Have you created a ShazzleMail account on your smartphone? This is a required first step.

Yes No

Free Encrypted Email

Posts Tagged ‘#shazzle’

f;laksjdf;laksdjfadf

SPYING ON THE INTERNET IS ORDERS OF MAGNITUDE MORE INVASIVE THAN PHONE METADATA

January 4, 2016

When you pick up the phone, who you’re calling is none of the government’s business. The NSA’s domestic surveillance of phone metadata was the first program to be disclosed based on documents from whistleblower Edward Snowden, and Americans have been furious about it ever since. The courts ruled it illegal, and Congress let the section of the Patriot Act that justified it expire (though the program lives on in a different form as part of the USA Freedom Act).

Yet XKEYSCORE, the secret program that converts all the data it can see into searchable events like web pages loaded, files downloaded, forms submitted, emails and attachments sent, porn videos watched, TV shows streamed, and advertisements loaded, demonstrates how Internet traffic can be even more sensitive than phone calls. And unlike the Patriot Act’s phone metadata program, Congress has failed to limit the scope of programs like XKEYSCORE, which is presumably still operating at full speed. Maybe Verizon stopped giving phone metadata to the NSA, but if a Verizon engineer uploads a spreadsheet full of this metadata without proper encryption, the NSA may well get it anyway by spying directly on the cables that the spreadsheet travels over.

The outrage over bulk collection of our phone metadata makes sense:Metadata is private. Americans call suicide prevention hotlines, HIV testing services, phone sex services, advocacy groups for gun rights and for abortion rights, and the people they’re having affairs with. We use the phone to schedule job interviews without letting our current employer know, and to manage long-distance relationships. Most of us, at one point or another, have spent long hours on the phone discussing the most intimate details about our lives. There isn’t an American alive today who didn’t grow up with at least some access to a telephone, so Americans understand this well.

But Americans don’t understand the Internet yet. Bulk collection of phone metadata is, without a doubt, a violation of your privacy, but bulk surveillance of Internet traffic is orders of magnitude more invasive. People also use the Internet in all the ways they use phones — often inadvertently sharing even more intimate details through online searches. In fact, the phone network itself is starting to go over the Internet, without customers even noticing.

XKEYSCORE, as well as NSA’s programs that tap the Internet directly and feed data into it, have some legal problems: They violate First Amendment rights to freedom of association; they violate the Wiretap Act. But the biggest and most obvious concerns are with the Fourth Amendment.

The Fourth Amendment to the U.S. Constitution is short and concise:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

It means that Americans have a right to privacy. If government agents want to search you or seize your data, they must have a warrant. The warrant can only be issued if they have probable cause, and the warrant must be specific. It can’t say, “We want to seize everyone’s Internet traffic to see what’s in it.” Instead, it must say something like, “We want to seize a specific incriminating document from a specific suspect.”

But this is exactly what’s happening:

The government is indiscriminately seizing Internet traffic to see what’s in it, without probable cause. The ostensible justification is that, while tens of millions of Americans may be swept up in this dragnet, the real targets are foreigners. In a legal document called USSID 18, the NSA sets out policies and procedures that purportedly prevent unreasonable searches of data from U.S. persons.

But it doesn’t prevent, or even claim to prevent, unreasonable seizures.

Kurt Opsahl, general counsel of the Electronic Frontier Foundation, explains: “We have a fundamental disagreement with the government about whether [data] acquisition is a problem. Acquisition is a seizure and has to be compliant with the Fourth Amendment.”

If you read USSID 18 carefully, you’ll see that it appears to limit, with many exceptions, the government’s ability to intentionally collect data concerning U.S. persons. But the Department of Defense, under which the NSA operates, defines “collection” differently than most of us do. It doesn’t consider seized data as “collected” until it’s been queried by a human.

