<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-16750015</atom:id><lastBuildDate>Mon, 27 Apr 2026 11:13:50 +0000</lastBuildDate><category>privacy</category><category>tsa</category><category>surveillance</category><category>FOIA</category><category>cookies</category><category>google</category><category>FBI</category><category>phishing</category><category>DMCA</category><category>airport</category><category>ssl</category><category>taco</category><category>tor</category><category>DoJ</category><category>ID</category><category>data retention</category><category>firefox</category><category>opt-out</category><category>transparency</category><category>ATT</category><category>CALEA</category><category>RIAA</category><category>big brother</category><category>copyright</category><category>ecpa</category><category>facebook</category><category>microsoft</category><category>police</category><category>this american life</category><category>yahoo</category><category>&quot;lies damn lies&quot;</category><category>Bank Of America</category><category>MiTM</category><category>Won&#39;t someone think of the children</category><category>apple</category><category>censorship</category><category>cipav</category><category>continental</category><category>data protection</category><category>do not track</category><category>drm</category><category>encryption</category><category>extensions</category><category>financial privacy</category><category>flying</category><category>hotwatch</category><category>investigation</category><category>lawsuit</category><category>location info</category><category>no-fly list</category><category>nsa</category><category>referrer</category><category>responsible disclosure</category><category>rss</category><category>safecount</category><category>server logs</category><category>subpoenas</category><category>surveilance</category><category>trespass to chattel</category><category>what a mess</category><category>white house</category><category>wiretapping</category><category>wiretaps</category><category>4th amendment</category><category>BOA</category><category>DCA</category><category>DHS</category><category>EFF</category><category>EU</category><category>FCRA</category><category>FISA</category><category>G-Men</category><category>HTTPS</category><category>IE9</category><category>IIPI</category><category>SiteKey</category><category>T</category><category>TRIP</category><category>Terrorist Surveillance Program</category><category>access point</category><category>adobe</category><category>advertising</category><category>airport security</category><category>akamai</category><category>amber alert</category><category>anonymity</category><category>astroglide</category><category>astroturfing</category><category>babylon</category><category>behavioral advertising</category><category>berkman</category><category>big news</category><category>blogging</category><category>boarding pass</category><category>booya</category><category>broken glass</category><category>browser exploits</category><category>browsers</category><category>certificate authorities</category><category>child porn</category><category>chilling effect</category><category>cloud computing</category><category>cnet</category><category>code</category><category>common carrier</category><category>congress</category><category>contest</category><category>cover up</category><category>credit</category><category>credit union</category><category>crypto wars</category><category>customizegoogle</category><category>customs</category><category>deep crack</category><category>deep pocket inspection</category><category>diginotar</category><category>disclosure</category><category>dissertation</category><category>docomo</category><category>farce</category><category>flying without ID</category><category>fraud</category><category>freedom</category><category>freeloaders</category><category>freenet</category><category>fun projects</category><category>glenn greenwald</category><category>gmail</category><category>gogo wireless</category><category>google reader</category><category>google toolbar</category><category>henry waxman</category><category>hiibel</category><category>hotmail</category><category>ibm</category><category>ignorance</category><category>images</category><category>imaginary laws</category><category>intercepts</category><category>internship</category><category>interview</category><category>iran</category><category>jennifer granick</category><category>kiddie porn</category><category>law</category><category>lawyers</category><category>laziness</category><category>leakage</category><category>legalese</category><category>lessons</category><category>liars</category><category>linux</category><category>location</category><category>loophole</category><category>man in the middle</category><category>mashup</category><category>mccain</category><category>mistruths</category><category>mobile phones</category><category>more government stupidity</category><category>mozilla</category><category>mpaa</category><category>myspace</category><category>net neutrality</category><category>no-id</category><category>open government</category><category>opendns</category><category>opt out header</category><category>ottawa</category><category>p2p</category><category>patents</category><category>patriot act</category><category>paypal</category><category>pen registers</category><category>pet workshop</category><category>pgp</category><category>physical security</category><category>pirate bay</category><category>podcast</category><category>police state</category><category>privacy by design</category><category>puffer</category><category>red hat</category><category>ruby</category><category>schumer</category><category>section 215</category><category>security</category><category>skype</category><category>sniffing</category><category>sony</category><category>sprint</category><category>spyware</category><category>surveillance state</category><category>t-mobile</category><category>takedown</category><category>targeted advertising</category><category>tracking</category><category>trademark</category><category>travel blog</category><category>united</category><category>us attorney</category><category>usms</category><category>vulnerability</category><category>web server logs</category><category>website</category><category>xml</category><category>youtube</category><title>slight paranoia</title><description>Analysis and opinion by Christopher Soghoian, security and privacy researcher.</description><link>http://paranoia.dubfire.net/</link><managingEditor>noreply@blogger.com (Christopher Soghoian)</managingEditor><generator>Blogger</generator><openSearch:totalResults>389</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-7666324139633484256</guid><pubDate>Thu, 08 Dec 2016 16:04:00 +0000</pubDate><atom:updated>2016-12-08T11:04:25.695-05:00</atom:updated><title>Learning how policy is made in the legislative branch</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;During my seven years in Washington D.C., I’ve worked for the nation’s premier privacy regulator—the Federal Trade Commission—and for one of the top civil liberties organizations in the United States&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;—&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;the American Civil Liberties Union&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;arial&amp;quot;; font-size: 14.6667px; white-space: pre-wrap;&quot;&gt;. These have both been great experiences, but I now want to learn first-hand how policy is made in the legislative branch.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;After more than four years at the ACLU, I’ll be leaving the organization on January 6, 2017 to join the &lt;a href=&quot;http://www.newamerica.org/oti/press-releases/techcongress-announces-second-class-congressional-innovation-fellows/&quot;&gt;new class&lt;/a&gt; of TechCongress Congressional Innovation Fellows. &amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;&lt;a href=&quot;http://www.techcongress.io/the-fellowship/&quot;&gt;TechCongress&lt;/a&gt; is a nonpartisan program incubated New America’s Open Technology Institute that’s dedicated to building 21st century government and developing cross-sector technology leaders. &amp;nbsp;The Congressional Innovation Fellowship was launched in 2015 and places technologists to serve in Congress through a one-year residency on Capitol Hill to gain in-depth understanding of the legislative process. &amp;nbsp;This year’s class includes four fellows with experience across the tech sector. &amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.2; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;The specifics of my placement (that is, which Congressional office or Committee I’ll work for) won’t be settled until January.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;This fellowship will mean that my life will change in many ways. I’m going to be putting my Twitter account on hold for the duration of my fellowship. Likewise, I won’t I give any public talks or speak to journalists (on or off the record) during that time. Starting in January, I’m going to keep my head down, focus on the job, and try to make the most of this fantastic opportunity. I’ll also be wearing a suit far more often.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;span style=&quot;background-color: transparent; color: black; font-family: &amp;quot;arial&amp;quot;; font-size: 14.666666666666666px; font-style: normal; font-variant: normal; font-weight: 400; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;&quot;&gt;I’ve loved my time at the ACLU, I’ve been lucky enough to work with some of the most skilled civil liberties lawyers in the country, on some of the most interesting and exciting technology and surveillance related issues of our time. My team will be hiring someone soon to replace me, so if you have a background in technology, an interest in civil liberties, and an ability to explain things and communicate with empathy to lawyers, journalists and policymakers, please apply once the job is posted.&lt;/span&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span id=&quot;docs-internal-guid-ede56de8-da25-92ac-3caf-f275fecfb496&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.38; margin-bottom: 0pt; margin-top: 0pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://paranoia.dubfire.net/2016/12/learning-how-policy-is-made-in.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-6285114020742458687</guid><pubDate>Thu, 09 Jul 2015 19:21:00 +0000</pubDate><atom:updated>2015-07-09T15:25:52.040-04:00</atom:updated><title>Goodbye Caspar</title><description>I think I first met Caspar Bowden back in 2007.&lt;br /&gt;
&lt;br /&gt;
I first encountered him at privacy conferences, where he would, without fail, be the first person to the microphone anytime a tech company employee or government official spoke, and he would hammer them with the most uncomfortable, probing questions about privacy and surveillance.&lt;br /&gt;
&lt;br /&gt;
The thing is, there are very few new faces on the privacy circuit. Many of these people had encountered Caspar before and had been on the receiving end of his unpleasant questions. If they gave a bullshit answer, the next time he asked the question, he would come prepared with material to respond. If they evaded, the next time he asked the question, he would mention how many times they had evaded it. He was relentless. It worked. He would ask the same questions over and over, until he finally browbreat them into giving an honest answer, on the record, in front of a room full of privacy experts, officials, and academics.&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
As a young, green activist, I was in awe.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Moreover, Caspar had somehow convinced Microsoft to hire him, to pay him a good wage, allow him to travel around the world, with a corporate Amex card, while he took the mic and railed against the very privacy-invading corporations who were paying his mortgage. Microsoft was for some reason keeping one of the biggest privacy curmudgeons in Europe on its payroll.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Microsoft has been, and continues to be, a total trainwreck on privacy. I always assumed that Microsoft kept Caspar around, in spite of his &lt;i&gt;rough edges&lt;/i&gt;, because he provided the company with blunt, useful, internal feedback on their own products and services before they launched. If they listened to Caspar, it meant they would avoid a public flogging from public interest advocates.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Eventually, Microsoft fired him. I don&#39;t know if it was because the company tired of his public shenanigans, because he was, unlike many of his corporate shill peers at Microsoft, not willing to tow the obviously deceptive company line about its commitment to privacy, or, as Caspar later hinted, because he was increasingly voicing his concerns internally about FISA Amendments Act Section 702 and the ease with which the US government could spy on the cloud computing services, such as those provided by Microsoft, which were used by non-Americans.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
But once Microsoft fired him, he dedicated himself to warning everyone he could about the way in which the NSA, through the FISA Amendments Act, could spy on the world. Caspar saw PRISM coming, and he tried to warn the world. But few would listen.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
I remember in the week or two before the CCC Camp, in the summer of 2011, trying to convince Caspar to change the slides he planned to use for his talk (&lt;a href=&quot;http://media.ccc.de/browse/conferences/camp2011/cccamp11-4589-a_brief_history_of_european_internet_surveillance_policy_and_what_maybe_next-en.html#video&quot;&gt;video&lt;/a&gt;) on FISA surveillance. They looked like a bottle of Doc Bronner&#39;s soap, words packed into every available inch of white space. They were impossible for the average attendee to understand, and would make him look crazy, as he stood on stage talking about a global NSA Internet dragnet. Caspar disagreed, and said that it was important to include as much useful information, the more the better, so that people watching at home could look it all up themselves.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
Caspar knew he was right about what we now know as PRISM, he knew that the US government and US corporate interests were engaged in an active &lt;a href=&quot;http://www.hldataprotection.com/files/2013/05/A-Sober-Look-at-National-Security-Access-to-Data-in-the-Cloud.pdf&quot;&gt;disinformation campaign&lt;/a&gt; to muddy the water on the issue of US government surveillance of cloud computing, and sadly, he could come off as a bit of a crank.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
But he was right. He was so damn right.&lt;br /&gt;
&lt;br /&gt;
Caspar taught me a lot, both by showing me what to do, and what not to do. I really looked up to him, and now he&#39;s gone.&lt;br /&gt;
&lt;br /&gt;
Fuck.&lt;br /&gt;
&lt;br /&gt;
I&#39;ll miss you Caspar.&lt;/div&gt;
</description><link>http://paranoia.dubfire.net/2015/07/goodbye-caspar.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-5011469631598160708</guid><pubDate>Thu, 15 Aug 2013 19:30:00 +0000</pubDate><atom:updated>2013-08-15T15:30:46.906-04:00</atom:updated><title>Gone Fishin&#39;</title><description>This blog is not currently active. If you want to see what I&#39;m upto, find me on Twitter at &lt;a href=&quot;https://www.twitter.com/csoghoian&quot;&gt;@csoghoian&lt;/a&gt; or at the ACLU &lt;a href=&quot;http://www.aclu.org/blog/free-future&quot;&gt;Free Future&lt;/a&gt; blog.</description><link>http://paranoia.dubfire.net/2013/08/gone-fishin.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-5152501742247360903</guid><pubDate>Sun, 09 Jun 2013 01:35:00 +0000</pubDate><atom:updated>2013-06-08T21:40:22.155-04:00</atom:updated><title>Analyzing Yahoo&#39;s PRISM non-denial</title><description>&lt;p&gt;Today, Yahoo&#39;s General Counsel &lt;a href=&quot;http://yahoo.tumblr.com/post/52491403007/setting-the-record-straight&quot;&gt;posted&lt;/a&gt; a carefully worded denial regarding the company&#39;s alleged participation in the NSA PRISM program. To the casual observer, it might seem like a categorical denial. I do not believe that Yahoo&#39;s denial is as straightforward as it seems.&lt;/p&gt;

&lt;p&gt;Below, I have carefully parsed Yahoo&#39;s statement, line by line, in order to highlight the fact that Yahoo has not in fact denied receiving court orders under &lt;a href=&quot;http://www.law.cornell.edu/uscode/text/50/1881a&quot;&gt;50 USC 1881a&lt;/a&gt; (AKA FISA Section 702) for massive amounts of communications data.&lt;/p&gt;

&lt;hr&gt;

&lt;blockquote&gt;We want to set the record straight about stories that Yahoo! has joined a program called PRISM through which we purportedly &lt;b&gt;volunteer&lt;/b&gt; information about our users to the U.S. government and give federal agencies access to our user databases.  These claims are false. [emphasis added]&lt;/blockquote&gt;

&lt;p&gt;No one has claimed that the PRISM program is voluntary. As the Director of National Intelligence has &lt;a href=&quot;http://www.dni.gov/index.php/newsroom/press-releases/191-press-releases-2013/869-dni-statement-on-activities-authorized-under-section-702-of-fisa&quot;&gt;confirmed&lt;/a&gt;, the PRISM program involves court orders granted using Section 702 of the Foreign Intelligence Surveillance Act.&lt;/p&gt;

&lt;p&gt;By falsely describing PRISM as a voluntary scheme, Yahoo&#39;s general counsel is then able to deny involvement outright. Very sneaky.&lt;/p&gt;

&lt;blockquote&gt;Yahoo! has not joined any program in which we volunteer to share user data with the U.S. government. We do not voluntarily disclose user information.
&lt;/blockquote&gt;

Again, PRISM has nothing to do with voluntary disclosures. These are compelled disclosures, pursuant to an order from the FISA court.

&lt;blockquote&gt;The only disclosures that occur are in response to specific demands.&lt;/blockquote&gt;

The government can make a specific demand for information about all communications coming to or from a particular country. This is an empty statement.

&lt;blockquote&gt;And, when the government does request user data from Yahoo!, we protect our users.&lt;/blockquote&gt;

Claiming to &quot;protect our users&quot; means nothing.

&lt;blockquote&gt;We demand that such requests be made through lawful means and for lawful purposes. We fight any requests that we deem unclear, improper, overbroad, or unlawful.&lt;/blockquote&gt;

When the law allows blanket surveillance, &quot;lawful means and lawful purposes&quot; doesn&#39;t mean anything. 

&lt;blockquote&gt;We carefully scrutinize each request, respond only when required to do so, and provide the least amount of data possible consistent with the law.&lt;/blockquote&gt;

When a FISA court order demands blanket surveillance, responding only when required to do so is an empty promise, as is providing the least amount of data possible.

&lt;blockquote&gt;The notion that Yahoo! gives any federal agency vast or unfettered access to our users’ records is categorically false.&lt;/blockquote&gt;

&lt;p&gt;Elsewhere in the post, Yahoo&#39;s uses the terms &quot;user data&quot; and &quot;user information&quot;. Why the sudden switch to the term &quot;users&#39; records&quot;? This seems to deny participation in a Section 215 metadata disclosure program (see: the Verizon Business order revealed earlier this week), which has nothing to do with PRISM.&lt;/p&gt;

&lt;p&gt;In any case, the PRISM scandal is not about unfettered access to users&#39; data. It is about giving the government data in which one party of the communication is not in the US. Yahoo is not accused of giving the government unfettered access to communications where all parties are in the US.&lt;/p&gt;

&lt;blockquote&gt;Of the hundreds of millions of users we serve, an infinitesimal percentage will ever be the subject of a government data collection directive.&lt;/blockquote&gt;

Note the use of the word directive in this statement, which does not mean voluntary. Now see below.

&lt;blockquote&gt;Where a request for data is received, we require the government to identify in each instance specific users and a specific lawful purpose for which their information is requested.&lt;/blockquote&gt;

Here, Yahoo switches to using the term &quot;requests&quot; which are voluntary, not demands. The government is not obligated to describe &quot;a specific legal purpose&quot; when it has obtained a court order compelling the disclosure of data. It is only when the government is making a voluntary request of Yahoo that the company has the ability to set terms for the disclosure.

&lt;blockquote&gt;Then, and only then, do our employees evaluate the request and legal requirements in order to respond—or deny—the request.&lt;/blockquote&gt;

Yahoo has flexibility when the government makes a request for data. The company has far less flexibility when it receives a court order demanding the disclosure of data.

&lt;blockquote&gt;We deeply value our users and their trust, and we work hard everyday to earn that trust and, more importantly, to preserve it.&lt;/blockquote&gt;

If that were true, Yahoo would protect the privacy and security of its customers by enabling HTTPS by default for Yahoo Mail. Yahoo was the last big email provider to even offer HTTPS as an opt-in option, and has still not enabled it by default. </description><link>http://paranoia.dubfire.net/2013/06/analyzing-yahoos-prism-non-denial.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><thr:total>27</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-4861969931784242394</guid><pubDate>Sat, 24 Nov 2012 22:14:00 +0000</pubDate><atom:updated>2012-11-24T17:35:27.451-05:00</atom:updated><title>A few words on patronage</title><description>&lt;p&gt;Over the past couple years, I&#39;ve taken several big companies to task for their woeful privacy and security practices. Just as it is important to call out these flaws, I believe it is also important to give companies credit when they go the extra mile to protect their customers.&lt;/p&gt;

&lt;p&gt;When Google began protecting Gmail with HTTPS by default, I &lt;a href=&quot;https://twitter.com/csoghoian/statuses/7700296461&quot;&gt;praised the company&lt;/a&gt;. When it started voluntarily publishing statistics for government requests, &lt;a href=&quot;http://paranoia.dubfire.net/2010/04/in-praise-of-google.html&quot;&gt;I again praised the company&lt;/a&gt;. When AT&amp;T protected its customers&#39; voicemail accounts from caller ID spoofing by forcing users to enter PINs, &lt;a href=&quot;http://arstechnica.com/tech-policy/2011/08/not-an-option-time-for-companies-to-embrace-security-by-default/&quot;&gt;I praised the company&lt;/a&gt;. When Twitter asked the government to unseal the 2703(d) order that it had obtained as part of its investigation into Wikileaks, &lt;a href=&quot;http://paranoia.dubfire.net/2011/01/thoughts-on-doj-wikileakstwitter-court.html&quot;&gt;I praised the company&lt;/a&gt;. When Facebook &lt;a href=&quot;https://twitter.com/csoghoian/status/30293490894118912&quot;&gt;started to offer&lt;/a&gt; HTTPS, and then this month enabled it by default, I &lt;a href=&quot;https://twitter.com/csoghoian/status/270398184969338881&quot;&gt;praised the company&lt;/a&gt;. When Mozilla switched to encrypted search by default for Firefox, I &lt;a href=&quot;http://paranoia.dubfire.net/2012/03/firefox-switching-to-https-google.html&quot;&gt;praised the organization.&lt;/a&gt;&lt;/P&gt;

&lt;p&gt;You get the idea.&lt;/p&gt;

&lt;p&gt;Of course, just because I praise a particular action by a company, it doesn&#39;t mean that I am suddenly giving the company or its products my seal of approval. As an example, I&#39;m of course glad that Facebook is enabling transport encryption to protect its customers&#39; communications from network based interception. That doesn&#39;t mean I suddenly love Facebook, or bless the company&#39;s other business practices. Turning on HTTPS by default is a great move, but it isn&#39;t enough to get me to open a Facebook account, or trust the company with my data.&lt;/p&gt;

&lt;p&gt;It is unfortunate then that I must defend myself against Nadim Kobeissi&#39;s &lt;a href=&quot;http://log.nadim.cc/?p=102&quot;&gt;latest attempt&lt;/a&gt; at reputation assassination.&lt;/p&gt;

&lt;p&gt;Earlier this month, I &lt;a href=&quot;https://twitter.com/csoghoian/status/264148155132678144&quot;&gt;praised&lt;/a&gt; Silent Circle for the company&#39;s fantastic &lt;a href=&quot;https://silentcircle.com/web/law-compliance/&quot;&gt;law enforcement compliance policy&lt;/a&gt;. [Silent Circle sent me an early draft of their policy, sought feedback, and even accepted some of my suggestions]. Compared to the industry norm, in which companies merely disclose that they will hand over their customers&#39; data to the government when forced to do so, Silent Circle&#39;s policy is an absolutely stellar example of the ways in which companies can approach this issue in a clear, transparent and honest manner.&lt;/p&gt;

&lt;P&gt;I have spent several years &lt;a href=&quot;http://files.dubfire.net/csoghoian-dissertation-final-8-1-2012.pdf&quot;&gt;researching&lt;/a&gt; the ways in which law enforcement agencies force service providers to spy on their customers. Most companies are not willing to discuss their law enforcement policies, let alone publish them online. It is for that reason that I praised Silent Circle - because they have set a great example that I hope other companies will follow.&lt;/p&gt;

&lt;p&gt;However, as with the numerous other examples I highlighted above, just because I praise a particular action by a company, it doesn&#39;t mean that I now stand behind the company or its products.&lt;/P&gt;

&lt;p&gt;Although I have praised Silent Circle&#39;s legal policies, I&#39;ve made no public statements regarding the technical merits of their products. When I&#39;ve been questioned by journalists about the extent to which consumers should trust the company&#39;s technology, I&#39;ve been consistently conservative. As I recently told Ryan Gallagher at &lt;a href=&quot;http://www.slate.com/articles/technology/future_tense/2012/10/silent_circle_mike_janke_s_iphone_app_makes_encryption_easy_governments.single.html&quot;&gt;Slate&lt;/a&gt;:&lt;/p&gt;

&lt;p&gt;&lt;blockquote&gt;Christopher Soghoian, principal technologist at the ACLU&#39;s Speech Privacy and Technology Project, said he was excited to see a company like Silent Circle visibly competing on privacy and security but that he was waiting for it to go open source and be audited by independent security experts before he would feel comfortable using it for sensitive communications.&lt;/blockquote&gt;&lt;/p&gt;

&lt;p&gt;Nadim has suggested that I am &lt;a href=&quot;http://log.nadim.cc/?p=102&quot;&gt;endangering my independence&lt;/a&gt; and that I have some kind of conflict of interest regarding Silent Circle, &lt;a href=&quot;https://twitter.com/kaepora/status/265892352214835200&quot;&gt;possibly&lt;/a&gt; because the company &lt;a href=&quot;https://twitter.com/kaepora/status/265893225208885248&quot;&gt;loaned me&lt;/a&gt; an iPod Touch so that I could get a chance to try out the iOS version of their software while they work out the kinks in the Android version. (How does Nadim even know the company loaned me an iPod? Because I &lt;a href=&quot;http://www.mail-archive.com/liberationtech@lists.stanford.edu/msg01387.html&quot;&gt;disclosed&lt;/a&gt; it in a discussion with him on a public mailing list.)&lt;/p&gt;

&lt;p&gt;Let me be perfectly clear. I am not a consultant to Silent Circle or any other company. I am not on an advisory board for Silent Circle or any other company. The only employer I have is the American Civil Liberties Union. Yes, I regularly talk with people who work at the company, and offer suggestions for ways that they can better protect the privacy of their customers. However, I regularly give solicited (and even more frequently, unsolicited) feedback to many companies, big and small. Most ignore me, but some occasionally change their practices. I am a privacy activist, and that is what I do.&lt;/p&gt;






</description><link>http://paranoia.dubfire.net/2012/11/a-few-words-on-patronage.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-8654303298106252840</guid><pubDate>Wed, 08 Aug 2012 10:08:00 +0000</pubDate><atom:updated>2012-08-08T09:07:43.269-04:00</atom:updated><title>Responding to Wired&#39;s ad hominem hatchet job</title><description>&lt;p&gt;I have long been a fan of Wired&#39;s coverage of privacy and security issues, particularly the insightful reporting and analysis by Ryan Singel, currently the editor of the Threat Level blog. It is for that reason that I am saddened to see Ryan stoop to twisting my words in support of a lengthy character assassination piece targeted against me.&lt;/p&gt;

&lt;b&gt;Brief background&lt;/b&gt;

&lt;p&gt;Two weeks ago, Wired published a &lt;a href=&quot;http://www.wired.com/threatlevel/2012/07/crypto-cat-encryption-for-all/all/&quot;&gt;glowing, 2000 word story&lt;/a&gt; by Quinn Norton about CryptoCat, an encrypted chat tool. Quinn was not the first journalist to shower praise upon Cryptocat -- writers at the New York Times and Forbes had previously done so too.&lt;/p&gt;

&lt;p&gt;I subsequently published a &lt;a href=&quot;http://paranoia.dubfire.net/2012/07/tech-journalists-stop-hyping-unproven.html&quot;&gt;lengthy blog post&lt;/a&gt;, which compared the media&#39;s coverage of Cryptocat, a relatively new, unproven security tool, to the media&#39;s previous fawning coverage of Haystack, a tool which, once analyzed by experts, was revealed to be pure snakeoil.&lt;/p&gt;

&lt;p&gt;The message in my blog post -- that journalists risk exposing their readers to harm when they hype unproven security technologies -- was directed at the media as a whole. In support of my argument, I cited glowing praise for such technologies printed in the Guardian, the New York Times, Newsweek, Forbes and, Wired.&lt;/p&gt;

&lt;p&gt;Today, Ryan Singel, the editor at Wired&#39;s Threat Level blog &lt;a href=&quot;http://www.wired.com/threatlevel/2012/08/security-researchers/all/&quot;&gt;responded to my blog post&lt;/a&gt;, but incorrectly frames my criticism as if it were solely directed at Quinn Norton and her coverage of Cryptocat. In doing so, Ryan inaccurately paints me as a sexist, security-community insider who is unfairly criticizing a tool &quot;created by an outsider to the clubby crypto community and one that’s written up by a woman and reviewed by a female security expert.&quot;

&lt;p&gt;&lt;b&gt;The importance of dissenting technical experts&lt;/b&gt;

&lt;p&gt;One of the biggest criticisms of Norton&#39;s story I expressed in my blog post of was the fact that she did not quote a single technical expert that was critical of Cryptocat, even though there are quite a few who have been vocal with their concerns:

&lt;blockquote&gt;
Other than Kobeissi, Norton&#39;s only other identified sources in the story are Meredith Patterson, a security researcher that was previously critical of Cryptocat who is quoted saying &quot;although [Cryptocat] got off to a bumpy start, he’s risen to the occasion admirably&quot; and an unnamed active member of Anonymous, who is quoted saying &quot;if it&#39;s a hurry and someone needs something quickly, [use] Cryptocat.&quot;
&lt;/blockquote&gt;

As I also noted in my post:

&lt;blockquote&gt;Even though their voices were not heard in the Wired profile, several prominent experts in the security community have criticized the web-based version of Cryptocat. These critics include Thomas Ptacek, Zooko Wilcox-O&#39;Hearn, Moxie Marlinspike and Jake Appelbaum.&lt;/blockquote&gt;

Singel frames my criticism here as sexist. Meredith Patterson is a woman, whereas the Cryptocat critics I named were all men. Singel claims that, &quot;Patterson, one of the all-too few female security researchers, doesn’t seem to count for much in Soghoian’s analysis.&quot; He adds later, &quot;instead, Soghoian believes, Norton should have turned to one of four more vocal critics he names — all of them men.&quot;

&lt;p&gt;As an initial matter, let me say that I have genuine respect for Meredith and her skills as a security researcher. We&#39;ve known each other for several years, have attended several privacy conferences together, and have a shared goal in keeping the communications of users out of the prying hands of the government. Nowhere in my prior blog post do I dismiss Patterson&#39;s skills, credentials, or technical opinions.

