James Bamford: The Secret War

"Tens of thousands of people move through more than 50 buildings—the city has its own post office, fire department, and police force. But as if designed by Kafka, it sits among a forest of trees, surrounded by electrified fences and heavily armed guards, protected by antitank barriers, monitored by sensitive motion detectors, and watched by rotating cameras. To block any telltale electromagnetic signals from escaping, the inner walls of the buildings are wrapped in protective copper shielding and the one-way windows are embedded with a fine copper mesh. This is the undisputed domain of General Keith Alexander, a man few even in Washington would likely recognize." Continue reading

Continue ReadingJames Bamford: The Secret War

NSA gets early access to zero-day exploit data from Microsoft, others

"The NSA isn’t alone in the business of swapping secrets with the corporate world. The FBI, CIA, and DOD also have programs enabling them to exchange sensitive government information with corporate 'partners' in exchange for information that relate to network security. The NSA’s dual role as the security arbiter for many government networks and as point organization for the US government’s offensive cyberwarfare capabilities means that the information it gains from these special relationships could be used to craft exploits to gain access to the computer systems and networks of foreign governments, businesses, and individuals." Continue reading

Continue ReadingNSA gets early access to zero-day exploit data from Microsoft, others

The Rise of the Anti-State Cyber-Warrior

"What is it about this new direction in war that makes it so different? First, it is not a battle that is waged by governments against other governments. It is a battle of the individual against the state. It is a battle that the state has a difficult time protecting against because it has a difficult time understanding from where an attack might emerge and it has a difficult time understanding the nature of the attack once the attack itself is observable. Among current, early cyber-warriors leading attacks, I have in mind such men as Julian Assange, creator of Wikileaks, Satoshi Nakamoto, the pseudonymous developer of Bitcoin and Edward Snowden, the NSA whistleblower." Continue reading

Continue ReadingThe Rise of the Anti-State Cyber-Warrior

Der Spiegel Laments The Rapid Spread of Printable Pistols

"A student from Texas has invented a plastic pistol that anyone can make with a 3-D printer. It is undetectable by metal detectors and capable of killing. And it is spreading unchecked across the continents. A few days after Cody Wilson's invention had been created, the United States Department of Homeland Security issued a warning to the rest of the world. The officials, responsible for fending off terrorist attacks, wrote three pages about the dangers of a weapon against which they are powerless. They wrote that public safety is threatened. They also wrote that, unfortunately, it is impossible to prevent this weapon from being made." Continue reading

Continue ReadingDer Spiegel Laments The Rapid Spread of Printable Pistols

How Snowden Did an End Run Around the NSA and the Obama Administration

"Snowden went to the Washington Post first, but when the Post waffled, he dropped them and went to Glenn Greenwald, a pro-civil rights lawyer who lives in Brazil and writes for The Guardian, a British newspaper/website. Greenwald wrote up the story as Snowden gave it to him, thereby scooping the world. He gets 100% credit, as does The Guardian. The Washington Post gets also-ran status. These days, a leaker with a story can get his story out his way. There is always a journalist somewhere who will run it. If it’s in a major publication, which The Guardian is, the story will get coverage. A leaker no longer has to do it anyone else’s way. He can do it his way." Continue reading

Continue ReadingHow Snowden Did an End Run Around the NSA and the Obama Administration

Google, Yahoo, and Facebook Are Scrambling: “We Never Cooperated with the NSA!”

"How can they escape? Snowden’s story confirms James Banford’s story. Bamford revealed all this in 2008. No one cared. Now, without warning, this is a hot story all over the Web. How does a company plausibly deny this? They are all going with a version of this one: 'We never inhaled.' In March, 2012, Wired ran Bamford’s story on the NSA’s huge complex in Utah: 'The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say).' It got some coverage, but there was no follow-through. Congress does not care. Congress funded it." Continue reading

Continue ReadingGoogle, Yahoo, and Facebook Are Scrambling: “We Never Cooperated with the NSA!”

Civil liberties groups launch StopWatching.us to protest surveillance

"A coalition of Internet and civil liberties groups launched a campaign Tuesday protesting the huge US online surveillance program revealed in the past week. Joining the effort were the Mozilla Foundation, American Civil Liberties Union, Greenpeace USA, the World Wide Web Foundation and more than 80 other organizations or companies. The coalition launched a website, StopWatching.us, and called on Congress to launch a full probe and urging more disclosure from US officials about the National Security Agency’s vast program Internet surveillance program. An online petition was also launched on the website." Continue reading

Continue ReadingCivil liberties groups launch StopWatching.us to protest surveillance

Edward Snowden And The Disruption Of Government

"What I want to focus on in this post is not Snowden himself, but what he represents, and what this may mean for governments and peoples over the next few decades. I believe we are in the midst of a centuries-long shift of power from state entities to the people those states have traditionally governed. What exactly the result of this evolution will be I don’t know, but I believe 'the State' as we know it has a limited lifespan and what replaces it, while perhaps imperfect, will be an improvement in terms of peace and prosperity. It can be explained in part by examining the research and teachings of noted icons of the business world Clayton Christensen, John Boyd, and Sun Tzu." Continue reading

Continue ReadingEdward Snowden And The Disruption Of Government

Guardian publishes third secret NSA document, on US cyberwar plans

"The document orders various government agencies to prepare for offensive cyberwarfare operations and says the government will 'identify targets of national importance.' The article quotes an intelligence source with knowledge of NSA programs as saying the directive makes US complaints about China's state-sponsored hacking 'hypocritical,' because the US has 'participated in offensive cyber operations and widespread hacking.' Some of the talking points in the directive were declassified in January, but the emphasis on offensive hacking wasn't made public, nor was the order to create a specific target list." Continue reading

Continue ReadingGuardian publishes third secret NSA document, on US cyberwar plans

All About Bitcoin Mining: Road To Riches Or Fool’s Gold?

"While I have now recouped my investment in mining hardware, you may not be so lucky. Even among ASIC-based mining hardware there is a ranking, a hierarchy based on purchase cost and energy efficiency. Tis folly to think that you’ll be able to run 130 nm ASICminer ASICs in California indefinitely. At some point, you will be outgunned by people running yet-to-be-sold 28 nm ASICs in some rural county of Washington state, where a kWh costs a mere 2.33 cents. Bitcoin mining is not for the faint of heart, nor for the mathematically challenged. Invest only what you can afford to lose. Or better yet, enjoy this crazy sideshow from the bleachers." Continue reading

Continue ReadingAll About Bitcoin Mining: Road To Riches Or Fool’s Gold?