NSA Defends Encryption Backdoors By Promising It's Only Used To Spy On All Of Us
from the choice-of-words... dept
The Director of National Intelligence has now responded to the unveiling of the fact that the NSA inserted backdoors in various forms of encryption and recruited internal spies at telco companies with one of his typically ridiculous statements using carefully parsed words. It sounds like the NSA rushed out that statement, because the attempt to assure the public that it's just being used on bad people leaves open a pretty large loophole. See if you can spot it:Throughout history, nations have used encryption to protect their secrets, and today, terrorists, cybercriminals, human traffickers and others also use code to hide their activities. Our intelligence community would not be doing its job if we did not try to counter that.Highlighting added by me. Here's a tip: when trying to reassure the public that you're not abusing your powers, and that you're breaking basic encryption used widely across the internet for their own good by narrowly targeting whom it's used against, maybe (just maybe) don't include a hedge word that includes every human being on earth.
As Ken White noted, we are all "others" here. We've already noted that previous leaks, concerning "minimization" have shown that the NSA people believe that if your data is encrypted then they can keep it, because you might be evil, and that comes through here as well. They keep trying to focus on how this is just about stopping terrorists, but it always leaves that massive loophole for "others."
So, once again, the NSA's attempt to insist that what it's doing is narrow and targeted and just after "the bad guys," yet again only breeds further reasons to trust the NSA even less. As White notes, this whole situation is particularly disturbing because so much can be classified under "others" that should be seen as reasonable and normal activity of a person who questions whether the government is really acting as a representative of the people.
Ken goes on from there and it's well worth reading the entire statement. The NSA sees the American public as the adversary and believes it can track pretty much anyone as an "other." And for those who believe you "have nothing to fear because you've done nothing wrong," it's time to recognize that you too, are the "other."I am the other because I do not trust my government in general, or the people working for its security apparatus in particular.
I am the other because I believe the Security State and its representatives habitually lie, both directly and by misleading language, about the scope of their spying on us. I believe they feel entitled to do so.
I am the other because I believe the Security State and its representatives habitually violate such modest restrictions as a complacent and compliant legislature puts on their spying — again, because they feel entitled to do so.
I am the other because I don't believe the Security State and its representatives when they say that government spying is reserved for foreign terrorists. In fact, the NSA's "minimization" techniques — touted as methods for restricting spying to foreign terrorists instead of U.S. citizens — are often transparently and insultingly ridiculous.
I am the other because I don't believe my government when it tries to convince us that enhanced spying techniques are used to protect us from terrorists. I believe, instead, that the increased powers acquired by my government since 9/11 have been habitually brought to bear for domestic purposes, including such things as the ruinous and amoral War on Drugs.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: backdoors, dni, encryption, i con the record, ic, james clapper, nsa, nsa surveillance, surveillance
Reader Comments
Subscribe: RSS
View by: Time | Thread
New Tshirt
[ link to this | view in chronology ]
Re: New Tshirt
[ link to this | view in chronology ]
Re: New Tshirt
[ link to this | view in chronology ]
The problem:
The NSA's weaknesses in the standards can be used BY ANYONE to spy on all of us.
[ link to this | view in chronology ]
Re: The problem:
This has probably already happened. And those who found them aren't going to tell us (because they want to profit from them) and the NSA isn't going to tell us (because they don't want to admit what they've done).
So as a result, we're all LESS secure. Worse, we don't know much less (see above). Still worse, we have no idea how to fix it because we have no idea what's broken.
[ link to this | view in chronology ]
Re: The problem:
[ link to this | view in chronology ]
Re: Re: The problem:
Sure, we can't trust the NSA 100%, especially if you're not a part of the same political party that controls the executive. But, truth be told, the impact that NSA spying has on your average citizen is significantly less than the impact a potential e.g. Russian hacker could have over that same citizen's bank account. I say this not to minimize the issue with NSA spying - it would still be a problem even without weakening encryption - but just to point out that IMO, the weaknesses introduced into encryption are far more dangerous in the hands of real criminals who have the serious intention of doing major harm to innocent people.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Every time the NSA puts forward an apologist so say everything is fine, it's a loaded statement with a ton of lies, misdirection, and carefully crafted reassurances that turn out within days to be false.
This government, the NSA, and major corporations that are selling data back to the branches of government is entirely out of hand.
This has to end.
[ link to this | view in chronology ]
BTW take a look at this Dilbert: http://www.dilbert.com/strips/comic/2013-09-06/
[ link to this | view in chronology ]
I guess all have a new scapegoat for the last 10+ years and the next 10+ years whenever there's a big data breach that does massive damage to the economy, the NSA did it with all the security vulnerabilities they inserted into the tech standards.
[ link to this | view in chronology ]
To quote
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
A lack of complaint from a government to me will likely mean one of 3 things:
1/ They are sharing some or all of the "take"
2/ The US has bullied them into submission
3/ The members of the government in question have no idea just what this means for their own country.
Any of those is rather scary...
[ link to this | view in chronology ]
At least NSA respects us enough to call adversaries!
Anyhoo, as for backdoors, Google is cooperating with NSA:
"NSA is quietly writing code for Google’s Android OS"
http://refreshingnews99.blogspot.in/2013/07/nsa-is-quietly-writing-code-for-googles.html
O h, and as ever, don't forget Snowden says Google helps NSA by providing them "direct access to servers".
[ link to this | view in chronology ]
Re: At least NSA respects us enough to call adversaries!
[ link to this | view in chronology ]
Re: At least NSA respects us enough to call adversaries!
[ link to this | view in chronology ]
Modern Times
[ link to this | view in chronology ]
Re: Modern Times
[ link to this | view in chronology ]
I want to get that printed on a T-shirt
Think it would sell? I could include a free tin foil hat with each purchase.
[ link to this | view in chronology ]
Re: I want to get that printed on a T-shirt
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re: Got to love OPEN SOURCE
Now I need to pinch my nose and start using Linux
I do not trust Microsoft anymore :(
[ link to this | view in chronology ]
Re: open source
Take Ubuntu, which is an open source distribution of GNU/Linux, it lacks the ehtical imperitives of free software and has "binary blobs", and binary isn't real source code - it's very difficult to use if you're making any non-trivial modification to the program. What's the betting the NSA working with Google haven't got binary blobs or even proprietary elements in Android?
Go fully free software with a distro such as gNewSense (Debian based). Debian is fully free by default but it makes it too easy to get proprietary software by keeping it in its repositories, although they are fairly clearly marked.
P.S. Use Gnash instead of adobe flashplayer, Gnash is free software - it doesn't always work perfectly but at least you can be fairly certain the NSA or GCHQ haven't screwed around with it.
[ link to this | view in chronology ]
Re: open source
It's like vegans criticizing vegetarians for being less doctrinaire. And fruitarians criticizing both.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
The Others
[ link to this | view in chronology ]
Things immediately escalate from there. NSA calls in Tailored Access Operations (TAO) to install an 'implant' in the rogue shadow.
NSA then attempts to access the 'implant' through the shadow's 'backdoor'. ;)
[ link to this | view in chronology ]
And who are these "Others"? Yep it's you.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Does Gargamel want to eat the Smurfs or turn them into gold?
[ link to this | view in chronology ]
[ link to this | view in chronology ]