&lt;p&gt;My criticism of Norton&#39;s piece, in this respect, is not about the specific technical expert who is quoted as saying positive things about Cryptocat, but rather, the total lack of any dissenting quotes. If the rest of the security community were agnostic about the merits of Cryptocat, then it would perhaps be fine to quote a single technical expert who has positive things to say. In this case though, there are several technical experts who have deep concerns about the security of Cryptocat, experts whose research and views Wired has covered at length in the past.&lt;/p&gt;

&lt;p&gt;As Singel has described it, I would have liked Norton to talk to a more more qualified expert, and to not print Patterson&#39;s opinions. That is not the case. I just think that a dissenting expert should be quoted too.

&lt;p&gt;To summarize, the gender of the technical expert quoted saying positive things about Cryptocat has absolutely nothing at all to do with my belief that a responsible journalist would have spoken to, and quoted at least one technical expert who is critical of the tool. Even more so when the headline of the story is &quot;This Cute Chat Site Could Save Your Life and Help Overthrow Your Government.&quot;

&lt;p&gt;&lt;b&gt;On the issue of privilege&lt;/b&gt;

&lt;p&gt;In my blog post, I quoted from a few of Norton&#39;s recent tweets, in which she criticizes the crypto community, which she believes is filled with &quot;&lt;a href=&quot;http://twitter.com/quinnnorton/statuses/229177519704784897&quot;&gt;privileged&lt;/a&gt;&quot;, &quot;&lt;a href=&quot;http://twitter.com/quinnnorton/statuses/229178651059568640&quot;&gt;mostly rich 1st world white boys w/ no real problems who don&#39;t realize they only build tools [for] themselves.&lt;/a&gt;&quot;&lt;/p&gt;

&lt;p&gt;After I published my blog post, Singel &lt;a href=&quot;http://twitter.com/rsingel/status/230068333200945152&quot;&gt;criticized me&lt;/a&gt; for quoting Norton&#39;s tweets, claiming that I was using &quot;an outsider&#39;s critique of your boys club as a way to discredit them.&quot;

&lt;p&gt;Although Singel clearly disagrees, I felt, and still feel that it is relevant to highlight the fact that Norton believes that the crypto community, and in particular, the critics of Cryptocat, are just privileged, paranoid geeks who have no real problems.&lt;/p&gt;

&lt;p&gt;As I mentioned in my blog post, two of the most vocal critics of Cryptocat&#39;s web based chat app, Jake Appelbaum and Moxie Marlinspike, have faced pretty extreme real world problems of surveillance and government harassment.&lt;/p&gt;

&lt;p&gt;After Appelbaum was outed by the press as as being associated with WikiLeaks, &lt;a href=&quot;http://www.nytimes.com/2011/01/09/world/09wiki.html?pagewanted=all&quot;&gt;Twitter&lt;/a&gt;, &lt;a href=&quot;http://online.wsj.com/article/SB10001424052970203476804576613284007315072.html&quot;&gt;Google and Sonic.net&lt;/a&gt; were forced to provide his communication records to the FBI as part of its investigation into WikiLeaks. At least one of Appelbaum&#39;s friends and colleagues has been &lt;a href=&quot;http://www.salon.com/2011/06/09/wikileaks_27/&quot;&gt;forced to testify&lt;/a&gt; at a federal grand jury, and he has been &lt;a href=&quot;http://boingboing.net/2011/10/31/air-space-a-trip-through-an-ai.html&quot;&gt;repeatedly&lt;/a&gt; stopped at the border, harassed, and had &lt;a href=&quot;http://news.cnet.com/8301-27080_3-20012253-245.html&quot;&gt;digital devices seized&lt;/a&gt; by the authorities.

&lt;p&gt;Likewise, for some time, Marlinspike was &lt;a href=&quot;http://www.wired.com/threatlevel/2010/11/hacker-border-search/&quot;&gt;routinely stopped&lt;/a&gt; at the border by US authorities, had his laptop and phones searched, and in at least one case, was questioned by a US embassy official, who had a photo of Marlinspike at hand, before he could get on a plane back to the US.&lt;/p&gt;

&lt;p&gt;While Appelbaum and Marlinspike have (thankfully) not been physically tortured by government agents, their paranoia and dedication towards improving the state of Internet security is by no means theoretical. Their concerns are legitimate, and their paranoia is justified.

&lt;p&gt;&lt;b&gt;On telling journalists to unplug&lt;/b&gt;

&lt;p&gt;Singel&#39;s most vicious, yet totally unfair criticism relates to the two paragraphs that concluded my Cryptocat blog post:
&lt;blockquote&gt;
Although human interest stories sell papers and lead to page clicks, the media needs to take some responsibility for its &lt;a href=&quot;http://bits.blogs.nytimes.com/2012/06/27/an-app-that-encrypts-shreds-hashes-and-salts/&quot;&gt;ignorant hyping&lt;/a&gt; of new security tools and services. When a PR person retained by a new hot security startup pitches you, consider approaching an independent security researcher or two for their thoughts. Even if it sounds great, please refrain from showering the tool with unqualified praise.

&lt;p&gt;By all means, feel free to continue hyping the latest social-photo-geo-camera-dating app, but before you tell your readers that a new security tool will lead to the next Arab Spring or prevent the NSA from reading peoples&#39; emails, step back, take a deep breath, and pull the power cord from your computer.
&lt;/blockquote&gt;

Singel states that the main point of my post &quot;seemed to be to tell a woman to shut up and unplug from the net.&quot; He further twists my words by writing:

&lt;blockquote&gt;
Moreover, Soghoian suggesting that if Quinn Norton ever wanted to write about about encryption tools in the future, she ought to &quot;step back, take a deep breath, and pull the power cord from your computer&quot; isn&#39;t just rude and obnoxious, it’s border-line sexist and an outright abuse of Soghoian&#39;s place in the computer security world.&quot;
&lt;/blockquote&gt;

&lt;p&gt;The harsh words in my conclusion, which Singel quotes, were aimed at &quot;the media.&quot; This of course includes Wired, but also many other journalists and news organizations who regularly publish stories on the latest new snake-oil product that uses &quot;military-grade encryption.&quot;

&lt;p&gt;In fact, the words &quot;ignorant hyping&quot; in the blog post&#39;s conclusion link to a recent New York Times &lt;a href=&quot;http://bits.blogs.nytimes.com/2012/06/27/an-app-that-encrypts-shreds-hashes-and-salts/&quot;&gt;article about Wickr&lt;/a&gt;, a new mobile app that the Times reveals will let &quot;users transmit texts, photos and videos through secure and anonymous means previously reserved for the likes of the military and intelligence operatives.&quot;

&lt;p&gt;(This is, of course, rubbish. There are no anonymity technologies that have been &quot;reserved for the likes of the military and intelligence operatives.&quot;)

&lt;p&gt;Finally, in support of his charge that I am sexist, Singel twists my words by stating that &quot;Soghoian suggest[s] that if Quinn Norton ever wanted to write about about encryption tools in the future, she ought to &#39;step back, take a deep breath, and pull the power cord from your computer.&#39;&quot;

&lt;p&gt;Let me be clear: Nowhere in my blog post do I tell Quinn that she should never again write about encryption tools. Instead, I warn journalists who are planning to write that &quot;that a new security tool will lead to the next Arab Spring or prevent the NSA from reading peoples&#39; emails.&quot; That is very different than &quot;ever writing about encryption tools in the future.&quot;&lt;/p&gt;

&lt;p&gt;Of course I want journalists to write about encryption, privacy, security and the importance of protecting data. I want users to be safe, and one of the best ways for them to discover and then adopt safe practices is by reading about them in the media. 

&lt;p&gt;(Strangely enough, Wired&#39;s &lt;a href=&quot;http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/&quot;&gt;chilling coverage&lt;/a&gt; this week of the devastating hack against &lt;strike&gt;Mike&lt;/strike&gt; Mat Honan has been absolutely fantastic, offering a clear demonstration of how difficult it is for users to protect their data even when using tools and services created by billion dollar corporations.)&lt;/P&gt; 

&lt;p&gt;What I wish to avoid though, is news stories that hype technologies that simply cannot, and will not deliver what has been promised to users. By all means, please tell users about two-factor authentication, encrypted cloud backups with keys not known to providers, and VPN services. Just don&#39;t claim that these technologies will plunge the NSA into darkness or lead to the overthrow of authoritarian governments.

&lt;P&gt;&lt;b&gt;I do not hate female journalists&lt;/b&gt;

&lt;p&gt;As an activist that uses media coverage to pressure companies to change their privacy invading practices, I regularly work with journalists around the world, feeding them stories, tips, and when they want them, quotes. In the more than six years that I have been working with the media (including Wired on countless occasions), never once has the gender of the reporter played any role in whether or not I went to them with a scoop, or returned their phone calls or emails.

&lt;p&gt;The media are of course not equal in their understanding of technology or their willingness to dig deep into a tech issue. In my experience, gender plays absolutely no role in determining the quality of a tech journalist.

&lt;p&gt;For example, of the entire news media, the What They Know team at the Wall Street Journal (Julia Angwin and Jennifer Valentino-DeVries) are by far the best in the business when it comes to covering privacy and security. They break major stories, do great investigative research, and routinely seek the confirmation of multiple technical experts in order to verify claims before they print them. On this beat, their coverage is first rate, and quite frankly, puts the New York Times, the Washington Post, Wired, Ars and others to shame. It is not surprising then, that when a great scoop lands in my lap, I take it to the WSJ first.

&lt;p&gt;I judge, praise and criticize journalists on the tech beat based on the quality of their reporting, not by their gender. In this case, I criticized Quinn Norton&#39;s Wired story because it was deeply flawed, not because she is a woman. To claim otherwise is pure bullshit.&lt;/p&gt;</description><link>http://paranoia.dubfire.net/2012/08/responding-to-wireds-ad-hominem-hatchet.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><thr:total>26</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-8560613549686010811</guid><pubDate>Mon, 30 Jul 2012 21:43:00 +0000</pubDate><atom:updated>2012-07-31T16:19:27.515-04:00</atom:updated><title>Tech journalists: Stop hyping unproven security tools</title><description>&lt;a href=&quot;http://static.guim.co.uk/sys-images/Media/Pix/pictures/2010/3/25/1269523445370/Austin-Heap-001.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left:1em; margin-right:1em&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;276&quot; width=&quot;460&quot; src=&quot;http://static.guim.co.uk/sys-images/Media/Pix/pictures/2010/3/25/1269523445370/Austin-Heap-001.jpg&quot; /&gt;&lt;/a&gt;

&lt;p&gt;&lt;b&gt;Preface: Although this essay compares the media&#39;s similar hyping of Haystack and Cryptocat, the tools are, at a technical level, in no way similar. Haystack was at best, snake oil, peddled by a charlatan. Cryptocat is an interesting, open-source tool created by a guy who means well, and usually listens to feedback.&lt;/b&gt;

&lt;p&gt;In 2009, media outlets around the world discovered, and soon began to shower praise upon Haystack, a software tool designed to allow Iranians to evade their government&#39;s Internet filtering. Haystack was the brainchild of Austin Heap, a San Francisco software developer, who the Guardian &lt;a href=&quot;http://www.guardian.co.uk/technology/2010/mar/21/austin-heap-haystack-iran&quot;&gt;described as&lt;/a&gt; a &quot;tech wunderkind&quot; with the &quot;know-how to topple governments.&quot; 

&lt;p&gt;The New York Times &lt;a href=&quot;http://www.nytimes.com/2010/02/19/opinion/19iht-edcohen.html&quot;&gt;wrote that&lt;/a&gt; Haystack &quot;makes it near impossible for censors to detect what Internet users are doing.&quot; The newspaper also quoted one of the members of the Haystack team saying that &quot;It&#39;s encrypted at such a level it would take thousands of years to figure out what you’re saying.&quot;

&lt;p&gt;Newsweek &lt;a href=&quot;http://www.thedailybeast.com/newsweek/2010/08/06/needles-in-a-haystack.print.html&quot;&gt;stated that&lt;/a&gt; Heap had &quot;found the perfect disguise for dissidents in their cyberwar against the world’s dictators.&quot; The magazine revealed that the tool, which Heap and a friend had in &quot;less than a month and many all-nighters&quot; of coding, was equipped with &quot;a sophisticated mathematical formula that conceals someone’s real online destinations inside a stream of innocuous traffic.&quot;

&lt;p&gt;Heap was not content to merely help millions of oppressed Iranians. Newsweek quoted the 20-something developer revealing his long term goal: &quot;We will systematically take on each repressive country that censors its people. We have a list. Don’t piss off hackers who will have their way with you.

&lt;p&gt;The Guardian &lt;a href=&quot;http://www.guardian.co.uk/technology/2010/sep/17/haystack-software-security-concerns&quot;&gt;even selected&lt;/a&gt; Heap as its Innovator of the Year. The chair of the award panel praised Heap&#39;s &quot;vision and unique approach to tackling a huge problem&quot; as well as &quot;his inventiveness and bravery.&quot;

&lt;p&gt;This was a feel-good tech story that no news editor could ignore. A software developer from San Francisco taking on a despotic regime in Tehran.&lt;/P&gt;

&lt;p&gt;There was just one problem: The tool hadn&#39;t been evaluated by actual security experts. Eventually, Jacob Appelbaum obtained a copy of and analyze the software. The results were not pretty -- he &lt;a href=&quot;https://twitter.com/ioerror/status/24425326976&quot;&gt;described it&lt;/a&gt; as &quot;the worst piece of software I have ever had the displeasure of ripping apart.&quot;

&lt;p&gt;Soon after, Daniel Colascione, the lead developer of Haystack &lt;a href=&quot;http://www.guardian.co.uk/technology/2010/sep/17/haystack-software-security-concerns&quot;&gt;resigned&lt;/a&gt; from the project, saying the program was an example of &quot;hype trumping security.&quot; Heap ultimately &lt;a href=&quot;http://blog.austinheap.com/haystack-halting-testing/&quot;&gt;shuttered Haystack&lt;/a&gt;.

&lt;p&gt;After the proverbial shit hit the fan, the Berkman Center&#39;s Jillian York &lt;a href=&quot;http://jilliancyork.com/2010/09/13/haystack-and-media-irresponsibility/&quot;&gt;wrote&lt;/a&gt;:
&lt;blockquote&gt;
I certainly blame Heap and his partners–for making outlandish claims about their product without it ever being subjected to an independent security review, and for all of the media whoring they’ve done over the past year.

&lt;p&gt;But I also firmly place blame on the media, which elevated the status of a person who, at best was just trying to help, and a tool which very well could have been a great thing, to the level of a kid genius and his silver bullet, without so much as a call to circumvention experts.
&lt;/blockquote&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://blogs-images.forbes.com/jonmatonis/files/2012/07/web_chat.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left:1em; margin-right:1em&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;324&quot; width=&quot;582&quot; src=&quot;http://blogs-images.forbes.com/jonmatonis/files/2012/07/web_chat.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;p&gt;&lt;b&gt;Cryptocat: The press is still hypin&#39;&lt;/b&gt;

&lt;p&gt;In 2011, &lt;a href=&quot;http://nadim.cc/&quot;&gt;Nadim Kobeissi&lt;/a&gt;, then a 20 year old college student in Canada started to develop Cryptocat, a web-based secure chat service. The tool was &lt;a href=&quot;http://news.ycombinator.com/item?id=2855257&quot;&gt;criticized&lt;/a&gt; by &lt;a href=&quot;http://www.matasano.com/articles/javascript-cryptography/&quot;&gt;security&lt;/a&gt; &lt;a href=&quot;https://twitter.com/random_walker/status/192745147040145408&quot;&gt;experts&lt;/a&gt; after its initial debut, but stayed largely below the radar until April 2012, when it won an award at the Wall Street Journal&#39;s Data Transparency &lt;a href=&quot;http://datatransparency.wsj.com/&quot;&gt;Codeathon&lt;/a&gt;. Days later, the New York Times published a &lt;a href=&quot;http://www.nytimes.com/2012/04/18/nyregion/nadim-kobeissi-creator-of-a-secure-chat-program-has-freedom-in-mind.html?_r=1&quot;&gt;profile&lt;/a&gt; of Kobeissi, which the newspaper described as a &quot;master hacker.&quot;

&lt;p&gt;Cryptocat originally launched as a web-based application, which required no installation of software by the user. As Kobeissi told the New York Times:
&lt;blockquote&gt;
&quot;The whole point of Cryptocat is that you click a link and you’re chatting with someone over an encrypted chat room... That’s it. You’re done. It’s just as easy to use as Facebook chat, Google chat, anything.”
&lt;/blockquote&gt;

&lt;p&gt;There are, unfortunately, &lt;a href=&quot;http://www.matasano.com/articles/javascript-cryptography&quot;&gt;many problems&lt;/a&gt; with the entire concept of web based crypto apps, the biggest of which is the difficulty of securely delivering javascript code to the browser. In an effort to address these legitimate security concerns, Kobeissi released a second version of Cryptocat in 2011, delivered as a &lt;a href=&quot;https://chrome.google.com/webstore/detail/gonbigodpnfghidmnphnadhepmbabhij&quot;&gt;Chrome browser plugin&lt;/a&gt;. The default version of Cryptocat on the public website was the less secure, web-based version, although users visiting the page were informed of the existence of the more secure Chrome plugin.

&lt;p&gt;&lt;b&gt;Forbes, Cryptocat and Hushmail&lt;/b&gt;

&lt;p&gt;Two weeks ago, Jon Matonis, a blogger at Forbes included Cryptocat in his list of &lt;a href=&quot;http://www.forbes.com/sites/jonmatonis/2012/07/19/5-essential-privacy-tools-for-the-next-crypto-war/&quot;&gt;5 Essential Privacy Tools For The Next Crypto War&lt;/a&gt;. He wrote that the tool &quot;establishes a secure, encrypted chat session that is not subject to commercial or government surveillance.&quot;

&lt;P&gt;If there is anyone who should be reluctant offer such bold, largely-unqualified praise to a web-based secure communications tool like Cryptocat, it should be Matonis. Several years ago, before  he blogged for Forbes, Matonis was the CEO of Hushmail, a web-based encrypted email service. Like Cryptocat, Hushmail offered a 100% web-based client, and a downloadable java-based client which was more resistant to certain interception attacks, but less easy to use.

&lt;p&gt;Hushmail had in public marketing materials &lt;a href=&quot;http://www.wired.com/threatlevel/2007/11/encrypted-e-mai/&quot;&gt;claimed that&lt;/a&gt; &quot;not even a Hushmail employee with access to our servers can read your encrypted e-mail, since each message is uniquely encoded before it leaves your computer.&quot; In was therefore quite a surprise when Wired &lt;a href=&quot;http://www.wired.com/threatlevel/2007/11/encrypted-e-mai&quot;&gt;reported in 2007&lt;/a&gt; that Hushmail had been forced by a Canadian court to insert a backdoor into its web-based service, enabling the company to obtain decrypted emails sent and received by a few of its users.

&lt;p&gt;The moral of the Hushmail story is that web based crypto tools often cannot protect users from surveillance backed by a court order.

&lt;p&gt;&lt;b&gt;Wired&#39;s ode to Cryptocat&lt;/b&gt;

&lt;p&gt;This past Friday, Wired &lt;a href=&quot;http://www.wired.com/threatlevel/2012/07/crypto-cat-encryption-for-all/all/&quot;&gt;published&lt;/a&gt; a glowing, 2000 word profile on Kobeissi and Cryptocat by Quinn Norton. It begins with a bold headline: &quot;This Cute Chat Site Could Save Your Life and Help Overthrow Your Government,&quot; after which, Norton describes the Cryptocat web app as something that can &quot;save lives, subvert governments and frustrate marketers.&quot;

&lt;p&gt;In her story, Norton emphasizes the usability benefits of Cryptocat over existing secure communications tools, and on the impact this will have on the average user for whom installing Pidgin and OTR is too difficult. Cryptocat, she writes, will allow &quot;anyone to use end-to-end encryption to communicate without ... mucking about with downloading and installing other software.&quot; As Norton puts it, Cryptocat&#39;s no-download-required distribution model &quot;means non-technical people anywhere in the world can talk without fear of online snooping from corporations, criminals or governments.&quot;

&lt;p&gt;In short, Norton paints a picture in which Cryptocat fills a critical need: secure communications tools for the 99%, for the &lt;a href=&quot;http://en.wikipedia.org/wiki/Wikipedia:Too_long;_didn&#39;t_read&quot;&gt;tl;dr&lt;/a&gt; crowd, for those who can&#39;t, don&#39;t know how to, don&#39;t have time to, or simply don&#39;t want to download and install software. For such users, Cryptocat sounds like a gift from the gods.

&lt;p&gt;&lt;b&gt;Journalists love human interest stories&lt;/b&gt;

&lt;p&gt;Kobeissi presents the kind of human interest story that journalists dream about: A Lebanese hacker who has lived through 4 wars in his 21 years, whose father was killed, whose house was bombed, who was interrogated by the &quot;&lt;a href=&quot;http://www.nytimes.com/2012/04/18/nyregion/nadim-kobeissi-creator-of-a-secure-chat-program-has-freedom-in-mind.html?_r=2&quot;&gt;cyber-intelligence authorities&lt;/a&gt;&quot; in Lebanon and by the Department of Homeland Security in the US, and who is now building a tool to help others in the Arab world overthrow their oppressive governments.

