House approves 'media shield' amendment, as reporter reveals 2011 subpoena fight

houseofrep232way_wide-4bac6d92f39d630d0f94f3c708ca06710a717d2f-s6-c30The House of Representatives today voted 225-183 to approve an appropriations bill amendment that bars the Justice Department from forcing reporters to testify about their confidential sources.

Read the rest

Majority of Americans think Snowden was right to leak


A forthcoming Yougov survey found that 55 percent of Americans believe Edward Snowden was right to leak the details of Prism (it's not clear whether they were surveyed on other leaks).

Read the rest

NSA can't find any emails from Snowden, then it can (convenient, no?)

Yesterday, the NSA released an email from Edward Snowden to his superiors asking about the legality of NSA spying, claiming it was the only evidence they had that he ever tried to go through channels before turning leaker; on its face, this is pretty damning. But there's one problem: six months ago, the NSA claimed that they had no emails of the sort from Snowden, and then this one happened to turn up just in time to counter Snowden's allegations on US TV that he'd tried to blow the whistle from inside. My guess? Someone as canny as Snowden kept copies of all the communiques he made and flags he raised, and will be shortly making the NSA look like pathetic liars (again).

Read the rest

Warrantless spying makes spying-with-a-warrant impossible

Tim Bray's taxonomy of privacy levels makes a compact and compelling argument that the existence of warrantless spying and security sabotage is what drives people to adopt cryptographic techniques that can't be broken even with a warrant. Cory 1

Jonathan Lethem and Lars Eidinger's claustrophobic, Snowden-commemorating short film

Jonathan Lethem and Lars Eidinger star in Lars and Jonathan: A Berlin Friendship , a short, paranoid, quirky film made for Transmediale's Snowden-leak-commemorating Magical Secrecy Tour.

Watch the full-length NBC News interview with Edward Snowden

140528-snowden-interview-mn-1447_4c31342b0b39224722c815ad79f0ceea.nbcnews-fp-720-320

NBC News has released an online version of its featured interview with NSA whistleblower Edward Snowden, a first for US TV.

Read the rest

Mysterious announcement from Truecrypt declares the project insecure and dead

The abrupt announcement that the widely used, anonymously authored disk-encryption tool Truecrypt is insecure and will no longer be maintained shocked the crypto world–after all, this was the tool Edward Snowden himself lectured on at a Cryptoparty in Hawai’i. Cory Doctorow tries to make sense of it all.

Read the rest

NBC airs Edward Snowden's first US TV interview

140527-edward-snowden-jms-1846_6908feb78dc51d2345105e53cf6cb759.nbcnews-fp-1440-600

NBC released a preview clip from a widely-promoted Brian Williams interview with whistleblower Edward Snowden, which airs tonight, Wednesday May 28, at 10pm EDT. The hour-long interview is the former NSA contractor’s first US television interview since leaking NSA documents to reporters.

Read the rest

Greenwald's "No Place to Hide": a compelling, vital narrative about official criminality

Cory Doctorow reviews Glenn Greenwald’s long-awaited No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. More than a summary of the Snowden leaks, it’s a compelling narrative that puts the most explosive revelations about official criminality into vital context.

Read the rest

Privacy vs network effects


Respected cryptographer and security researcher Ross Anderson has a fascinating new paper, Privacy versus government surveillance: where network effects meet public choice [PDF], which explores the "privacy economics" of mass surveillance, pointing out the largely overlooked impact of "network effects" on the reality of who spies, who is spied upon, and under what circumstances.

My first big point is that all the three factors which lead to monopoly – network effects, low marginal costs and technical lock-in – are present and growing in the national-intelligence nexus itself. The Snowden papers show that neutrals like Sweden and India are heavily involved in information sharing with the NSA, even though they have tried for years to pretend otherwise. A non-aligned country such as India used to be happy to buy warplanes from Russia; nowadays it still does, but it shares intelligence with the NSA rather then the FSB. If you have a choice of joining a big spy network like America's or a small one like Russia's then it's like choosing whether to write software for the PC or the Mac back in the 1990s. It may be partly an ideological choice, but the economics can often be stronger than the ideology.