If you email your mom, there’s a good chance the NSA will intercept the message as it travels through a fiberoptic cable, such as the ones that make up the backbone of the Internet, eventually making its way to an XKEYSCORE field site. You can thwart this with encryption: either by encrypting your email (hopefully someday all parents will know how to use encrypted email), or by using email servers that automatically encrypt with each other. In the absence of such encryption, XKEYSCORE will process the email, fingerprint it and tag it, and then it will sit in a database waiting to be queried. According to the Department of Defense, this email hasn’t been “collected” until an analyst runs a query and the email appears on the screen in front of them.

When NSA seizes, in bulk, data belonging to U.S. citizens or residents, data that inevitably includes information from innocent people that the government does not have probable cause to investigate, the agency has already committed an unconstitutional “unreasonable seizure,” even if analysts never query the data about innocent U.S. persons.

The NSA has legal justifications for all their surveillance: Section 215 of the Patriot Act, now expired, was used to justify bulk collection of phone and email metadata. Section 702 of the Foreign Intelligence Surveillance Act(FISA) is currently used to justify so-called “upstream” collection, tapping the physical infrastructure that the Internet uses to route traffic across the country and around the world in order to import into systems like XKEYSCORE. Executive Order 12333, approved by President Reagan, outlines vague rules, which are littered with exceptions and loopholes, that the executive branch made for itself to follow regarding spying on Americans, which includes USSID 18.

But these laws and regulations ignore the uncomfortable truth that the Fourth Amendment requires surveillance of Americans to be targeted; it cannot be done in bulk. Americans are fighting to end bulk surveillance in dozens of lawsuits, including Jewel v. NSA, which relies on whistleblower-obtained evidence that NSA tapped the fiber optic cables that carry Internet traffic in AT&T’s Folsom Street building in San Francisco. It’s easy for the government to stall cases like this, or get them dismissed, by insisting that talking about it at all puts our national security at risk.

And, of course, let’s not forget the 6.8 billion people on Earth who are not in the United States. Article 12 of the U.N. Declaration of Human Rightsstates:

No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.

The NSA has very few restrictions on spying on non-Americans (it must be for “foreign intelligence” or “counterintelligence” purposes, and not other purposes), despite XKEYSCORE and the bulk collection programs that feed it being an “arbitrary interference” with the privacy of such persons. NSA doesn’t even have restrictions on spying on allies, such as Germany and France.

Facebook feeds everywhere are decorated with baby pictures. When those babies are grown up and getting elected to Congress, maybe then Americans will understand how the Internet works, and that bulk surveillance of phone metadata is just a tiny sliver of the enormous “collect it all” bulk surveillance pie.

Photo: Getty

Tags: , , , , ,

featured image 4

A Secret Catalogue of Government Gear for Spying on Your Cellphone

December 18, 2015

The intercept has obtained a secret, internal U.S. government catalogue of dozens of cellphone surveillance devices used by the military and by intelligence agencies. The document, thick with previously undisclosed information, also offers rare insight into the spying capabilities of federal law enforcement and local police inside the United States.

The catalogue includes details on the Stingray, a well-known brand of surveillance gear, as well as Boeing “dirt boxes” and dozens of more obscure devices that can be mounted on vehicles, drones, and piloted aircraft. Some are designed to be used at static locations, while others can be discreetly carried by an individual. They have names like Cyberhawk, Yellowstone, Blackfin, Maximus, Cyclone, and Spartacus. Within the catalogue, the NSA is listed as the vendor of one device, while another was developed for use by the CIA, and another was developed for a special forces requirement. Nearly a third of the entries focus on equipment that seems to have never been described in public before.

The Intercept obtained the catalogue from a source within the intelligence community concerned about the militarization of domestic law enforcement. (The original is here.)

A few of the devices can house a “target list” of as many as 10,000 unique phone identifiers. Most can be used to geolocate people, but the documents indicate that some have more advanced capabilities, like eavesdropping on calls and spying on SMS messages. Two systems, apparently designed for use on captured phones, are touted as having the ability to extract media files, address books, and notes, and one can retrieve deleted text messages.