&lt;p&gt;As such, it isn&#39;t surprising that journalists and their editors aren&#39;t keen to prominently highlight the unproven nature of Cryptocat, even though I&#39;m sure Kobeissi stresses it in every interview. After all, which journalist in their right mind would want to spoil this story by mentioning that the web-based Cryptocat system is vulnerable to trivial man in the middle, HTTPS &lt;a href=&quot;http://www.thoughtcrime.org/software/sslstrip/&quot;&gt;stripping attacks&lt;/a&gt; when accessed using Internet Explorer or Safari? What idiot would sabotage the fairytale by highlighting that Cryptocat is unproven, an experimental project by a student interested in cryptography?

&lt;p&gt;And so, such facts are buried. The New York Times waited until paragraph 10 in a 16 paragraph story to reveal that Kobeissi told the journalist that his tool &quot;is not ready for use by people in life-and-death situations.&quot; Likewise, Norton waits until paragraph 27 of her Wired profile before she reveals that &quot;Kobeissi has said repeatedly that Cryptocat is an experiment&quot; or that &quot;structural flaws in browser security and Javascript still dog the project.&quot; The preceding 26 paragraphs are filled with feel good fluff, including description of his troubles at the US border and a three paragraph no-comment from US Customs.

&lt;P&gt;At best, this is &lt;a href=&quot;http://en.wikipedia.org/wiki/Inverted_pyramid&quot;&gt;bad journalism&lt;/a&gt;, and at worst, it is reckless. If Cryptocat is the secure chat tool for the tl;dr crowd, burying its known flaws 27 paragraphs down in a story almost guarantees that many users won&#39;t learn about the risks they are taking.

&lt;p&gt;&lt;b&gt;Cryptocat had faced extensive criticism from experts&lt;/b&gt;

&lt;p&gt;Norton acknowledges in paragraph 23 of her story that &quot;Kobeissi faced criticism from the security community.&quot; However, she never actually quotes any critics. She quotes Kobeissi saying that &quot;Cryptocat has significantly advanced the field of browser crypto&quot; but doesn&#39;t give anyone the opportunity to challenge the statement. 

&lt;p&gt;Other than Kobeissi, Norton&#39;s only other identified sources in the story are Meredith Patterson, a security researcher &lt;a href=&quot;http://twitter.com/maradydd/status/230242039361585152&quot;&gt;that was previously critical of Cryptocat&lt;/a&gt; who is quoted saying &quot;although [Cryptocat] got off to a bumpy start, he’s risen to the occasion admirably&quot; and an unnamed active member of Anonymous, who is quoted saying &quot;if it&#39;s a hurry and someone needs something quickly, [use] Cryptocat.&quot;

&lt;p&gt;It isn&#39;t clear why Norton felt it wasn&#39;t necessary to publish any dissenting voices. From her public Tweets, it is however, quite clear that Norton has no love for the crypto community, which she believes is filled with &quot;&lt;a href=&quot;http://twitter.com/quinnnorton/statuses/229177519704784897&quot;&gt;privileged&lt;/a&gt;&quot;, &quot;&lt;a href=&quot;http://twitter.com/quinnnorton/statuses/229178651059568640&quot;&gt;mostly rich 1st world white boys w/ no real problems who don&#39;t realize they only build tools [for] themselves.&lt;/a&gt;&quot;

&lt;p&gt;Even though their voices were not heard in the Wired profile, several prominent experts in the security community &lt;a href=&quot;http://twitter.theinfo.org/227813118108127232#id227966760802975744&quot;&gt;have criticized&lt;/a&gt; the web-based version of Cryptocat. These critics include &lt;a href=&quot;http://www.matasano.com/articles/javascript-cryptography/&quot;&gt;Thomas&lt;/a&gt; &lt;a href=&quot;http://news.ycombinator.com/item?id=2855257&quot;&gt;Ptacek&lt;/a&gt;, Zooko Wilcox-O&#39;Hearn, Moxie Marlinspike and Jake Appelbaum. The latter two, coincidentally, have faced pretty extreme &quot;real world [surveillance] problems&quot; &lt;a href=&quot;http://www.wired.com/threatlevel/2010/11/hacker-border-search/&quot;&gt;documented&lt;/a&gt; at &lt;a href=&quot;http://www.wired.com/threatlevel/2011/10/doj-wikileaks-probe/&quot;&gt;length&lt;/a&gt;, by Wired.

&lt;p&gt;&lt;b&gt;Security problems with Cryptocat and Kobeissi&#39;s response&lt;/b&gt;

&lt;p&gt;Since Cryptocat was first released, security experts have criticized the web-based app, which is vulnerable to several attacks, some possible using automated tools. The response by Kobeissi to these concerns has long been to &lt;a href=&quot;http://twitter.com/kaepora/statuses/228247942723678208&quot;&gt;point to&lt;/a&gt; the existence of the Cryptocat browser plugin.

&lt;p&gt;The problem is that Cryptocat is described by journalists, and by Kobeissi in interviews with journalists, as a tool for those who can&#39;t or don&#39;t want to install software. When Cryptocat is criticized, Kobeissi then points to a downloadable browser plugin that users can install. In short, the only technology that can protect users from network attacks against the web-only Cryptocat also neutralizes its primary, and certainly most publicized feature.

&lt;p&gt;Over the past few weeks, criticism of the web-based Cryptocat and its vulnerability to attacks has increased, &lt;a href=&quot;http://twitter.theinfo.org/227813118108127232#id227966760802975744&quot;&gt;primarily on Twitter&lt;/a&gt;. Responding to the criticism, on Saturday, Kobeissi &lt;a href=&quot;https://blog.crypto.cat/2012/07/cryptocat-2-deployment-notes/&quot;&gt;announced&lt;/a&gt; that the the upcoming version 2 of Cryptocat will be browser-plugin only. &lt;strike&gt;At the time of writing this essay, the Cryptocat web-based interface also appears to be offline.&lt;/strike&gt;

&lt;p&gt;Kobeissi&#39;s decision to ditch the no-download-required version of Cryptocat came just one day after the publication of Norton&#39;s glowing Wired story, in which she emphasized that Cryptocat enables &quot;anyone to use end-to-end encryption to communicate without ... mucking about with downloading and installing other software.&quot;

&lt;p&gt;This was no doubt a difficult decision for Kobeissi. Rather than leading the development of a secure communications tool that Just Works without any download required, he must now rebrand Cryptocat as a communications tool that doesn&#39;t require operating system install privileges, or one that is merely easier to download and install. This is far less sexy, but, importantly, far more secure. He made the right choice.

&lt;p&gt;&lt;b&gt;Conclusion&lt;/b&gt;

&lt;p&gt;The technology and mainstream media play a key role in helping consumers to discover new technologies. Although there is a certain amount of hype with the release of every new app or service (if there isn&#39;t, the PR people aren&#39;t doing their jobs), hype is dangerous for security tools. 

&lt;p&gt;It is by now well documented that humans engage in &lt;a href=&quot;http://en.wikipedia.org/wiki/Risk_compensation&quot;&gt;risk compensation&lt;/a&gt;. When we wear seatbelts, we drive faster. When we wear bike helmets, we drive closer. These safety technologies at least work.

&lt;p&gt;We also engage in risk compensation with security software. When we think our communications are secure, we are probably more likely to say things that we wouldn&#39;t if our calls were going over a telephone like or via Facebook. However, if the security software people are using is in fact insecure, then the users of the software are put in danger.

&lt;p&gt;Secure communications tools are difficult to create, even by teams of skilled cryptographers. The Tor Project is nearly ten years old, yet bugs and design flaws are still found and fixed every year by other researchers. Using Tor for your private communications is by no means 100% safe (although, compared to many of the alternatives, it is often better). However, Tor has had years to mature. Tools like Haystack and Cryptocat have not. No matter how good you may think they are, they&#39;re simply not ready for prime time.

&lt;p&gt;Although human interest stories sell papers and lead to page clicks, the media needs to take some responsibility for its &lt;a href=&quot;http://bits.blogs.nytimes.com/2012/06/27/an-app-that-encrypts-shreds-hashes-and-salts/&quot;&gt;ignorant hyping&lt;/a&gt; of new security tools and services. When a PR person retained by a new hot security startup pitches you, consider approaching an independent security researcher or two for their thoughts. Even if it sounds great, please refrain from showering the tool with unqualified praise.

&lt;p&gt;By all means, feel free to continue hyping the latest social-photo-geo-camera-dating app, but before you tell your readers that a new security tool will lead to the next Arab Spring or prevent the NSA from reading peoples&#39; emails, step back, take a deep breath, and pull the power cord from your computer.</description><link>http://paranoia.dubfire.net/2012/07/tech-journalists-stop-hyping-unproven.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><thr:total>14</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-1756413927951476919</guid><pubDate>Thu, 26 Jul 2012 21:15:00 +0000</pubDate><atom:updated>2012-07-27T11:08:48.895-04:00</atom:updated><title>The known unknowns of Skype interception</title><description>&lt;p&gt;Over the past few weeks, the technical blogosphere, and most recently, the mainstread media have tried to answer the question: What kind of assistance can Skype provide to law enforcement agencies?&lt;/p&gt; Most of the stories have been filled with speculation, sometimes &lt;a href=&quot;http://www.forbes.com/sites/kashmirhill/2012/07/26/this-is-what-is-actually-terrifying-about-microsofts-skype-policy/&quot;&gt;informed&lt;/a&gt;, &lt;a href=&quot;http://arstechnica.com/tech-policy/2012/07/skype-handing-over-more-chat-data-to-law-enforcement/&quot;&gt;but&lt;/a&gt; &lt;a href=&quot;http://www.slate.com/blogs/future_tense/2012/07/20/skype_won_t_comment_on_whether_it_can_now_eavesdrop_on_conversations_.html&quot;&gt;mostly&lt;/a&gt; &lt;a href=&quot;http://www.washingtonpost.com/business/economy/skype-makes-chats-and-user-data-more-available-to-police/2012/07/25/gJQAobI39W_story.html&quot;&gt;not&lt;/a&gt;. In an attempt to paint as clear a picture as possible, I want to explain what we do and don&#39;t know about Skype and surveillance.

&lt;p&gt;&lt;b&gt;Skype has long provided assistance to governments&lt;/b&gt;&lt;/p&gt;

The Washington Post &lt;a href=&quot;http://www.washingtonpost.com/business/economy/skype-makes-chats-and-user-data-more-available-to-police/2012/07/25/gJQAobI39W_story.html&quot;&gt;reported yesterday&lt;/a&gt; that:

&lt;blockquote&gt;Skype, the online phone service long favored by political dissidents, criminals and others eager to communicate beyond the reach of governments, has expanded its cooperation with law enforcement authorities to make online chats and other user information available to police

&lt;p&gt;The changes, which give the authorities access to addresses and credit card numbers, have drawn quiet applause in law enforcement circles but hostility from many activists and analysts.&lt;/blockquote&gt;

&lt;p&gt;To back up its claim, the post cites interviews with &quot;industry and government officials familiar with the changes&quot; who &quot;poke on the condition of anonymity because they weren’t authorized to discuss the issue publicly.&quot; Ugh.

&lt;p&gt;However, a quick Google search for &quot;Skype law enforcement handbook&quot; quickly turns up an official looking &lt;a href=&quot;http://cryptome.org/isp-spy/skype-spy.pdf&quot;&gt;document&lt;/a&gt; on the whistleblower website cryptome.org, dated October 2007, which makes it clear that Skype has long been providing the assistance that the Post claims is new.

&lt;p&gt;From Skype&#39;s 2007 &lt;a href=&quot;http://cryptome.org/isp-spy/skype-spy.pdf&quot;&gt;law enforcement handbook&lt;/a&gt;:

&lt;blockquote&gt;
In response to a subpoena or other court order, Skype will provide:&lt;br&gt;
• Registration information provided at time of account registration&lt;br&gt;
• E-mail address &lt;br&gt;
• IP address at the time of registration&lt;br&gt; 
• Financial transactions conducted with Skype in the past year, although details of the credit cards used are stored 
only by the billing provider used (for instance, Bibit, RBS or PayPal)&lt;br&gt;
• Destination telephone numbers for any calls placed to the public switched telephone network (PSTN) &lt;br&gt;
• All service and account information, including any billing address(es) provided, IP address (at each transaction),  and complete transactional information&lt;br&gt; 
&lt;/blockquote&gt;

While Skype&#39;s law enforcement handbook suggests that the company does not have access to IP address session logs, &lt;a href=&quot;http://arstechnica.com/uncategorized/2006/08/7582/&quot;&gt;high-profile criminal case&lt;/a&gt; from 2006 suggests that the company does.

&lt;blockquote&gt;Kobi Alexander, the founder of Comverse, was nabbed in Negombo, Sri Lanka yesterday by a private investigator. He is wanted by the US government in connection with financial fraud charges. He is accused of profiting from some very shady stock-option deals, to the detriment of Comverse shareholders. Once the deals became public and he was indicted, he resigned as CEO and fled the US.

&lt;p&gt;Alexander was traced to the Sri Lankan capital of Colombo after he placed a one-minute call using Skype. That was enough to alert authorities to his presence and hunt him down.&lt;/blockquote&gt;

This makes sense. Skype clients connect to Skype&#39;s central servers (so that users can make calls to non Skype users, and learn which of their friends are online and offline), and so the servers naturally learn the IP address that the user is connecting from. This is not surprising.

&lt;p&gt;&lt;b&gt;Skype voice call encryption&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;So while it is clear that Skype can provide government agencies with basic subscriber information and IP login info, what remains unclear is the extent to which governments can intercept the contents of Skype voice calls.&lt;/p&gt;

&lt;p&gt;Skype has always been rather evasive when it comes to discussing this issue. Whenever questions come up, the company makes it a point to mention that it provides end to end encryption, but then dodges all questions about how it handles encryption keys.

&lt;p&gt;Skype&#39;s strategy is genius - most journalists, even those that cover tech, know very little about the more granular aspects of cryptography. When Skype says it provides end to end call encryption, journalists then tell their readers that Skype is wiretapping proof, even though Skype never made that specific claim. Conveniently enough, Skype never bothers to correct the many people who have read a tad bit too much into the company&#39;s statements about security.

&lt;p&gt;As Seth Schoen from EFF &lt;a href=&quot;http://www.forbes.com/sites/kashmirhill/2012/07/26/this-is-what-is-actually-terrifying-about-microsofts-skype-policy/2/&quot;&gt;told Forbes&lt;/a&gt; recently, &quot;my view is that Skype has gotten a reputation for impregnable security that it has never deserved.&quot; Exactly. Consumers think the service is secure, and Skype has absolutely no incentive to correct this false, yet positive impression.

&lt;P&gt;&lt;b&gt;The mud puddle test&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;Last year, I directed a bit of a media firestorm at Dropbox, after I &lt;a href=&quot;http://www.wired.com/threatlevel/2011/05/dropbox-ftc/&quot;&gt;filed an FTC complaint&lt;/a&gt; alleging that the company had been misleading its customers about the &quot;military grade&quot; security it used to protect the files uploaded by users. Earlier this year, the tech press started to ask &lt;a href=&quot;http://arstechnica.com/apple/2012/04/apple-holds-the-master-key-when-it-comes-to-icloud-security-privacy/&quot;&gt;similar questions&lt;/a&gt; about the cryptography and key management used by Apple&#39;s iCloud service.

&lt;p&gt;Soon after, crytographer Matt Green &lt;a href=&quot;http://blog.cryptographyengineering.com/2012/04/icloud-who-holds-key.html&quot;&gt;proposed the &#39;mud puddle test&#39;&lt;/a&gt; for easily determining if a cloud based storage solution has unencrypted access to your data.

&lt;blockquote&gt;

1. First, drop your device(s) in a mud puddle.&lt;br&gt;
2. Next, slip in said puddle and crack yourself on the head. When you regain consciousness you&#39;ll be perfectly fine, but won&#39;t for the life of you be able to recall your device passwords or keys.&lt;br&gt;
3. Now try to get your cloud data back.&lt;br&gt;

Did you succeed? If so, you&#39;re screwed. Or to be a bit less dramatic, I should say: your cloud provider has access to your &#39;encrypted&#39; data, as does the government if they want it, as does any rogue employee who knows their way around your provider&#39;s internal policy checks.
&lt;/blockquote&gt;

&lt;p&gt;Both Dropbox and iCloud fail the mud puddle test. If a user&#39;s laptop is destroyed and they forget their password, both services permit a user to reset the password and then download all of their data that was stored with the service. Both of these companies have access to your data, and can be forced to hand it over to the government. In contrast, SpiderOak, a competing online backup service (which I use) passes the test. If a SpiderOak user forgets their password, they lose their data.

&lt;p&gt;What about Skype? After all, the company isn&#39;t an online backup service, but rather a communications service, right?


&lt;p&gt;Well, as an initial matter, if you forget your password, Skype sends you a reset link by email, which lets you into your account, maintaining the same account balance and restoring your full contact list. Likewise, if you install Skype on a new computer, your contact list is downloaded, and you can conduct conversations that, to the other caller, will not in any way reveal that you recently installed Skype on a new device, or reset your password. It just works.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Encrypted communications require encryption keys.&lt;/b&gt;

&lt;p&gt;Some protocols, like &lt;a href=&quot;http://www.cypherpunks.ca/otr/&quot;&gt;Off The Record&lt;/a&gt; (built into several Instant Messaging clients, but not to be &lt;a href=&quot;http://www.imperialviolet.org/2012/01/14/gootr.html&quot;&gt;confused&lt;/a&gt; with Google&#39;s fake, unencrypted Off The Record), random keys are created by the IM client, and then users are expected to exchange and verify them out of band (usually, by phone, or in person).

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.howtogeek.com/wp-content/uploads/2010/12/otr_screen.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left:1em; margin-right:1em&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;460&quot; width=&quot;414&quot; src=&quot;http://www.howtogeek.com/wp-content/uploads/2010/12/otr_screen.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;p&gt;The OTR developers realized that users don&#39;t like manually verifying random alpha-numeric crypto fingerprints, and so the developers introduced a slightly easier method of verifying OTR keys in recent versions that uses secret questions or shared secrets selected by users (obviously, this is less secure, but more likely to be actually followed by users).

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPYmEHOTOvqodA7m6SkeT2QK92tK2xdxJar7v2E3QdujRfVNbcyQ_qMkzXfGYaSk1FcmY3YX53CqVQn16-Kcf6J55ODhsf7NAlku-7D4l5HgpKs9LlARPBVNEHns9F9LfzDscQsg/&quot; imageanchor=&quot;1&quot; style=&quot;margin-left:1em; margin-right:1em&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;434&quot; width=&quot;423&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPYmEHOTOvqodA7m6SkeT2QK92tK2xdxJar7v2E3QdujRfVNbcyQ_qMkzXfGYaSk1FcmY3YX53CqVQn16-Kcf6J55ODhsf7NAlku-7D4l5HgpKs9LlARPBVNEHns9F9LfzDscQsg/&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;p&gt;Another scheme, the ZRTP &lt;a href=&quot;http://zfone.com/zrtp_ietf.html&quot;&gt;encrypted VOIP protocol&lt;/a&gt;, created by Phil Zimmermann of PGP fame avoids the static fingerprint method, and instead requires users to verify a random phrase at the beginning of each conversation. ZRTP (which is also used by Whisper Systems&#39; &lt;a href=&quot;http://www.whispersys.com/support.html&quot;&gt;RedPhone&lt;/a&gt; and the open source &lt;a href=&quot;https://jitsi.org/&quot;&gt;Jitsi chat tool&lt;/a&gt;) can rely on these pass phrase exchanges, because users presumably know each others&#39; voices. Text based IM schemes don&#39;t have this voice recognition property, and so slightly heavier weight verification schemes are required there.&lt;/p&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;

&lt;a href=&quot;http://zfone.com/images/Zfone-GUI/Mac-Disclosure.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left:1em; margin-right:1em&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;297&quot; width=&quot;221&quot; src=&quot;http://zfone.com/images/Zfone-GUI/Mac-Disclosure.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;p&gt;While these key/identity verification methods are a pain for users, they are important. Encryption is great, but without some method of authentication, it is not very helpful. That is, without authentication, you can be sure you have encrypted session, but you have no idea who is at the other end (someone pretending to be your friend, a government device engaging in a man in the middle interception attack, etc). The key verification/exchange methods used by OTR and ZRTP provide a strong degree of authentication, so that users can be sure that no one else is snooping on their communications.

&lt;p&gt;&lt;b&gt;Thanks for the crypto lesson&lt;/b&gt;

&lt;p&gt;In contrast to the complex, user-visible fingerprint exchange and verification methods employed by OTR and ZRTP, Skype does nothing at all. Skype handles all the crypto and key exchange behind the scenes. When a Skype user installs the software on a brand new device and initiates a conversation with a friend already in their contact list, that friend is not told that the caller&#39;s device/software has a new crypto key and that it should be verified. Instead, the call just connects.

&lt;p&gt;While we don&#39;t know the full details of how Skype handles its key exchange, what is clear is that Skype is in a position to impersonate its customers, or, should it be forced, to give a government agency the ability to impersonate its customers. As Skype acts as the gatekeeper of conversations, and the only entity providing any authentication of callers, users have no way of knowing if they&#39;re directly communicating with a friend they frequently chat with, or if their connection is being intercepted using a man in the middle attack, made possible due to the disclosure of cryptographic keys by Skype to the government.

&lt;p&gt;I suspect that Skype does not create a new private encryption key for each device running Skype. Instead, my guess is that it creates a key once, when the user sets up their account, and then stores this online, along with the user&#39;s contact list. When the user installs Skype on a new device, the key is downloaded, along with all of their other account data. The user&#39;s public/private key pair would then be used to authenticate a session key exchange. If this is the design that Skype uses, the company can be compelled to disclose the private crypto keys it holds, allowing the government to impersonate users, and perform active man in the middle interception attacks against their communications.

&lt;p&gt;One alternate, but equally insecure approach would be for the Skype clients to create a new public/private keypair each time the a user installs Skype on their computer and for Skype to digitally sign the user&#39;s public key using a certificate pre-installed in all Skype clients. In that scenario, while Skype the company won&#39;t have access to your private key, it will be able to sign public keys in your name for other people (including the government) that other Skype clients will accept without complaint. Such impersonation methods can then be used to perform man in the middle attacks.

&lt;p&gt;Whatever the key exchange method that Skype uses, as long as users rely on Skype for all caller authentication, and as long as the company provides account access after a forgotten password, and seamless communications after the installation of Skype on a new computer, the company will fail the mud puddle test. Under such circumstances, Skype is in a position to give the government sufficient data to perform a man in the middle attack against Skype users.

&lt;p&gt;&lt;b&gt;Government agencies and encryption keys&lt;/b&gt;

&lt;p&gt;Ok, so Skype has access to users&#39; communications encryption keys (or can enable others to impersonate as Skype users). What does this mean for the confidentiality of Skype calls? Skype may in fact be telling the truth when it tells journalists that it does not provide CALEA-style wiretap capabilities to governments. It may not need to. If governments can can impersonate Skype users and perform man in the middle attacks on their conversations (with the assistance of broadband ISPs or wireless carriers), then they can decrypt the voice communications without any further assistance from Skype.

&lt;P&gt;Do we know if this is happening? No. But that is largely because Skype really won&#39;t comment on the specifics of its interactions with governments, or the assistance it can provide. However, &lt;a href=&quot;http://www.apache-ssl.org/disclosure.pdf&quot;&gt;privacy researchers&lt;/a&gt; (pdf) have for many years speculated about governments compelling companies to hand over their own encryption keys or &lt;a href=&quot;http://files.cloudprivacy.net/ssl-mitm.pdf&quot;&gt;provide false certificates&lt;/a&gt; (pdf) for use in MiTM attacks. In such cases, when the requests come, there isn&#39;t really anything that companies can do to resist.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;We need transparency&lt;/b&gt;

&lt;p&gt;I suspect that 99% of Skype&#39;s customers have never given a moment&#39;s thought to the ease or difficulty with which government agencies can listen to their calls. Most likely use the service because it is free/cheap, easy, and enables them to talk to their loved ones with a minimum of hassle. There are, however, journalists, human rights activists and other at-risk groups who use Skype because they think it is more secure. In terms of Skype&#39;s hundreds of millions of users, these thousands of privacy-sensitive users are a tiny rounding error, a drop in the bucket.

&lt;p&gt;Skype is not transparent about its surveillance capabilities. It will not tell us how it handles keys, what kind of assistance it provides governments, under what circumstances, or which governments it will and won&#39;t assist. Until it is more transparent, Skype should be assumed to be insecure, and not safe for those whose physical safety depends upon confidentiality of their calls.

&lt;p&gt;Skype of course can&#39;t talk about the requests for assistance it has received from intelligence agencies, since such requests are almost certainly classified. However, Skype &lt;i&gt;could&lt;/i&gt;, if it wished to, tell users about its surveillance capabilities. It doesn&#39;t.

