<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: The Politics of Security</title>
	<atom:link href="http://www.epanorama.net/blog/2013/06/04/the-politics-of-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2013/06/04/the-politics-of-security/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Sat, 25 Apr 2026 11:56:54 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/06/04/the-politics-of-security/comment-page-1/#comment-1477211</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 04 Mar 2016 07:56:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20134#comment-1477211</guid>
		<description><![CDATA[FBI is asking courts to legalize crypto backdoors because Congress won’t
The most lawmakers have done is float bill to create a &quot;commission&quot; to study issue.
http://arstechnica.com/tech-policy/2016/03/fbi-is-asking-courts-to-legalize-crypto-backdoors-because-congress-wont/

James Comey, the FBI director, told a House panel on Tuesday that the so-called “Going Dark” problem is “grave, growing, and extremely complex.” (PDF)

His prepared testimony to the House Judiciary Committee is not surprising. There’s been a chorus of government actors singing that same song for years. But what we didn&#039;t hear was the bureau director ask Congress for legislation authorizing encryption backdoors. That’s because there’s no congressional support—which underscores why the President Obama administration is now invoking a 1789 obscure law in federal courthouses asking judges to do what Congress has declined to do.

&quot;If I didn&#039;t do that, I oughta be fired,&quot; Comey told the panel during his live testimony. The panel&#039;s hearing, &quot;Encryption Tightrope: Balancing Americans&#039; Security and Privacy,&quot; was largely dedicated to the FBI&#039;s legal battle with Apple. He said if the bureau had the capability to bypass iPhone passcode locks in the dozens of pending cases where they&#039;ve gone to court, &quot;We wouldn&#039;t be litigating if we could.&quot;]]></description>
		<content:encoded><![CDATA[<p>FBI is asking courts to legalize crypto backdoors because Congress won’t<br />
The most lawmakers have done is float bill to create a &#8220;commission&#8221; to study issue.<br />
<a href="http://arstechnica.com/tech-policy/2016/03/fbi-is-asking-courts-to-legalize-crypto-backdoors-because-congress-wont/" rel="nofollow">http://arstechnica.com/tech-policy/2016/03/fbi-is-asking-courts-to-legalize-crypto-backdoors-because-congress-wont/</a></p>
<p>James Comey, the FBI director, told a House panel on Tuesday that the so-called “Going Dark” problem is “grave, growing, and extremely complex.” (PDF)</p>
<p>His prepared testimony to the House Judiciary Committee is not surprising. There’s been a chorus of government actors singing that same song for years. But what we didn&#8217;t hear was the bureau director ask Congress for legislation authorizing encryption backdoors. That’s because there’s no congressional support—which underscores why the President Obama administration is now invoking a 1789 obscure law in federal courthouses asking judges to do what Congress has declined to do.</p>
<p>&#8220;If I didn&#8217;t do that, I oughta be fired,&#8221; Comey told the panel during his live testimony. The panel&#8217;s hearing, &#8220;Encryption Tightrope: Balancing Americans&#8217; Security and Privacy,&#8221; was largely dedicated to the FBI&#8217;s legal battle with Apple. He said if the bureau had the capability to bypass iPhone passcode locks in the dozens of pending cases where they&#8217;ve gone to court, &#8220;We wouldn&#8217;t be litigating if we could.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/06/04/the-politics-of-security/comment-page-1/#comment-1477203</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 04 Mar 2016 07:44:17 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20134#comment-1477203</guid>
		<description><![CDATA[Pavel Alpeyev / Bloomberg Business: 	
Samsung says customer privacy is “extremely important” and backdoors would undermine trust, but stops short of openly supporting Apple, won&#039;t file amicus brief  —  Samsung Echoes Apple&#039;s Arguments on Importance of User Privacy  —  The world&#039;s largest smartphone vendor also opposes backdoors

Samsung Echoes Apple&#039;s Arguments on Importance of User Privacy
http://www.bloomberg.com/news/articles/2016-03-03/samsung-echoes-apple-s-arguments-on-importance-of-user-privacy

New York Times: 	
Several tech execs were initially worried about supporting Apple in FBI case because of its potential to backfire, concerns over public perception  —  Apple Gets Tech Industry Backing in iPhone Dispute, Despite Misgivings  —  It is a remarkable moment for the technology industry … 