Above all, the catalogue represents a trove of details on surveillance devices developed for military and intelligence purposes but increasingly used by law enforcement agencies to spy on people and convict them of crimes. The mass shooting earlier this month in San Bernardino, California, which President Barack Obama has called “an act of terrorism,” prompted calls for state and local police forces to beef up their counterterrorism capabilities, a process that has historically involved adapting military technologies to civilian use. Meanwhile, civil liberties advocates and others are increasingly alarmed about how cellphone surveillance devices are used domestically and have called for a more open and informed debate about the trade-off between security and privacy — despite a virtual blackout by the federal government on any information about the specific capabilities of the gear.

“We’ve seen a trend in the years since 9/11 to bring sophisticated surveillance technologies that were originally designed for military use — like Stingrays or drones or biometrics — back home to the United States,” said Jennifer Lynch, a senior staff attorney at the Electronic Frontier Foundation, which has waged a legal battle challenging the use of cellphone surveillance devices domestically. “But using these technologies for domestic law enforcement purposes raises a host of issues that are different from a military context.”

MANY OF THE DEVICES in the catalogue, including the Stingrays and dirt boxes, are cell-site simulators, which operate by mimicking the towers of major telecom companies like Verizon, AT&T, and T-Mobile. When someone’s phone connects to the spoofed network, it transmits a unique identification code and, through the characteristics of its radio signals when they reach the receiver, information about the phone’s location. There are also indications that cell-site simulators may be able to monitor calls and text messages.

In the catalogue, each device is listed with guidelines about how its use must be approved; the answer is usually via the “Ground Force Commander” or under one of two titles in the U.S. code governing military and intelligence operations, including covert action.

But domestically the devices have been used in a way that violates the constitutional rights of citizens, including the Fourth Amendment prohibition on illegal search and seizure, critics like Lynch say. They have regularly been used without warrants, or with warrants that critics call overly broad. Judges and civil liberties groups alike have complained that the devices are used without full disclosure of how they work, even within court proceedings.

“Every time police drive the streets with a Stingray, these dragnet devices can identify and locate dozens or hundreds of innocent bystanders’ phones,” said Nathan Wessler, a staff attorney with the Speech, Privacy, and Technology Project of the American Civil Liberties Union.

The controversy around cellphone surveillance illustrates the friction that comes with redeploying military combat gear into civilian life. The U.S. government has been using cell-site simulators for at least 20 years, but their use by local law enforcement is a more recent development.

The archetypical cell-site simulator, the Stingray, was trademarked by Harris Corp. in 2003 and initially used by the military, intelligence agencies, and federal law enforcement. Another company, Digital Receiver Technology, now owned by Boeing, developed dirt boxes — more powerful cell-site simulators — which gained favor among the NSA, CIA, and U.S. military as good tools for hunting down suspected terrorists. The devices can reportedly track more than 200 phones over a wider range than the Stingray.

Amid the war on terror, companies selling cell-site simulators to the federal government thrived. In addition to large corporations like Boeing and Harris, which clocked more than $2.6 billion in federal contracts last year, the catalogue obtained by The Intercept includes products from little-known outfits like Nevada-based Ventis, which appears to have been dissolved, and SR Technologies of Davie, Florida, which has a website that warns: “Due to the sensitive nature of this business, we require that all visitors be registered before accessing further information.” (The catalogue obtained by The Intercept is not dated, but includes information about an event that occurred in 2012.)

The U.S. government eventually used cell-site simulators to target people for assassination in drone strikes, The Intercept has reported. But the CIA helped use the technology at home, too. For more than a decade, the agency worked with the U.S. Marshals Service to deploy planes with dirt boxes attached to track mobile phones across the U.S., the Wall Street Journal revealed.

