Bitcoin developer: Are bitcoin thieves revealing NSA back doors?

"Will bitcoin -- and the financial incentive to break bitcoin crypto -- reveal other NSA backdoors in ECDSA, SHA256, RIPEMD160, and other algorithms and libraries used by bitcoin? Thieves are likely to exploit any flaws immediately, and move stolen loot to another private key. The NSA, on the other hand, is likely to avoid exploiting any weaknesses until key moments. Thus, ironically, thieves are playing a role in securing bitcoin and associated algorithms from NSA, Chinese, Russian or mafia tampering. Was the SecureRandom() bug a now-revealed NSA backdoor? You can thank bitcoin for exposing the problem and leading to immediate fixes, and attention to weak RNG impact." Continue reading

Continue ReadingBitcoin developer: Are bitcoin thieves revealing NSA back doors?

Schneier on NSA surveillance: A guide to staying secure

"Now that we have enough details about how the NSA eavesdrops on theinternet, including today's disclosures of the NSA's deliberate weakening of cryptographic systems, we can finally start to figure out how to protect ourselves. The NSA has turned the fabric of the internet into a vast surveillance platform, but they are not magical. They're limited by the same economic realities as the rest of us, and our best defense is to make surveillance of us as expensive as possible. Trust the math. Encryption is your friend. Use it well, and do your best to ensure that nothing can compromise it. That's how you can remain secure even in the face of the NSA." Continue reading

Continue ReadingSchneier on NSA surveillance: A guide to staying secure

What Exactly Are the NSA’s ‘Groundbreaking Cryptanalytic Capabilities’?

"Whatever the NSA has up its top-secret sleeves, the mathematics of cryptography will still be the most secure part of any encryption system. I worry a lot more about poorly designed cryptographic products, software bugs, bad passwords, companies that collaborate with the NSA to leak all or part of the keys, and insecure computers and networks. Those are where the real vulnerabilities are, and where the NSA spends the bulk of its efforts. While the NSA certainly has symmetric cryptanalysis capabilities that we in the academic world do not, converting that into practical attacks on the sorts of data it is likely to encounter seems so impossible as to be fanciful." Continue reading

Continue ReadingWhat Exactly Are the NSA’s ‘Groundbreaking Cryptanalytic Capabilities’?

Secret U.S. documents reveal Al-Qaeda has anti-drone operation

"Al-Qaeda’s leaders have set up cells of engineers to try to shoot down, disable or hijack US drones, The Washington Post reported late Tuesday citing top-secret US intelligence documents. The Al-Qaeda leadership is 'hoping to exploit the technological vulnerabilities of a weapons system that has inflicted huge losses against the terrorist network,' the Post said online. The Al-Qaeda commanders are keen to achieve 'a technological breakthrough (that) could curb the US drone campaign, which has killed an estimated 3,000 people over the past decade,' the Post reported. [Drone strikes] have taken a toll among civilians in those countries, something that has fueled anti-US sentiment." Continue reading

Continue ReadingSecret U.S. documents reveal Al-Qaeda has anti-drone operation

How Intelligence Was Twisted to Support an Attack on Syria

"Secretary of State John Kerry assured the public that the Obama administration's summary of the intelligence on which it is basing the case for military action to punish the Assad regime for an alleged use of chemical weapons was put together with an acute awareness of the fiasco of the 2002 Iraq WMD intelligence estimate. Nevertheless, the unclassified summary of the intelligence assessment made public August 30, 2013, utilizes misleading language evocative of the infamous Iraq estimate's deceptive phrasing. The document displays multiple indications that the integrity of the assessment process was seriously compromised." Continue reading

Continue ReadingHow Intelligence Was Twisted to Support an Attack on Syria

U.S. steps up Pakistan surveillance: ‘black budget’ analysis

"America has delivered nearly $26 billion in aid to Pakistan over the past 12 years, with the money aimed at stabilizing the country and ensuring its cooperation in counterterrorism efforts, according to the paper. US spy agencies reported that senior Pakistani military and intelligence officials knew of and possibly ordered a broad campaign of extrajudicial killings of militants and other adversaries, the Post said. Public disclosure of the reports could have forced the administration of President Barack Obama to sever aid to the Pakistani armed forces. This is because of a US law that prohibits military assistance to human rights abusers." Continue reading

Continue ReadingU.S. steps up Pakistan surveillance: ‘black budget’ analysis

The State: Judge in its Own Cause

"Is this really a nation of laws, though? There’s an old legal principle, 'nemo iudex in causa sua,' which translated into English means 'no one should be the judge of their own cause.' But in fact all the laws theoretically limiting the state’s power are interpreted by — wait for it — officials of the state. The commission of the actual military, intelligence and diplomatic crimes themselves, the classification of documents that evidence those crimes, and the setting of civil and criminal penalties for revealing wickedness in high places — all these things are done by officials of the same government." Continue reading

Continue ReadingThe State: Judge in its Own Cause

Fifth of CIA applicants with suspect backgrounds have ‘significant terrorist’ connections

"Although the file did not describe the nature of the jobseekers’ extremist or hostile ties, it cited Hamas, Hezbollah and Al-Qaeda and its affiliates most often. The fear of infiltration is such that the NSA planned last year to investigate at least 4,000 staff who obtained security clearances. The NSA detected potentially suspicious activity among staff members after trawling through trillions of employee keystrokes at work. The suspicious behavior included staffers accessing classified databases they do not usually use for their work or downloading several documents, two people familiar with the software used to monitor staff told the Post." Continue reading

Continue ReadingFifth of CIA applicants with suspect backgrounds have ‘significant terrorist’ connections

Gitmo defendant’s lawyers: CIA gave ‘Zero Dark Thirty’ makers more info than us

"The CIA cooperated with the makers of the Hollywood movie about the hunt for Osama bin Laden, and has acknowledged one character was 'modeled after' Connell’s client, Ammar al Baluchi, an alleged al Qaeda money mover also known as Ali Abdul Aziz Ali. He is Khalid Sheikh Mohammed’s nephew. The movie showed interrogators stringing up the Ammar character with a rope, forcing him to wear a dog collar, waterboarding him and stuffing him into a coffin-like box. The CIA has not acknowledged using those techniques on Baluchi but has admitted using them on other prisoners." Continue reading

Continue ReadingGitmo defendant’s lawyers: CIA gave ‘Zero Dark Thirty’ makers more info than us

$652 million project ‘GENIE’: U.S. conducted 231 ‘offensive cyberoperations’

"The revelation is based on a classified intelligence budget provided to the paper by fugitive leaker Edward Snowden, as well as on interviews. Under a $652 million project code-named 'GENIE,' US specialists hack foreign computer networks to secretly put them under American control. This involves placing 'covert implants' in computers, routers and firewalls, it said, adding that by year’s end 'GENIE' is projected to control at least 85,000 'malware' plug-ins in machines around the globe. US intelligence services make 'routine use' of government-constructed malware around the globe that 'differs little in function from the ‘advanced persistent threats’ that US officials attribute to China.'" Continue reading

Continue Reading$652 million project ‘GENIE’: U.S. conducted 231 ‘offensive cyberoperations’