{"id":186554,"date":"2013-12-22T21:29:00","date_gmt":"2013-12-23T02:29:00","guid":{"rendered":"https:\/\/www.panix.com\/~msaroff\/40years\/2013\/12\/22\/this-weeks-spylapalooza\/"},"modified":"2013-12-22T21:29:00","modified_gmt":"2013-12-23T02:29:00","slug":"this-weeks-spylapalooza","status":"publish","type":"post","link":"https:\/\/www.panix.com\/~msaroff\/40years\/2013\/12\/22\/this-weeks-spylapalooza\/","title":{"rendered":"This Week&#8217;s Spylapalooza"},"content":{"rendered":"<p>It&#8217;s been a busy week for developments in spying by the US state security apparatus.<\/p>\n<p>First, we have the report from the President&#8217;s hand picked panel, &#8220;<a href=\"http:\/\/www.whitehouse.gov\/sites\/default\/files\/docs\/2013-12-12_rg_final_report.pdf\">Liberty and Security in a Changing World<\/a>.&#8221; (PDF)<\/p>\n<p>From people who know the issues, the reviews have been this weak tea.<\/p>\n<p>The EFF&#8217;s conclusion was that, &#8220;<a href=\"https:\/\/www.eff.org\/deeplinks\/2013\/12\/eff-statement-presidents-review-groups-nsa-report\">The reportleft  open the door for future mass surveillance and failed to address the  constitutionality of the NSA&#8217;s mass spying, recently questioned by the  D.C. federal court and raised by EFF in its multiple lawsuits<\/a>.&#8221;<\/p>\n<p>Marcy Wheeler, who is has perhaps the most knowledgeable on these sorts of issues, observes that <a href=\"http:\/\/www.theguardian.com\/commentisfree\/2013\/dec\/19\/nsa-review-panel-report-legal-questions\">the panel refused to address whether the NSA spying program was illegal<\/a>.&nbsp; There is simply nothing in the report about this.<\/p>\n<p>When she looks what <b>is<\/b> in the report, she sees signs that the <a href=\"http:\/\/crooksandliars.com\/2013\/12\/president-s-review-group-suggests-nsa\">NSA is probably functioning as a domestic security agency:<\/a><\/p>\n<blockquote><p><span style=\"color: blue;\">Which  is why I\u2019m curious what\u2019s behind the following language, offered in  support of the recommendation to clearly designate NSA as a foreign  intelligence organization and presented with two other things we know  NSA does.<\/span><\/p>\n<blockquote><p><span style=\"color: blue;\">It should not be a domestic security service, a military command, or an information assurance organization.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span> <span style=\"color: blue;\">[&#8230;] Like other agencies, there are situations in which NSA does and  should provide support to the Department of Justice, the Department of  Homeland Security, and other law enforcement entities. <b>But it should not assume the lead for programs that are primarily domestic in nature.<\/b><\/span><\/p><\/blockquote>\n<p><span style=\"color: blue;\">That seems to suggest that, in addition to supporting DHS, DOJ, and  other law enforcement entities (cough, DEA, as well as probably Secret  Service in its cyber-role), NSA takes the lead on certain issues that  are primarily domestic.I do hope we\u2019ll learn what this refers to.  Because if NSA is operating domestically (maybe to police IP?), it will  be scandalous news.<\/span><\/p><\/blockquote>\n<p><i>Pro Publica<\/i> notes that one of the more direct recommendations of the panel is that the <a href=\"http:\/\/www.propublica.org\/article\/presidential-panel-to-nsa-stop-undermining-encryption\">NSA needs to stop undermining publicly available encryption algorithms<\/a>:<\/p>\n<blockquote><p><span style=\"color: blue;\">The National Security Agency should not undermine  encryption standards that are designed to protect the privacy of  communications, the panel of experts appointed by President Obama to  review NSA surveillance recommended in a <a href=\"http:\/\/www.propublica.org\/documents\/item\/930409-2013-12-12-rg-final-report-on-nsa\">report<\/a> released today.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span> <span style=\"color: blue;\">The recommendation, among the strongest of the <a href=\"http:\/\/www.nytimes.com\/2013\/12\/19\/us\/politics\/report-on-nsa-surveillance-tactics.html?hp\">many suggested changes<\/a> laid out by the panel, comes several months after ProPublica, the Guardian, and the New York Times <a href=\"http:\/\/www.propublica.org\/article\/the-nsas-secret-campaign-to-crack-undermine-internet-encryption\">reported<\/a> that the NSA has successfully worked to undercut encryption. The story was based on a <a href=\"http:\/\/www.propublica.org\/documents\/item\/784284-bullrun-briefing-sheet-from-gchq.html\">set of<\/a> <a href=\"http:\/\/www.propublica.org\/documents\/item\/784285-sigint-enabling-project.html\">documents<\/a> provided by former NSA contractor Edward Snowden.