Apple Gets Tech Industry Backing in iPhone Dispute, Despite Misgivings
http://www.nytimes.com/2016/03/03/technology/tech-rallies-to-apples-defense-but-not-without-some-hand-wringing.html?_r=0]]></description>
		<content:encoded><![CDATA[<p>Pavel Alpeyev / Bloomberg Business:<br />
Samsung says customer privacy is “extremely important” and backdoors would undermine trust, but stops short of openly supporting Apple, won&#8217;t file amicus brief  —  Samsung Echoes Apple&#8217;s Arguments on Importance of User Privacy  —  The world&#8217;s largest smartphone vendor also opposes backdoors</p>
<p>Samsung Echoes Apple&#8217;s Arguments on Importance of User Privacy<br />
<a href="http://www.bloomberg.com/news/articles/2016-03-03/samsung-echoes-apple-s-arguments-on-importance-of-user-privacy" rel="nofollow">http://www.bloomberg.com/news/articles/2016-03-03/samsung-echoes-apple-s-arguments-on-importance-of-user-privacy</a></p>
<p>New York Times:<br />
Several tech execs were initially worried about supporting Apple in FBI case because of its potential to backfire, concerns over public perception  —  Apple Gets Tech Industry Backing in iPhone Dispute, Despite Misgivings  —  It is a remarkable moment for the technology industry … </p>
<p>Apple Gets Tech Industry Backing in iPhone Dispute, Despite Misgivings<br />
<a href="http://www.nytimes.com/2016/03/03/technology/tech-rallies-to-apples-defense-but-not-without-some-hand-wringing.html?_r=0" rel="nofollow">http://www.nytimes.com/2016/03/03/technology/tech-rallies-to-apples-defense-but-not-without-some-hand-wringing.html?_r=0</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/06/04/the-politics-of-security/comment-page-1/#comment-1457589</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 04 Dec 2015 07:40:01 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20134#comment-1457589</guid>
		<description><![CDATA[Surveillance after Paris 
https://opendemocracy.net/david-lyon/surveillance-after-paris

There’s little evidence that “mass surveillance” catches potential terrorists, but it does risk catching innocents. More conventional police methods are more effective against terrorism.

The Friday 13 events in Paris were horrendous – bloody and heartless attacks without warning on innocent civilians enjoying a warm November evening, in restaurants and bars, at a concert and a soccer game. A few days before, I had been walking through neighbouring districts, taking in the sights and sounds of a great city. 

Anyone who knows about security-and-surveillance could guess what would happen. Security authorities would want more powers and governments would gauge how far they could go. Of course, it’s understandable that any government in that position will wish to reassure the population with visible signs of security. But governments do tend to rush headlong into new counter-terrorism measures after a major attack like that in Paris. Sometimes they are desperate to show that they are doing something.

Unfortunately, French responses thus far follow a familiar pattern… So border checks were increased with ramped-up databases and reinforced surveillance.

Events like these are also viewed as ideal opportunities to make policy changes. As Naomi Klein shows in Shock Doctrine, some governments have for many years exploited crises to push through controversial law or policy

Learning from the past

While tightened security may seem like a good plan, changing the rules and demanding greater powers for security and intelligence services in the wake of attacks may not be wise. Sober judgment, not knee-jerk responses, is called for. After the Charlie Hebdo attacks earlier in 2015, the French introduced new laws for warrantless searches, ISPs to collect communications metadata, and trimmed oversight for agencies. This time – in November – some borders were temporarily closed and a 3-month state of emergency was declared. 

We saw it, classically, in the US after 9/11, but also in the UK after 7/7

The evidence that what Snowden and others call “mass surveillance” produces better ways of tracking terrorists is hard to find.

Does mass surveillance work?

Does allowing intelligence agencies to collect more data – what Snowden and others call “mass surveillance” – or increasing powers of arrest and detention, and removing checks and balances, really improve things? The evidence that these produce better ways of tracking terrorists is hard to find. More is not necessarily better when it comes to data. In 2013, the White House claimed that more than 50 terror plots had been uncovered by the NSA’s methods. But in 2014 two independent reviews showed that in 255 terrorism cases investigated by the NSA, only four were the result of using phone metadata and none of the four prevented attacks. 

Edward Snowden is clear about this. Reflecting on the Charlie Hebdo attacks in Paris, he pointed out that these occurred despite the mass surveillance programs introduced there in 2013. Observing that French law was now one of the most intrusive and expansive laws in Europe, he commented that it still didn’t stop the attack. They’re simply “burying people under too much data,” he said. 

After the November attacks in Paris, American agencies were quick to blame Snowden – along with internet encryption and Silicon Valley privacy policies.

The New York Times argued that in fact Paris was a case of failure to act on information the authorities already had. As for encryption, the Paris attackers used none. 

By and large, conventional police work, based on targeted surveillance of suspects, is what produces results.

In case after case, we have seen that intelligence agencies knew about those who committed atrocities but failed to – as they say – connect the dots. 

Collateral damage

At the same time, indiscriminate surveillance creates new risks; innocent “suspects,” the chilling effects of everyone being tracked and checked and the denial of democracy – which ironically is a victory for terrorists. Terrorism arises, it seems, from groups that despise diversity and who seek national, political or religious homogeneity. 

Security-driven surveillance today is very enamoured of big data ‘solutions’ – seen especially in the application of new analytics to seeking out suspects. 

While there may well be appropriate ways of using the so-called ‘data deluge’ created by internet and particularly social media use, the current trend is towards prediction and preemption.

Fears and futures

After 9/11, I argued that one of the worst outcomes of the various responses to terrorism is the fomenting of fear. Without for a moment discounting the appalling suffering and loss associated with the Paris attacks – or any others – it must be said that some responses to such atrocities are also highly dangerous. At the far end of fear-mongering is the proposal from US presidential contender Donald Trump to establish a database of American Muslims. If he were not so popular this could be discounted as fascist fanaticism.

But the trouble with many surveillance responses is that they do so well what marks surveillance today – a process of social sorting that classifies populations in order to treat different groups differently. Thus what is done requires utmost care. Categories have consequences. 

When security agencies make their case for more data, more sophisticated analytics, they often make it sound as if these were neutral technologies. 