After being used by federal agencies for years, cellular surveillance devices began to make their way into the arsenals of a small number of local police agencies. By 2007, Harris sought a license from the Federal Communications Commission to widely sell its devices to local law enforcement, and police flooded the FCC with letters of support. “The text of every letter was the same. The only difference was the law enforcement logo at the top,” said Chris Soghoian, the principal technologist at the ACLU, who obtained copies of the letters from the FCC through a Freedom of Information Act request.

The lobbying campaign was a success. Today nearly 60 law enforcement agencies in 23 states are known to possess a Stingray or some form of cell-site simulator, though experts believe that number likely underrepresents the real total. In some jurisdictions, police use cell-site simulators regularly. The Baltimore Police Department, for example, has used Stingrays more than 4,300 times since 2007.

Police often cite the war on terror in acquiring such systems. Michigan State Police claimed their Stingrays would “allow the State to track the physical location of a suspected terrorist,” although the ACLU later found that in 128 uses of the devices last year, none were related to terrorism. In Tacoma, Washington, police claimed Stingrays could prevent attacks using improvised explosive devices — the roadside bombs that plagued soldiers in Iraq. “I am not aware of any case in which a police agency has used a cell-site simulator to find a terrorist,” said Lynch. Instead, “law enforcement agencies have been using cell-site simulators to solve even the most minor domestic crimes.”

The Intercept is not publishing information on devices in the catalogue where the disclosure is not relevant to the debate over the extent of domestic surveillance.

The Office of the Director of National Intelligence declined to comment for this article. The FBI, NSA, and U.S. military did not offer any comment after acknowledging The Intercept’s written requests. The Department of Justice “uses technology in a manner that is consistent with the requirements and protections of the Constitution, including the Fourth Amendment, and applicable statutory authorities,” said Marc Raimondi, a Justice Department spokesperson who, for six years prior to working for the DOJ, worked for Harris Corp., the manufacturer of the Stingray.

WHILE INTEREST FROM local cops helped fuel the spread of cell-site simulators, funding from the federal government also played a role, incentivizing municipalities to buy more of the technology. In the years since 9/11, the U.S. has expanded its funding to provide military hardware to state and local law enforcement agencies via grants awarded by the Department of Homeland Security and the Justice Department. There’s been a similar pattern with Stingray-like devices.

“The same grant programs that paid for local law enforcement agencies across the country to buy armored personnel carriers and drones have paid for Stingrays,” said Soghoian. “Like drones, license plate readers, and biometric scanners, the Stingrays are yet another surveillance technology created by defense contractors for the military, and after years of use in war zones, it eventually trickles down to local and state agencies, paid for with DOJ and DHS money.”

In 2013, the Florida Department of Law Enforcement reported the purchase of two HEATR long-range surveillance devices as well as $3 million worth of Stingray devices since 2008. In California, Alameda County and police departments in Oakland and Fremont are using $180,000 in Homeland Security grant money to buy Harris’ Hailstorm cell-site simulator and the hand-held Thoracic surveillance device, made by Maryland security and intelligence company Keyw. As part of Project Archangel, which is described in government contract documents as a “border radio intercept program,” the Drug Enforcement Administration has contracted with Digital Receiver Technology for over $1 million in DRT surveillance box equipment. The Department of the Interior contracted with Keyw for more than half a million dollars of “reduced signature cellular precision geolocation.”

Information on such purchases, like so much about cell-site simulators, has trickled out through freedom of information requests and public records. The capabilities of the devices are kept under lock and key — a secrecy that hearkens back to their military origins. When state or local police purchase the cell-site simulators, they are routinely required to sign non-disclosure agreements with the FBI that they may not reveal the “existence of and the capabilities provided by” the surveillance devices, or share “any information” about the equipment with the public.

Indeed, while several of the devices in the military catalogue obtained by The Intercept are actively deployed by federal and local law enforcement agencies, according to public records, judges have struggled to obtain details of how they work. Other products in the secret catalogue have never been publicly acknowledged and any use by state, local, and federal agencies inside the U.S. is, therefore, difficult to challenge.

