NSA has direct access to tech giants' systems for user data, secret files reveal

Discussion in 'privacy general' started by Dermot7, Jun 6, 2013.

  1. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    Final countdown – NSA says it really will end blanket phone spying on US citizens this Sunday
    http://www.theregister.co.uk/2015/11/27/nsa_phone_spying_deadline/

     
  2. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,402
    Minimalist,

    I just checked my personal TRUST list and surprise the NSA isn't on it!
     
  3. driekus

    driekus Registered Member

    Joined:
    Nov 30, 2014
    Posts:
    489
    I trust them. They are definitely stopping bulk data collection as indicated. They are just restarting it under a different legal justification.

    It doesnt affect me, I am not in America so I have no rights.
     
  4. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    Yes, I don't trust them either. But I also don't trust other three letter agencies and other big companies when it comes to privacy.
     
  5. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
  6. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    Revealed: FBI can demand web history, phone location data without a warrant
    http://www.zdnet.com/article/fbi-can-force-companies-to-turn-over-user-data-without-a-warrant/

     
  7. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,402

    It was nice to read about someone beating them in court so their "activities" could be reported. For the individual, the overwhelming concern will be the ENCRYPTION/PASSWORD final determination in the courts (USA issue). They can demand anything they want but if you hand them a FDE computer and stand on the 5th that has higher priority at this time. Its totally touch and go with verdicts all over the place. Usually those that lose on the password issue have made a huge mistake (opsec or admissions) which gets cited as the reason for dis-honoring the 5th so to speak.

    Your post screams for the importance of a solid VPN/TOR. If your ISP and others don't know your web activities they can't turn much over. It will come down to YOU defending yourself as to who gets to see your web activities. Thats a better scenario than some big ISP just "laying down" to a letter from some agency.
     
  8. hawki

    hawki Registered Member

    Joined:
    Dec 17, 2008
    Posts:
    6,077
    Location:
    DC Metro Area
    The Good: The U.S. District Court for the Southern District of New York is the "Crown Jewel" of the Federal District Court System (Fed District Courts are the first level-where cases are tried, motions to dismiss , etc. are decided) so the decision has weight.

    The Bad: The Court Stayed its ruling until the Appeal by The U.S. Dept . of "Justice" is decided by the Second Circuit Court of Appeals. That Court has not hesitated to throw out decisions of The District Court for BS, obviously flawed reasons where matters of National Security are involved.

    For example, in a case brought by a group of Journalists which challenged the legality of the provisions to the National Defense Authorization Act of 2012, that allows the U.S. Military to capture an American Citizen on American Soil and Detain Him/Her Indefinitely with absolutely no Constitutional Rights and in total secrecy including the ability to employ rendition to a foreign country that is known to torture at the sole discretion of The President, was invalidated in a blistering opinion by a judge of the Fed Dist Crt. S.D.N.Y. That decision was reversed by The Second Circuit Court of Appeals on totally bogus grounds. Subsequently, The U.S. Supreme Court denied Cert. (declined to hear the appeal)
    See: Hedges v. Obama.

    So don't get your hopes up and welcome to our Post-Constitutional World :-(

    Haven't you heard there's terrrists out there?
     
    Last edited: Nov 30, 2015
  9. driekus

    driekus Registered Member

    Joined:
    Nov 30, 2014
    Posts:
    489
    I am questioning how long the 5th will work. Steve Gibson from the Security Now podcast commented on this and indicated that providing the password is probably self incrimination but the courts have not answered whether decrypting the data is self incriminating. In the wake of the Paris attacks I question how long it will be before the courts deal with this question.
     
  10. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,402
    I didn't want to make this a full 5th discussion. My point was that without vpns/tor/encryption THEY have everything and you get no bargaining tool or advanced notice. At least this way access to anything only comes through YOU.

    The far better practice is to study vpns and tor and all other network issues to keep the wolf from the door in the first place! The BEST is to throw your computer in a lake and never go online, but that is no fun!!
     
  11. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    GCHQ confirms that it hacks computers without ‘proper warrants’
    http://www.welivesecurity.com/2015/...t-it-hacks-computers-without-proper-warrants/

     
  12. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
  13. driekus

    driekus Registered Member

    Joined:
    Nov 30, 2014
    Posts:
    489
    The problem is that at face value it is not an unreasonable request. If the government has a warrant reviewed by a real judge for a single person and needs to decrypt their phone it is reasonable that they should be able to get access. As long as the warrant is made available at a later date and there are no gag orders associated.