Making a difference

Snowden insists – and proves it by his own example – that any and all can help to make a difference. These are not problems that can be solved overnight by some hastily concocted laws or a furious rush to foreclose freedoms. Indeed, these exacerbate our situation. Surveillance today touches us all and we all need to take action, however small, to change things for the better.]]></description>
		<content:encoded><![CDATA[<p>Surveillance after Paris<br />
<a href="https://opendemocracy.net/david-lyon/surveillance-after-paris" rel="nofollow">https://opendemocracy.net/david-lyon/surveillance-after-paris</a></p>
<p>There’s little evidence that “mass surveillance” catches potential terrorists, but it does risk catching innocents. More conventional police methods are more effective against terrorism.</p>
<p>The Friday 13 events in Paris were horrendous – bloody and heartless attacks without warning on innocent civilians enjoying a warm November evening, in restaurants and bars, at a concert and a soccer game. A few days before, I had been walking through neighbouring districts, taking in the sights and sounds of a great city. </p>
<p>Anyone who knows about security-and-surveillance could guess what would happen. Security authorities would want more powers and governments would gauge how far they could go. Of course, it’s understandable that any government in that position will wish to reassure the population with visible signs of security. But governments do tend to rush headlong into new counter-terrorism measures after a major attack like that in Paris. Sometimes they are desperate to show that they are doing something.</p>
<p>Unfortunately, French responses thus far follow a familiar pattern… So border checks were increased with ramped-up databases and reinforced surveillance.</p>
<p>Events like these are also viewed as ideal opportunities to make policy changes. As Naomi Klein shows in Shock Doctrine, some governments have for many years exploited crises to push through controversial law or policy</p>
<p>Learning from the past</p>
<p>While tightened security may seem like a good plan, changing the rules and demanding greater powers for security and intelligence services in the wake of attacks may not be wise. Sober judgment, not knee-jerk responses, is called for. After the Charlie Hebdo attacks earlier in 2015, the French introduced new laws for warrantless searches, ISPs to collect communications metadata, and trimmed oversight for agencies. This time – in November – some borders were temporarily closed and a 3-month state of emergency was declared. </p>
<p>We saw it, classically, in the US after 9/11, but also in the UK after 7/7</p>
<p>The evidence that what Snowden and others call “mass surveillance” produces better ways of tracking terrorists is hard to find.</p>
<p>Does mass surveillance work?</p>
<p>Does allowing intelligence agencies to collect more data – what Snowden and others call “mass surveillance” – or increasing powers of arrest and detention, and removing checks and balances, really improve things? The evidence that these produce better ways of tracking terrorists is hard to find. More is not necessarily better when it comes to data. In 2013, the White House claimed that more than 50 terror plots had been uncovered by the NSA’s methods. But in 2014 two independent reviews showed that in 255 terrorism cases investigated by the NSA, only four were the result of using phone metadata and none of the four prevented attacks. </p>
<p>Edward Snowden is clear about this. Reflecting on the Charlie Hebdo attacks in Paris, he pointed out that these occurred despite the mass surveillance programs introduced there in 2013. Observing that French law was now one of the most intrusive and expansive laws in Europe, he commented that it still didn’t stop the attack. They’re simply “burying people under too much data,” he said. </p>
<p>After the November attacks in Paris, American agencies were quick to blame Snowden – along with internet encryption and Silicon Valley privacy policies.</p>
<p>The New York Times argued that in fact Paris was a case of failure to act on information the authorities already had. As for encryption, the Paris attackers used none. </p>
<p>By and large, conventional police work, based on targeted surveillance of suspects, is what produces results.</p>
<p>In case after case, we have seen that intelligence agencies knew about those who committed atrocities but failed to – as they say – connect the dots. </p>
<p>Collateral damage</p>
<p>At the same time, indiscriminate surveillance creates new risks; innocent “suspects,” the chilling effects of everyone being tracked and checked and the denial of democracy – which ironically is a victory for terrorists. Terrorism arises, it seems, from groups that despise diversity and who seek national, political or religious homogeneity. </p>
<p>Security-driven surveillance today is very enamoured of big data ‘solutions’ – seen especially in the application of new analytics to seeking out suspects. </p>
<p>While there may well be appropriate ways of using the so-called ‘data deluge’ created by internet and particularly social media use, the current trend is towards prediction and preemption.</p>
<p>Fears and futures</p>
<p>After 9/11, I argued that one of the worst outcomes of the various responses to terrorism is the fomenting of fear. Without for a moment discounting the appalling suffering and loss associated with the Paris attacks – or any others – it must be said that some responses to such atrocities are also highly dangerous. At the far end of fear-mongering is the proposal from US presidential contender Donald Trump to establish a database of American Muslims. If he were not so popular this could be discounted as fascist fanaticism.</p>
<p>But the trouble with many surveillance responses is that they do so well what marks surveillance today – a process of social sorting that classifies populations in order to treat different groups differently. Thus what is done requires utmost care. Categories have consequences. </p>
<p>When security agencies make their case for more data, more sophisticated analytics, they often make it sound as if these were neutral technologies. </p>
<p>Making a difference</p>
<p>Snowden insists – and proves it by his own example – that any and all can help to make a difference. These are not problems that can be solved overnight by some hastily concocted laws or a furious rush to foreclose freedoms. Indeed, these exacerbate our situation. Surveillance today touches us all and we all need to take action, however small, to change things for the better.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/06/04/the-politics-of-security/comment-page-1/#comment-1452618</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 18 Nov 2015 12:47:26 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20134#comment-1452618</guid>
		<description><![CDATA[Exploiting Emotions About Paris to Blame Snowden, Distract from Actual Culprits Who Empowered ISIS
http://www.epanorama.net/newepa/2015/11/17/exploiting-emotions-about-paris-to-blame-snowden-distract-from-actual-culprits-who-empowered-isis/]]></description>
		<content:encoded><![CDATA[<p>Exploiting Emotions About Paris to Blame Snowden, Distract from Actual Culprits Who Empowered ISIS<br />
<a href="http://www.epanorama.net/newepa/2015/11/17/exploiting-emotions-about-paris-to-blame-snowden-distract-from-actual-culprits-who-empowered-isis/" rel="nofollow">http://www.epanorama.net/newepa/2015/11/17/exploiting-emotions-about-paris-to-blame-snowden-distract-from-actual-culprits-who-empowered-isis/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/06/04/the-politics-of-security/comment-page-1/#comment-1452617</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 18 Nov 2015 12:47:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20134#comment-1452617</guid>
		<description><![CDATA[Natasha Lomas / TechCrunch: 	
In the aftermath of Paris attacks, intelligence agencies scapegoat encryption to mask the failures of mass surveillance  —  Encryption Is Being Scapegoated To Mask The Failures Of Mass Surveillance  —  Well that took no time at all.  Intelligence agencies rolled right into the horror … 