“It can take decades for the public to learn what our police departments are doing, by which point constitutional violations may be widespread,” Wessler said. “By showing what new surveillance capabilities are coming down the pike, these documents will help lawmakers, judges, and the public know what to look out for as police departments seek ever-more powerful electronic surveillance tools.”

Sometimes it’s not even clear how much police are spending on Stingray-like devices because they are bought with proceeds from assets seized under federal civil forfeiture law, in drug busts and other operations. Illinois, Michigan, and Maryland police forces have all used asset forfeiture funds to pay for Stingray-type equipment.

“The full extent of the secrecy surrounding cell-site simulators is completely unjustified and unlawful,” said EFF’s Lynch. “No police officer or detective should be allowed to withhold information from a court or criminal defendant about how the officer conducted an investigation.”

JUDGES HAVE BEEN among the foremost advocates for ending the secrecy around cell-site simulators, including by pushing back on warrant requests. At times, police have attempted to hide their use of Stingrays in criminal cases, prompting at least one judge to throw out evidence obtained by the device. In 2012, a U.S. magistrate judge in Texas rejected an application by the Drug Enforcement Administration to use a cell-site simulator in an operation, saying that the agency had failed to explain “what the government would do with” the data collected from innocent people.

Law enforcement has responded with some limited forms of transparency. In September, the Justice Department issued new guidelines for the use of Stingrays and similar devices, including that federal law enforcement agencies using them must obtain a warrant based on probable cause and must delete any data intercepted from individuals not under investigation.

Contained within the guidelines, however, is a clause stipulating vague “exceptional circumstances” under which agents could be exempt from the requirement to get a probable cause warrant.

“Cell-site simulator technology has been instrumental in aiding law enforcement in a broad array of investigations, including kidnappings, fugitive investigations, and complicated narcotics cases,” said Deputy Attorney General Sally Quillian Yates.

Meanwhile, parallel guidelines issued by the Department of Homeland Security in October do not require warrants for operations on the U.S. border, nor do the warrant requirements apply to state and local officials who purchased their Stingrays through grants from the federal government, such as those in Wisconsin, Maryland, and Florida.

The ACLU, EFF, and several prominent members of Congress have said the federal government’s exceptions are too broad and leave the door open for abuses.

“Because cell-site simulators can collect so much information from innocent people, a simple warrant for their use is not enough,” said Lynch, the EFF attorney. “Police officers should be required to limit their use of the device to a short and defined period of time. Officers also need to be clear in the probable cause affidavit supporting the warrant about the device’s capabilities.”

In November, a federal judge in Illinois published a legal memorandum about the government’s application to use a cell-tower spoofing technology in a drug-trafficking investigation. In his memo, Judge Iain Johnston sharply criticized the secrecy surrounding Stingrays and other surveillance devices, suggesting that it made weighing the constitutional implications of their use extremely difficult. “A cell-site simulator is simply too powerful of a device to be used and the information captured by it too vast to allow its use without specific authorization from a fully informed court,” he wrote.

He added that Harris Corp. “is extremely protective about information regarding its device. In fact, Harris is so protective that it has been widely reported that prosecutors are negotiating plea deals far below what they could obtain so as to not disclose cell-site simulator information. … So where is one, including a federal judge, able to learn about cell-site simulators? A judge can ask a requesting Assistant United States Attorney or a federal agent, but they are tight-lipped about the device, too.”

The ACLU and EFF believe that the public has a right to review the types of devices being used to encourage an informed debate on the potentially far-reaching implications of the technology. The catalogue obtained by The Intercept, said Wessler, “fills an important gap in our knowledge, but it is incumbent on law enforcement agencies to proactively disclose information about what surveillance equipment they use and what steps they take to protect Fourth Amendment privacy rights.”

Tags: , , , , ,

featured image 3

Privacy hawks turn to White House in encryption fight

December 14, 2015

Privacy advocates are leaning on the White House to counter lawmakers’ renewed efforts to pass encryption-piercing legislation in the wake of the terror attacks in Paris and San Bernardino, Calif.