&lt;p&gt;I personally don&#39;t really care if Skype is resistant to government surveillance or not. There are other schemes, such as ZRTP, which are peer reviewed, open, documented protocols which activists can and should use. What I would like though, is for Skype to be honest. If it is providing encryption keys to governments, it should tell its customers. They deserve the truth.</description><link>http://paranoia.dubfire.net/2012/07/the-known-unknows-of-skype-interception.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPYmEHOTOvqodA7m6SkeT2QK92tK2xdxJar7v2E3QdujRfVNbcyQ_qMkzXfGYaSk1FcmY3YX53CqVQn16-Kcf6J55ODhsf7NAlku-7D4l5HgpKs9LlARPBVNEHns9F9LfzDscQsg/s72-c" height="72" width="72"/><thr:total>14</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-916980177657603389</guid><pubDate>Wed, 18 Apr 2012 15:36:00 +0000</pubDate><atom:updated>2012-04-18T11:36:01.041-04:00</atom:updated><title>Congressmen pushing awful cybersecurity bill fail cybersecurity 101</title><description>&lt;p&gt;Over the last several months, several cybersecurity bills have been proposed by various Congressional committees. One of the leading bills, the Cyber Intelligence Sharing and Protection Act (CISPA), has been proposed by Congressmen Mike Rogers (R-Mich.) and Rep. Dutch Ruppersberger (D-Md.). Many of the major civil liberties groups like EFF and ACLU have legitimately criticized the substance of the bill, which would give companies a free pass to share their customers&#39; private information with the government.&lt;/p&gt;

&lt;p&gt;I&#39;m not going to get into the weeds and criticize specific portions of this bill. Instead, I want to make a broader point - Congress knows absolutely nothing about cybersecurity, and quite simply, until it knows more, and starts leading by example, it has no business forcing its wishes on the rest of us.&lt;/p&gt;

&lt;p&gt;Congressmen Rogers and Ruppersberger are, respectively, the chairman and ranking member of the House Intelligence Committee. Although it is no secret that most members of Congress do not have technologists on staff providing them with policy advice, we can at least hope that the two most senior members of the Intelligence Committee have in-house technical advisors with specific expertise in the area of information security. After all, without such subject area expertise, it boggles the mind as to how they can at least evaluate and then put their names on the cybersecurity legislation that was almost certainly ghostwritten by other parts of the government - specifically, the National Security Agency.

&lt;p&gt;So, given that these two gentlemen feel comfortable forcing their own view of cybersecurity on the rest of the public, I thought it would be useful to look at whether or not they practice what they preach. Specifically, how is their own information security. While I am not (for legal reasons) going to perform any kind of thorough audit of the two members&#39; websites or email systems, even the most cursory evaluation is pretty informative.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;HTTPS and Congressional websites&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;HTTPS encryption is the most basic form of security that websites should use - providing not only confidentiality, but also authentication and integrity, so that visitors to a site can be sure they are indeed communicating with the site they believe they are visiting. All big banks and financial organizations use HTTPS by default, Google has used it for Gmail since January 2010, and even the CIA and NSA websites use HTTPS by default (even though there is absolutely nothing classified on either of the two spy agency public sites). Some in Congress have even lectured companies about their lack of default HTTPS encryption - one year ago, Senator Schumer wrote to several major firms including Yahoo and Amazon, &lt;a href=&quot;http://schumer.senate.gov/record.cfm?id=331455&quot;&gt;telling them&lt;/a&gt; that &quot;providers of major websites have a responsibility to protect individuals who use their sites and submit private information. It’s my hope that the major sites will immediately put in place secure HTTPS web addresses.”&lt;/p&gt;

&lt;p&gt;It is now 2012. HTTPS is no longer an obscure feature used by a few websites. It is an information security best practice and increasingly becoming the default across the industry. It is therefore alarming that not only do Congressional websites not offer HTTPS by default, but most members&#39; websites don&#39;t support HTTPS &lt;b&gt;at all&lt;/b&gt;.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Rogers&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;For example, the webserver running Congressman Mike Rogers&#39;s website seems to support HTTPS, however, attempting to visit https://mikerogers.house.gov/ (or https://www.mikerogers.house.gov/) will result in a certificate error.&lt;/p&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlKgz1Ju140K25PKbFZGtPdSnxjFRqPNGJs3AevOWVV2sFSnaOjOHDrA8Am-EmIwLlVhpR8ukkT6ElCI_GIekCDuiEcQpjt8IpoVrfgjC1qHJeC96L_VSUIReSy1Ie5Z5GbAeZ/s1600/mike-rogers-ssl.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left:1em; margin-right:1em&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;258&quot; width=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlKgz1Ju140K25PKbFZGtPdSnxjFRqPNGJs3AevOWVV2sFSnaOjOHDrA8Am-EmIwLlVhpR8ukkT6ElCI_GIekCDuiEcQpjt8IpoVrfgjC1qHJeC96L_VSUIReSy1Ie5Z5GbAeZ/s400/mike-rogers-ssl.PNG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;p&gt;This is perhaps a bit better than Congressman Roger&#39;s &lt;a href=&quot;http://www.mikerogersforcongress.com/&quot;&gt;campaign website&lt;/a&gt;, which does not appear to be running a HTTPS webserver at all. Attempting to visit &lt;b&gt;https&lt;/b&gt;://www.mikerogersforcongress.com/ results in a connection error.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Ruppersberger&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;When I manually tried to visit the HTTPS URL for Congressman Ruppersberger&#39;s website last night, it instead redirected me to the Congressional Caucus on Intellectual Property Promotion. Soon after I called the Congressman&#39;s office this morning to question his team&#39;s cybersecurity skills, the site stopped redirecting visitors, and now instead displays a misconfiguration error.&lt;/p&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibokL_GaWu5WT2CjEiq1KVb6ofa3DQzl3tf3U0dsWdIvBVD6IYvtLQzUq4bDf1_x2RBD7h2zl8SHoIDF7xbbbDyG2y1y5pGQAZ2YtW5i2bPTlN8uJWg2ztMZ_edN8zGi_lB_Es/s1600/dutch-https.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left:1em; margin-right:1em&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;122&quot; width=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibokL_GaWu5WT2CjEiq1KVb6ofa3DQzl3tf3U0dsWdIvBVD6IYvtLQzUq4bDf1_x2RBD7h2zl8SHoIDF7xbbbDyG2y1y5pGQAZ2YtW5i2bPTlN8uJWg2ztMZ_edN8zGi_lB_Es/s400/dutch-https.PNG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;p&gt;Congressman Dutch&#39;s &lt;a href=&quot;http://www.dutchforcongress.com/&quot;&gt;campaign webserver&lt;/a&gt; appears to support HTTPS, but returns a &lt;a href=&quot;https://www.dutchforcongress.com/&quot;&gt;certificate error&lt;/a&gt;.&lt;/p&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEho4LQvM0sjLx8IJxmhk6GdRNlAUpCz6SG5i4HxcblFSrV4wTVqmHZ5fo4fNQsCYuX7qsLcP3CMoehM0M9jyAH2yUw3BxyY4_Kv6O7x-3B-fFjBBvXhYcu7-F312sHdPJTE5MrI/s1600/dutch-campaign.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left:1em; margin-right:1em&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;235&quot; width=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEho4LQvM0sjLx8IJxmhk6GdRNlAUpCz6SG5i4HxcblFSrV4wTVqmHZ5fo4fNQsCYuX7qsLcP3CMoehM0M9jyAH2yUw3BxyY4_Kv6O7x-3B-fFjBBvXhYcu7-F312sHdPJTE5MrI/s400/dutch-campaign.PNG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;p&gt;&lt;b&gt;Congressional websites could do HTTPS&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;While most Congressional websites return HTTPS certificate errors, the problems largely seem to be configuration issues. The webserver that runs all of the house.gov websites is listening on port 443 and it looks like Akamai has issued a wildcart *.house.gov certificate that can be used to secure any Congressional website. As an example, Nancy Pelosi&#39;s &lt;a href=&quot;https://pelosi.house.gov&quot;&gt;website&lt;/a&gt; supports HTTPS without any certificate errors (although it looks like there is some non-HTTPS encrypted content delivered from that page too.) This means that the Congressional IT staff can enable HTTPS encryption for Rogers, Ruppersberger and every other member without having to buy any new HTTPS certificates or setting up new webservers. The software is already all there - and the fact that these sites do not work over HTTPS connections already suggests that no one in the members&#39; offices have asked for it. After all, if Nancy Pelosi&#39;s site can offer a secure experience, other members of Congress should be able to get similar protections too.&lt;/P&gt; 

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3XGpRSCrqqCsPaYTEncjW_OiSlxN65SnuOE7UdTM0Fs2QkMm2JRLJLj1uQBHDMFYaHlXtCgURqrEX0oEV3dNYBN9t_-2vpsFC-SDDL1kfLKIWw8JSq3TS92lRvUVFcIvQmJP8/s1600/house-cert.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left:1em; margin-right:1em&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; width=&quot;351&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3XGpRSCrqqCsPaYTEncjW_OiSlxN65SnuOE7UdTM0Fs2QkMm2JRLJLj1uQBHDMFYaHlXtCgURqrEX0oEV3dNYBN9t_-2vpsFC-SDDL1kfLKIWw8JSq3TS92lRvUVFcIvQmJP8/s400/house-cert.PNG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;p&gt;&lt;b&gt;Remember SOPA&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;During the SOPA debate several months ago, a few members seemed to take pride in acknowledging their total ignorance regarding technology, proclaiming that they were not nerds, didn&#39;t understand the Internet, but even so still thought that SOPA was a good bill. Those members were justifiably ridiculed for ignoring technical experts while voting for legislation that would significantly and negatively impact the Internet.&lt;/p&gt;

&lt;p&gt;Here, we have members who&#39;ve not even bothered to ask the Congressional IT staff to make sure that their website &lt;b&gt;support&lt;/b&gt; HTTPS, let alone use it by default, who are now telling the rest of the country that we should trust their judgement on the complex topic of cybersecurity.&lt;/p&gt;

&lt;p&gt;Until the respective Congressional committees that deal with technology issues actually hire subject matter experts, any legislation they propose will lack legitimacy and, most likely, will probably be ineffective. Likewise, if Congress thinks that cybersecurity is a priority, perhaps it should lead by example.&lt;/p&gt;
 
&lt;div style=&quot;background-color:#000000;width:520px;&quot;&gt;&lt;div style=&quot;padding:4px;&quot;&gt;&lt;iframe src=&quot;http://media.mtvnservices.com/embed/mgid:cms:video:thedailyshow.com:406251&quot; width=&quot;512&quot; height=&quot;288&quot; frameborder=&quot;0&quot;&gt;&lt;/iframe&gt;&lt;p style=&quot;text-align:left;background-color:#FFFFFF;padding:4px;margin-top:4px;margin-bottom:0px;font-family:Arial, Helvetica, sans-serif;font-size:12px;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://www.thedailyshow.com/watch/wed-january-18-2012/ko-computer&quot;&gt;The Daily Show with Jon Stewart&lt;/a&gt;&lt;/b&gt;&lt;br/&gt;Get More: &lt;a href=&#39;http://www.thedailyshow.com/full-episodes/&#39;&gt;Daily Show Full Episodes&lt;/a&gt;,&lt;a href=&#39;http://www.indecisionforever.com/&#39;&gt;Political Humor &amp; Satire Blog&lt;/a&gt;,&lt;a href=&#39;http://www.facebook.com/thedailyshow&#39;&gt;The Daily Show on Facebook&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://paranoia.dubfire.net/2012/04/congressmen-pushing-awful-cybersecurity.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlKgz1Ju140K25PKbFZGtPdSnxjFRqPNGJs3AevOWVV2sFSnaOjOHDrA8Am-EmIwLlVhpR8ukkT6ElCI_GIekCDuiEcQpjt8IpoVrfgjC1qHJeC96L_VSUIReSy1Ie5Z5GbAeZ/s72-c/mike-rogers-ssl.PNG" height="72" width="72"/><thr:total>6</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-5924076271677366436</guid><pubDate>Wed, 04 Apr 2012 18:28:00 +0000</pubDate><atom:updated>2012-04-04T14:38:40.229-04:00</atom:updated><title>Google&#39;s pro-privacy legal position re: DOJ could assist class action lawyers in search referrer privacy lawsuit</title><description>&lt;p&gt;
In the summer of 2010, &lt;a href=&quot;http://blogs.wsj.com/digits/2010/10/07/former-ftc-employee-files-complaint-over-google-privacy/&quot;&gt;I filed&lt;/a&gt; a FTC &lt;a href=&quot;http://online.wsj.com/public/resources/documents/FTCcomplaint100710.pdf&quot;&gt;complaint&lt;/a&gt; (pdf) against Google for &lt;a href=&quot;http://paranoia.dubfire.net/2010/10/my-ftc-complaint-about-googles-private.html&quot;&gt;deceiving its users&lt;/a&gt; about the extent to which it knowingly leaks user search queries to third parties via the referring header sent by web browsers. Shortly after my complaint was made public, a class action firm &lt;a href=&quot;http://www.mediapost.com/publications/article/138712/&quot;&gt;hit Google&lt;/a&gt; with a lawsuit over the practice.&lt;/p&gt;

&lt;p&gt;Like many privacy class actions, the lawyers included every possible legal argument they could think of. One of their claims was that Google had violated the &lt;a href=&quot;https://en.wikipedia.org/wiki/Stored_Communications_Act&quot;&gt;Stored Communications Act&lt;/a&gt;, which prohibits companies from sharing the contents of users&#39; communications contents with other parties (even law enforcement agencies, unless they have a warrant).&lt;/p&gt;

&lt;p&gt;The federal judge assigned to the case &lt;a href=&quot;http://www.mediapost.com/publications/article/171458/vanity-searcher-can-proceed-with-lawsuit-against-g.html&quot;&gt;recently threw out&lt;/a&gt; all but one of the class action firm&#39;s claims, but but has permitted the case to continue solely focusing on Google&#39;s alleged violations of the Stored Communications Act. As such, one of the next big, important issues that the court is going to have to address is determining whether or not search queries are considered communications content under the Stored Communications Act.&lt;/p&gt;

&lt;p&gt;As law professor Eric Goldman &lt;a href=&quot;http://blog.ericgoldman.org/archives/2012/03/lawsuit_against_2.htm&quot;&gt;recently observed&lt;/a&gt;, &quot;the SCA&#39;s poor drafting means that no one (including the judges) knows exactly what&#39;s covered by the statute.&quot; This is certainly true, and made worse by the fact that the statute hasn&#39;t really been updated since it was passed in 1986, long before the first web search engine or referrer header. It is for this very reason that DOJ has argued that the government should be able to get search engine query data without a warrant. Thankfully, Google disagrees.&lt;/p&gt; 

&lt;p&gt;&lt;b&gt;Google: Search queries are content&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;At a &lt;A href=&quot;http://www.usfca.edu/law/lawreviewsymp/&quot;&gt;recent event&lt;/a&gt; at San Francisco Law School, Richard Salgado, Google&#39;s Director of Law Enforcement and Information Security spoke publicly (for the first time) about Google&#39;s aggressively pro-privacy legal position on search queries and government access:&lt;/p&gt;

&lt;blockquote&gt;&lt;p&gt;As far as search warrants and content go, Google and I think a lot of providers are taking this position, sees the 4th amendment particularly as it has been applied in the Warshak cases, as establishing that there is a reasonable expectation of privacy such that disclosure of the contents held with the third party is protected by the 4th Amendment. And not limited to email, but other material that is uploaded to the service provider to be  handled by the service provider.&lt;/p&gt;

&lt;p&gt;You hear a lot about ECPA about electronic communications service, ECS and remote computing sevice, RCS, and the crazy rules that apply [for example], the 180 day rule. I think most providers now, although I really should only speak to Google, view the way the case law is going and certaininly viewing the 4th Amendment as applying to any content that is provided by the user to the service, so that, for Google, would include things like Calendar and Docs, and all those others, even where there is not a communication function going on, that there&#39;s not another party involved in the Doc that you&#39;re uploading, the notes that you&#39;re keeping for yourself. It&#39;s still material that you&#39;ve put with the service provider as part of the service that the company, in this case Google, is holding on your behalf. Its our view that that is protected by the 4th amendment, and unless one of the exceptions to the warrant requirement apply, its not to be disclosed to a government entity as a matter of compulsion.&lt;/p&gt;

&lt;p&gt;Question: Where does search fall in that?&lt;/p&gt;

&lt;p&gt;Answer: Search is one where we take a pretty hard stance, the same with other material, so we view search that its provided to us the way that other information is provided to us. That is very consistent with the ligitiation with the Department of Justice back in 2006.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;center&gt;&lt;object width=&quot;420&quot; height=&quot;315&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/MCuAf0kE-1g?version=3&amp;amp;hl=en_US&amp;start=1684&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/MCuAf0kE-1g?version=3&amp;amp;hl=en_US&amp;start=1684&quot; type=&quot;application/x-shockwave-flash&quot; width=&quot;420&quot; height=&quot;315&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/center&gt;

&lt;p&gt;Now, it seems pretty clear that Salgado is primarily talking about Google&#39;s view that the 4th Amendment protects user search queries, and is not arguing that they are communications content under the Stored Communications Act. Prior to this public event, I had heard reliable rumors that Google had adopted a warrant position for search queries based on the Stored Communications Act. Perhaps my sources were wrong, or perhaps Google realizes that it is going to be difficult to simultaneously argue two different positions on search engine queries and the SCA.&lt;/p&gt;

&lt;p&gt;Even so, I suspect Google&#39;s legal team is still going to have a difficult time convincing the judge in this case that search engine queries are private enough for the company to repeatedly argue that they deserve warrant protections under the 4th Amendment, yet not private enough to deserve protections under the Stored Communications Act&#39;s prohibition against sharing communications content.&lt;/p&gt;

&lt;p&gt;After all, as Al Gidari, Google&#39;s top privacy outside lawyer himself &lt;a href=&quot;
http://www.brookings.edu/~/media/Files/events/2011/0517_electronic_privacy/20110517_electronic_privacy.pdf#page=28&quot;&gt;said at Brookings&lt;/a&gt; last year:&lt;/p&gt;
&lt;blockquote&gt;&lt;p&gt;&quot;[C]ontent is content, I don’t care how many times you try to repackage it into something else, content is still content, and the standards that we try to apply that give lesser protection to that content inevitably falls short, as well, when people stop and think about it.&quot;&lt;/p&gt;&lt;/blockquote&gt;</description><link>http://paranoia.dubfire.net/2012/04/googles-pro-privacy-legal-position-re.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-6690749941838999860</guid><pubDate>Tue, 03 Apr 2012 16:25:00 +0000</pubDate><atom:updated>2012-04-03T13:08:43.729-04:00</atom:updated><title>ACLU docs reveal real-time cell phone location spying is easy and cheap</title><description>&lt;blockquote&gt;&lt;b&gt;&quot;Technological progress poses a threat to privacy by enabling an extent of surveillance that in earlier times would have been prohibitively expensive.&quot;&lt;/b&gt; &lt;br&gt; -- &lt;i&gt;US v. Garcia&lt;/i&gt;, 474 F. 3d 994 - Court of Appeals, 7th Circuit 2007&lt;/blockquote&gt;&lt;/p&gt;


&lt;p&gt;In 2009, I attended a surveillance industry trade show (the &quot;wiretapper&#39;s ball&quot;) in Washington DC where I recorded an executive from Sprint describing, in depth, the location tracking capabilities his company provided to law enforcement agencies:
&lt;blockquote&gt;&quot;[M]y major concern is the volume of requests. We have a lot of things that are automated but that&#39;s just scratching the surface. One of the things, like with &lt;b&gt;our GPS tool. We turned it on the web interface for law enforcement about one year ago last month, and we just passed 8 million requests. So there is no way on earth my team could have handled 8 million requests from law enforcement, just for GPS alone.&lt;/b&gt; So the tool has just really caught on fire with law enforcement. They also &lt;b&gt;love that it is extremely inexpensive to operate and easy,&lt;/b&gt; so, just the sheer volume of requests they anticipate us automating other features, and I just don&#39;t know how we&#39;ll handle the millions and millions of requests that are going to come in.&lt;br&gt;
-- Paul Taylor, Electronic Surveillance Manager, Sprint Nextel.&lt;/blockquote&gt;
&lt;/p&gt;

&lt;p&gt;The information that I gathered was one of the first real data points revealing the scale and ease with which law enforcement and intelligence agencies can now collect real-time location data from wireless phone carriers. This is because unlike wiretaps, there are &lt;a href=&quot;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1806628&quot;&gt;no annual statistics&lt;/a&gt; produced by the courts that detail the number of location surveillance orders issued each year.&lt;/p&gt;

&lt;p&gt;My disclosure of this information led to significant news coverage, but also to a citation from Judge Kozinski of the 9th Circuit, who observed in dissent in &lt;a href=&quot;http://scholar.google.com/scholar_case?case=3041522210962234921&quot;&gt;&lt;i&gt;U.S. v. Pineda-Moreno&lt;/i&gt;&lt;/a&gt; that:
&lt;blockquote&gt;When requests for cell phone location information have become so numerous that the telephone company must develop a self-service website so that law enforcement agents can retrieve user data from the comfort of their desks, we can safely say that &quot;such dragnet-type law enforcement practices&quot; are already in use.&lt;/blockquote&gt;

&lt;p&gt;&lt;b&gt;ACLU FOIA docs reveal other carriers have followed Sprint&#39;s lead&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;It appears that Sprint is not the only wireless company to provide law enforcement agencies with an easy way to track the location of targets in real-time.&lt;/p&gt;

&lt;p&gt;Among the &lt;a href=&quot;http://www.aclu.org/protecting-civil-liberties-digital-age/cell-phone-location-tracking-public-records-request&quot;&gt;5500 pages of documents&lt;/a&gt; obtained by the ACLU as part of a nationwide FOIA effort, are a &lt;a href=&quot;http://www.aclu.org/files/cellphonetracking/20120328/celltrackingpra_tucsonpd_tucsonaz.pdf&quot;&gt;few pages&lt;/a&gt; from Tucson AZ detailing (or at least hinting at) the real-time location tracking services provided to the government by the major wireless carriers.&lt;/p&gt;

&lt;p&gt;AT&amp;T&#39;s &lt;a href=&quot;http://files.cloudprivacy.net/att-gps-tool.pdf&quot;&gt;Electronic Surveillance Fee Schedule&lt;/a&gt; reveals that the company offers an &quot;E911 Tool&quot; to government agencies, which it charges $100 to activate, and then $25 per day to use.&lt;/p&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiISHpBuPznhPZXdPX8AgR4v3pwSzziUiapta7W59W0XIR37kGI6qwIZ3bOQcl1FK8g6VlM2rAje_Ln8tOpN4xGjlrxjQ1N-iojAUXO0o6CLfz4IUOL4MCOcF8oLmCQkQq8-sSo/s1600/att-gps-snipped.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left:1em; margin-right:1em&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;52&quot; width=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiISHpBuPznhPZXdPX8AgR4v3pwSzziUiapta7W59W0XIR37kGI6qwIZ3bOQcl1FK8g6VlM2rAje_Ln8tOpN4xGjlrxjQ1N-iojAUXO0o6CLfz4IUOL4MCOcF8oLmCQkQq8-sSo/s400/att-gps-snipped.PNG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;p&gt;While it is no secret that Sprint provides law enforcement agencies subscriber real-time GPS data via its &quot;L-Site&quot; website (read the &lt;a href=&quot;http://www.aclu.org/files/cellphonetracking/20120328/celltrackingpra_concordpd_concordnc.pdf#page=37&quot;&gt;L-site manual&lt;/a&gt;), Sprint&#39;s &lt;a href=&quot;http://files.cloudprivacy.net/sprint-l-site.pdf&quot;&gt;Electronic Surveillance Fee Schedule&lt;/a&gt; reveals that the company charges just $30 per month for access to this real-time data.&lt;/p&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgk6Ykmj2lza8Vm6dUqIZf-xL1dRI-qfHWpTj0DGU5NKfl79bE7MIjUzqnhyphenhyphenKBFn6Duk-gP4yarNp3quSbt50-8y5dV6bocebrC9dTOVui50eHwsCcGL7wKSflwOrfPuNZc5-pX/s1600/sprint-gps-tracking-snipped.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left:1em; margin-right:1em&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;87&quot; width=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgk6Ykmj2lza8Vm6dUqIZf-xL1dRI-qfHWpTj0DGU5NKfl79bE7MIjUzqnhyphenhyphenKBFn6Duk-gP4yarNp3quSbt50-8y5dV6bocebrC9dTOVui50eHwsCcGL7wKSflwOrfPuNZc5-pX/s400/sprint-gps-tracking-snipped.PNG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhz0ob4cI2qSBiB_CniPjxx-PMGBsgZ7u2G6xFL-vOmO4H17C3r3hvc1kdOmIzqWu1oc4ib37b2OLr8xPB14JP6IGFZGbrgiUfuDF0g81zeutX2xEfAWH_SvrL5Ozjh3dLtzHtc/s1600/sprint-invoice.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left:1em; margin-right:1em&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;193&quot; width=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhz0ob4cI2qSBiB_CniPjxx-PMGBsgZ7u2G6xFL-vOmO4H17C3r3hvc1kdOmIzqWu1oc4ib37b2OLr8xPB14JP6IGFZGbrgiUfuDF0g81zeutX2xEfAWH_SvrL5Ozjh3dLtzHtc/s400/sprint-invoice.PNG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;p&gt; The documents from T-Mobile provides by far the greatest amount of information about the company&#39;s real-time location tracking capabilities. The company&#39;s Locator Tool service, which it charges law enforcement agencies $100 per day to access, generates pings at customizable 15 / 30/ 60 minute intervals, after which, the real-time location information is emailed directly to the law enforcement agency.&lt;/p&gt; 

&lt;iframe src=&quot;https://docs.google.com/a/soghoian.net/viewer?authuser=0&amp;srcid=0B440JZxVjFhoenJwQ042UDFSQnVaMmFVSnhrWDdJQQ&amp;pid=explorer&amp;a=v&amp;chrome=false&amp;embedded=true&quot; width=&quot;640&quot; height=&quot;480&quot;&gt;&lt;/iframe&gt;

&lt;p&gt;Unfortunately, Verizon&#39;s surveillance pricing sheets do not reveal any information about GPS tracking. It is almost certain that the company does provide real-time location data, but for now, we don&#39;t know how it is provided, or at what cost.&lt;/p&gt;</description><link>http://paranoia.dubfire.net/2012/04/aclu-docs-reveal-real-time-cell-phone.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiISHpBuPznhPZXdPX8AgR4v3pwSzziUiapta7W59W0XIR37kGI6qwIZ3bOQcl1FK8g6VlM2rAje_Ln8tOpN4xGjlrxjQ1N-iojAUXO0o6CLfz4IUOL4MCOcF8oLmCQkQq8-sSo/s72-c/att-gps-snipped.PNG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-8503616489930211638</guid><pubDate>Mon, 26 Mar 2012 21:13:00 +0000</pubDate><atom:updated>2012-03-26T18:07:30.304-04:00</atom:updated><title>Federal judge: Google free to tell user about mysterious gov requests, likely related to Wikileaks</title><description>&lt;p&gt;&lt;b&gt;Summary&lt;/b&gt;&lt;/p&gt;

In &lt;a href=&quot;http://files.cloudprivacy.net/memo-order-re-mystery-search-warrant-order-google.pdf&quot;&gt;two&lt;/a&gt; 1-page &lt;a href=&quot;http://files.cloudprivacy.net/memo-order-re-mystery-2703-order-google.pdf&quot;&gt;orders&lt;/a&gt; issued today, a Federal judge in Virginia has (for a second time) ruled that Google is permitted to tell a customer (and only that customer) about two mysterious surveillance orders -- a 2703(d) order and a search warrant -- issued in June, 2011 for records (likely including communications content) associated with their Google account.

