign to degrade and destroy Islamic State forces.” The Hill (Alexander Bolton) notes that Democrats in both chambers have called for a vote in Congress over military strikes in Iraq, while Senate Majority Leader Harry Reid “almost certainly wants to avoid [a vote] as he seeks to keep the upper chamber majority in his party’s hands.” The United Kingdom has also expanded its military involvement in Iraq, with Defence Secretary Michael Fallon confirming that British warplanes are no longer confined to the initial humanitarian mission to assist Iraq’s Yazidi minority [The Guardian’s Nicholas Watt]. The UN Security Council has placed six individuals affiliated with extremist organizations in Iraq and Syria, including the Islamic State, on its sanctions list [UN News Centre]. Army Col. Joel Rayburn, writing in the Washington Post, considers the legacy of Nouri al-Maliki. While Maliki has agreed to step down as prime minister, Rayburn argues that “the damage he has wrought will define his country for decades to come.” Mike Hanna [Al Jazeera America] explains why Maliki’s ouster “is no magic bullet for Iraq,” noting that a “change of prime minister doesn’t in itself alter Iraq’s political or security equation.” And Ali Khedery [New York Times] writes how the latest change in government “really is Iraq’s last chance.”
  • Journalist James Risen, who faces prison over his refusal to reveal the source of a CIA operation story, has called President Obama “the greatest enemy of press freedom in a generation” [New York Times’ Maureen Dowd]. The International Atomic Energy Agency said that Iran has promised to co-operate with an investigation to be carried out by the nuclear watchdog, following a “useful” meeting in Tehran [Reuters’ Fredrik Dahl and Mehrdad Balali]. Sky News reports that WikiLeaks founder Julian Assange is planning to “soon” leave the Ecuadorian embassy in London, after spending more than two years inside the building. Assange said he is planning to meet with the British government to resolve his “lack of legal protection.”
  • If you want to receive your news directly to your inbox, sign up here for the Just Security Early Edition. For the latest information from Just Security, follow us on Twitter (@just_security) and join the conversation on Facebook. To submit news articles and notes for inclusion in our daily post, please email us at news@justsecurity.org. Don’t forget to visit The Pipeline for a preview of upcoming events and blog posts on U.S. national security.
  •  
    Until about a month ago, I thought that Barack Obama would leave only two lasting accomplishments for future history books: [i] first African-American President; and [ii] ending the U.S. war in Iraq. Make it item 1 only now. It's no longer U.S. military "mission creep" in Iraq; it's full bore reinvasion topped off with a U.S. enguineered coup of the Iraqi government.   Just Security is a very high quality politico-legal site for issues involving U.S. and U.S.-sponsored violence and surveillance issues. It's based at the Center for Human Rights and Global Justice at New York University School of Law. Their emailed weekday newsletter is great for the topics I try to follow.  
‹ Previous 21 - 40 of 2322 Next › Last »
Showing 20 items per page