Second, modern warfare, like the software industry, has seen the bulk of its costs turn from variable costs into fixed costs. In medieval times, warfare was almost entirely a matter of manpower, and society was organised appropriately; as well as rent or produce, tenants owed their feudal lord forty days’ service in peacetime, and sixty days during a war. Barons held their land from the king in return for an oath of fealty, and a duty to provide a certain size of force on demand; priests and scholars paid a tax in lieu of service, so that a mercenary could be hired in their place. But advancing technology brought steady industrialisation. When the UK and the USA attacked Germany in 1944, we did not send millions of men to Europe, as in the first world war, but a combat force of a couple of hundred thousand troops – though with thousands of tanks and backed by larger numbers of men in support roles in tens of thousands of aircraft and ships. Nowadays the transition from labour to capital has gone still further: to kill a foreign leader, we could get a drone fire a missile that costs $30,000. But that's backed by colossal investment – the firms whose data are tapped by PRISM have a combined market capitalisation of over $1 trillion.

Third is the technical lock-in, which operates at a number of levels. First, there are lock-in effects in the underlying industries, where (for example) Cisco dominates the router market: those countries that have tried to build US-free information infrastructures (China) or even just government information infrastructures (Russia, Germany) find it’s expensive. China went to the trouble of sponsoring an indigenous vendor, Huawei, but it’s unclear how much separation that buys them because of the common code shared by router vendors: a vulnerability discovered in one firm’s products may affect another. Thus the UK government lets BT buy Huawei routers for all but its network’s most sensitive parts (the backbone and the lawful-intercept functions). Second, technical lock-in affects the equipment used by the intelligence agencies themselves, and is in fact promoted by the agencies via ETSI standards for functions such as lawful intercept.

Just as these three factors led to the IBM network dominating the mainframe age, the Intel/Microsoft network dominating the PC age, and Facebook dominating the social networking scene, so they push strongly towards global surveillance becoming a single connected ecosystem.

Privacy versus government surveillance: where network effects meet public choice (via Schneier)

(Image: Friendwheel, Steve Jurvetson, CC-BY)

The Internet With a Human Face: Maciej Cegłowski on the things we need to fix


Maciej Cegłowski's latest talk, The Internet With A Human Face, is a perfect companion to both his Our Comrade the Electron and Peter Watts's Scorched Earth Society: A Suicide Bomber's Guide to Online Privacy: a narrative that explains how the Internet of liberation became the Internet of inhuman and total surveillance. Increasingly, I'm heartened by the people who understand that the right debate to have is "How do we make the Internet a better place for human habitation?" and not "Is the Internet good or bad for us?" I'm also heartened to see the growth of the view that aggregated personal data is a kind of immortal toxic waste and that the best way to prevent spills is to not collect it in the first place.

Read the rest

Greenwald to release list of Americans under illegal NSA surveillance

Glenn Greenwald has pre-announced his next Snowden-doc publication: a list of US citizens the NSA has subjected to illegal surveillance. I keep hearing that there's a huge bang at the end of the Snowden files, and there certainly seems to be a sense of controlled heightening drama in the disclosures. I assume that if Greenwald has pre-announced this publication that it's bound to have some bombshells lurking in it.

US gov may block Chinese nationals from Defcon hacker event

A map of China is seen through a magnifying glass on a computer screen showing binary digits in Singapore in this January 2, 2014 photo illustration. Picture taken January 2, 2014. REUTERS/Edgar Su

The US government may use visa restrictions to ban hackers from China from participating in the 2014 Defcon hacker conference in Las Vegas. The move is part of a larger effort by the US to combat Chinese internet espionage.

Read the rest

Wikileaks says NSA recording all calls in Afghanistan

Glenn Greenwald. [Reuters]


Glenn Greenwald, of The Intercept. [Reuters]

The National Security Agency records the entire content of every phone call in Afghanistan, claims WikiLeaks.

Read the rest

Must-see: Michael Geist on the state of surveillance in Canada

Here's a riveting talk by Michael Geist on the state of Canadian surveillance. Geist broke the story that Canadian telcos hand over personal information to government agencies every 27 seconds, without a warrant. Canada is one of the "Five Eyes" countries that participated in the NSA's surveillance build-out, and the Canadian government is once again considering a massive expansion of warrantless surveillance powers for police, government agencies, and even private companies working for the government.