&lt;p&gt;While Google is only permitted to notify the subscriber that was the subject of surveillance, that person is permitted to tell anyone else they wish, should they wish to do so.&lt;/p&gt; 

&lt;p&gt;&lt;b&gt;Background&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;One month ago, a federal judge published &lt;a href=&quot;http://ia600807.us.archive.org/32/items/gov.uscourts.vaed.277148/gov.uscourts.vaed.277148.1.0.pdf&quot;&gt;two&lt;/a&gt; (pdf) &lt;a href=&quot;http://www.archive.org/download/gov.uscourts.vaed.277150/gov.uscourts.vaed.277150.1.0.pdf&quot;&gt;orders&lt;/a&gt; (pdf) [hereafter the February 2012 orders], related to two previously secret surveillance orders obtained in June, 2011 by the government seeking data about a Google subscriber. In the two February 2012 orders, the judge ruled that Google could tell the user about the earlier surveillance orders.&lt;/p&gt;

&lt;p&gt;Soon after, the government &lt;a href=&quot;http://ia700807.us.archive.org/32/items/gov.uscourts.vaed.277148/gov.uscourts.vaed.277148.2.0.pdf&quot;&gt;filed a motion&lt;/a&gt; with the court, seeking to clarify whether Google could tell &lt;i&gt;any person&lt;/i&gt; about the orders, or merely the impacted user.&lt;/p&gt;

&lt;p&gt;In the two orders issued today, the judge seems to have been convinced by the government&#39;s clarifying motion. Thus, in 14 days (unless the government appeals), Google will be free to tell the impacted user (and no one else) about the June 2011 surveillance orders.

&lt;p&gt;&lt;b&gt;This may involve Wikileaks&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;When Jeff Rollins at PaidContent &lt;a href=&quot;https://paidcontent.org/article/419-court-filings-suggest-google-fighting-feds-over-megaupload-emails/&quot;&gt;first highlighted&lt;/a&gt; the existence of these two mysterious court orders, he suggested that they might be related to the Megaupload investigation. The Megaupload connection was mere speculation on his part (as he acknowledged), as there simply isn&#39;t anything solid in those two brief court orders that identifies a particular target.&lt;/p&gt;

&lt;p&gt;However, for the reasons I outline below, I believe that these surveillance orders are actually related to the investigation of to Wikileaks.&lt;/P&gt;

&lt;p&gt;First, in one of the February 2012 &lt;a href=&quot;http://ia600807.us.archive.org/32/items/gov.uscourts.vaed.277148/gov.uscourts.vaed.277148.1.0.pdf&quot;&gt;orders&lt;/a&gt; (page 2), the judge noted that &quot;[t]he existence of the investigation in issue and the government’s wide use of § 2703(d) orders and other investigative tools has been widely publicized now.&quot;&lt;/p&gt;

&lt;P&gt;The only high-profile federal investigation that I can think of in recent times involving 2703(d) orders is the government&#39;s investigation of individuals associated with Wikileaks. That is, while the Megaupload indictment was also filed in the Eastern District of Virginia, there has been little publicity surrounding the actual investigative legal instruments used in the case.&lt;/p&gt;

&lt;p&gt;Specifically, I&#39;ve not seen any published media report indicating that a 2703(d) order was used in that investigation. In contrast, the &lt;a href=&quot;http://mirror.wikileaks.info/leak/twitter-subpoena.pdf&quot;&gt;2703(d) order&lt;/a&gt; issued to Twitter as part of the Wikileaks investigation has itself been a major story, as have the (failed) efforts of the ACLU, EFF and others to quash the order.&lt;/p&gt;

&lt;p&gt;In December 2010, a judge from the same court &lt;A href=&quot;http://online.wsj.com/article/SB10001424052748704482704576072081788251562.html&quot;&gt;issued a 2703(d) order&lt;/a&gt; to Twitter, forcing the company to disclose information about several users associated with Wikileaks. A month later, the Twitter judge agreed to unseal that order, allowing Twitter to notify the impacted individuals. Once existence of the surveillance order was made public, the media went crazy.&lt;/p&gt;

&lt;p&gt;The Wall Street Journal &lt;A href=&quot;http://online.wsj.com/article/SB10001424052970203476804576613284007315072.html&quot;&gt;later revealed&lt;/a&gt; that Google and California broadband provider Sonic had received similar requests as part of the same investigation. At the time of the WSJ report, those surveillance orders remained sealed.&lt;/p&gt;

&lt;p&gt;Second, one persistent rumor in Washington DC over the past year has been that one of the main reasons DOJ has cited justifying the continued sealing of the Wikileaks/Google/Sonic orders is a fear of harassment from the Internet community directed at the prosecutors involved in the case.&lt;/p&gt;

&lt;p&gt;As the WSJ &lt;a href=&quot;http://online.wsj.com/article/SB10001424052970203363504577185364230417098.html&quot;&gt;revealed earlier this year&lt;/a&gt;, the address of Tracy Doherty McCormick, the prosecutor whose name was on the original Twitter order &quot;was spread online, and the person&#39;s email account [tracy.mccormick@usdoj.gov] was subscribed to a pornography site.&quot; According to the unnamed officials quoted by the WSJ, she was also &quot;bombarded with harassing phone calls.&quot;&lt;/p&gt;

&lt;p&gt;The WSJ also reported that fear of similar harassment led &quot;the government to take the rare step of keeping officials&#39; names out of news releases and public statements when the government shut down the website Megaupload.com.&quot; It is likely that similar fears were the reason that no prosecutors names were listed in the recently published &lt;A href=&quot;http://gizmodo.com/5890886/read-the-full-lulzsec-indictments-right-here&quot;&gt;Lulzsec indictments&lt;/a&gt;.

&lt;p&gt;Why do I mention this? Well, the two orders issued by the judge today specifically state that Google may share a copy of the 2703(d) order and search warrant with the impacted subscriber, but that the email address and name of the attesting official must be redacted first.&lt;/p&gt;

&lt;p&gt;This suggests that someone at DOJ has told the judge they are fearful of retaliation from the Internet community -- thus also suggesting that this surveillance is related to a high-profile investigation of a target to whom Anonymous and other Internet activists may feel some sympathy. While this certainly could be the Megaupload case, I&#39;d be willing to bet a few dollars that this involves Wikileaks.&lt;/p&gt;</description><link>http://paranoia.dubfire.net/2012/03/federal-judge-google-free-to-tell-user.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-2953515930959719028</guid><pubDate>Wed, 21 Mar 2012 12:10:00 +0000</pubDate><atom:updated>2012-03-21T08:10:32.715-04:00</atom:updated><title>Firefox switching to HTTPS Google search by default (and the end of referrer leakage)</title><description>&lt;p&gt;A few days ago, Mozilla&#39;s developers &lt;a href=&quot;https://bugzilla.mozilla.org/show_bug.cgi?id=633773&quot;&gt;quietly enabled&lt;/a&gt; Google&#39;s HTTPS encrypted search as the default search service for the &quot;nightly&quot; &lt;a href=&quot;http://www.squarefree.com/burningedge/2012/03/18/2012-03-18-trunk-builds/&quot;&gt;developer trunk&lt;/a&gt; of the Firefox browser (it will &lt;a href=&quot;https://bugzilla.mozilla.org/show_bug.cgi?id=633773#c42&quot;&gt;actually use&lt;/a&gt; the &lt;a href=&quot;https://en.wikipedia.org/wiki/SPDY&quot;&gt;SPDY protocol&lt;/a&gt;). This change should reach regular users at some point in the next few months.&lt;/p&gt;

&lt;p&gt;This is a big deal for the 25% or so of Internet users who use Firefox to browse the web, bringing major improvements in privacy and security.&lt;/p&gt;

&lt;p&gt;First, the search query information from these users will be shielded from their Internet service providers and governments who might be using Deep Packet Inspection (DPI) equipment to monitor the activity of users or censor and filter search results.&lt;/p&gt;

&lt;p&gt;Second, the search query information will also be shielded from the websites that consumer visit after conducting a search. This information is normally leaked via the &quot;referrer header&quot;. Google has in the past gone out of its way to facilitate referrer header based data leakage (which led to me filing a &lt;a href=&quot;http://paranoia.dubfire.net/2010/10/my-ftc-complaint-about-googles-private.html&quot;&gt;FTC complaint&lt;/a&gt; against the firm in 2010).&lt;/p&gt;

&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKn4R0JfROhDj7sjJOfEiIO2pVCRjn6sns7aa7HfJQS769yyPVMyhVNwaqLtY6O-Gtfl6M2nM0qsk1Wwyt89NSmzlpwKEHl5FmHVXIH46ETwpUL2A2vDenTHbgFqhu5-DbMW9VBA/s1600/google-referrer-HIV.png&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 400px; height: 217px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKn4R0JfROhDj7sjJOfEiIO2pVCRjn6sns7aa7HfJQS769yyPVMyhVNwaqLtY6O-Gtfl6M2nM0qsk1Wwyt89NSmzlpwKEHl5FmHVXIH46ETwpUL2A2vDenTHbgFqhu5-DbMW9VBA/s400/google-referrer-HIV.png&quot; border=&quot;0&quot; alt=&quot;&quot;id=&quot;BLOGGER_PHOTO_ID_5525518442577323554&quot; /&gt;&lt;/a&gt;&lt;br /&gt;

&lt;p&gt;However, &lt;a href=&quot;http://googleblog.blogspot.com/2011/10/making-search-more-secure.html&quot;&gt;in October 2011&lt;/a&gt;, Google turned on HTTPS search by default for signed-in users, and at the same time, began scrubbing the search query from the non-HTTPS URL that HTTPS users are redirected to (and that subsequently leaks via the referrer header) before they reach the destination website:&lt;blockquote&gt;
Over the next few weeks, many of you will find yourselves redirected to https://www.google.com (note the extra “s”) when you’re signed in to your Google Account. This change encrypts your search queries and Google’s results page....&lt;p&gt;What does this mean for sites that receive clicks from Google search results? When you search from https://www.google.com, websites you visit from our organic search listings will still know that you came from Google, but won&#39;t receive information about each individual query.&lt;/blockquote&gt;
&lt;/p&gt;

&lt;p&gt;At the time of the announcement, Google told the search engine optimization (SEO) industry (a community that very much wants to be able to continue to passively receive this kind of detailed user data) that the percentage of users whose search queries would be shielded would be a &lt;a href=&quot;http://searchengineland.com/google-puts-a-price-on-privacy-98029&quot;&gt;&quot;single digit&quot;&lt;/a&gt; -- and thus, at least 90% of Google users would still continue to unknowingly leak their search queries as they browse the web.&lt;/p&gt;

&lt;p&gt;Shortly after Google&#39;s October announcement, search engine industry analyst Danny Sullivan &lt;a href=&quot;http://searchengineland.com/google-to-begin-encrypting-searches-outbound-clicks-by-default-97435&quot;&gt;told the SEO community&lt;/a&gt; that the days of referrer leakage were doomed:&lt;blockquote&gt;By the future is clear. Referrer data is going away from search engines, and likely from other web sites, too. It’s somewhat amazing that we’ve had it last this long, and it will be painful to see that specific, valuable data disappear.

&lt;p&gt;But from a consumer perspective, it’s also a better thing to do. As so much more moves online, referrers can easily leak out the location of things like private photos. Google’s move is part of a trend of blocking that already started and ultimately may move into the browsers themselves.&lt;/blockquote&gt;&lt;/p&gt;

&lt;p&gt;It looks like Danny was right.&lt;/p&gt;

&lt;p&gt;Google&#39;s October 2011 decision to start proactively scrubbing search queries from the referrer header was a great first step, but a small percentage of Google&#39;s search users benefited. Now that Mozilla is switching to HTTPS search, hundreds of millions of Firefox users will have their privacy protected, by default.&lt;/p&gt;

&lt;p&gt;The only surprising aspect to this otherwise great bit of good news is that the first major browser to use HTTPS search is Firefox and not Chrome. I &lt;a href=&quot;https://bugzilla.mozilla.org/show_bug.cgi?id=633773#c9&quot;&gt;reasonably assumed&lt;/a&gt; that as soon as Google&#39;s pro-privacy engineers and lawyers won the internal battle over those in the company sympathetic to needs of the SEO community, that Google&#39;s flagship browser would have been the first to ship HTTPS by default.&lt;/p&gt;

&lt;p&gt;Just as it showed strong privacy leadership by being the &lt;a href=&quot;http://online.wsj.com/article/SB10001424052748704213404576100441609997236.html&quot;&gt;first browser&lt;/a&gt; to embrace Do Not Track, Mozilla is similarly showing its users that privacy is a priority by being the first to embrace HTTPS search by default. For Mozilla, this is a clear win. For the Chrome team, whose browser has otherwise set the gold standard for security (and who have &lt;a href=&quot;http://www.schemehostport.com/2011/11/referer-sic.html&quot;&gt;proposed&lt;/a&gt; and &lt;a href=&quot;http://googlewebmastercentral.blogspot.com/2012/03/upcoming-changes-in-googles-http.html&quot;&gt;implemented&lt;/a&gt; a mechanism to enable websites to limit referrer leakage), this must be extremely frustrating and probably quite embarrassing. Hopefully, they will soon follow Mozilla&#39;s lead by protecting their users with HTTPS search by default.&lt;/p&gt;

(Just to be clear - the ultimate decision to enable HTTPS search by default was &lt;a href=&quot;https://bugzilla.mozilla.org/show_bug.cgi?id=633773#c27&quot;&gt;largely&lt;/a&gt; in &lt;a href=&quot;https://bugzilla.mozilla.org/show_bug.cgi?id=633773#c4&quot;&gt;the&lt;/a&gt; hands of Google&#39;s &lt;a href=&quot;https://bugzilla.mozilla.org/show_bug.cgi?id=633773#c14&quot;&gt;search engineers&lt;/a&gt;, who are responsible for dealing with the increased traffic. Mozilla&#39;s privacy team deserves the credit for pressuring Google, and Google&#39;s search engine team deserve a big pat on the back for agreeing to cope with encrypted searches from hundreds of millions of users.)</description><link>http://paranoia.dubfire.net/2012/03/firefox-switching-to-https-google.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKn4R0JfROhDj7sjJOfEiIO2pVCRjn6sns7aa7HfJQS769yyPVMyhVNwaqLtY6O-Gtfl6M2nM0qsk1Wwyt89NSmzlpwKEHl5FmHVXIH46ETwpUL2A2vDenTHbgFqhu5-DbMW9VBA/s72-c/google-referrer-HIV.png" height="72" width="72"/><thr:total>10</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-5958763420783640962</guid><pubDate>Wed, 14 Mar 2012 14:47:00 +0000</pubDate><atom:updated>2012-03-14T11:07:16.420-04:00</atom:updated><title>FBI seeks warrant to force Google to unlock Android phone</title><description>&lt;p&gt;Today, I stumbled across a recent FBI &lt;a href=&quot;http://www.archive.org/download/gov.uscourts.casd.378626/gov.uscourts.casd.378626.1.0.pdf&quot;&gt;application&lt;/a&gt; and accompanying affidavit for a search warrant ordering Google to unlock a screen-locked Android phone. The application asks Google to: &quot;provide law enforcement with any and all means of gaining access, including login and password information, password reset, and/or manufacturer default code (&quot;PUK&quot;), in order to obtain the complete contents of the memory&quot; of a seized phone.

&lt;p&gt;The phone in question was seized from a gentleman named &lt;a href=&quot;http://www.10news.com/news/4248312/detail.html&quot;&gt;Dante Dears&lt;/a&gt;, a founding member of the &quot;Pimpin&#39; Hoes Daily&quot; street gang. On January 17, 2012, a cellphone was seized from Dears by an FBI agent, who then obtained a search warrant to look through the device. According to the affidavit, the technicians at the FBI Regional Computer Forensics Lab (RCFL) were unable to get past the electronic &quot;pattern lock&quot; access controls protecting the phone (apparently, entering multiple incorrect unlock sequences will lock the memory of the phone, which can then only be accessed by entering the user&#39;s Gmail username and password).&lt;/p&gt;

&lt;p&gt;So why is this interesting and noteworthy?&lt;/p&gt;

&lt;p&gt;First, it suggests that the FBI&#39;s computer forensics lab in Southern California is unable, or unwilling to use &lt;a href=&quot;http://www.logicube.com/shop/cellxtract/#sp&quot;&gt;commercially available&lt;/a&gt; forensics tools or &lt;a href=&quot;http://forensics.spreitzenbarth.de/2012/02/28/cracking-pin-and-password-locks-on-android/&quot;&gt;widely documented&lt;/a&gt; hardware-hacking techniques to analyze seized phones and download the data from them.&lt;/p&gt;

&lt;p&gt;Second, it suggests that a warrant might be enough to get Google to unlock a phone. Presumably, this is not the first time that the FBI has requested Google unlock a phone, so one would assume that the FBI would request the right kind of order. However, we do not know if Google has complied with the request. Given that an unlocked smartphone will continue to receive text messages and new emails (transmitted after the device was first seized), one could reasonably argue that the government should have to obtain a wiretap order in order to unlock the phone.&lt;/p&gt;

&lt;p&gt;Third, on page 13 of the warrant application, the government asks that the owner of the phone not be told about the government&#39;s request to unlock his phone. It is surprising then that the warrant and the associated affidavit have not been sealed by the court.&lt;/p&gt;</description><link>http://paranoia.dubfire.net/2012/03/fbi-seeks-warrant-to-force-google-to.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><thr:total>22</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-4853106237151314031</guid><pubDate>Thu, 23 Feb 2012 14:18:00 +0000</pubDate><atom:updated>2012-02-23T09:47:37.435-05:00</atom:updated><title>Do Not Track: First they ignore you, then they ridicule you, then they fight you, then you win.</title><description>&lt;p&gt;In July of 2009, my friend and research collaborator &lt;a href=&quot;http://www.sidstamm.com&quot;&gt;Sid Stamm&lt;/a&gt; helped me to put together a prototype Firefox add-on that added two headers to outgoing HTTP requests:&lt;/p&gt;
&lt;blockquote&gt;
X-Behavioral-Ad-Opt-Out: 1&lt;br&gt;
X-Do-Not-Track: 1
&lt;/blockquote&gt;

&lt;p&gt;The idea for the Do Not Track header came from &lt;a href=&quot;http://paranoia.dubfire.net/2011/01/history-of-do-not-track-header.html&quot;&gt;a conversation&lt;/a&gt; I&#39;d had with security researcher &lt;a href=&quot;http://www.dankaminsky.com&quot;&gt;Dan Kaminsky&lt;/a&gt; in March of 2009.&lt;/p&gt;

&lt;p&gt;A few months after we released the DNT prototype, I started working at the FTC. Once there, &lt;a href=&quot;http://www.ashkansoltani.org&quot;&gt;Ashkan Soltani&lt;/a&gt; and I evangelized the header-based mechanism as a superior solution to the flawed opt-out cookies that the industry had grudgingly delivered. In December 2010, the FTC issued a privacy report that called for a &quot;do not track&quot; system that would enable people to avoid having their actions monitored online.&lt;/p&gt;

Today, the Obama Administration, the FTC and the advertising industry &lt;a href=&quot;http://online.wsj.com/article/SB10001424052970203960804577239774264364692.html&quot;&gt;will announce&lt;/a&gt; that the last remaining web browser (Chrome) will support the &lt;a href=&quot;http://en.wikipedia.org/wiki/Do_not_track_header&quot;&gt;Do Not Track header&lt;/a&gt;, and that the major online advertising networks will look for and respect it.