<\/span><\/p><\/blockquote>\n<p>Outside of the intelligence review board, we have learned that the <a href=\"http:\/\/www.reuters.com\/article\/2013\/12\/20\/us-usa-security-rsa-idUSBRE9BJ1C220131220\">NSA paid RSA Security LLC to incorporate insecure encryption in its products<\/a>:<\/p>\n<blockquote><p><span style=\"color: blue;\">As a key part of a  campaign to embed encryption software that it could crack into widely  used computer products, the U.S. National Security Agency arranged a  secret $10 million contract with RSA, one of the most influential firms  in the computer security industry, Reuters has learned.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">Documents leaked by former NSA  contractor Edward Snowden show that the NSA created and promulgated a  flawed formula for generating random numbers to create a &#8220;back door&#8221; in  encryption products, the New York Times reported in September. Reuters  later reported that RSA became the most important distributor of that  formula by rolling it into a software tool called Bsafe that is used to  enhance security in personal computers and many other products.<\/span><br \/><span style=\"color: blue;\"><br \/><\/span><span style=\"color: blue;\">Undisclosed  until now was that RSA received $10 million in a deal that set the NSA  formula as the preferred, or default, method for number generation in  the BSafe software, according to two sources familiar with the contract.  Although that sum might seem paltry, it represented more than a third  of the revenue that the relevant division at RSA had taken in during the  entire previous year, securities filings show.<\/span><\/p><\/blockquote>\n<p>In total, this explains the <a href=\"http:\/\/www.bloomberg.com\/news\/2013-12-19\/nsa-fallout-in-europe-boosts-alternatives-to-google.html\">flight from services like Google to non-US algernatives<\/a>.<\/p>\n<p>In a perfect world,&nbsp; all of this might lead the White House, and the intelligence agencies to back off regarding their expansion of power, but you would be wrong.<\/p>\n<p>They are at this time attempting to <a href=\"http:\/\/www.nytimes.com\/2013\/12\/22\/us\/white-house-tries-to-prevent-judge-from-ruling-on-surveillance-efforts.html?hpw&amp;rref=politics\">quash a court ruling on the constitutionality ofits domestic spying program<\/a> by <a href=\"http:\/\/www.washingtonpost.com\/world\/national-security\/us-reasserts-need-to-keep-domestic-surveillance-secret\/2013\/12\/21\/9d2b4538-6a7e-11e3-a0b9-249bbb34602c_story.html\">invoking the state-secrets privilege<\/a>. <\/p>\n<p>And for your amusement, we have Mark Fiore&#8217;s comments on the difference between the data collection by the government and commercial interest.<br \/>&nbsp; <\/p>\n<p><iframe loading=\"lazy\" allowfullscreen=\"\" frameborder=\"0\" height=\"281\" src=\"\/\/www.youtube.com\/embed\/pjYoT3sZIWA\" width=\"500\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s been a busy week for developments in spying by the US state security apparatus. First, we have the report from the President&#8217;s hand picked panel, &#8220;Liberty and Security in a Changing World.&#8221; (PDF) From people who know the issues, the reviews have been this weak tea. The EFF&#8217;s conclusion was that, &#8220;The reportleft open &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[971,1067,1102,1041,978,1103,1025,1027],"tags":[],"class_list":["post-186554","post","type-post","status-publish","format-standard","hentry","category-civil-rights","category-communications","category-intelligence","category-law-enforcement-misconduct","category-politics","category-secrecy","category-technology","category-video"],"_links":{"self":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/186554"}],"collection":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/comments?post=186554"}],"version-history":[{"count":0,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/186554\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/media?parent=186554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/categories?post=186554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/tags?post=186554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}