Despite a lack of direct evidence the technology played a role in either incident, lawmakers continue to use both deadly plots to promote a bill that would force companies to decrypt data upon request.

The tactic has left technologists and privacy advocates frustrated, even outraged.

In a meeting with privacy and civil liberties groups on Thursday, the Obama administration said it was preparing to issue an updated stance on encryption policy in the coming weeks, giving the pro-encryption community hope it might have a new ally in its fight.

“I’m very hopeful and the White House has been very receptive,” said Kevin Bankston, director of New America’s Open Technology Institute, who attended the sit-down with top White House cybersecurity and technology officials.

The White House is the one force in government that digital rights advocates believe has the power to shut down the what they see as damaging and distracting battles over a technology they say is necessary and inevitable.

“My concern is we’re going to be arguing this every few years unless there’s a definitive statement from the White House,” Bankston said.

Since the deadly attacks, major Silicon Valley players such as Apple and Google have been under intense pressure from Congress and law enforcement to allow investigators some form of guaranteed access to encrypted data.

As a result, privacy advocates say several types of useful encryption have become vilified with little reason. 

“I’m frustrated by this cynical, opportunistic playbook where the intelligence community sits poised to take advantage of whatever tragedy comes along,” Bankston said, “even if the facts on the ground have nothing to do with it.”

On Capitol Hill this week, FBI Director James Comey portrayed claims that companies cannot crack their own encrypted data, even under court order, as a business decision, not a technological imperative. 

Among them, Apple argues the company itself is incapable of getting at the encrypted data on its latest operating system.

“There are plenty of companies today that provide secure services to their customers and still comply with court orders,” Comey told the Senate Judiciary Committee on Wednesday. “This is not a technical issue, it is a business model question.”

Lawmakers have picked up on this message, using it to lambast Silicon Valley.

“Here’s my message to Silicon Valley: Change your business model tomorrow,” Sen. Lindsey Graham (R-S.C.), who is running for president, said Wednesday on Fox News.

Joe Hall, chief technologist with the Center for Democracy and Technology (CDT), which was also represented at the White House meeting, called this language “really infuriating.”

“What that shows is a misunderstanding of why one would choose to secure either a given communication or a device,” he added.

Providing “easy-to-use, mass market cybersecurity tools” keeps American tech firms competitive in the global marketplace and help secure broad swaths of data from rapidly expanding cyber crime syndicates and overseas cyber spies, Hall said.

Congress has long “been on the warpath,” he added, to get companies and individuals to adopt this type of secure technology. 

Yet suddenly, increasingly common forms of securing data and messages, such as end-to-end encryption and full-disk encryption, are under attack.

With end-to-end encryption, a digital message — an email, or iMessage, for instance — is only visible to the sender and receiver. Full-disk encryption allows people to lock down all information on a hard drive. 

During his Wednesday testimony, Comey told lawmakers that one of the shooters in the Garland, Texas, attack on a contest to draw a cartoon of the Prophet Mohammed exchanged 109 of encrypted messages with overseas terrorists.

“We have no idea what he said, because those messages were encrypted,” he said.

Investigators have not produced similar examples for the suspects in Paris and San Bernardino, although ABC News reported the couple behind the San Bernardino shootings had digital devices with “some form of encryption,” citing two unnamed U.S. officials.

Still, these details have fueled those calling for a policy that would ensure government access to secured data.

Sens. Richard Burr (R-N.C.) and Dianne Feinstein (D-Calif.) have vowed to offer legislation that would compel companies to comply with court orders seeking encrypted messages. 

“I think this world is really changing in terms of people wanting the protection and wanting law enforcement, if there is conspiracy going on over the Internet, that that encryption ought to be able to be pierced,” Feinstein said Wednesday.

But technologists and civil society groups say such a bill would essentially amount to a ban on manufacturing or selling devices with features such as end-to-end or full-disk encryption.

