Senate committee votes unanimously to sanction any country that takes Snowden

"The 30-member Senate Appropriations Committee adopted by consensus an amendment to a spending bill that would direct Secretary of State John Kerry to meet with congressional committees to come up with sanctions against any country that takes Snowden in. Bolivia, Nicaragua and Venezuela have said they could offer sanctuary to Snowden. Republican U.S. Senator Lindsey Graham said he introduced the amendment to try to get the attention of any country that might take in Snowden, not Russia in particular, although he noted Moscow has lined up against the United States on other issues, including the civil war in Syria." Continue reading

Continue ReadingSenate committee votes unanimously to sanction any country that takes Snowden

The Creepy, Long-Standing Practice of Undersea Cable Tapping

"More than 550,000 miles of flexible undersea cables about the size of garden watering hoses carry all the world's emails, searches, and tweets. Together, they shoot the equivalent of several hundred Libraries of Congress worth of information back and forth every day. In 2005, the Associated Press reported that a submarine called the USS Jimmy Carter had been repurposed to carry crews of technicians to the bottom of the sea so they could tap fiber optic lines. The easiest place to get into the cables is at the regeneration points -- spots where their signals are amplified and pushed forward on their long, circuitous journeys." Continue reading

Continue ReadingThe Creepy, Long-Standing Practice of Undersea Cable Tapping

NSA Taps Directly Into Undersea Fiber-optic Data Cables

"Of course, by tapping directly into the beams of light transferring this data around the globe — apparently with the cooperation of the world’s chief technology companies — the federal government bypasses all legal and constitutional restraints on its already immense power. Remarkably, there does not seem to be a corresponding flight by Americans from the devices or services being monitored by the federal government. As one brick after another is stacked on the ever-growing walls of the 21st-century Panopticon, it appears that nothing will dissuade Americans from growing increasingly reliant on the very tools being used in the construction." Continue reading

Continue ReadingNSA Taps Directly Into Undersea Fiber-optic Data Cables

House protects surveillance program before passing military spending bill

"After fierce debate over the limits of domestic spying, the House on Wednesday voted to protect the federal government's ability to collect phone records and other data related to U.S. citizens who aren't suspected of terrorism. The Obama administration lobbied against Amash's amendment, and members of congressional intelligence committees defended the NSA's actions. Rep. Michele Bachmann, R-Minn., said it was 'a false narrative that the federal government is taking in the content of American phone calls and emails.' She said there was more information about U.S. citizens in a phone book than in the NSA database." Continue reading

Continue ReadingHouse protects surveillance program before passing military spending bill

2013 Bitcoin Mid-Year Review and Outlook

"The past six months may one day prove to be among the most important in bitcoin’s history. As global events sparked increasing need for frictionless wealth transfers, bitcoin’s popularity ballooned and ignited a conversation that will likely continue to flourish in the years to come. Growth in bitcoin’s value was outpaced only by the incredible interest from entrepreneurs, investors and the press. In this 27-page report we cover the major events from the first half of 2013 and what to look out for in the months ahead." Continue reading

Continue Reading2013 Bitcoin Mid-Year Review and Outlook

Whitfield Diffie (Wikipedia)

"Bailey Whitfield 'Whit' Diffie is an American cryptographer and one of the pioneers of public-key cryptography. In 1975-76, Diffie and Martin Hellman criticized the NBS proposed Data Encryption Standard, largely because its 56-bit key length was too short to prevent Brute-force attack. Subsequent history has shown not only that NSA actively intervened with IBM and NBS to shorten the key size, but also that the short key size enabled exactly the kind of massively parallel key crackers that Hellman and Diffie sketched out. When these were ultimately built outside the classified world, they made it clear that DES was insecure and obsolete." Continue reading

Continue ReadingWhitfield Diffie (Wikipedia)

Data Encryption Standard – NSA’s involvement in the design (Wikipedia)

"In 1973 NBS solicited private industry for a data encryption standard (DES). The first offerings were disappointing, so NSA began working on its own algorithm. Then Howard Rosenblum, deputy director for research and engineering, discovered that Walter Tuchman of IBM was working on a modification to Lucifer for general use. NSA gave Tuchman a clearance and brought him in ...] NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key." Continue reading

Continue ReadingData Encryption Standard – NSA’s involvement in the design (Wikipedia)

Data, meet spies: The unfinished state of Web crypto

"Most Internet companies do not use an privacy-protective encryption technique that has existed for over 20 years -- it's called forward secrecy -- that cleverly encodes Web browsing and Web e-mail in a way that frustrates fiber taps by national governments. Lack of adoption by Apple, Twitter, Microsoft, Yahoo, AOL and others is probably due to 'performance concerns and not valuing forward secrecy enough,' says Ivan Ristic, director of engineering at the cloud security firm Qualys. Google, by contrast, adopted it two years ago." Continue reading

Continue ReadingData, meet spies: The unfinished state of Web crypto

Google strengthens Android security with NSA’s SELinux; TPM also coming

"Originally developed by programmers from the National Security Agency, SELinux enforces a much finer-grained series of mandatory access control policies. the other big security enhancement introduced in Android 4.3 is a more robust way to store cryptographic credentials used to access sensitive information and resources. 'With the keychain enhancements, the system-wide keys are bound to a hardware-based root of trust process devices that support this,' said Pau Oliva Fora, senior mobile security engineer at viaForensics. 'The phone needs to have a secure element such as a Trusted Platform Module so that private keys can't be stolen.'" Continue reading

Continue ReadingGoogle strengthens Android security with NSA’s SELinux; TPM also coming

Feds put heat on Web firms for master encryption keys

"These demands for master encryption keys, which have not been disclosed previously, represent a technological escalation in the clandestine methods that the FBI and the National Security Agency employ when conducting electronic surveillance against Internet users. If the government obtains a company's master encryption key, agents could decrypt the contents of communications intercepted through a wiretap or by invoking the potent surveillance authorities of the Foreign Intelligence Surveillance Act. Web encryption -- which often appears in a browser with a HTTPS lock icon when enabled -- uses a technique called SSL, or Secure Sockets Layer." Continue reading

Continue ReadingFeds put heat on Web firms for master encryption keys