&lt;p&gt;The total time, from the first conversation about the concept to a White House press conference announcing broad industry support? 3 years. Decades in Internet time, but this is extremely quick by Washington, DC standards.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;&lt;a href=&quot;http://paranoia.dubfire.net/2011/01/history-of-do-not-track-header.html&quot;&gt;First they ignore you&lt;/a&gt;&lt;/b&gt;:&lt;/p&gt;
&lt;blockquote&gt;
In mid July 2009, the Future of Privacy Forum organized a meeting and conference call in which I pitched the header concept to a bunch of industry players, public interest groups, and other interested parties. I was perhaps slightly over-dramatic when I told them that the &quot;day of reckoning was coming&quot;, for opt out cookies, and that it was time to embrace a header based mechanism...none of the advertising firms showed any interest in the header.&lt;/blockquote&gt;

&lt;p&gt;&lt;b&gt;&lt;a href=&quot;http://paidcontent.org/article/419-microsoft-its-naive-to-trust-tracking-sites-to-obey-anti-tracking-signa/&quot;&gt;Then they laugh at you&lt;/a&gt;:&lt;/b&gt;&lt;/p&gt;
&lt;blockquote&gt;
[Microsoft Vice President Dean] Hachamovitch said it’s naive to simply trust that the tracking sites will obey an anti-tracking signal. “We don’t have ‘do not send me pop-up window’ HTTP headers,” said Hachamovitch, speaking at UC Berkeley. “We just have pop-up blockers.” Similarly, he noted, there’s no “Do Not Phish Me” button on browsers.&lt;/blockquote&gt;

&lt;p&gt;&lt;b&gt;&lt;a href=&quot;http://online.wsj.com/article/SB10001424052748704692904576166820102959428.html&quot;&gt;Then they fight you&lt;/a&gt;:&lt;/b&gt;&lt;/p&gt;
&lt;blockquote&gt;The Interactive Advertising Bureau, which represents online advertisers, said &quot;there is currently no definition&quot; of what advertisers should do when receiving the do-not-track notification. &quot;It&#39;s like sending a smoke signal in the middle of Manhattan; it might draw a lot of attention, but no one knows how to read the message,&quot; said Mike Zaneis, senior vice president of the organization.&lt;/blockquote&gt;

&lt;p&gt;&lt;b&gt;&lt;a href=&quot;http://online.wsj.com/article/SB10001424052970203960804577239774264364692.html&quot;&gt;Then you win&lt;/a&gt;:&lt;/b&gt;&lt;/p&gt;
&lt;blockquote&gt;A coalition of Internet giants including Google Inc. has agreed to support a do-not-track button to be embedded in most Web browsers—a move that the industry had been resisting for more than a year.&lt;/blockquote&gt;</description><link>http://paranoia.dubfire.net/2012/02/do-not-track-header-3-years-in-making.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><thr:total>6</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-1636026957434649834</guid><pubDate>Wed, 08 Feb 2012 18:45:00 +0000</pubDate><atom:updated>2012-02-08T13:45:54.304-05:00</atom:updated><title>How long does it take for the FTC to investigate a company?</title><description>&lt;p&gt;The Federal Trade Commission is the nation&#39;s premier privacy enforcer. In the last few years, it has gone after Facebook, Google, Twitter and several other firms for violating consumers&#39; privacy or deceiving them about the degree to which they protect that privacy. To outsiders, the FTC can seem highly secretive - it doesn&#39;t announce when it opens an investigation, only when an investigation ends in a settlement, a lawsuit, or a &lt;a href=&quot;http://www.ftc.gov/os/closings/staffclosing.shtm&quot;&gt;public closing letter&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;As a result, although the newspapers and blogs may be filled with stories about a particular privacy firestorm, there is no way to know if the FTC is investigating a company. A year or two later, the FTC might announce a settlement, or, the FTC may quietly close an investigation, without ever tipping the public off to the fact that agency staff spent months investigating the company.&lt;/p&gt;

&lt;p&gt;I spent a year working in the FTC&#39;s Division of Privacy and Identity Protection between 2009-2010, where I got to assist with several important privacy investigations. I saw first hand how frustrating it is for staff, when advocates, the media and Members of Congress demand that the FTC investigate a company or worse, criticize the FTC for doing nothing, when FTC staff are already several months into a complex investigation.&lt;/p&gt;

&lt;p&gt;In order to try and help the general public better understand this topic, I recently sought and obtained (via FOIA) the official &lt;a href=&quot;http://files.cloudprivacy.net/ftc-privacy-matter-initiations-2012.pdf&quot;&gt;Matter Initiation Notices&lt;/a&gt; (pdf) filed by FTC staff when they formally opened investigations into all of the major privacy-related cases settled during the past few years.&lt;/p&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEmSXHu9mL1UWgaRmHgdQMoKxgWduQAa93gNS5xb7b-0BlgiOOX-2cr2LbvumllVCE3hzSylbG9ii0WafH9toKj5aLvJGSSevbWus-WDIPgRzol0vTHbms2U0BoOMEqpwU88qk/s1600/chart_1+%25283%2529.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left:1em; margin-right:1em&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;247&quot; width=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEmSXHu9mL1UWgaRmHgdQMoKxgWduQAa93gNS5xb7b-0BlgiOOX-2cr2LbvumllVCE3hzSylbG9ii0WafH9toKj5aLvJGSSevbWus-WDIPgRzol0vTHbms2U0BoOMEqpwU88qk/s400/chart_1+%25283%2529.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;p&gt;As these documents show, even the fastest privacy case (Google Buzz) took a year from start to finish, while others, such as Facebook (2.3 years) and ControlScan (2.7 years) took far longer.&lt;/p&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo0j5s_Jg9m-20hIG9_JU3gUCgSt5amQmTRx8G8EWheCjoEHIGhl_h8A876sNWPOkG5zcEPOM5qfLcyc1Tp6yIt1krY6x_lV2lA2sbtRXYnIUrH2-BNvw5pOEbilNAJE90bCAf/s1600/ftc-spreadsheet-big.PNG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left:1em; margin-right:1em&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;82&quot; width=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgo0j5s_Jg9m-20hIG9_JU3gUCgSt5amQmTRx8G8EWheCjoEHIGhl_h8A876sNWPOkG5zcEPOM5qfLcyc1Tp6yIt1krY6x_lV2lA2sbtRXYnIUrH2-BNvw5pOEbilNAJE90bCAf/s400/ftc-spreadsheet-big.PNG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;p&gt;The take-home lesson from this data? The FTC&#39;s investigations are not quick. Given that there are just a couple dozen attorneys in the Division, this isn&#39;t surprising. If we want better (and faster) privacy enforcement, giving the FTC more money to hire additional staff would be a great first step.&lt;/p&gt;</description><link>http://paranoia.dubfire.net/2012/02/how-long-does-it-take-for-ftc-to.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEmSXHu9mL1UWgaRmHgdQMoKxgWduQAa93gNS5xb7b-0BlgiOOX-2cr2LbvumllVCE3hzSylbG9ii0WafH9toKj5aLvJGSSevbWus-WDIPgRzol0vTHbms2U0BoOMEqpwU88qk/s72-c/chart_1+%25283%2529.png" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-1455379173241409358</guid><pubDate>Mon, 19 Dec 2011 07:00:00 +0000</pubDate><atom:updated>2011-12-19T02:26:15.573-05:00</atom:updated><title>Sprint recklessly exposed Carrier IQ logged URL data to easy government access</title><description>In recent weeks, there has been considerable controversy around Carrier IQ and the data collected by it and the wireless phone companies who have partnered with the firm. Now that class action lawsuits have been filed, and the FTC is reportedly &lt;a href=&quot;http://www.washingtonpost.com/business/economy/feds-probing-carrier-iq/2011/12/14/gIQA9nCEuO_story.html?tid=pm_business_pop&quot;&gt;probing the company&lt;/a&gt;, one of the most important questions will be: What is the harm?&lt;br /&gt;&lt;br /&gt;As I will attempt to argue in this blog post, by allowing Carrier IQ to collect and retain private user data (such as URLs of pages viewed), Sprint recklessly exposed this sensitive information, which would normally require a court order for the government to obtain, to access with a mere subpoena.&lt;br /&gt;&lt;br /&gt;Last week, technical experts &lt;a href=&quot;http://ashkansoltani.org/docs/carrier_IQ.html&quot;&gt;Ashkan Soltani&lt;/a&gt; and &lt;a href=&quot;https://www.eff.org/deeplinks/2011/12/carrier-iq-architecture&quot;&gt;Peter Eckersley&lt;/a&gt; reported that Carrier IQ&#39;s software was, in some cases, collecting keystrokes and the contents of (SMS) text messages. A 19-page &lt;a href=&quot;http://www.carrieriq.com/PR.20111212.pdf&quot;&gt;report&lt;/a&gt; (pdf) released by Carrier IQ confirmed the researchers&#39; claims, putting the blame on a technical bug and accidental overlogging by Sprint or HTC.&lt;br /&gt;&lt;br /&gt;For the purpose of this blog post, lets give Carrier IQ the benefit of the doubt. Instead, it is sufficient to focus our attention on one form of intentional data collection that Carrier IQ and its partner Sprint have acknowledged: the URLs of websites visited by handset owners. [There are others kinds of data that the company has intentionally logged too, for example, location data, but we don&#39;t know as much about this right now, so I&#39;m focusing my analysis on URLs]&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Carrier IQ and Sprint: Yeah, we log URLs&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;In a &lt;a href=&quot;http://franken.senate.gov/files/letter/111214_CarrierIQ_Response_to_Sen_Franken.pdf&quot;&gt;letter to Senator Franken&lt;/a&gt; (pdf) last week, Carrier IQ acknowledged that its software has been used by one wireless carrier to collect the URLs of webpages viewed by subscribers:&lt;blockquote&gt;Embedded versions of IQ Agent &lt;b&gt;allow for the collection of URLs if requested by a Network Operator&lt;/b&gt; in a profile. These can be collected together with performance metrics so that Network Operators can determine how devices on its network perform for specific web sites... The profile specified by the Network Operator and loaded on the device dictates if this information is actually gathered. The IQ Agent cannot read or copy the content of a website. &lt;b&gt;Only one of Carrier IQ&#39;s customers has requested a profile to collect URLs of websites visited on devices on its network.&lt;/b&gt;&lt;/blockquote&gt;&lt;br /&gt;In its &lt;a href=&quot;http://franken.senate.gov/files/letter/111214_Sprint_Response_to_Sen_Franken_CarrierIQ.pdf&quot;&gt;letter to Senator Franken&lt;/a&gt; (pdf), Sprint acknowledged that it was the wireless carrier that collected URLs:&lt;br /&gt;&lt;blockquote&gt;Sprint already knows the website of a URL of a website that a user is trying to reach from routing the request on its network. This information may be collected through the Carrier IQ software as part of a profile established to troubleshoot website loading latencies or errors experienced by a population of subscribers.&lt;/blockquote&gt;&lt;br /&gt;Let us ignore the fact that in the same letter, Sprint falsely denies collecting users&#39; search query information (the search terms are in the Google/Bing URL), that it failed to disclose that Sprint collects through Carrier IQ the URLs of webpages viewed over encrypted HTTPS connections which it would never learn by watching the network, or, that it probably also gets through Carrier IQ the URLs accessed by handset owners when they are using WiFI and not Sprint&#39;s network. While these are interesting points (and show that Sprint is either lying to a Senator, or their legal team is embarrassingly ignorant about technology), they are unnecessary for our analysis.&lt;br /&gt;&lt;br /&gt;It is also worth mentioning, although similarly unnecessary for our analysis, that Sprint&#39;s Electronic Surveillance Manager &lt;a href=&quot;http://paranoia.dubfire.net/2009/12/8-million-reasons-for-real-surveillance.html&quot;&gt;revealed in comments&lt;/a&gt; at the ISS World surveillance conference in 2009 that Sprint allows its marketing department to look through the logs of URLs viewed by its subscribers:&lt;br /&gt;&lt;blockquote&gt;On the Sprint 3G network, we have IP data back 24 months, and we have, depending on the device, we can actually tell you what URL they went to ... If [the handset uses] the [WAP] Media Access Gateway, we have the URL history for 24 months ... We don&#39;t store it because law enforcement asks us to store it, we store it because when we launched 3G in 2001 or so, we thought we were going to bill by the megabyte ... but ultimately, that&#39;s why we store the data ... It&#39;s because marketing wants to rifle through the data.&lt;/blockquote&gt;&lt;br /&gt;&lt;b&gt;Legal protections for URL data under US privacy law&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;It is beyond a cliche at this point to complain that our primary electronic privacy law dates from 1986, and hasn&#39;t been substantially updated since. This law not only differs in the legal protections offered to data based on whether it is is &lt;i&gt;content&lt;/i&gt; or &lt;i&gt;non-content&lt;/i&gt;, but also, based on what kind of company is holding the data.&lt;br /&gt;&lt;br /&gt;As a Sprint customer, I am obviously unhappy about the fact that that the company voluntarily logs and retains the URLs that subscribers visit - which are subsequently available to the government. However, I can get at least a tiny bit of comfort from the fact that the Electronic Communications Privacy Act requires a court order issued under &lt;a href=&quot;http://www.law.cornell.edu/uscode/usc_sec_18_00002703----000-.html&quot;&gt;18 USC 2703(d)&lt;/a&gt; before Sprint can be forced to disclose these records to law enforcement agencies.&lt;br /&gt;&lt;br /&gt;Furthermore, if Sprint wished to do so, it could probably argue that URLs contain communications content, and thus should only be disclosed pursuant to a probable cause warrant. [DOJ has acknowledged in its &lt;a href=&quot;http://www.cybercrime.gov/ssmanual/ssmanual2009.pdf&quot;&gt;Search and Seizure manual&lt;/a&gt; that URLs can contain content, at least in context of real-time intercepts via a pen register]. However, given Sprint&#39;s general pro-government approach to privacy, I wouldn&#39;t expect them to lift a finger to protect their customers.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Carrier IQ and ECPA&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;What about Carrier IQ? Does the government need a court order to get URLs when held by the company?&lt;br /&gt;&lt;br /&gt;To be considered a &quot;remote computing service&quot; (RCS) or an &quot;electronic communication service&quot; (ECS) provider under the Electronic Communications Privacy Act (ECPA), you need to actually provide services to the public. Carrier IQ does not do this -- its customers are wireless carriers. On this point alone, user data held by Carrier IQ is simply not subject to the limited protections of ECPA.&lt;br /&gt;&lt;br /&gt;Furthermore, even if we ignore the important requirement relating to providing services to the public, a service provider also has to actually provide the ability to send or receive a users&#39; communication for it to be considered an ECS under the law. See Sega Enterprises Ltd. v. MAPHIA, 948 F. Supp. 923, 930-31 (N.D. Cal. 1996) (video game manufacturer that accessed private email of users of another company&#39;s bulletin board service was not a provider of electronic communication service); State Wide Photocopy, Corp. v. Tokai Fin. Servs., Inc., 909 F. Supp. 137, 145 (S.D.N.Y. 1995) (financing company that used fax machines and computers but did not provide the ability to send or receive communications was not provider of electronic communication service).&lt;br /&gt;&lt;br /&gt;Since Carrier IQ is merely covertly logging the URLs that consumers are viewing, rather than actually delivering web pages to the end user, they also aren&#39;t covered under ECPA.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;So what?&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;As Carrier IQ is neither an RCS or ECS under ECPA, any data held by the company can be obtained by the government with a mere subpoena (and potentially, but I&#39;m not as sure of this, by a civil litigant too, such as a divorce lawyer).&lt;br /&gt;&lt;br /&gt;As Sprint opted to have user data sent to Carrier IQ, where it was held for 30-45 days, rather than having the carrier IQ software send the data directly to Sprint&#39;s servers, I believe that Sprint recklessly exposed this private information to easy access by the government without a court order. There are plenty of ways that the company could have guaranteed that this data would always remain protected under ECPA -- but it didn&#39;t do so.&lt;br /&gt;&lt;br /&gt;Likewise, while Sprint claims in its letter to Senator Franken that it tells its customers in its privacy policy that it collects information about the sites that they visit, it never discloses to subscribers that this private data is collected and stored by a third party, or the important way this will enable government access to that data. Sprint needlessly kept its customers in the dark about the ways in which the firm was exposing their data to government access.&lt;br /&gt;&lt;br /&gt;In its letter to Senator Franken, Carrier IQ denied getting any requests from law enforcement agencies for user data. Sprint had to issue a much more delicately worded statement: it has not disclosed Carrier IQ data to law enforcement (the reason for this careful wording, I suspect, is the presence of 110 employees in Sprint&#39;s Electronic Surveillance team who do nothing but supply user data to law enforcement and intelligence agencies).&lt;br /&gt;&lt;br /&gt;Although the recent &lt;a href=&quot;http://www.muckrock.com/news/archives/2011/dec/12/fbi-carrier-iq-files-used-law-enforcement-purposes/&quot;&gt;FOIA response&lt;/a&gt; that Muckrock received suggests that the FBI has at least some interest in Carrier IQ data, if we rely on the statements of Carrier IQ and Sprint, then, at least as it relates to URL data, the risks I have described in this blog post are largely theoretical. Even so, it doesn&#39;t change the fact that Sprint has demonstrated an extremely cavalier attitude towards user privacy.&lt;br /&gt;&lt;br /&gt;In a best case scenario, Sprint&#39;s legal team simply didn&#39;t consider the ECPA/law enforcement related implications of using Carrier IQ&#39;s technology. In a worst case scenario, they knew what they were doing, and didn&#39;t care. In either case, the company should be held responsible.</description><link>http://paranoia.dubfire.net/2011/12/sprint-recklessly-exposed-carrier-iq.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-7211381346265530241</guid><pubDate>Fri, 16 Dec 2011 23:00:00 +0000</pubDate><atom:updated>2011-12-16T18:01:07.401-05:00</atom:updated><title>Commerce Dept: export licenses for intercept tech have &quot;exploded&quot; over last 2,3 years</title><description>Earlier this year, the Commerce Department&#39;s Bureau of Industry and Security held a two-day &lt;a href=&quot;http://www.bis.doc.gov/seminarsandtraining/update2011/index.htm&quot;&gt;Conference on Export Controls and Policy&lt;/a&gt;. It included a workshop specifically focused on the rules governing the export of encryption technologies (which include intercept equipment). The full transcript can be found here: &lt;a href=&quot;http://htc-01.media.globix.net/COMP008760MOD1/BIS_Web/Transcripts/072111_Encryption_Workshop_2011_part1.pdf&quot;&gt;part 1 (pdf)&lt;/a&gt;, &lt;a href=&quot;http://htc-01.media.globix.net/COMP008760MOD1/BIS_Web/Transcripts/072111_Encryption_Workshop_2011_part2.pdf&quot;&gt;part 2 (pdf)&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;As a non-lawyer, and non-expert in export control regulations, I was pretty surprised to learn that the government already strictly regulates the export of covert communications surveillance technology. What this means, of course, is that the Commerce Department already has a list of every foreign buyer of US made covert surveillance technology. Unfortunately, they won&#39;t provide this information to the public, and as far as I know, they won&#39;t provide it in response to FOIA requests.&lt;br /&gt;&lt;br /&gt;In any case, reading through the transcript of the event, the following section caught my eye, as it specifically addressed the regulations that apply to surreptitious listening technology:&lt;br /&gt;&lt;blockquote&gt;&lt;br /&gt;&lt;a href=&quot;http://www.linkedin.com/pub/michael-pender/8/1aa/910&quot;&gt;Michael Pender&lt;/a&gt;: Licenses [for &quot;surreptitious listening&quot; technology] are required for export to all end users, all destinations, and there&#39;s a general policy of denial.&lt;br /&gt;&lt;br /&gt;The exceptions are for U.S. government agencies or communication-service providers there in the normal course of their business.  So, if you&#39;re representing a U.S. law-enforcement agency and you&#39;re partnering with some other organization in another country and you need to send something out of the county, you know, contact us.  Licenses are authorized for that situation.&lt;br /&gt;&lt;br /&gt;If you represent a telecommunications company and you receive court orders for wiretaps from the local law enforcement and you have to comply with those court orders, you know, that&#39;s one of the few circumstances in which we can grant a license.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;And you wouldn&#39;t think there would be that many licenses for these products in general in a year, but the rate at which they&#39;re coming in has just exploded over the course of the  last 2, 3 years.  I mean, I think I went from getting one a year to like five times as many, and then again, it&#39;s at least doubled or tripled in just the last year.&lt;/b&gt;&lt;/blockquote&gt;</description><link>http://paranoia.dubfire.net/2011/12/commerce-dept-export-licenses-for.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-7870463626291367180</guid><pubDate>Sat, 12 Nov 2011 01:12:00 +0000</pubDate><atom:updated>2011-11-11T23:40:56.615-05:00</atom:updated><title>Twitter&#39;s privacy policy and the Wikileaks case</title><description>&lt;p&gt;&lt;b&gt;Summary:&lt;/b&gt; The federal judge in the Wikileaks case cited in his order a version of Twitter&#39;s privacy policy from 2010, rather than the very different policy that existed when Appelbaum, Gonggrijp and Jonsdottir created their Twitter accounts back in 2008. That older policy actually promised users that Twitter would keep their data private unless they violated the company&#39;s terms of service. It is unclear how the judge managed to miss this important detail.&lt;/p&gt;

&lt;hr&gt;

&lt;p&gt;Earlier this week, a federal judge in Virginia handed down an order in the high-profile Twitter/Wikileaks case. That order has already been &lt;a href=&quot;http://www.wired.com/threatlevel/2011/11/wikileaks-twitter-ruling/&quot;&gt;widely&lt;/a&gt; covered by the &lt;a href=&quot;http://www.nytimes.com/2011/11/11/technology/twitter-ordered-to-yield-data-in-wikileaks-case.html&quot;&gt;media&lt;/a&gt;, so I won&#39;t summarize it here.&lt;/p&gt;

&lt;p&gt;In ruling that Appelbaum, Gonggrijp and Jonsdottir did not have a reasonable expectation of privacy in the IP addresses that Twitter had collected, the judge specifically highlighted the existence of statements about IP address collection in Twitter&#39;s privacy policy.&lt;/p&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://1.bp.blogspot.com/-PjkQ6D1K708/Tr3KNKYRjoI/AAAAAAAAABQ/RT5nat zZ6lHg/s1600/twitter-order-privacy-policy-1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left:1em; margin-right:1em&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;174&quot; width=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLrDG6rZ2SkH1_7B0YcguWSTF6UsE-eQtfPeNgfrOZGZlQBeGhVuSD72uWN8vi_AltYf-mzDhZHAj_03JZB2QMpxzKQRRgRoPj_3rvRj5O7bUqHIDhO77_jJ1uYWhfvbcDI-ti/s400/twitter-order-privacy-policy-1.png&quot; /&gt;&lt;/a&gt;&lt;br&gt;(from page 3 of the order)&lt;/div&gt;

&lt;p&gt;The judge noted that Twitter reveals in its privacy policy that it collects &quot;many types of usage information, including physical location, IP address, browser type, the &lt;b&gt;referring domain&lt;/b&gt; ...&quot; To support this claim, the judge cited the &lt;a href=&quot;http://www.archive.org/download/gov.uscourts.vaed.262289/gov.uscourts.vaed.262289.45.1.pdf&quot;&gt;&quot;Bringola declaration&quot;&lt;/a&gt; (pdf), which is a collection of screenshots from Twitter&#39;s website produced by a paralegal working for Appelbaum&#39;s lawyer.&lt;/p&gt;

&lt;p&gt;The privacy policy reproduced in the Bringola declaration and cited by the judge was effective as of November 16, 2010, and appears to have been the current privacy policy in March of 2011 when the paralegal made the screenshots. That privacy policy included the following &quot;Log Data&quot; section:&lt;/p&gt;

&lt;p&gt;&lt;blockquote&gt;Our servers automatically record information (&quot;Log Data&quot;) created by your use of the Services. Log Data may include information such as your IP address, browser type, the referring domain, pages visited, your mobile carrier, device and application IDs, and search terms. Other actions, such as interactions with our website, applications and advertisements, may also be included in Log Data. If we haven’t already deleted the Log Data earlier, we will either delete it or remove any common account identifiers, such as your username, full IP address, or email address, after 18 months.&lt;/blockquote&gt;&lt;/p&gt;

&lt;P&gt;There is a slight problem with relying on a privacy policy created on November 16, 2010 to decide the reasonable expectation of privacy of these three individuals: They created their Twitter accounts several years before the document was written.&lt;/P&gt;

&lt;p&gt;According to the useful website &lt;a href=&quot;http://howlonghaveyoubeentweeting.com/&quot;&gt;howlonghaveyoubeentweeting.com&lt;/a&gt;, Appelbaum&#39;s Twitter account was created on February 23, 2008, Gonggrijp created his on September 26, 2008, and Jonsdottir created hers on November 14, 2008.&lt;/p&gt;

&lt;p&gt;Thankfully, Twitter seems to archive all the old versions of their privacy policy. It would appear that all three individuals would have &quot;agreed to&quot; (ignoring the fact that none of them likely read the thing in the first place) &lt;a href=&quot;https://twitter.com/privacy/previous/version_1&quot;&gt;Version 1&lt;/a&gt; of the privacy policy, dated May 14, 2007. The &quot;Log data&quot; section of that policy reads as follows:&lt;/p&gt;

&lt;p&gt;&lt;blockquote&gt;When you visit the Site, our servers automatically record information that your browser sends whenever you visit a website (&quot;Log Data&quot; ). This Log Data may include information such as your IP address, browser type or the domain from which you are visiting, the web-pages you visit, the search terms you use, and any advertisements on which you click. For most users accessing the Internet from an Internet service provider the IP address will be different every time you log on. We use Log Data to monitor the use of the Site and of our Service, and for the Site&#39;s technical administration. &lt;b&gt;We do not associate your IP address with any other personally identifiable information to identify you personally, except in case of violation of the Terms of Service.&lt;/b&gt;&lt;/blockquote&gt;&lt;/p&gt;

&lt;p&gt;There are a few things worth noting here:&lt;/P&gt;
&lt;ol&gt;
&lt;li&gt;The term &quot;referring domain&quot; appears in privacy policy cited by the judge in his court order, but not in Version 1 of the Twitter privacy policy. This strongly suggests that the judge is citing a newer version of the Twitter policy. The term appears to have been added in &lt;a href=&quot;https://twitter.com/privacy/previous/version_2&quot;&gt;Version 2&lt;/a&gt; of the privacy policy, dated November 18, 2009.
&lt;li&gt;In Version 1 of its policy, Twitter promised its users that it would &lt;b&gt;not&lt;/b&gt; associate their IP addresses with any other personally identifiable information sufficient to identify them personally, unless they violated the Twitter terms of service. This pro-user sentence was removed in Version 2 of Twitter&#39;s privacy policy, one year later.&lt;/li&gt;
&lt;li&gt;The government has not alleged that any of the 3 individuals violated Twitter&#39;s terms of service. As such, it would appear that they could reasonably rely on Twitter&#39;s claims that it wouldn&#39;t associate their retained IP address information with their existing account records or any other personally identifiable information.&lt;/ol&gt;

&lt;p&gt;This is very interesting.&lt;/p&gt;

&lt;p&gt;The old version of Twitter&#39;s policy that the three individuals &quot;agreed&quot; to also includes the following paragraph about updates to the document:&lt;/p&gt;