Encryption Is Being Scapegoated To Mask The Failures Of Mass Surveillance
http://techcrunch.com/2015/11/17/the-blame-game/

Well that took no time at all. Intelligence agencies rolled right into the horror and fury in the immediate wake of the latest co-ordinated terror attacks in the French capital on Friday, to launch their latest co-ordinated assault on strong encryption — and on the tech companies creating secure comms services — seeking to scapegoat end-to-end encryption as the enabling layer for extremists to perpetrate mass murder.

There’s no doubt they were waiting for just such an ‘opportune moment’ to redouble their attacks on encryption after recent attempts to lobby for encryption-perforating legislation foundered. (A strategy confirmed by a leaked email sent by the intelligence community’s top lawyer, Robert S. Litt, this August — and subsequently obtained by the Washington Post — in which he anticipated that a “very hostile legislative environment… could turn in the event of a terrorist attack or criminal event where strong encryption can be shown to have hindered law enforcement”. Et voila Paris… )

Speaking to CBS News the weekend in the immediate aftermath of the Paris attacks, former CIA deputy director Michael Morell said: “I think this is going to open an entire new debate about security versus privacy.”

Elsewhere the fast-flowing attacks on encrypted tech services have come without a byline — from unnamed European and American officials who say they are “not authorized to speak publicly”. Yet are happy to speak publicly, anonymously.

The NYT published an article on Sunday alleging that attackers had used “encryption technology” to communicate — citing “European officials who had been briefed on the investigation but were not authorized to speak publicly”. (The paper subsequently pulled the article from its website, as noted by InsideSources, although it can still be read via the Internet Archive.)

The irony of government/intelligence agency sources briefing against encryption on condition of anonymity as they seek to undermine the public’s right to privacy would be darkly comic if it weren’t quite so brazen.

Here’s what one such unidentified British intelligence source told Politico: “As members of the general public get preoccupied that the government is spying on them, they have adopted these applications and terrorists have found them tailor-made for their own use.”

&quot;Seeking to outlaw technology tools that are used by the vast majority of people to protect the substance of law-abiding lives is not just bad politics, it’s dangerous policy.&quot;

In the same Politico article, an identified source — J.M. Berger, the co-author of a book about ISIS — makes a far more credible claim: “Terrorists use technology improvisationally.”

Of course they do. The co-founder of secure messaging app Telegram, Pavel Durov, made much the same point earlier this fall when asked directly by TechCrunch about ISIS using his app to communicate. “Ultimately the ISIS will always find a way to communicate within themselves. And if any means of communication turns out to be not secure for them, then they switch to another one,” Durov argued. “I still think we’re doing the right thing — protecting our users privacy.”

Bottom line: banning encryption or enforcing tech companies to backdoor communications services has zero chance of being effective at stopping terrorists finding ways to communicate securely. They can and will route around such attempts to infiltrate their comms, as others have detailed at length.

Here’s a recap: terrorists can use encryption tools that are freely distributed from countries where your anti-encryption laws have no jurisdiction. Terrorists can (and do) build their own securely encrypted communication tools. Terrorists can switch to newer (or older) technologies to circumvent enforcement laws or enforced perforations. They can use plain old obfuscation to code their communications within noisy digital platforms like the Playstation 4 network, folding their chatter into general background digital noise (of which there is no shortage). And terrorists can meet in person, using a network of trusted couriers to facilitate these meetings, as Al Qaeda — the terrorist group that perpetrated the highly sophisticated 9/11 attacks at a time when smartphones were far less common, nor was there a ready supply of easy-to-use end-to-end encrypted messaging apps — is known to have done.