The result, they insist, would be a world in which everyday people are more vulnerable to data breaches and dissidents are more exposed to repressive government spies. 

In response, these encryption advocates have turned their hopes to the White House.

“The White House has to look at those comments and what may result from where the senators are headed and start to take a proactive stance in regards to that,” said Amie Stepanovich, U.S. policy manager at digital rights advocate Access, who attended Thursday’s White House meeting. 

“We need somebody in a position of power to take leadership on this issue,” she added.

Privacy hawks have seen positive movement from the White House over the past year. 

For months, the administration was investigating legislative options and technological mandates that would allow law enforcement its desired access to data on encrypted devices. Ultimately, the White House decided to back away, for the time being, from any mandate.

Following Thursday’s meeting, attendees praised the administration’s ongoing attention to the issue.

“They really wanted to listen to our opinions and the research that we were able to bring in,” Stepanovich said.

But the White House can’t drag its feet forever, privacy advocates agreed. 

They see the administration’s current encryption stance as “no stance.” The position is allowing Congress and law enforcement to continue down potentially destructive paths that would undermine security, encryption advocates said.

A full-throated endorsement of robust encryption methods, such as end-to-end encryption and full-disk encryption, can cut off that path, they said.

“It could be a game-changer,” Bankston said. “I think it would help us put to bed this debate that’s been raging for well over a year.”

“We can move on and start having a more productive conversation about how law enforcement and the tech community can adapt to a world where encryption is common,” he added.

Tags: , , , , , ,

featured image 2

Game for privacy is gone, mass surveillance is here to stay – Assange on #RT10 panel

December 11, 2015

Humanity has lost its battle for privacy and must now learn to live in a world where mass surveillance is becoming cheaper for governments to implement, WikiLeaks founder Julian Assange said during a panel dedicated to RT’s 10th anniversary.
Assange addressed the panel on security and surveillance hosted by RT in central Moscow on Thursday via videoconference from the Ecuadorian embassy in London, where he has remained holed up for the last three years in order to avoid extradition to Sweden.
When offered a chance to comment on the session’s topic – “Security or Surveillance: Can the right to privacy and effective anti-terror security coexist in the digital age?” – the whistleblower asked the moderator, and host of The Big Picture Show on RT American, Thom Hartmann: “How long have you got, Tom?” implying he has a lot to say on the issue.
But it was Assange’s only joke during the event, as his reply turned out to be gravely serious and in many respects depressing.
“In thinking about this issue I want to take quite a different position, perhaps, from what you would expect me to have taken… I think that we should understand that the game for privacy is gone. It’s gone. The mass surveillance is here to stay,” he said.
Mass surveillance is already being implemented not only by major world powers, but also by some medium and small-sized countries, he added.
“The Five Eyes intelligence arrangement [of Australia, Canada, New Zealand, the UK and the US]… is so evasive in terms of mass surveillance of domestic and international telecommunications that while some experts can achieve practical privacy for themselves for limited number of operations… it’s gone for the rest of the populations,” the WikiLeaks founder stressed.
International terrorists are among those “experts” capable of making their communications invisible for security agencies, he added.
Privacy “will not be coming back, short of a very regressive economic collapse, which reduces the technological capacity of civilization,” Assange said.
“The reason it will not come back is that the cost of engaging in mass surveillance is decreasing by about 50 per cent every 18 months, because it’s the underlying cost that’s predicated on the cost of telecommunications, moving surveillance intercepts around and computerization and storage – all those costs are decreasing much faster at a geometric rate than the human population is increasing,” he explained.
Mass surveillance and computerization are “winning” the competition with humanity and human values and they’re “going to continue to win at an ever-increasing rate. That’s the reality that we have to deal with,” the WikiLeaks whistleblower added.
The focus should now switch from defending privacy to understanding what kind of society will be built in these new, changed conditions, he said.
The WikiLeaks founder reminded the panel of the historic examples of East Germany and other societies, in which people adapted to living under the scrutiny of the authorities.
“If you look at societal behavior in very conformist, small, isolated societies with reduced social spaces – like Sweden, South Korea, Okinawa in Japan and North Korea – then you’ll see that society adapts. Everyone becomes incredibly timid, they start to use code words; use a lot of subtext to try and sneak out your controversial views,” he said.
According to Assange, the modern world is currently moving “towards that kind of a society.”
Privacy is among values “that simply are unsustainable… in the face of the reality of technological change; the reality of the deep state with a military-industrial complex and the reality of Islamic terrorism, which is legitimizing that sector in a way that it’s behaving,” he stressed.
Assange encouraged those present on the panel as well as the general public to “get on the other side of the debate where it’s going” and stop holding on to privacy.
The panel discussion was part of an RT conference titled ‘Information, messages, politics:The shape-shifting powers of today’s world.’ The meeting brought together politicians, foreign policy experts and media executives from across the globe, among them former director of the US Defense Intelligence Agency Michael Flynn, the Green Party’s Jill Stein and former vice president of the Parliamentary Assembly of the OSCE, Willy Wimmer.

