Home » Posts tagged 'fbi' (Page 7)

Tag Archives: fbi

Olduvai
Click on image to purchase

Olduvai III: Catacylsm
Click on image to purchase

Post categories

Post Archives by Category

The Human Rights Risks of Encryption ‘Back Doors’

The Human Rights Risks of Encryption ‘Back Doors’ 

a katz / Shutterstock

One fact that has received little attention in the current encryption debate is that many categories of individuals rely on strong encryption for their own security. These include sexual and gender-based rights activists, domestic violence victims, journalists and their sources, and human rights defenders. Strong encryption is necessary to protect fundamental human rights; as one technologist puts it, encryption saves lives.

Encryption, a process of scrambling communications to make them private, is frequently discussed simply as a privacy issue. But the same process that keeps banks’ communications secure is also, for many, a safeguard of many human rights including the right to life. For those who rely on secure communications in sensitive situations, the issue goes far beyond privacy.

Experts agree that “secure back doors”—which would give law enforcement secret access to digital storage or communications—are scientifically impossible. That explains the uproar over a federal magistrate judge’s recent decision ordering Apple to create a backdoor to an iPhone. On Feb. 25, Apple moved to vacate that decision and warned that the FBI is seeking a “dangerous power” in the case.

Back doors are wholly unnecessary for security. Law enforcement agencies already use hacking tools to track electronic communications and circumvent encryption. Information-sharing programs reportedly exist with intelligence agencies, which use keyloggers to record encrypted messages before they are sent. National Security Agency (NSA) supercomputers can even number-crunch to break some encoded messages. And encryption does not shield the “to” and “from” lines of messages—also known as metadata. The problem is not a lack of tools, but intelligence failures in analyzing existing information—perhaps one reason former NSA head Michael Hayden rejects the FBI’s position on back doors.

…click on the above link to read the rest of the article…

Obama to Expand Surveillance State Powers by Signing a 21 Page Memo

Obama to Expand Surveillance State Powers by Signing a 21 Page Memo

As the Apple vs. FBI battle rages in the court system and throughout the halls of Congress, Obama decides to do what he does best. Using “his pen” to make consequential decisions unilaterally.

Just another day in the American banana republic.

The New York Times reports:

WASHINGTON — The Obama administration is on the verge of permitting the National Security Agency to share more of the private communications it intercepts with other American intelligence agencies without first applying any privacy protections to them, according to officials familiar with the deliberations.

The change would relax longstanding restrictions on access to the contents of the phone calls and email the security agency vacuums up around the world, including bulk collection of satellite transmissions, communications between foreigners as they cross network switches in the United States, and messages acquired overseas or provided by allies.

The idea is to let more experts across American intelligence gain direct access to unprocessed information, increasing the chances that they will recognize any possible nuggets of value. That also means more officials will be looking at private messages — not only foreigners’ phone calls and emails that have not yet had irrelevant personal information screened out, but also communications to, from, or about Americans that the N.S.A.’s foreign intelligence programs swept in incidentally.

Robert S. Litt, the general counsel in the office of the Director of National Intelligence, said that the administration had developed and was fine-tuning what is now a 21-page draft set of procedures to permit the sharing.

Until now, National Security Agency analysts have filtered the surveillance information for the rest of the government. They search and evaluate the information and pass only the portions of phone calls or email that they decide is pertinent on to colleagues at the Central Intelligence Agency, the Federal Bureau of Investigation and other agencies. 

…click on the above link to read the rest of the article…

FBI vs. Apple Establishes a New Phase of the Crypto Wars

For over two decades, the battle between privacy-minded technologists and the U.S. government has primarily been over encryption. In the 1990s, in what became known as the Crypto Wars, the U.S. tried to limit powerful encryption — calling it as dangerous to export as sophisticated munitions — and eventually lost.

After the 2013 Snowden revelations, as mainstream technology companies started spreading encryption by putting it in popular consumer products, the wars erupted again. Law enforcement officials, led by FBI Director James Comey, loudly insisted that U.S. companies should build backdoors to break the encryption just for them.

That won’t happen because what these law enforcement officials are asking for isn’t possible (any backdoor can be used by hackers, too) and wouldn’t be effective (because encryption is widely available globally now). They’ve succeeded in slowing the spread of unbreakable encryption by intimidating tech companies that might otherwise be rolling it out faster, but not much else.