Point is, technology is not a two-lane highway that can be regulated with a couple of neat roadblocks — whatever many politicians appear to think. All such roadblocks will do is catch the law-abiding citizens who rely on digital highways to conduct more and more aspects of their daily lives. And make those law-abiding citizens less safe in multiple ways.]]></description>
		<content:encoded><![CDATA[<p>Natasha Lomas / TechCrunch:<br />
In the aftermath of Paris attacks, intelligence agencies scapegoat encryption to mask the failures of mass surveillance  —  Encryption Is Being Scapegoated To Mask The Failures Of Mass Surveillance  —  Well that took no time at all.  Intelligence agencies rolled right into the horror … </p>
<p>Encryption Is Being Scapegoated To Mask The Failures Of Mass Surveillance<br />
<a href="http://techcrunch.com/2015/11/17/the-blame-game/" rel="nofollow">http://techcrunch.com/2015/11/17/the-blame-game/</a></p>
<p>Well that took no time at all. Intelligence agencies rolled right into the horror and fury in the immediate wake of the latest co-ordinated terror attacks in the French capital on Friday, to launch their latest co-ordinated assault on strong encryption — and on the tech companies creating secure comms services — seeking to scapegoat end-to-end encryption as the enabling layer for extremists to perpetrate mass murder.</p>
<p>There’s no doubt they were waiting for just such an ‘opportune moment’ to redouble their attacks on encryption after recent attempts to lobby for encryption-perforating legislation foundered. (A strategy confirmed by a leaked email sent by the intelligence community’s top lawyer, Robert S. Litt, this August — and subsequently obtained by the Washington Post — in which he anticipated that a “very hostile legislative environment… could turn in the event of a terrorist attack or criminal event where strong encryption can be shown to have hindered law enforcement”. Et voila Paris… )</p>
<p>Speaking to CBS News the weekend in the immediate aftermath of the Paris attacks, former CIA deputy director Michael Morell said: “I think this is going to open an entire new debate about security versus privacy.”</p>
<p>Elsewhere the fast-flowing attacks on encrypted tech services have come without a byline — from unnamed European and American officials who say they are “not authorized to speak publicly”. Yet are happy to speak publicly, anonymously.</p>
<p>The NYT published an article on Sunday alleging that attackers had used “encryption technology” to communicate — citing “European officials who had been briefed on the investigation but were not authorized to speak publicly”. (The paper subsequently pulled the article from its website, as noted by InsideSources, although it can still be read via the Internet Archive.)</p>
<p>The irony of government/intelligence agency sources briefing against encryption on condition of anonymity as they seek to undermine the public’s right to privacy would be darkly comic if it weren’t quite so brazen.</p>
<p>Here’s what one such unidentified British intelligence source told Politico: “As members of the general public get preoccupied that the government is spying on them, they have adopted these applications and terrorists have found them tailor-made for their own use.”</p>
<p>&#8220;Seeking to outlaw technology tools that are used by the vast majority of people to protect the substance of law-abiding lives is not just bad politics, it’s dangerous policy.&#8221;</p>
<p>In the same Politico article, an identified source — J.M. Berger, the co-author of a book about ISIS — makes a far more credible claim: “Terrorists use technology improvisationally.”</p>
<p>Of course they do. The co-founder of secure messaging app Telegram, Pavel Durov, made much the same point earlier this fall when asked directly by TechCrunch about ISIS using his app to communicate. “Ultimately the ISIS will always find a way to communicate within themselves. And if any means of communication turns out to be not secure for them, then they switch to another one,” Durov argued. “I still think we’re doing the right thing — protecting our users privacy.”</p>
<p>Bottom line: banning encryption or enforcing tech companies to backdoor communications services has zero chance of being effective at stopping terrorists finding ways to communicate securely. They can and will route around such attempts to infiltrate their comms, as others have detailed at length.</p>
<p>Here’s a recap: terrorists can use encryption tools that are freely distributed from countries where your anti-encryption laws have no jurisdiction. Terrorists can (and do) build their own securely encrypted communication tools. Terrorists can switch to newer (or older) technologies to circumvent enforcement laws or enforced perforations. They can use plain old obfuscation to code their communications within noisy digital platforms like the Playstation 4 network, folding their chatter into general background digital noise (of which there is no shortage). And terrorists can meet in person, using a network of trusted couriers to facilitate these meetings, as Al Qaeda — the terrorist group that perpetrated the highly sophisticated 9/11 attacks at a time when smartphones were far less common, nor was there a ready supply of easy-to-use end-to-end encrypted messaging apps — is known to have done.</p>
<p>Point is, technology is not a two-lane highway that can be regulated with a couple of neat roadblocks — whatever many politicians appear to think. All such roadblocks will do is catch the law-abiding citizens who rely on digital highways to conduct more and more aspects of their daily lives. And make those law-abiding citizens less safe in multiple ways.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/06/04/the-politics-of-security/comment-page-1/#comment-1397219</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 26 May 2015 08:41:02 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20134#comment-1397219</guid>
		<description><![CDATA[Will Obama’s cybersecurity executive order make a difference?
http://www.csoonline.com/article/2900872/malware-cybercrime/will-obama-s-cybersecurity-executive-order-make-a-difference.html?utm_source=taboola&amp;utm_medium=referral

Will Obama’s Cybersecurity Executive Order Make a Difference?

