Listen to Patraeus?

"Remember General David Patraeus? The guy who claimed that as soon as his brilliant comprehensive counterinsurgency strategy (COIN) was implemented in Afghanistan the US would emerge victorious? The 'maverick savior of Iraq' as he was christened by neocon historian Viktor David Hanson? Anyone notice how Iraq and Afghanistan are doing these days? After two colossal failures, Patraeus has crawled out from under his rock of shame to again take up the cause of war-promotion. Heartily endorsing President Obama’s request for authorization to use force on Syria, Patraeus betrays the real prize in the sights of the Syria war-promoters: Iran." Continue reading

Continue ReadingListen to Patraeus?

A complete U.S. withdrawal from Afghanistan in 2014? Don’t count on it

"A US envoy on Tuesday dismissed suggestions that Washington would withdraw all troops from Afghanistan after next year, saying that both countries wanted to preserve a smaller force. Aides to US President Barack Obama earlier this year openly mulled the so-called 'zero option' of a complete withdrawal from Afghanistan once US troops end their combat role in 2014. 'We talk about the zero option — that’s not an option for the United States,' said James Dobbins, the US special envoy for Afghanistan and Pakistan. Dobbins said he expected 'several thousand American forces and several thousand non-American NATO forces' in 2015 and beyond." Continue reading

Continue ReadingA complete U.S. withdrawal from Afghanistan in 2014? Don’t count on it

6 Ways the U.S. Drug War Intrudes On Your Life, Whether Or Not You Use

"Many Americans who do not use illegal 'drugs' assume exemption from drug war policies. But regardless of how much marijuana you do or don't smoke, the U.S. war on drugs affects nearly everyone. While some prohibition tactics are more obvious than others, the drug war has slyly pushed its way into many corners of American life. Be it at the post office, in the workspace, or behind the counter at Walgreens, the war on drugs has established a nagging presence in the everyday lives of Americans, even those who do not get high illegally. Whether or not you are aware that the drug war is behind these creeping invasions, our drug policy has unequivocally curtailed basic civil rights." Continue reading

Continue Reading6 Ways the U.S. Drug War Intrudes On Your Life, Whether Or Not You Use

NSA encryption, Latin American fallout and US/UK attacks on press freedoms

"In Europe this week, President Obama has been making similar claims when asked about NSA spying, repeatedly assuring people that NSA surveillance is overwhelmingly devoted to stopping terrorism threats. One big problem the NSA and US government generally have had since our reporting began is that their defenses offered in response to each individual story are quickly proven to be false by the next story, which just further undermines their credibility around the world. That NSA denial I just excerpted above has already been disproven by several reports, but after Sunday, I think it will prove to be perhaps the NSA's most misleading statement yet." Continue reading

Continue ReadingNSA encryption, Latin American fallout and US/UK attacks on press freedoms

NSA slides: Steve Jobs Is ‘Big Brother’ And Smartphone Users Are ‘Zombies’

"A private individual referring to iPhone customers as 'zombies' is one thing. The NSA doing it is quite another. People who don't take an active effort to protect their information are being labeled as sub-human by a government agency. If these smartphones users don't care about the data they're leaking, then they really don't have an 'expectation of privacy' to be steamrolled. That's the argument. As Der Spiegel puts it, the agency is arguing that the smartphone-buying public is 'complicit in its own surveillance.' But they aren't, as one recent decision on acquiring cell phone location data without a warrant pointed out." Continue reading

Continue ReadingNSA slides: Steve Jobs Is ‘Big Brother’ And Smartphone Users Are ‘Zombies’

How to foil NSA sabotage: use a dead man’s switch

"It doesn't really matter if you trust the 'good' spies not to abuse their powers (though even the NSA now admits to routine abuse, you should still be wary of deliberately weakened security. It is laughable to suppose that the back doors that the NSA has secretly inserted into common technologies will only be exploited by the NSA. There are plenty of crooks, foreign powers, and creeps who devote themselves to picking away patiently at the systems that make up the world and guard its wealth and security (that is, your wealth and security) and whatever sneaky tools the NSA has stashed for itself in your operating system, hardware, applications and services, they will surely find and exploit." Continue reading

Continue ReadingHow to foil NSA sabotage: use a dead man’s switch

Crypto prof asked to remove NSA-related blog post

"What I've been told is that someone on the APL [Johns Hopkins' Applied Physics Laboratory—motto: 'Enhancing national security through science and technology'] side of JHU discovered my blog post and determined that it was hosting/linking to classified documents. This requires a human since I don't believe there's any automated scanner for this process. It's not clear to me whether this request originated at APL or if it came from elsewhere. All I know is that I received an e-mail this morning from the Interim Dean of the Engineering school asking me to take down the post and to desist from using the NSA logo. He also suggested I should seek counsel if I continued." Continue reading

Continue ReadingCrypto prof asked to remove NSA-related blog post

The feds pay for 60 percent of Tor’s development. Can users trust it?

"The NSA’s sustained attempt to get around encryption calls into question many of the technologies people have come to rely on to avoid surveillance. One indispensable tool is Tor, the anonymizing service that takes a user’s Internet traffic and spits it out from some other place on the Web so that its origin is obscured. So far there’s no hard evidence that the government has compromised the anonymity of Tor traffic. But some on a Tor-related e-mail list recently pointed out that a substantial chunk of the Tor Project’s 2012 operating budget came from the Department of Defense, which houses the NSA." Continue reading

Continue ReadingThe feds pay for 60 percent of Tor’s development. Can users trust it?

Let us count the ways: How the feds (legally, technically) get our data

"It’s worth considering the various vectors of technical and legal data-gathering that high-level adversaries in America and Britain (and likely other countries, at least in the 'Five Eyes' group of anglophone allies) are likely using in parallel to go after a given target. So far, the possibilities include: A company volunteers to help (and gets paid for it). Spies copy the traffic directly off the fiber. A company complies under legal duress. Spies infiltrate a company. Spies coerce upstream companies to weaken crypto in their products/install backdoors. Spies brute force the crypto. Spies compromise a digital certificate. Spies hack a target computer directly, stealing keys and/or data, sabotage." Continue reading

Continue ReadingLet us count the ways: How the feds (legally, technically) get our data