Tags: , , , , , , , ,

trump is a fag

Trump Says He Supports Reauthorizing Patriot Act, NSA Metadata Collection

December 10, 2015

2016 Republican presidential candidate and billionaire real estate mogul Donald Trump said that he supports reauthorizing the USA PATRIOT Act and bulk cell phone metadata collection by the National Security Agency in an interview on the Hugh Hewitt Show earlier this month.

In the above-embedded clip, Hewitt asks Trump, “On metadata collection, Ted Cruz is glad the NSA got out of it. Marco Rubio wants it back. What’s Donald Trump think?

Well, I tend to err on the side of security, I must tell you,” Trump replied, “and I’ve been there for longer than you would think. But, you know, when you have people that are beheading if you’re a Christian and frankly for lots of other reasons, when you have the world looking at us and would like to destroy us as quickly as possible, I err on the side of security, and so that’s the way it is, that’s the way I’ve been, and some people like that, frankly, and some people don’t like that.

And I’m not just saying that since Paris, I’m saying for quite some time. I assume when I pick up my telephone people are listening to my conversations anyway, if you want to know the truth. It’s pretty sad commentary, but I err on the side of security,” said Trump.

Hewitt then asked, “Alright, so you would be in favor of restoring the Patriot Act?

I think that would be fine. As far as I’m concerned, that would be fine,” Trump responded.

Newsweek points out that Donald Trump has held the same position since before the Paris terror attacks. He said this summer, “I support legislation which allows the NSA to hold the bulk metadata. For oversight, I propose that a court, which is available any time on any day, is created to issue individual rulings on when this metadata can be accessed.

Tags: , , , , ,

Introducing ShazzleMail Email and How it Works

Privacy is your Fundamental Human Right.

Our Daily Blog
telegram-3m
Your Privacy Is Our Business
April 30, 2019

Let us reassure you: You’re worried only because you don’t understand anything about anything. ...

Read more
pr
Coffee with Privacy Pros: Three Constants of Privacy
April 23, 2019

A look behind the career and privacy theology of the law-lovin’ CPO of Uber, Ruby Zefo Jared Cose...

Read more
privacy-coins-and-bitcoin-dominance-guide
We’ve Stopped Talking And Searching About Privacy
April 15, 2019

Kalev Leetaru Contributor AI & Big Data I write about the broad intersection of data and soci...

Read more
private
Rebiton Allows You to Buy Bitcoin and Keep Your Privacy
April 8, 2019

by Kai Sedgwick Purchasing bitcoin ought to be quick and easy, but over the years, encroaching KY...

Read more
20190323_fbd001
Big tech faces competition and privacy concerns in Brussels
March 25, 2019

And the sector may be the better for it Print edition | Briefing Mar 23rd 2019 | PARIS Around 19 ...

Read more