We continue to live in a world that is exciting with new, easy-to-use technology that allows all of us to be more effective and efficient in our business and personal lives. Yet the ease of use of this technology also puts all of us at risk.

President Obama and many in government and the private sector realize there is so much more that all of us could and should do to ensure we can be confident that our most sensitive personal data is safe. It is our right and we need to take action against the cyber adversaries that wish to do us harm.

The EO and the legislation previously passed by Congress is a great start. But in order for the actions taken to increase information sharing among the public and private sectors to really be effective, additional legislation is necessary. We need to see liability relief along with codified roles and responsibilities for the public and private sector regarding information sharing. In addition, the President has called for a national breach process and updated criminal laws to support today’s security needs and the future environment. We support that. With this approach, information sharing can, in fact, truly become actionable and allow the good guys to operate inside the bad guy’s decision cycle.]]></description>
		<content:encoded><![CDATA[<p>Will Obama’s cybersecurity executive order make a difference?<br />
<a href="http://www.csoonline.com/article/2900872/malware-cybercrime/will-obama-s-cybersecurity-executive-order-make-a-difference.html?utm_source=taboola&#038;utm_medium=referral" rel="nofollow">http://www.csoonline.com/article/2900872/malware-cybercrime/will-obama-s-cybersecurity-executive-order-make-a-difference.html?utm_source=taboola&#038;utm_medium=referral</a></p>
<p>Will Obama’s Cybersecurity Executive Order Make a Difference?</p>
<p>We continue to live in a world that is exciting with new, easy-to-use technology that allows all of us to be more effective and efficient in our business and personal lives. Yet the ease of use of this technology also puts all of us at risk.</p>
<p>President Obama and many in government and the private sector realize there is so much more that all of us could and should do to ensure we can be confident that our most sensitive personal data is safe. It is our right and we need to take action against the cyber adversaries that wish to do us harm.</p>
<p>The EO and the legislation previously passed by Congress is a great start. But in order for the actions taken to increase information sharing among the public and private sectors to really be effective, additional legislation is necessary. We need to see liability relief along with codified roles and responsibilities for the public and private sector regarding information sharing. In addition, the President has called for a national breach process and updated criminal laws to support today’s security needs and the future environment. We support that. With this approach, information sharing can, in fact, truly become actionable and allow the good guys to operate inside the bad guy’s decision cycle.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/06/04/the-politics-of-security/comment-page-1/#comment-1373119</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 09 Apr 2015 08:13:54 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20134#comment-1373119</guid>
		<description><![CDATA[Sam Machkovech / Ars Technica: 	
Presidential candidate Rand Paul promises to end warrantless searches of phone, computer records; campaign site sells $15 “NSA spy cam blocker” sticker

Rand Paul sells “NSA spy cam blocker” as presidential bid fundraiser
Bid announcement video taken off YouTube due to copyright claim over a song.
http://arstechnica.com/tech-policy/2015/04/rand-paul-sells-nsa-spy-cam-blocker-as-presidential-bid-fundraiser/]]></description>
		<content:encoded><![CDATA[<p>Sam Machkovech / Ars Technica:<br />
Presidential candidate Rand Paul promises to end warrantless searches of phone, computer records; campaign site sells $15 “NSA spy cam blocker” sticker</p>
<p>Rand Paul sells “NSA spy cam blocker” as presidential bid fundraiser<br />
Bid announcement video taken off YouTube due to copyright claim over a song.<br />
<a href="http://arstechnica.com/tech-policy/2015/04/rand-paul-sells-nsa-spy-cam-blocker-as-presidential-bid-fundraiser/" rel="nofollow">http://arstechnica.com/tech-policy/2015/04/rand-paul-sells-nsa-spy-cam-blocker-as-presidential-bid-fundraiser/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/06/04/the-politics-of-security/comment-page-1/#comment-1373110</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Thu, 09 Apr 2015 08:06:41 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20134#comment-1373110</guid>
		<description><![CDATA[Turns Out Feds Actually Tracked Most International Calls For Nearly A Decade Before 9/11 -- Didn&#039;t Stop The Attack
https://www.techdirt.com/articles/20150407/17213830578/turns-out-feds-actually-tracked-most-international-calls-nearly-decade-before-911-didnt-stop-attack.shtml

One of the big arguments trotted out repeatedly by surveillance state defenders concerning the NSA&#039;s Section 215 program to collect records on all phone calls is that such a thing &quot;would have prevented 9/11&quot; if it had been in place at the time. Here&#039;s former FBI boss Robert Mueller making just that argument right after the initial Snowden leaks. Here&#039;s Dianne Feinstein making the argument that if we had that phone tracking program before September 11th, we could have stopped the attacks. And here&#039;s former NSA top lawyer and still top NSA supporter Stewart Baker arguing that the program is necessary because the lack of such a program failed to stop 9/11.

Except, it turns out, the feds did have just such a program prior to 9/11 -- run by the DEA.

