Skip to main content

Home/ Socialism and the End of the American Dream/ Group items tagged Tails

Rss Feed Group items tagged

Paul Merrell

Edward Snowden Explains How To Reclaim Your Privacy - 0 views

  • Micah Lee: What are some operational security practices you think everyone should adopt? Just useful stuff for average people. Edward Snowden: [Opsec] is important even if you’re not worried about the NSA. Because when you think about who the victims of surveillance are, on a day-to-day basis, you’re thinking about people who are in abusive spousal relationships, you’re thinking about people who are concerned about stalkers, you’re thinking about children who are concerned about their parents overhearing things. It’s to reclaim a level of privacy. The first step that anyone could take is to encrypt their phone calls and their text messages. You can do that through the smartphone app Signal, by Open Whisper Systems. It’s free, and you can just download it immediately. And anybody you’re talking to now, their communications, if it’s intercepted, can’t be read by adversaries. [Signal is available for iOS and Android, and, unlike a lot of security tools, is very easy to use.] You should encrypt your hard disk, so that if your computer is stolen the information isn’t obtainable to an adversary — pictures, where you live, where you work, where your kids are, where you go to school. [I’ve written a guide to encrypting your disk on Windows, Mac, and Linux.] Use a password manager. One of the main things that gets people’s private information exposed, not necessarily to the most powerful adversaries, but to the most common ones, are data dumps. Your credentials may be revealed because some service you stopped using in 2007 gets hacked, and your password that you were using for that one site also works for your Gmail account. A password manager allows you to create unique passwords for every site that are unbreakable, but you don’t have the burden of memorizing them. [The password manager KeePassX is free, open source, cross-platform, and never stores anything in the cloud.]
  • The other thing there is two-factor authentication. The value of this is if someone does steal your password, or it’s left or exposed somewhere … [two-factor authentication] allows the provider to send you a secondary means of authentication — a text message or something like that. [If you enable two-factor authentication, an attacker needs both your password as the first factor and a physical device, like your phone, as your second factor, to login to your account. Gmail, Facebook, Twitter, Dropbox, GitHub, Battle.net, and tons of other services all support two-factor authentication.]
  • We should armor ourselves using systems we can rely on every day. This doesn’t need to be an extraordinary lifestyle change. It doesn’t have to be something that is disruptive. It should be invisible, it should be atmospheric, it should be something that happens painlessly, effortlessly. This is why I like apps like Signal, because they’re low friction. It doesn’t require you to re-order your life. It doesn’t require you to change your method of communications. You can use it right now to talk to your friends.
  • ...4 more annotations...
  • Lee: What do you think about Tor? Do you think that everyone should be familiar with it, or do you think that it’s only a use-it-if-you-need-it thing? Snowden: I think Tor is the most important privacy-enhancing technology project being used today. I use Tor personally all the time. We know it works from at least one anecdotal case that’s fairly familiar to most people at this point. That’s not to say that Tor is bulletproof. What Tor does is it provides a measure of security and allows you to disassociate your physical location. … But the basic idea, the concept of Tor that is so valuable, is that it’s run by volunteers. Anyone can create a new node on the network, whether it’s an entry node, a middle router, or an exit point, on the basis of their willingness to accept some risk. The voluntary nature of this network means that it is survivable, it’s resistant, it’s flexible. [Tor Browser is a great way to selectively use Tor to look something up and not leave a trace that you did it. It can also help bypass censorship when you’re on a network where certain sites are blocked. If you want to get more involved, you can volunteer to run your own Tor node, as I do, and support the diversity of the Tor network.]
  • Lee: So that is all stuff that everybody should be doing. What about people who have exceptional threat models, like future intelligence-community whistleblowers, and other people who have nation-state adversaries? Maybe journalists, in some cases, or activists, or people like that? Snowden: So the first answer is that you can’t learn this from a single article. The needs of every individual in a high-risk environment are different. And the capabilities of the adversary are constantly improving. The tooling changes as well. What really matters is to be conscious of the principles of compromise. How can the adversary, in general, gain access to information that is sensitive to you? What kinds of things do you need to protect? Because of course you don’t need to hide everything from the adversary. You don’t need to live a paranoid life, off the grid, in hiding, in the woods in Montana. What we do need to protect are the facts of our activities, our beliefs, and our lives that could be used against us in manners that are contrary to our interests. So when we think about this for whistleblowers, for example, if you witnessed some kind of wrongdoing and you need to reveal this information, and you believe there are people that want to interfere with that, you need to think about how to compartmentalize that.
  • Tell no one who doesn’t need to know. [Lindsay Mills, Snowden’s girlfriend of several years, didn’t know that he had been collecting documents to leak to journalists until she heard about it on the news, like everyone else.] When we talk about whistleblowers and what to do, you want to think about tools for protecting your identity, protecting the existence of the relationship from any type of conventional communication system. You want to use something like SecureDrop, over the Tor network, so there is no connection between the computer that you are using at the time — preferably with a non-persistent operating system like Tails, so you’ve left no forensic trace on the machine you’re using, which hopefully is a disposable machine that you can get rid of afterward, that can’t be found in a raid, that can’t be analyzed or anything like that — so that the only outcome of your operational activities are the stories reported by the journalists. [SecureDrop is a whistleblower submission system. Here is a guide to using The Intercept’s SecureDrop server as safely as possible.]
  • And this is to be sure that whoever has been engaging in this wrongdoing cannot distract from the controversy by pointing to your physical identity. Instead they have to deal with the facts of the controversy rather than the actors that are involved in it. Lee: What about for people who are, like, in a repressive regime and are trying to … Snowden: Use Tor. Lee: Use Tor? Snowden: If you’re not using Tor you’re doing it wrong. Now, there is a counterpoint here where the use of privacy-enhancing technologies in certain areas can actually single you out for additional surveillance through the exercise of repressive measures. This is why it’s so critical for developers who are working on security-enhancing tools to not make their protocols stand out.
  •  
    Lots more in the interview that I didn't highlight. This is a must-read.
Paul Merrell