    The problem is that it becomes a very slippery slope. As soon as it is possible to decrypt a device/message the government will put in secret court orders or "thematic warrants" (I love that term) from a court controlled by the government and prevent disclosure of the nature of the order. As soon as you move from "trust no-one encryption" to trust the device/app provider then you have no privacy.

    Steve Gibson (Security Now podcast) commented on the issue indicating that the government should be allowed access. I disagree with his stance as he really underestimates the slippery slope. Great discussion though particularly for Wilders Security Forum users.
    https://www.grc.com/securitynow.htm
     
  14. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    @driekus
    I see two problems with government getting an access to encrypted data:
    1. how to implement it? Till now I didn't hear yet how that would be possible without someone else getting an access also. If one government gets in, others will want same access also, and hackers will get that access also - sooner or later.
    2. "bad guys" won't use backdoored services. If provider will allow government to get to encrypted data, they will lose all users that cherish their privacy. Users will just use another provider or other tools. At the end government will get access to less secure data of ordinary people. IMO this is really what they want to achieve. In real democracy government is most afraid of their people and not some criminals and terrorists. Controlling their people is what they all want, fight against criminal and terrorists is just something they want to sell people to give up on their right to privacy.
     
  15. driekus

    driekus Registered Member

    Joined:
    Nov 30, 2014
    Posts:
    489
    Agree completely with your statements. I am definitely not in favour of government access, just to be clear. It is just when it is presented to the general population as "If the government has a warrant reviewed by a real judge for a single person and needs to decrypt their phone it is reasonable that they should be able to get access." I can see it as a very tough argument to refute. At face value ignoring the implications it is not unreasonable.

    The government one (point 1) is particularly interesting because you end up with the situation of trying to determine who the "good" governments are that should be allowed access and who the "bad" governments are. And yes any backdoor will eventually be found. The other problem with backdoors is that you lose access to certain powerful encryption tools (perfect forward secrecy as one I can think of).
     
  16. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    No real need for explicit backdoors when - for example - the draft Investigatory Powers Bill in the UK already admits to "equipment interference" both targeted and in bulk. This hacking has relied on backdoored or weakened products/services, or the exploitation of bugs, both pretty easy to the weaponisers of the internet, and with the resources to attack all main operating systems..

    This makes the effectiveness of encryption more moot - if you can install a KSL (they can and do) - then your encryption passwords are known. Sir David Omand (ex GCHQ) effectively threatened this if encryption proved troublesome.
     
  17. driekus

    driekus Registered Member

    Joined:
    Nov 30, 2014
    Posts:
    489
    They really prove the point why we wouldnt trust them with a backdoor :)
     
  18. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
  19. driekus

    driekus Registered Member

    Joined:
    Nov 30, 2014
    Posts:
    489
  20. deBoetie

    deBoetie Registered Member

    Joined:
    Aug 7, 2013
    Posts:
    1,832
    Location:
    UK
    @driekus - as well as those tactics, I believe there is an agreed-behind-the-scenes tactic to have a) coordinated public attacks on things like encryption, and b) attempts to slip anti-privacy legislation into one jurisdiction, and then use that fact as a justification to allow all the other jurisdictions to join in - after all, x does it, so it must be alright. The UK IPB is a case in point, attempting to legitimise mass-surveillance, the UK version of NSLs, and state-mass-hacking. It then makes it much easier for the X-eye countries to do the same, or at least, outflank their local privacy safeguards using the UK as a proxy to give them what they want.
     
  21. driekus

    driekus Registered Member

    Joined:
    Nov 30, 2014
    Posts:
    489
    Agreed, the US seems to be trying to edge in behind the UK.

    They are also trying to introduce the same concept (backdoor on encryption) in different ways, each time trying to confuse a public that struggles to understand even the most basic cryptographic concepts.
     
  22. Dermot7

    Dermot7 Registered Member

    Joined:
    Dec 20, 2009
    Posts:
    3,430
    Location:
    Surrey, England.
    https://theintercept.com/2015/12/17/a-secret-catalogue-of-government-gear-for-spying-on-your-cellphone/

    p.s. This post may be better suited to this thread. Please move if best, thanks.
     
    Last edited: Dec 17, 2015
  23. driekus

    driekus Registered Member

    Joined:
    Nov 30, 2014
    Posts:
    489
  24. Krusty

    Krusty Registered Member

    Joined:
    Feb 3, 2012
    Posts:
    10,246
    Location:
    Among the gum trees
    Searching for something completely unrelated, I stumbled across this story. I can't vouch for its accuracy but if it is real it is frightening.

    http://climateviewer.com/2014/01/18...-computer-cellphone-screen-using-radio-waves/

     
  25. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.