&quot;The now-discontinued operation, carried out by the DEA&#039;s intelligence arm, was the government&#039;s first known effort to gather data on Americans in bulk, sweeping up records of telephone calls made by millions of U.S. citizens regardless of whether they were suspected of a crime. It was a model for the massive phone surveillance system the NSA launched to identify terrorists after the Sept. 11 attacks. That dragnet drew sharp criticism that the government had intruded too deeply into Americans&#039; privacy after former NSA contractor Edward Snowden leaked it to the news media two years ago.&quot;]]></description>
		<content:encoded><![CDATA[<p>Turns Out Feds Actually Tracked Most International Calls For Nearly A Decade Before 9/11 &#8212; Didn&#8217;t Stop The Attack<br />
<a href="https://www.techdirt.com/articles/20150407/17213830578/turns-out-feds-actually-tracked-most-international-calls-nearly-decade-before-911-didnt-stop-attack.shtml" rel="nofollow">https://www.techdirt.com/articles/20150407/17213830578/turns-out-feds-actually-tracked-most-international-calls-nearly-decade-before-911-didnt-stop-attack.shtml</a></p>
<p>One of the big arguments trotted out repeatedly by surveillance state defenders concerning the NSA&#8217;s Section 215 program to collect records on all phone calls is that such a thing &#8220;would have prevented 9/11&#8243; if it had been in place at the time. Here&#8217;s former FBI boss Robert Mueller making just that argument right after the initial Snowden leaks. Here&#8217;s Dianne Feinstein making the argument that if we had that phone tracking program before September 11th, we could have stopped the attacks. And here&#8217;s former NSA top lawyer and still top NSA supporter Stewart Baker arguing that the program is necessary because the lack of such a program failed to stop 9/11.</p>
<p>Except, it turns out, the feds did have just such a program prior to 9/11 &#8212; run by the DEA.</p>
<p>&#8220;The now-discontinued operation, carried out by the DEA&#8217;s intelligence arm, was the government&#8217;s first known effort to gather data on Americans in bulk, sweeping up records of telephone calls made by millions of U.S. citizens regardless of whether they were suspected of a crime. It was a model for the massive phone surveillance system the NSA launched to identify terrorists after the Sept. 11 attacks. That dragnet drew sharp criticism that the government had intruded too deeply into Americans&#8217; privacy after former NSA contractor Edward Snowden leaked it to the news media two years ago.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/06/04/the-politics-of-security/comment-page-1/#comment-1356787</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 13 Mar 2015 15:04:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20134#comment-1356787</guid>
		<description><![CDATA[Technology should be used to create social mobility – not to spy on citizens
http://www.theguardian.com/technology/2015/mar/10/nsa-gchq-technology-create-social-mobility-spy-on-citizens

NSA and GCHQ mass surveillance is more about disrupting political opposition than catching terrorists

Why spy? That’s the several-million pound question, in the wake of the Snowden revelations. Why would the US continue to wiretap its entire population, given that the only “terrorism” they caught with it was a single attempt to send a small amount of money to Al Shabab?

One obvious answer is: because they can. Spying is cheap, and cheaper every day. Many people have compared NSA/GCHQ mass spying to the surveillance programme of East Germany’s notorious Stasi, but the differences between the NSA and the Stasi are more interesting than the similarities.

The most important difference is size. The Stasi employed one snitch for every 50 or 60 people it watched. We can’t be sure of the size of the entire Five Eyes global surveillance workforce, but there are only about 1.4 million Americans with Top Secret clearance, and many of them don’t work at or for the NSA, which means that the number is smaller than that (the other Five Eyes states have much smaller workforces than the US). This million-ish person workforce keeps six or seven billion people under surveillance – a ratio approaching 1:10,000. What’s more, the US has only (“only”!) quadrupled its surveillance budget since the end of the Cold War: tooling up to give the spies their toys wasn’t all that expensive, compared to the number of lives that gear lets them pry into.

IT has been responsible for a 2-3 order of magnitude productivity gain in surveillance efficiency. The Stasi used an army to surveil a nation; the NSA uses a battalion to surveil a planet. 