&lt;p&gt;&lt;blockquote&gt;This Privacy Policy may be updated from time to time for any reason; each version will apply to information collected while it was in place. We will notify you of any material changes to our Privacy Policy by posting the new Privacy Policy on our Site. You are advised to consult this Privacy Policy regularly for any changes.&lt;/blockquote&gt;&lt;/p&gt;

&lt;p&gt;Note, Twitter didn&#39;t say that it would send out emails to users when it updated its privacy policy, instead, it advised users to revisit the site on a regular basis to see if the policy had changed. How this sentence passed the laugh test at Twitter&#39;s HQ, I do not know.&lt;/p&gt;

&lt;p&gt;In subsequent edits to the policy, Twitter reworded this section, so that it now reads:&lt;/p&gt;

&lt;p&gt;&lt;blockquote&gt;We may revise this Privacy Policy from time to time. The most current version of the policy will govern our use of your information and will always be at https://twitter.com/privacy. If we make a change to this policy that, in our sole discretion, is material, we will notify you via an @Twitter update or e-mail to the email associated with your account. By continuing to access or use the Services after those changes become effective, you agree to be bound by the revised Privacy Policy.&lt;/blockquote&gt;&lt;/p&gt;

&lt;p&gt;Got that? As of Version 2 of Twitter&#39;s privacy policy, merely by continuing to use Twitter, you agree to be bound by whatever the company adds to the policy. Oh, and it is up to the company to decide if the changes to the policy are important enough to justify telling users.&lt;/p&gt;

&lt;p&gt;I know that I am not the first researcher to point out how stupid privacy policies are, or that no one reads them. Many others &lt;a href=&quot;http://lorrie.cranor.org/pubs/readingPolicyCost-authorDraft.pdf&quot;&gt;have done&lt;/a&gt; it, and done so far more eloquently than me. My goal in writing this blog post is simple: Not only is a federal judge ruling that 3 individuals have no reasonable expectation of privacy with regard to the government getting some of their Internet transaction data, but the judge isn&#39;t even citing the right version of a widely ignored privacy policy to do so. If the judge were to examine the privacy policy that existed when these three targets signed up for a Twitter account, he might decide that they do in fact have a reasonable expectation of privacy and that the government needs a warrant to get the data.&lt;/p&gt;</description><link>http://paranoia.dubfire.net/2011/11/twitters-privacy-policy-and-wikileaks.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLrDG6rZ2SkH1_7B0YcguWSTF6UsE-eQtfPeNgfrOZGZlQBeGhVuSD72uWN8vi_AltYf-mzDhZHAj_03JZB2QMpxzKQRRgRoPj_3rvRj5O7bUqHIDhO77_jJ1uYWhfvbcDI-ti/s72-c/twitter-order-privacy-policy-1.png" height="72" width="72"/><thr:total>12</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-3701198224177719505</guid><pubDate>Wed, 02 Nov 2011 21:26:00 +0000</pubDate><atom:updated>2011-11-03T00:38:02.414-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">privacy</category><category domain="http://www.blogger.com/atom/ns#">security</category><title>Two honest Google employees: our products don&#39;t protect your privacy</title><description>&lt;p&gt;Two senior Google employees recently acknowledged that the company&#39;s products do not protect user privacy. This is quite a departure from the norm at Google, where statements about privacy are usually thick with &lt;a href=&quot;http://news.cnet.com/8301-13739_3-10038963-46.html&quot;&gt;propaganda&lt;/a&gt;, &lt;a href=&quot;http://paranoia.dubfire.net/2009/07/more-mistruths-from-google-on-privacy.html&quot;&gt;mistruths&lt;/a&gt; and &lt;a href=&quot;http://blogs.wsj.com/digits/2010/10/07/former-ftc-employee-files-complaint-over-google-privacy/&quot;&gt;often&lt;/a&gt; outright &lt;a href=&quot;http://www.ftc.gov/opa/2011/03/google.shtm&quot;&gt;deception&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Google&#39;s products do not meet the privacy needs of journalists, bloggers, small businesses (or anyone else concerned about government surveillance).&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;Last week, I &lt;a href=&quot;http://www.nytimes.com/2011/10/27/opinion/without-computer-security-sources-secrets-arent-safe-with-journalists.html&quot;&gt;published an op-ed&lt;/a&gt; in the New York Times that focused on the widespread ignorance of computer security among journalists and news organizations. Governments often have no need to try and compel a journalist to reveal the identity of their sources if they can simply obtain stored communication records from phone, email and social networking companies.&lt;/p&gt;

&lt;p&gt;Will DeVries, Google&#39;s top DC privacy lobbyist soon &lt;a href=&quot;
https://plus.google.com/114398554253715786472/posts/Dpc7jxkVw7s&quot;&gt;posted a link to the article&lt;/a&gt; on his (personal) Google+ page, and added the following comment:
&lt;blockquote&gt;I often disagree with Chris, but when he&#39;s right, he&#39;s dead right. Journalists (and bloggers, and small businesses) need to take a couple hours and learn to use free, widely available security measures to store data and communicate.&lt;/blockquote&gt;&lt;/p&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMJ0NTkoeJV2CRk51xHYpxbtkii61AdKy8pQS10OQqnzFakY6bMOm6Sg4UqbMLckBdYobQHUZG9JYdlvlBG4xL29YGcymfOqAEZ8vZB2idL5_E2FB3oWLVhlCmgnmafrLL8q1G/s1600/will+cropped.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left:1em; margin-right:1em&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;127&quot; width=&quot;600&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMJ0NTkoeJV2CRk51xHYpxbtkii61AdKy8pQS10OQqnzFakY6bMOm6Sg4UqbMLckBdYobQHUZG9JYdlvlBG4xL29YGcymfOqAEZ8vZB2idL5_E2FB3oWLVhlCmgnmafrLL8q1G/s400/will+cropped.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;

&lt;p&gt;Let me first say that I really respect Will. Many of the people in Google&#39;s policy team default to propaganda mode when questioned. Will does not do this - he either speaks truthfully, or declines to comment. I wish companies would hire more people like him, as they significantly boost the credibility of the firm among privacy advocates.&lt;/p&gt;

&lt;p&gt;Regarding Will&#39;s comment: If Google&#39;s products were secure out of the box, journalists would not need to &quot;take a couple hours&quot; to learn to protect their data and communications. Will does not tell journalists to ditch their insecure Hotmail accounts and switch to Gmail, or to ditch their easily trackable iPhones and get an Android device. Likewise, he does not advise people to stop using Skype for voice and video chat, and instead use Google&#39;s &lt;a href=&quot;http://www.google.com/chat/video&quot;&gt;competing services&lt;/a&gt;. He doesn&#39;t do that, because if he described these services as more secure and resistant to government access than the competition, he&#39;d be lying.&lt;/p&gt;

&lt;p&gt;Google&#39;s services are not secure by default, and, because the company&#39;s business model depends upon the monetizaton of user data, the company keeps as much data as possible about the activities of its users. These detailed records are not just useful to Google&#39;s engineers and advertising teams, but are also a juicy target for law enforcement agencies.&lt;/p&gt;

&lt;p&gt;It would be great if Google&#39;s products were suitable for journalists, bloggers, activists and other groups that are routinely the target of surveillance by governments around the world. For now, though, as Will notes, these persons will need to investigate the (non-Google) tools and methods with which they can protect their data.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Google business model is in conflict with privacy by design&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;At a recent conference in Kenya, &lt;a href=&quot;http://en.wikipedia.org/wiki/Vint_Cerf&quot;&gt;Vint Cerf&lt;/a&gt;, one of the fathers of the Internet and Google&#39;s Chief Internet Evangelist spoke on the same panel as me. We had the following exchange over the issue of Google&#39;s lack of encryption for user data stored on the company&#39;s servers (I&#39;ve edited it to show the important bits about this particular topic - the &lt;a href=&quot;http://www.intgovforum.org/cms/component/content/article/71-transcripts-/894-sop-workshop-160-global-trends-to-watch-the-erosion-of-privacy-and-anonymity-and-the-need-of-transparency-of-government-access-requests-&quot;&gt;full transcript is online here&lt;/a&gt;).&lt;/p&gt;

&lt;p&gt;Me:&lt;/p&gt;

&lt;blockquote&gt;&lt;p&gt;[I]t&#39;s very difficult to monetize data when you cannot see it.  And so if the files that I store in Google docs are encrypted or if the files I store on Amazon&#39;s drives are encrypted then they are not able to monetize it....And unfortunately, these companies are putting their desire to monetize your data over their desire to protect your communications.&lt;/p&gt;

&lt;p&gt;Now, this doesn&#39;t mean that Google and Microsoft and Yahoo! are evil.  They are not going out of their way to help law enforcement.  It&#39;s just that their business model is in conflict with your privacy. And given two choices, one of which is protecting you from the government and the other which is making money, they are going to go with making money because, of course, they are public corporations.  They are required to make money and return it to their shareholders.&lt;/P&gt;
&lt;/blockquote&gt;

&lt;p&gt;Vint Cerf:&lt;/P&gt;

&lt;blockquote&gt;I think you&#39;re quite right, however that, we couldn&#39;t run our system if everything in it were encrypted because then we wouldn&#39;t know which ads to show you.  So this is a system that was designed around a particular business model.&lt;/blockquote&gt;&lt;/p&gt;

Google could encrypt user data in storage with a key not known to the company, as several &lt;a href=&quot;https://spideroak.com/&quot;&gt;other cloud storage companies&lt;/a&gt; already do. Unfortunately, Google&#39;s ad supported business model simply does not permit the company to protect user data in this way.

The end result is that law enforcement agencies can, and regularly do request user data from the company -- requests that would lead to nothing if the company put user security and privacy first.</description><link>http://paranoia.dubfire.net/2011/11/two-honest-google-employees-our.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjMJ0NTkoeJV2CRk51xHYpxbtkii61AdKy8pQS10OQqnzFakY6bMOm6Sg4UqbMLckBdYobQHUZG9JYdlvlBG4xL29YGcymfOqAEZ8vZB2idL5_E2FB3oWLVhlCmgnmafrLL8q1G/s72-c/will+cropped.png" height="72" width="72"/><thr:total>21</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-1006094608162028311</guid><pubDate>Mon, 19 Sep 2011 12:45:00 +0000</pubDate><atom:updated>2011-09-19T08:45:08.961-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">certificate authorities</category><category domain="http://www.blogger.com/atom/ns#">diginotar</category><category domain="http://www.blogger.com/atom/ns#">HTTPS</category><category domain="http://www.blogger.com/atom/ns#">surveillance</category><title>The forces that led to the DigiNotar hack</title><description>&lt;p&gt;Last week, the &lt;a href=&quot;http://www.nytimes.com/2011/09/12/technology/hacker-rattles-internet-security-circles.html&quot;&gt;New York Times&lt;/a&gt; finally covered the DigiNotar hacks, more than two weeks after security experts and the tech media first broke the story.  Unfortunately, the top 2-3 newspapers in the US (which is what legislative staff, regulators and policy makers read) have missed most of the important details. The purpose of this blog post is to fill in  those gaps, providing key context to understand this incident as part of the larger Internet trust (and surveillance) debate.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;Lawful access&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;As consumers around the world have embraced cloud computing, 
large Internet firms like Google, Facebook, Twitter, Yahoo, all of them 
based in the United States, increasingly hold users&#39; most private 
documents and other data. This has been a boon for law enforcement 
agencies, which can often obtain these files without a court issued 
search warrant, or have to provide the investigated individual with the 
kind of prompt notice that would otherwise occur had their home been 
searched.&lt;/p&gt;

&lt;p&gt;Law enforcement and intelligence agencies in the US, EU, Canada, Brasil, India, Japan, Israel and several other 
countries all regularly obtain private user data from Google. The 
company will insist on a court order for some kinds of user data, but 
will disclose many other types of data and subscriber records without 
first insisting on an order issued by an independent judge. This isn&#39;t 
because Google is evil, but because privacy laws in these countries, the
US included, are so weak.&lt;/p&gt;

&lt;p&gt;Google does not treat all governments equally though. For example,
the company will not honor requests from the governments of Iran, Libya,
Zimbabwe, Vietnam and several other countries. You might be inclined to believe that Google has taken this 
position because of the poor human rights record in these countries - 
that is part of the reason (but not the whole one, otherwise, Google 
would refuse requests from the US government which has a documented 
track record of assassination, rendition/kidnapping and torture). 
Google&#39;s policy of refusing these requests, I believe, largely comes 
down to the fact that Google does not have an office or staff in those 
countries. Without a local presence, employees to threaten with arrest 
or equipment to seize, these governments lack leverage over Google.&lt;/p&gt;


&lt;p&gt;This situation is not specific to Google - Facebook, Yahoo, 
Microsoft and other large US firms all disclose user data to governments that have leverage over them, and ignore requests from others. Thus, lacking any &quot;legitimate&quot; way to engage in what they believe is lawful surveillance of their citizens, these governments that lack leverage have turned to other methods. Specifically, network surveillance.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;An unintended consequence of HTTPS by default&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;When users connect to Facebook, Twitter, or Hotmail—as well as many 
other popular websites—they are vulnerable to passive network surveillance and active attacks, such as account hijacking. These
 services are vulnerable because they do not use HTTPS encryption to 
protect all data as it is transmitted over the Internet.&lt;/p&gt;

&lt;p&gt;Such attacks are trivially easy for hackers to perform against users of an open WiFi network using tools like &lt;a href=&quot;http://codebutler.com/firesheep&quot;&gt;Firesheep&lt;/a&gt;.
They are also relatively easy for government agencies to perform on a  larger scale, when they can compel the assistance of upstream ISPs.&lt;/p&gt;

&lt;p&gt;As I described above, because Google will not respond to formal requests for user data from certain governments, it is likely that the state security agencies in these countries have come to depend on network interception, performed with the assistance of domestic ISPs.&lt;/p&gt;

&lt;p&gt;Unfortunately for these governments, in January 2010, Google &lt;a href=&quot;http://gmailblog.blogspot.com/2010/01/default-https-access-for-gmail.html&quot;&gt;enabled HTTPS by default&lt;/a&gt;  for Gmail and a few other services. Once the firm flipped the default setting, passive network surveillance became impossible. Thus, in January 2010, the governments of Iran and a few other countries lost their ability to watch the communications of domestic Google users.&lt;/p&gt;

&lt;p&gt;For now, these governments can still spy on Facebook, Twitter and Hotmail, as these services do not use HTTPS by default. That is changing though. Following the release of Firesheep in October 2010, (as well as &lt;a href=&quot;http://news.cnet.com/8301-1009_3-20037253-83.html&quot;&gt;two senior&lt;/a&gt; US government officials calling for &lt;a href=&quot;https://www.eff.org/deeplinks/2010/03/ftc-internet-companies-start-using-ssl&quot;&gt;encryption by default&lt;/a&gt;) all three &lt;a href=&quot;http://www.facebook.com/blog.php?post=486790652130&quot;&gt;services&lt;/a&gt; now &lt;a href=&quot;http://windowsteamblog.com/windows_live/b/windowslive/archive/2010/11/09/hotmail-security-improves-with-full-session-https-encryption.aspx&quot;&gt;offer&lt;/a&gt; configuration options &lt;a href=&quot;http://blog.twitter.com/2011/03/making-twitter-more-secure-https.html&quot;&gt;to force&lt;/a&gt; the use of HTTPS. These firms are all moving towards HTTPS by default - for some firms, it will likely be a matter of weeks until it happens, for others, months.&lt;/p&gt;

&lt;p&gt;Governments can see the writing on the wall - HTTPS by default will become the norm. Passive network surveillance will lose its potency as a tool of government monitoring, and once that happens, the state intelligence agencies will &quot;go dark&quot;, losing the ability to keep tabs on their citizen&#39;s use of foreign, mostly US-based Internet communications services.&lt;/p&gt;

&lt;p&gt;&lt;b&gt;HTTPS Certificate Authorities and surveillance&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;As these large providers switch to HTTPS by default, government agencies will no longer be able to rely on passive network interception. By switching to &lt;i&gt;active&lt;/i&gt; interception attacks, these governments can, in many cases, easily neutralize the HTTPS encryption, thus restoring their ability to spy on their citizens. One active attack, known as a &quot;man in the middle attack&quot; requires that the government first obtain a HTTPS certificate issued by a Certificate Authority (CA) trusted by the major web browsers.&lt;/p&gt;

&lt;p&gt;In March of 2010, Sid Stamm and I published a paper on what we called &lt;a href=&quot;http://files.cloudprivacy.net/ssl-mitm.pdf&quot;&gt;compelled certificate creation attacks&lt;/a&gt;, in which a government simply requires a domestic Certificate Authority issue it one or more certificates for surveillance purposes. When we released a draft of our paper, we also published a product brochure I had obtained in the fall of 2009 at the ISS surveillance conference, for a &lt;a href=&quot;http://www.wired.com/threatlevel/2010/03/packet-forensics/&quot;&gt;Packet Forensics interception device&lt;/a&gt; that described how it could be used to intercept communications using these kinds of certificates.&lt;/p&gt;

&lt;p&gt;The browsers trust a lot of Certificate Authorities, probably too many. These include companies located in countries around the world. They also include Certificate Authorities that are operated by government agencies. For example, Microsoft &lt;a href=&quot;http://social.technet.microsoft.com/wiki/contents/articles/3581.aspx&quot;&gt;trusts&lt;/a&gt; a couple dozen governments, that include Tunisia and Venezuela. It is perhaps worth noting  that Microsoft &lt;a href=&quot;http://social.technet.microsoft.com/wiki/contents/articles/3581.aspx&quot;&gt;continues to&lt;/a&gt; trust the Tunisian government even after it was &lt;a href=&quot;http://www.theatlantic.com/technology/archive/2011/01/the-inside-story-of-how-facebook-responded-to-tunisian-hacks/70044/&quot;&gt;caught in December 2010 actively hijacking&lt;/a&gt; the accounts of Facebook users -- an act that led to Facebook enabling HTTPS by default for all users in the country.)&lt;/p&gt;

&lt;p&gt;In any case, as Sid an I described, governments can compel domestic Certificate Authorities to provide them with the certificates necessary to intercept their own citizens&#39; communications. However, not all governments  around the world are as lucky as Tunisia to be trusted by the browsers, nor do all of them have a domestic certificate authority that they can bully around. Some countries, like Iran, have no way to obtain a certificate that will let them spy on Google users (yes, I know that you can buy intermediate CA issuing powers, but I am assuming that no one will sell this to the Iranian gov).&lt;/p&gt;

&lt;p&gt;In recent weeks, we have learned that the encrypted communications of 300,000 people in Iran were monitored by an entity using a certificate that DigiNotar issued. While the Iranian government has not admitted to conducting this man in the middle surveillance against its citizens, it seems reasonable to assume they were behind it. The reason for this certificate theft seems pretty clear, when you consider the other details described in this blog post:&lt;/p&gt;

&lt;p&gt;Iran wants to spy on its citizens. It wants the same interception and spying capabilities that the US and other western governments have. Unfortunately for the Iranian government, it has no domestic CA, and Google doesn&#39;t have an office in Tehran. So, it used a certificate obtained by hacking into a CA already trusted by the browsers - a CA that had weak default passwords, and that covered up the attack for weeks after it learned about it, giving the Iranian government plenty of time to use the stolen certificate to spy on its citizens.&lt;/p&gt;

&lt;p&gt;As Facebook, Twitter and other big sites embrace HTTPS by default, the temptation will grow for for governments without other ways to spy their citizens to hack into certificate authorities with weak security. Can you blame them?&lt;/p&gt;

&lt;p&gt;&lt;b&gt;NSA and other US government agencies have gambled with our security&lt;/b&gt;&lt;/p&gt;

&lt;p&gt;In December 2009, after I had obtained Packet Forensics&#39; product marketing materials, I met with a former senior US intelligence official. I told him that I believed that governments around the world were abusing this flaw to spy on their own citizens, as well as foreigners. When I told him I would be going public in a few months, motivated by my concerns about China and other governments spying on Americans, he said I would be aiding &quot;terrorists in Peshawar&quot; by helping to secure their communications. Needless to say, our meeting wasn&#39;t particularly productive.&lt;/p&gt;

&lt;p&gt;US intelligence agencies have long known about the flaws associated with the current certificate authority web of trust. For example, in 1998,
James Hayes, an air force captain working for the National Security Agency published &lt;a href=&quot;http://www.ise.gmu.edu/~duminda/classes/spring08/isa562/Slides/00725710.pdf&quot;&gt;an academic paper&lt;/a&gt; in which he described the ease with which certificates could be used to intercept traffic:&lt;/p&gt;
&lt;blockquote&gt;Certificate masquerading allows a masquerader to substitute an unsuspecting server’s valid certificate with the masquerader’s valid certificate. The masquerader
could monitor Web traffic, picking up unsuspecting victims’ surfing habits, such as the various net shopping malls and stores a victim may visit. The masquerader could change messages at will without detection, or collect the necessary information and go shopping on his or her own time.&lt;/blockquote&gt;

&lt;p&gt;Of course, it isn&#39;t too surprising that NSA has known about these vulnerabilities. If the agency hadn&#39;t know about these risks, it would have been grossly incompetent.&lt;/p&gt;

&lt;p&gt;The question to consider then, is what has and hasn&#39;t the NSA done with this knowledge. In addition to attacking the computers of foreign governments, NSA is supposed to protect US government electronic assets. In the 10 years since NSA first acknowledged it knew about the problems with certificate authorities, what steps has the agency taken to protect US government computers from these attacks? Likewise, what has it done to protect US businesses and individuals?&lt;/p&gt;

&lt;p&gt;The answer, I believe, is &quot;nothing&quot;. The reason for this, I suspect, is that NSA wanted to exploit the flaws itself and didn&#39;t want to do anything that would lead to the elimination of what is likely a valuable source of intelligence information -- even though this meant that the governments of China, Turkey, Israel, Tunisia and Venezuela would have access to this surveillance method too.&lt;/p&gt;

&lt;p&gt;Perhaps this was a reasonable choice to make, when the intelligence agencies abusing the flaw could be trusted to do so discreetly (&lt;i&gt;The &lt;a href=&quot;http://news.ycombinator.com/item?id=3011286&quot;&gt;first rule&lt;/a&gt; of State-run CA Club is...&lt;/i&gt;). The Iranians have upset that delicate understanding. They have acquired and used certificates in a manner that is anything but discreet, thus forcing the issue to the front page of newspapers around the world.