Indeed, as almost everyone else acknowledges, unbreakable encryption is here to stay.

Tech privacy advocates continue to remain vigilant about encryption, actively pointing out the inadequacies and impossibilities of the anti-encryption movement, and jumping on any sign of backsliding.

But even as they have stayed focused on defending encryption, the government has been shifting its focus to something else.

The ongoing, very public dispute between Apple and the FBI, in fact, marks a key inflection point — at least as far as the public’s understanding of the issue.

You might say we’re entering the Post-Crypto phase of the Crypto Wars.

Think about it: The more we learn about the FBI’s demand that Apple help it hack into a password-protected iPhone, the more it looks like part of a concerted, long-term effort by the government to find new ways around unbreakable encryption — rather than try to break it.

…click on the above link to read the rest of the article…

We Just Found out the Real Reason the FBI Wants a Backdoor into the iPhone

On its face, the case boils down to a single locked and encrypted iPhone 5S, used by radical jihadist Syed Rizwan Farook before he and his wide Tashfeen Malik killed 14 people in San Bernardino on December 2nd. The DOJ wants Apple to build a backdoor into the device so that it can bypass the company’s state of the art encryption apparatus and access information and evidence related to the case.

At least, that’s the premise presented to the public. As we are learning, the FBI and the federal government have a far more comprehensive end-game in mind than merely bolstering the prosecution of this one case.

Whistleblower Edward Snowden tweeted last week that “crucial details [of the case] are being obscured by officials.” Specifically, he made the following trenchant points:


Journalists: Crucial details in the @FBI v.  case are being obscured by officials. Skepticism here is fair:

Upgrade Your iPhone Passcode to Defeat the FBI’s Backdoor Strategy

YESTERDAY, APPLE CEO TIM COOK published an open letter opposing a court order to build the FBI a “backdoor” for the iPhone.

Cook wrote that the backdoor, which removes limitations on how often an attacker can incorrectly guess an iPhone passcode, would set a dangerous precedent and “would have the potential to unlock any iPhone in someone’s physical possession,” even though in this instance, the FBI is seeking to unlock a single iPhone belonging to one of the killers in a 14-victim mass shooting spree in San Bernardino, California, in December.

It’s true that ordering Apple to develop the backdoor will fundamentally undermine iPhone security, as Cook and other digital security advocates have argued. But it’s possible for individual iPhone users to protect themselves from government snooping by setting strong passcodes on their phones — passcodes the FBI would not be able to unlock even if it gets its iPhone backdoor.

The technical details of how the iPhone encrypts data, and how the FBI might circumvent this protection, are complex and convoluted, and are being thoroughly explored elsewhere on the internet. What I’m going to focus on here is how ordinary iPhone users can protect themselves.

The short version: If you’re worried about governments trying to access your phone, set your iPhone up with a random, 11-digit numeric passcode. What follows is an explanation of why that will protect you and how to actually do it.

If it sounds outlandish to worry about government agents trying to crack into your phone, consider that when you travel internationally, agents at the airport or other border crossings can seize, search, and temporarily retain your digital devices — even without any grounds for suspicion. And while a local police officer can’t search your iPhone without a warrant, cops have used their own digital devices to get search warrants within 15 minutes, as a Supreme Court opinion recently noted.

…click on the above link to read the rest of the article…

Is It All Just A Publicity Stunt? Apple Unlocked iPhones For The Feds 70 Times Before

Is It All Just A Publicity Stunt? Apple Unlocked iPhones For The Feds 70 Times Before

The event that has gripped the tech and libertarian community over the past 48 hours has been Tim Cook’s stern refusal to comply with a subpoena demanding that Apple unlock the iPhone 5C belonging to one of the San Bernardino shooters for a full FBI inspection.

As reported previously, Judge Sheri Pym of U.S. District Court in Los Angeles said on Tuesday that Apple must provide “reasonable technical assistance” to investigators seeking to unlock data on – in other words hack – an iPhone 5C that had been owned by Syed Rizwan Farook, one of the San Bernardino shooters.

So far Tim Cook has refused to comply, saying said his company opposed the demand from the judge to help the FBI break into the iPhone. Cook said that the demand threatened the security of Apple’s customers and had “implications far beyond the legal case at hand.”

He added that “the government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals,” he said.   “We can find no precedent for an American company being forced to expose its customers to a greater risk of attack.”