Spying, especially domestic spying, is an aspect of what the Santa Fe Institute economist Samuel Bowles calls guard labour: work that is done to stabilise property relationships, especially the property belonging to the rich.]]></description>
		<content:encoded><![CDATA[<p>Technology should be used to create social mobility – not to spy on citizens<br />
<a href="http://www.theguardian.com/technology/2015/mar/10/nsa-gchq-technology-create-social-mobility-spy-on-citizens" rel="nofollow">http://www.theguardian.com/technology/2015/mar/10/nsa-gchq-technology-create-social-mobility-spy-on-citizens</a></p>
<p>NSA and GCHQ mass surveillance is more about disrupting political opposition than catching terrorists</p>
<p>Why spy? That’s the several-million pound question, in the wake of the Snowden revelations. Why would the US continue to wiretap its entire population, given that the only “terrorism” they caught with it was a single attempt to send a small amount of money to Al Shabab?</p>
<p>One obvious answer is: because they can. Spying is cheap, and cheaper every day. Many people have compared NSA/GCHQ mass spying to the surveillance programme of East Germany’s notorious Stasi, but the differences between the NSA and the Stasi are more interesting than the similarities.</p>
<p>The most important difference is size. The Stasi employed one snitch for every 50 or 60 people it watched. We can’t be sure of the size of the entire Five Eyes global surveillance workforce, but there are only about 1.4 million Americans with Top Secret clearance, and many of them don’t work at or for the NSA, which means that the number is smaller than that (the other Five Eyes states have much smaller workforces than the US). This million-ish person workforce keeps six or seven billion people under surveillance – a ratio approaching 1:10,000. What’s more, the US has only (“only”!) quadrupled its surveillance budget since the end of the Cold War: tooling up to give the spies their toys wasn’t all that expensive, compared to the number of lives that gear lets them pry into.</p>
<p>IT has been responsible for a 2-3 order of magnitude productivity gain in surveillance efficiency. The Stasi used an army to surveil a nation; the NSA uses a battalion to surveil a planet. </p>
<p>Spying, especially domestic spying, is an aspect of what the Santa Fe Institute economist Samuel Bowles calls guard labour: work that is done to stabilise property relationships, especially the property belonging to the rich.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/06/04/the-politics-of-security/comment-page-1/#comment-1354965</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Tue, 10 Mar 2015 09:13:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=20134#comment-1354965</guid>
		<description><![CDATA[We have no self-control: America&#039;s most powerful men explain why they&#039;re scared of email
Hillary Clinton email-gate gives Senators Luddite, Graham and McCain enough rope
http://www.theregister.co.uk/2015/03/09/we_have_no_selfcontrol_us_most_powerful_men_explain_why_theyre_scared_of_email/

Two of the most powerful men in the United States have revealed they don&#039;t use email - because they&#039;re scared of what they might say.

&quot;I don&#039;t email. You can have every email I&#039;ve ever sent. I&#039;ve never sent one,&quot; Senator Lindsey Graham told NBC&#039;s Meet the Press yesterday. Graham&#039;s statement follows a similar admission by Senator John McCain late last week who confirmed he also doesn&#039;t email, telling MSNBC: &quot;I&#039;d rather use the phone, I&#039;d rather use tweets.&quot;

Even more bizarre is the reason both Senators give for not using email: they lack the necessary self-control not to say something stupid.

Graham told a confused Bloomberg News: &quot;I&#039;ve tried not to have a system where I can just say the first dumb thing that comes to my mind. I&#039;ve always been concerned. I can get texts, and I call you back, if I want.&quot;

McCain meanwhile said this: &quot;I&#039;m afraid that if I was emailing, given my solid, always calm temperament that I might email something that I might regret. You could send out an email that you would regret later on and would be maybe taken out of context.&quot;

But while the original Luddites took to smashing up the machinery of the 19th century, Graham and McCain are happy to do something much more dangerous: allow internet technologies to be abused by the government agencies they are supposed to be overseeing.

The solution to vast intrusions into privacy, in the senior lawmakers&#039; eyes, is seemingly not to protect citizens from those carrying out surveillance but to simply opt out of using technology altogether.

And that is far more disturbing that the use of personal email by a former secretary of state.]]></description>
		<content:encoded><![CDATA[<p>We have no self-control: America&#8217;s most powerful men explain why they&#8217;re scared of email<br />
Hillary Clinton email-gate gives Senators Luddite, Graham and McCain enough rope<br />
<a href="http://www.theregister.co.uk/2015/03/09/we_have_no_selfcontrol_us_most_powerful_men_explain_why_theyre_scared_of_email/" rel="nofollow">http://www.theregister.co.uk/2015/03/09/we_have_no_selfcontrol_us_most_powerful_men_explain_why_theyre_scared_of_email/</a></p>
<p>Two of the most powerful men in the United States have revealed they don&#8217;t use email &#8211; because they&#8217;re scared of what they might say.</p>
<p>&#8220;I don&#8217;t email. You can have every email I&#8217;ve ever sent. I&#8217;ve never sent one,&#8221; Senator Lindsey Graham told NBC&#8217;s Meet the Press yesterday. Graham&#8217;s statement follows a similar admission by Senator John McCain late last week who confirmed he also doesn&#8217;t email, telling MSNBC: &#8220;I&#8217;d rather use the phone, I&#8217;d rather use tweets.&#8221;</p>
<p>Even more bizarre is the reason both Senators give for not using email: they lack the necessary self-control not to say something stupid.</p>
<p>Graham told a confused Bloomberg News: &#8220;I&#8217;ve tried not to have a system where I can just say the first dumb thing that comes to my mind. I&#8217;ve always been concerned. I can get texts, and I call you back, if I want.&#8221;</p>
<p>McCain meanwhile said this: &#8220;I&#8217;m afraid that if I was emailing, given my solid, always calm temperament that I might email something that I might regret. You could send out an email that you would regret later on and would be maybe taken out of context.&#8221;</p>
<p>But while the original Luddites took to smashing up the machinery of the 19th century, Graham and McCain are happy to do something much more dangerous: allow internet technologies to be abused by the government agencies they are supposed to be overseeing.</p>
<p>The solution to vast intrusions into privacy, in the senior lawmakers&#8217; eyes, is seemingly not to protect citizens from those carrying out surveillance but to simply opt out of using technology altogether.</p>
<p>And that is far more disturbing that the use of personal email by a former secretary of state.</p>
]]></content:encoded>
	</item>
</channel>
</rss>