America's new, more 'usable', nuclear bomb in Europe | World news | The Guardian - 0 views

  • The $8 billion upgrade to the US B61 nuclear bomb has been widely condemned as an awful lot of money to spend on an obsolete weapon. As an old fashioned ‘dumb’ bomb it has no role in US or NATO nuclear doctrine, but the upgrade has gone ahead anyway, in large part as a result of lobbying by the nuclear weapons laboratories. In non-proliferation terms however the only thing worse than a useless bomb is a ‘usable’ bomb. Apart from the stratospheric price, the most controversial element of the B61 upgrade is the replacement of the existing rigid tail with one that has moving fins that will make the bomb smarter and allow it to be guided more accurately to a target. Furthermore, the yield can be adjusted before launch, according to the target. The modifications are at the centre of a row between anti-proliferation advocates and the government over whether the new improved B61-12 bomb is in fact a new weapon, and therefore a violation of President Obama’s undertaking not to make new nuclear weapons. His administration’s 2010 Nuclear Posture Review said life extension upgrades to the US arsenal would “not support new military missions or provide for new military capabilities.”
  • The issue has a particular significance for Europe where a stockpile of 180 B61’s is held in six bases in five countries. If there is no change in that deployment by the time the upgraded B61-12’s enter the stockpile in 2024, many of them will be flown out to the bases in Belgium, the Netherlands, Germany, Italy and Turkey. The row has had a semantic tone, revolving on what the definition of ‘new’ is, but arguably the only definition that counts is whether the generals and officials responsible for dropping bombs, view its role in a different light as a result of its refurbishment. Referring to the B61-12’s enhanced accuracy on a recent PBS Newshour television programme, the former head of US Strategic Command, General James Cartwright, made this striking remark: If I can drive down the yield, drive down, therefore, the likelihood of fallout, etc, does that make it more usable in the eyes of some — some president or national security decision-making process? And the answer is, it likely could be more usable.
  • In general, it is not a good thing to see the words ‘nuclear bomb’ and ‘usable’ anywhere near each other. Yet they seem to share space in the minds of some of America’s military leaders, as Hans Kristensen of the Federation of American Scientists, points out. Cartwright’s confirmation follows General Norton Schwartz, the former U.S. Air Force Chief of Staff, who in 2014 assessed that the increased accuracy would have implications for how the military thinks about using the B61. “Without a doubt. Improved accuracy and lower yield is a desired military capability. Without a question,” he said. The great thing about nuclear weapons was that their use was supposed to be unthinkable and they were therefore a deterrent to contemplation of a new world war. Once they become ‘thinkable’ we are in a different, and much more dangerous, universe.
  •  
    Oh, Lord, please save this planet from idiocy in high places. 
Paul Merrell

Israel and neocons are trying to 'suck America into' Iranian war that could lead to wor... - 0 views

  • Israel is trying to “suck America into” a war with Iran that could destabilize the Middle East and lead to a world war in much the way that the imperial rivalries in 1914 led to the First World War, Lawrence Wilkerson, former chief of staff to Secretary of State Colin Powell, warned in Washington last week. A war with Iran, he said, could “perhaps terminate the experiment that is Israel and do irreparable damage to the empire that America has become.” But Israeli leaders want a war, and they are pushing one with the support of their American political friends, including Democrats like Sen. Chris Coons of Delaware, whose overheated rhetoric about Iran recalls Joseph Goebbels, the Nazi propagandist, Wilkerson said. Another pro-war faction are “warmed-over neoconservatives” who got us into the Iraq war. “I’ve been there, done that; I don’t need the tour,” he said. Wilkerson, a retired army colonel who now teaches government at Washington-area universities, served Powell during the runup to the Iraq war. He spoke last Friday at the annual Israel lobby conference at the National Press Club, sponsored by the Washington Report on Middle East Affairs and Institute for Research: Middle East Policy. The conference aired on C-SPAN. I have transcribed his speech below. Wilkerson’s remarks are important because his analysis of the tail wagging the dog is so cogent and frightening at a time when the premier Israel lobby group AIPAC is pushing for action against Iran in Syria. Also for Wilkerson’s respectful take on Vladimir Putin; for his unvarnished opinion of the Israel lobby, so different from the tame piece he published in The New York Times a month ago; and for his comments about Israel attacking the USS Liberty in 1967 and stealing US uranium to build a nuclear weapon with LBJ’s knowledge.
‹ Previous 21 - 23 of 23
Showing 20 items per page