&lt;p&gt;Now, any state actor or criminal enterprise with a budget to hire hackers can likely get its hands on fraudulent certificates sufficient to intercept users&#39; communications, as Comodo and DigiNotar will not be the last certificate authorities with weak security to be hacked. Hundreds of millions of computers around the world remain vulnerable to this attack, and will likely stay this way, until the web browser vendors decide upon and deploy effective defenses.&lt;/p&gt;

&lt;p&gt;Had the US defense and intelligence community acted 10 years ago to protect the Internet, instead of exploiting this flaw, we would not be in the dire situation that we are currently in, waiting for the next hacked certificate authority, or the next man in the middle attack.&lt;/p&gt; 



</description><link>http://paranoia.dubfire.net/2011/09/forces-that-led-to-diginotar-hack.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-824905338955511204</guid><pubDate>Thu, 04 Aug 2011 17:20:00 +0000</pubDate><atom:updated>2011-08-04T13:31:00.143-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ecpa</category><category domain="http://www.blogger.com/atom/ns#">surveillance</category><title>Warrantless &quot;emergency&quot; surveillance of Internet communications by DOJ up 400%</title><description>According to an official DOJ report, the use of &quot;emergency&quot;, warrantless requests to ISPs for customer communications content has skyrocketed over 400% in a single year.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://files.spyingstats.com/exigent-requests/doj-2702-report-2010.pdf&quot;&gt;The 2009 report&lt;/a&gt; (pdf), which I recently obtained via a Freedom of Information Act request (it took DOJ &lt;a href=&quot;http://files.spyingstats.com/exigent-requests/FOIA-reply-2010-2702-report.pdf&quot;&gt;11 months&lt;/a&gt; (pdf) to give me the two-page report), reveals that law enforcement agencies within the Department of Justice sought and obtained communications content for 91 accounts. This number is a significant increase over previous years: 17 accounts &lt;A href=&quot;http://files.spyingstats.com/exigent-requests/doj-2702-report-2009.pdf&quot;&gt;in 2008&lt;/a&gt; (pdf), 9 accounts &lt;a href=&quot;http://files.spyingstats.com/exigent-requests/doj-2702-report-2008.pdf&quot;&gt;in 2007&lt;/a&gt; (pdf), and 17 accounts &lt;a href=&quot;http://files.spyingstats.com/exigent-requests/doj-2702-report-2007.pdf&quot;&gt;in 2006&lt;/a&gt; (pdf).&lt;br /&gt; &lt;br /&gt;&lt;b&gt;Background&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;When Congress passed the Electronic Communications Privacy Act in 1986, it permitted law enforcement agencies to obtain stored communications and customer records in emergencies without the need for a court order. &lt;br /&gt;&lt;br /&gt;In such scenarios, a carrier can (but is not required to) disclose the requested information if it, &quot;in good faith, believes that an emergency involving danger of death or serious physical injury to any person requires disclosure without delay of communications relating to the emergency.&quot;  Typically, belief means that a police officer states that an emergency exists. &lt;br /&gt;&lt;br /&gt;With the passage of the USA PATRIOT Improvement and Reauthorization Act of 2005, Congress created specific statistical reporting requirements for the voluntary disclosure of the contents of subscriber communications in emergency situations. In describing his motivation for introducing the requirement, Senator Lungren stated that:&lt;blockquote&gt;&lt;br /&gt;&quot;I felt that some accountability is necessary to ensure that this authority is not being abused… This information [contained in the reports] I believe should be highly beneficial to the Committee, fulfilling our oversight responsibility in the future … this is the best way for us to have a ready manner of looking at this particular section. In the hearings that we had, I found no basis for claiming that there has been abuse of this section. I don&#39;t believe on its face it is an abusive section. But I do believe that it could be subject to abuse in the future and, therefore, this allows us as Members of Congress to have an ability to track this on a regular basis.&quot;&lt;/blockquote&gt;&lt;br /&gt;&lt;b&gt;The current reports are deeply flawed&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;The emergency request reports are compiled and submitted by the Attorney General, and only apply to disclosures made to law enforcement agencies within the Department of Justice. As such, there are no statistics for emergency disclosures made to other federal law enforcement agencies, such as the Secret Service, as well as those made to state and local law enforcement agencies.&lt;br /&gt;&lt;br /&gt;Furthermore, although 18 USC 2702 permits both the disclosure of the content of communications, as well as non-content records associated with subscribers and their communications (such as geo-location data), Congress only required that statistics be compiled for the disclosure of communications content. It is not clear why Congress limited the reports in this way.&lt;br /&gt;&lt;br /&gt;Because the reporting requirements do not apply to disclosures made to law enforcement agencies outside the Department of Justice, and do not include the disclosure of non-content communications data and other subscriber records, the reports reveal a very limited portion of the scale of voluntary disclosures to law enforcement agencies.&lt;br /&gt;&lt;br /&gt;Likewise, although Congress intended for these reports to assist with public oversight of the emergency disclosure authority, the Department of Justice has not proactively made these reports available to the general public. The reports for 2006 and 2007 were leaked to me by a friend with contacts on the Hill. I obtained the 2008 and 2009 reports via FOIA requests -- and disgracefully, it took DOJ 11 months to provide me with a copy of the 2-page report for 2009.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;The emergency requests documented in these reports only scratch the surface&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://markey.house.gov/docs/telecomm/Verizon_wiretaping_response_101207.pdf&quot;&gt;A letter&lt;/a&gt; (pdf) submitted by Verizon to Congressional committees in 2007 revealed that the company had received 25,000 emergency requests during the previous year.  Of these 25,000 emergency requests, just 300 requests were from federal law enforcement agencies. In contrast, the reports submitted to Congress by the Attorney General reveal less than 20 disclosures for that year.  Even though no other service provider has disclosed similar numbers regarding emergency disclosures, it is quite clear that the Department of Justice statistics are not adequately reporting the scale of this form of surveillance. In fact, they underreport these disclosures by several orders of magnitude.&lt;br /&gt;&lt;br /&gt;The current reporting law is largely useless. It does not apply to state and local law enforcement agencies, who make tens of thousands of warrantless requests to ISPs each year. It does not apply to federal law enforcement agencies outside DOJ, such as the Secret Service. Finally, it does not apply to emergency disclosures of non-content information, such as geo-location data, subscriber information (such as name and address), or IP addresses used.&lt;br /&gt;&lt;br /&gt;As such, Congress currently has no idea how many warrantless requests are made to ISPs each year. How can it hope to make sane policy in this area, when it has no useful data?</description><link>http://paranoia.dubfire.net/2011/08/warrantless-emergency-surveillance-of.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><thr:total>9</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-4646468413682510782</guid><pubDate>Fri, 24 Jun 2011 09:45:00 +0000</pubDate><atom:updated>2011-06-24T05:51:20.797-04:00</atom:updated><title>Privacy preserving FOIA lawsuits</title><description>Several weeks ago, after an extremely successful &lt;a href=&quot;http://www.indiegogo.com/Help-Chris-sue-DOJ-to-turn-over-600-surveillance-docs&quot;&gt;online fundraising effort&lt;/a&gt; to cover the costs, I filed a FOIA complaint in Washington, DC Federal District Court.&lt;br /&gt;&lt;br /&gt;Before filing the complaint, I looked through the court website and paid particular attention to a document posted there, titled &lt;a href=&quot;http://www.dcd.uscourts.gov/dcd/sites/dcd/files/PaidCaseInstructions.pdf&quot;&gt;Information for Parties Who Wish to File a Civil Complaint&lt;/a&gt; (pdf), which states:&lt;br /&gt;&lt;blockquote&gt;The name of this Court must be written at the top of the first page [of the complaint]. The complete name and address for each plaintiff must be included in the caption of the complaint. A Post Office Box is insufficient as an address, unless you file a separate motion asking the Court to permit such an address.&lt;/blockquote&gt;Since moving to Washington DC, I&#39;ve tried to keep my residential address out of databases, primarily by using a PO Box for everything possible. As such, I wasn&#39;t too keen on my home address showing up in a public court docket. Following the guidance given by the court, I put my PO box address on my FOIA complaint and filed an accompanying Motion To Include PO Box Address on Complaint.&lt;br /&gt;&lt;br /&gt;Two weeks later, I called the court clerk to find out the status of the case, I was told that my motion had been rejected and that the my complaint and all the accompanying documents had been sent back to me.&lt;br /&gt;&lt;br /&gt;The clerk didn&#39;t actually tell me the reason why the motion had been rejected, and so as soon as I returned to DC, I &lt;A href=&quot;http://dockets.justia.com/docket/district-of-columbia/dcdce/1:2011cv01080/148626/&quot;&gt;refiled the complaint&lt;/a&gt; with my home address, which was promptly docketed by the clerk.&lt;br /&gt;&lt;br /&gt;Several days later, an envelope from the clerk arrived in the mail, which included a copy of the motion that I had filed. Written on it was a note by &lt;a href=&quot;http://en.wikipedia.org/wiki/Royce_C._Lamberth&quot;&gt;Judge Royce Lamberth&lt;/a&gt;, informing me that my motion was denied, but that the court would reconsider it if I provided my residence address to be filed under seal for the court and defendants.&lt;br /&gt;&lt;br /&gt;This news came too late for me -- my home address is now in the DC court docket (something I am still rather upset about), but perhaps this information will be useful to others.&lt;br /&gt;&lt;br /&gt;&lt;a title=&quot;View Motion for Po Box Denied on Scribd&quot; href=&quot;http://www.scribd.com/doc/58615812/Motion-for-Po-Box-Denied&quot; style=&quot;margin: 12px auto 6px auto; font-family: Helvetica,Arial,Sans-serif; font-style: normal; font-variant: normal; font-weight: normal; font-size: 14px; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none; display: block; text-decoration: underline;&quot;&gt;Motion for Po Box Denied&lt;/a&gt;&lt;iframe class=&quot;scribd_iframe_embed&quot; src=&quot;http://www.scribd.com/embeds/58615812/content?start_page=1&amp;view_mode=list&amp;access_key=key-zwf32z446dqf9qvxm9d&quot; data-auto-height=&quot;true&quot; data-aspect-ratio=&quot;0.771752837326608&quot; scrolling=&quot;no&quot; id=&quot;doc_39295&quot; width=&quot;100%&quot; height=&quot;600&quot; frameborder=&quot;0&quot;&gt;&lt;/iframe&gt;&lt;script type=&quot;text/javascript&quot;&gt;(function() { var scribd = document.createElement(&quot;script&quot;); scribd.type = &quot;text/javascript&quot;; scribd.async = true; scribd.src = &quot;http://www.scribd.com/javascripts/embed_code/inject.js&quot;; var s = document.getElementsByTagName(&quot;script&quot;)[0]; s.parentNode.insertBefore(scribd, s); })();&lt;/script&gt;</description><link>http://paranoia.dubfire.net/2011/06/privacy-preserving-foia-lawsuits.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-5960375053990270090</guid><pubDate>Wed, 25 May 2011 03:23:00 +0000</pubDate><atom:updated>2011-05-24T23:37:00.420-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">patriot act</category><category domain="http://www.blogger.com/atom/ns#">section 215</category><title>Senators hint at DOJ&#39;s secret reinterpretation and use of Section 215 of the Patriot Act</title><description>&lt;b&gt;Summary&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;According to two Democratic Senators, the Department of Justice has secretly reinterpreted a controversial provision contained in the USA Patriot Act to give the government surveillance powers that are &quot;inconsistent with the public’s understanding of these laws.&quot; The senators also accuse DOJ of misleading the American public when describing the use of this legal authority.&lt;br /&gt;&lt;br /&gt;This disclosure builds on previous cryptic statements from DOJ officials  regarding the use of &quot;Section 215&quot; powers for &quot;sensitive collection program,&quot; and Senator Russ Feingold regarding repeated abuses of Section 215 that he was not permitted to publicly describe.&lt;br /&gt;&lt;br /&gt;Although FBI Director Robert Mueller &lt;a href=&quot;http://emptywheel.firedoglake.com/2011/02/17/confirmed-our-government-has-criminalized-beauty-products/&quot;&gt;revealed earlier this year&lt;/a&gt; that the FBI has used Section 215 powers to monitor the sale of hydrogen peroxide, such data collection is unlikely to be the &quot;sensitive collection program&quot; about which several senators have tried to alert the public.&lt;br /&gt;&lt;br /&gt;If I had to make a wild guess, I suspect it is likely related to warrantless, massive scale collection of geo-location information from cellular phones.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Secret reinterpretations of the law&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Marcy Wheeler &lt;a href=&quot;http://emptywheel.firedoglake.com/2011/05/24/wyden-and-udall-want-obama-to-admit-to-secret-collection-program/&quot;&gt;reported this evening&lt;/a&gt; that Senators Wyden and Udall, both of whom are on the Intelligence committee have submitted an &lt;a href=&quot;http://static1.firedoglake.com/28/files/2011/05/Wyden-Udall-Amendment.pdf&quot;&gt;amendment&lt;/a&gt; (pdf) as part of the rushed, bipartisan effort to reauthorize Patriot Act. The amendment is noteworthy not because of the changes to the law it proposes, but the information it reveals:&lt;blockquote&gt;&lt;br /&gt;(6) United States Government officials should not secretly reinterpret public laws and statutes in a manner that is inconsistent with the public’s understanding of these laws, and should not describe the execution of these laws in a way that misinforms or misleads the public;&lt;br /&gt;&lt;br /&gt;(7) On February 2, 2011, the congressional intelligence committees received a secret report from the Attorney General and the Director of National Intelligence that has been publicly described as pertaining to intelligence collection authorities that are subject to expiration under section 224 of the USA PATRIOT Act (Public Law 107–56; 115 Stat. 295); and&lt;br /&gt;&lt;br /&gt;(8) while it is entirely appropriate for particular intelligence collection techniques to be kept secret, the laws that authorize such techniques, and the United States Government’s official interpretation of these laws, should not be kept secret but should instead be transparent to the public, so that these laws can be the subject of informed public debate and consideration.&lt;/blockquote&gt;&lt;br /&gt;For those of you who don&#39;t read legalese, this means that the Department of Justice has secretly reinterpreted a controversial provision in the Patriot Act, likely Section 215, and is using it in a way that is inconsistent with the public&#39;s understanding of the law.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;DOJ has already admitted that Section 215 is being used for a &quot;sensitive collection program&quot;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;On September 22, 2009, Todd Hinnen, then the Deputy Assistant Attorney General for law and policy in DOJ’s National Security Division testified before the House Judiciary Subcommittee on the Constitution, Civil Rights, and Civil Liberties in support of the reauthorization of key provisions of the USA PATRIOT Act.&lt;br /&gt;&lt;br /&gt;During his oral testimony, Mr. Hinnen stated that:&lt;br /&gt;&lt;blockquote&gt;&quot;The business records provision [Section 215] allows the government to obtain any tangible thing it demonstrates to the FISA court is relevant to a counterterrorism or counterintelligence investigation.&lt;br /&gt;&lt;br /&gt;This provision is used to obtain critical information from the businesses unwittingly used by terrorists in their travel, plotting, preparation for, communication regarding, and execution of attacks.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;It also supports an important, sensitive collection program&lt;/b&gt; about which many members of the subcommittee or their staffs have been briefed.&quot;&lt;/blockquote&gt;&lt;br /&gt;&lt;b&gt;Section 215 has been repeatedly abused&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;On October 1, 2009, Senator Feingold made several statements regarding abuses of Section 215 during a Senate Judiciary Committee markup hearing:&lt;blockquote&gt;&lt;br /&gt;&quot;I remain concerned that critical information about the implementation of the Patriot Act remains classified. Information that I believe, would have a significant impact on the debate..... &lt;span style=&quot;font-weight: bold;&quot;&gt;There is also information about the use of Section 215 orders that I believe Congress and the American People deserve to know&lt;/span&gt;. It is unfortunate that we cannot discuss this information today.&lt;br /&gt;&lt;br /&gt;…&lt;br /&gt;&lt;br /&gt;Mr Chairman, I am also a member of the intelligence Committee. I recall during the debate in 2005 that proponents of Section 215 argued that these authorities had never been misused. &lt;span style=&quot;font-weight: bold;&quot;&gt;They cannot make that statement now. They have been misused&lt;/span&gt;. I cannot elaborate here. But I recommend that my colleagues seek more information in a classified setting.&lt;br /&gt;&lt;br /&gt;…&lt;br /&gt;&lt;br /&gt;I want to specifically disagree with Senator Kyle&#39;s statement that just the fact that there haven&#39;t been abuses of the other provisions which are Sunsetted. That is not my view of Section 215. &lt;span style=&quot;font-weight: bold;&quot;&gt;I believe section 215 has been misused as well&lt;/span&gt;.&quot;&lt;/blockquote&gt;&lt;br /&gt;Likewise, after the Senate rejected several reforms of Section 215 powers in 2009, Senator Durbin told his colleagues that:&lt;br /&gt;&lt;blockquote&gt;&quot;[T]he real reason for resisting this obvious, common-sense modification of Section 215 is unfortunately cloaked in secrecy. Some day that cloak will be lifted, and future generations will whether ask our actions today meet the test of a democratic society: transparency, accountability, and fidelity to the rule of law and our Constitution.&quot;&lt;/blockquote&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;Clearly, there are many unanswered questions - we do not know what kind of data collection is occurring, and why it is problematic enough to cause four senators to speak up publicly. However, given that four senators have now spoken up, this strongly suggests that there is something seriously rotten going on.</description><link>http://paranoia.dubfire.net/2011/05/senators-hint-at-dojs-secret.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-16750015.post-5285395854948544215</guid><pubDate>Tue, 03 May 2011 15:55:00 +0000</pubDate><atom:updated>2011-05-04T08:55:17.575-04:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">do not track</category><title>Industry-created &quot;privacy enhancing&quot; abandonware</title><description>Industry loves self regulation and why shouldn&#39;t it? Given the choice between strong enforcement by a federal agency, and scout&#39;s honor promises, industry would be foolish to support a strong FTC.&lt;br /&gt;&lt;br /&gt;Unfortunately, the self-regulatory groups and organizations that are created in response to the threat of regulation are often extremely short lived. &lt;br /&gt;&lt;br /&gt;Pam Dixon noted this in her &lt;a href=&quot;http://www.ftc.gov/os/comments/privacyreportframework/00369-57987.pdf&quot;&gt;her comment&lt;/a&gt; (pdf) submitted in response to the FTC&#39;s recent privacy report:&lt;blockquote&gt;[I]ndustry knows that the Commission’s attention span is limited.  When the Commission showed interest in online privacy in the years before 2000, industry responded by developing and loudly trumpeting a host of privacy self-regulatory activities.  Most of these activities were strictly for the purpose of convincing policy makers at the Commission and elsewhere that regulation or legislation was a bad idea.  All of these activities actually or effectively disappeared  as soon as new appointees to the Commission demonstrated a lack of interest in regulatory or legislative approaches to privacy.&lt;br /&gt;&lt;br /&gt;[These include:]&lt;br /&gt;&lt;br /&gt;The &lt;b&gt;Individual Reference Services Group&lt;/b&gt; (IRSG) was announced in 1997 as a self-regulatory organization for companies that provide information that identifies or locates individuals.  The group terminated in 2001.&lt;br /&gt;&lt;br /&gt;The &lt;b&gt;Privacy Leadership Initiative&lt;/b&gt; began in 2000 to promote self regulation and to support privacy educational activities for business and for consumers.  The  organization lasted about two years.&lt;br /&gt;&lt;br /&gt;The &lt;b&gt;Online Privacy Alliance&lt;/b&gt; began in 1998 with an interest in promoting industry self regulation for privacy.  OPA’s last reported activity appears to have taken place in 2001, although its website continues to exist and shows signs of an  update in 2011.&lt;br /&gt;&lt;br /&gt;The &lt;b&gt;Network Advertising Initiative&lt;/b&gt; had its origins in 1999, when the Federal Trade Commission showed interest in the privacy effects of online behavioral targeting.  By 2003, when FTC interest in privacy regulation had evaporated, the NAI had only two members.  Enforcement and audit activity lapsed as well.  NAI did nothing to fulfill its promises or keep its standards up to date with current technology until 2008, when FTC interest increased&lt;/blockquote&gt;&lt;br /&gt;&lt;b&gt;Industry created privacy enhancing software is made for regulators, not consumers&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;A few weeks ago, Ryan Singel at Wired &lt;a href=&quot;http://www.wired.com/epicenter/2011/04/chrome-do-not-track/2/&quot;&gt;wrote about&lt;/a&gt; Google&#39;s curious lack of support for Do Not Track (DNT). Rather than embracing the DNT header supported by the three other major browser vendors, Google is instead pushing the 3rd party browser plugins it has released that make it possible for consumers to retain their opt out cookies.&lt;br /&gt;&lt;br /&gt;As I told Ryan then:&lt;blockquote&gt;&quot;[Google&#39;s] opt-out cookies and their plug-in are not aimed at consumers,&quot; Soghoian says. &quot;They are aimed at policy makers. Their purpose is to give them something to talk about when they get called in front of Congress. No one is using this plug-in and they don’t expect anyone to use it.&quot;&lt;/blockquote&gt;Soon after this piece was published, I received a bit of pushback from several friends in Washington, who felt I was unfairly slamming the company.&lt;br /&gt;&lt;br /&gt;However, when you actually examine the history of the industry&#39;s privacy enhancing technologies, they seem awfully similar to the short-lived self regulatory organizations that Pam Dixon highlighted.&lt;br /&gt;&lt;br /&gt;&lt;B&gt;Privacy enhancing abandonware&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;On March 11, 2009, Google &lt;a href=&quot;http://searchengineland.com/google-introduces-interest-based-advertising-beta-16855&quot;&gt;entered the behavioral advertising&lt;/a&gt; market. On the same day, Google released its &lt;a href=&quot;http://www.google.com/ads/preferences/plugin/&quot;&gt;Advertising Cookie Opt-out Plugin&lt;/a&gt; for Firefox and Internet Explorer. The browser plugin permanently saves the DoubleClick opt-out cookie, enabling users to retain their opt-out status even after clearing all cookies.&lt;br /&gt;&lt;br /&gt;Google&#39;s tool was a genuine innovation in privacy enhancing technologies. Furthermore, as the tool was released under an open source license, I was able to take the source code, expand it, and turn it into &lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/targeted-advertising-cookie-op/&quot;&gt;TACO&lt;/a&gt;, which opted consumers out of dozens of different ad networks.&lt;br /&gt;&lt;br /&gt;The &lt;a href=&quot;https://code.google.com/p/google-opt-out-plugin/source/detail?r=5&quot;&gt;initial release&lt;/a&gt; of Google&#39;s plugin worked with Firefox 1.5 through 3.0.&lt;br /&gt;&lt;br /&gt;In June 2009, &lt;a href=&quot;https://www.mozilla.com/en-US/firefox/3.5/releasenotes/&quot;&gt;Mozilla released&lt;/a&gt; Firefox 3.5. It took Google nearly two weeks to &lt;a href=&quot;https://code.google.com/p/google-opt-out-plugin/source/detail?r=6&quot;&gt;release&lt;/a&gt; an update to its plugin that was compatible with the new version of the browser.&lt;br /&gt;&lt;br /&gt;One year later, Mozilla released Firefox 3.6 in January 2010. This time, it took more than a month for Google &lt;a href=&quot;https://code.google.com/p/google-opt-out-plugin/issues/detail?id=4#c5&quot;&gt;to release&lt;/a&gt; an updated version of the add-on.&lt;br /&gt;&lt;br /&gt;Most recently, on March 22, 2011, Mozilla released Firefox 4.0. More than 5 weeks later, Google still has not released an updated version of its opt out add-on.&lt;br /&gt;&lt;br /&gt;Google can perhaps be forgiven for ignoring the users of its Firefox privacy add-on -- the company&#39;s attention seems to have shifted to its new plugin: &lt;a href=&quot;https://chrome.google.com/webstore/detail/hhnjdplhmcnkiecampfdgfjilccfpfoe&quot;&gt;Keep My Opt Outs&lt;/a&gt;, which only supports the company&#39;s Chrome Browser (the tool was &lt;strike&gt;quickly rushed out&lt;/strike&gt; &lt;a href=&quot;http://blogs.wsj.com/digits/2011/01/24/google-announces-new-privacy-tool-for-chrome/&quot;&gt;announced&lt;/a&gt; on the same day that &lt;a href=&quot;http://online.wsj.com/article/SB10001424052748704213404576100441609997236.html&quot;&gt;Mozilla announced&lt;/a&gt; its support for Do Not Track).&lt;br /&gt;&lt;br /&gt;Similarly, in November 2009, the Network Advertising Initiative (an organization representing many of the major ad networks) &lt;a href=&quot;http://www.clickz.com/clickz/news/1699318/new-nai-opt-out-tool-protects-against-cookie-deletion&quot;&gt;released&lt;/a&gt; its own Firefox plugin that makes opt out cookies permanent. NAI Executive Director Charles Curran &lt;a href=&quot;http://www.clickz.com/clickz/news/1699318/new-nai-opt-out-tool-protects-against-cookie-deletion&quot;&gt;told&lt;/a&gt; one journalist that &quot;this [tool] has been a recognition of criticism of opt-outs that are recorded in cookies. It&#39;s essentially designed to prevent the standard sweep of cookies that you get from a cookie cache dump...It&#39;s designed to work with the browser functionality.&quot; &lt;br /&gt;&lt;br /&gt;As with Google&#39;s plugin, although it has been more than 5 weeks since the the release of Firefox 4.0, the NAI plugin still has &lt;a href=&quot;http://code.google.com/p/ahi/source/list&quot;&gt;not been updated&lt;/a&gt; to support it. &lt;br /&gt;&lt;br /&gt;&lt;b&gt;Why updates are important&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;When a user upgrades to a new version of Firefox, the browser will check for available updates to all installed browser plugins. Any plugins that have not been updated to support the new browser release &lt;b&gt;will be disabled&lt;/b&gt;. This is obviously a pretty big problem, which is why Mozilla actively encourages developers to make sure that their addons support upcoming versions of the browser. For the 4.0 version of Firefox, which was released in March, Mozilla &lt;a href=&quot;https://blog.mozilla.com/addons/2010/11/11/making-add-on-compatible-firefox-4/&quot;&gt;started harassing&lt;/a&gt; add-on developers as far back as November, 2010.&lt;br /&gt;&lt;br /&gt;As such, there are likely tens of thousands (if not more) users of Firefox 4.0 whose Advertising Cookie Opt-out Plugin is currently disabled due to incompatibility. The moment these users clear their cookies (something some many have configured to happen automatically when they restart their browser), they will lose their doubleclick.net behavioral advertising opt out cookie. Likewise, the thousands of Firefox 4.0 users who had previously installed the NAI opt out plugin have now lost the opt out cookie persistence that they were promised.&lt;br /&gt;&lt;br /&gt;These firms have created privacy enhancing technologies and then loudly advertised them to consumers and regulators. Unfortunately, now that the attention of regulators has shifted to Do Not Track, both Google and the NAI appear to have abandoned the users of their respective plugins. Neither firm has provided their users with sufficient notice to let them know the impact, or let them know what other options they have to continue to maintain their opt out choices.&lt;br /&gt;&lt;br /&gt;Perhaps the FTC will take notice?</description><link>http://paranoia.dubfire.net/2011/05/industry-created-privacy-enhancing.html</link><author>noreply@blogger.com (Christopher Soghoian)</author><thr:total>3</thr:total></item></channel></rss>