Cook’s summary:

“The implications of the government’s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data. The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.”

…click on the above link to read the rest of the article…

Almost 12 Years After Calling a Reporter, DOJ Whistleblower Slapped With Ethics Charges

The D.C. Office of Disciplinary Counsel — the legal body responsible for overseeing the D.C. Bar’s professional rules — has filed ethics charges against Thomas Tamm, the former Justice Department lawyer who contacted the New York Times about President Bush’s warrantless wiretapping program in 2004.

The office’s charging papers, which were released Tuesday and first reported by the National Law Journal, cite two counts of professional misconduct. In addition to charging him with referring his client’s secrets to a newspaper, they also allege that Tamm “failed to refer information in his possession that persons within the Department of Justice were violating their legal obligations.”

According to a 2008 interview with Newsweek, Tamm did ask his supervisors about “the program” (as it was referred to by the administration). He was told that it was “probably illegal,” and that he should drop the subject. He even reached out to the staff of the Senate Judiciary Committee, who refused to discuss the program with him on the basis of its secrecy.

The D.C. Office of Disciplinary Counsel declined to comment.

In 2001, Tamm joined the Department of Justice’s Office of Intelligence Policy and Review, the agency responsible for filing individualized warrant requests before the Foreign Intelligence Surveillance Court. He soon discovered that one category of cases was treated differently: under “the program,” only the attorney general could sign the warrant applications, and only one FISA Court judge was allowed to review them. Tamm inferred that the evidence gathered to prepare the warrants must have been obtained illegally. In the spring of 2004, he walked to a nearby payphone to call New York Times journalist Eric Lichtblau. The Times would go on to win a 2006 Pulitzer Prize for its reporting on the NSA’s warrantless wiretapping program.

…click on the above link to read the rest of the article…

Government Agencies are Stockpiling Body Armor, Tactical Gear, Ammo

Government Agencies are Stockpiling Body Armor, Tactical Gear, Ammo

In recent years under President Obama, federal agencies have been stockpiling alarmingly huge amounts of military hardware, body armor, and riot gear. As concerns continue to mount over an increasingly bloated and powerful federal government, agencies whose primary function is administrative — such as the EPA, FDA, and IRS — have been progressively militarized. Since 2006, 44 federal agencies have spent an astounding $71 million on items such as guns, ammunition, body armor, and riot and tactical gear.

And citizens as well as watchdog agencies are taking due note of these alarming developments.

In a recent audit of the federal government by the nonprofit organization Open the Books, government waste and bloat takes a backseat to the issue of increasingly armed government agencies. Since 2006, nearly $330 million was spent on the same type of equipment by traditional law enforcement agencies such as the FBI, DEA, and Secret Service.

The massive expenditures by agencies which are supposed to be administrative by nature have many people asking why, for instance, the Department of Veterans Affairs would need riot helmets, body armor, Kevlar blankets, and tactical gear. Or why the FDA needs ballistic vests.

As concerned Americans study the numbers in the watchdog audit, many are asking why the Environmental Protection Agency (EPA) spent $200,000 on body armor during the Obama administration, or for what reason the Zoo Police at the Smithsonian Institution spent $28,000 for body armor during the fiscal year 2012.

Children and adults alike are taught to view police as the “good guys.” However, America’s local police force is increasingly being militarized. Simultaneously media outlets, congressmen, and President Obama are pressing the call for American citizens to be further disarmed and weakened through the systematic dismantling of the Second Amendment.

…click on the above link to read the rest of the article…

The Proof Is In: The US Government Is The Most Complete Criminal Organization In Human History

The Proof Is In: The US Government Is The Most Complete Criminal Organization In Human History

Consider a few examples. Washington first forced the Swiss government to violate its own banking laws. Then Washington forced Switzerland to repeal its bank secrecy laws. Allegedly, Switzerland is a democracy, but the country’s laws are determined in Washington by people not elected by the Swiss to represent them.

Consider the “soccer scandal” that Washington concocted, apparently for the purpose of embarrassing Russia. The soccer organization’s home is Switzerland, but this did not stop Washington from sending FBI agents into Switzerland to arrest Swiss citizens. Try to imagine Switzerland sending Swiss federal agents into the US to arrest Americans.

Consider the $9 billion fine that Washington imposed on a French bank for failure to fully comply with Washington’s sanctions against Iran. This assertion of Washington’s control over a foreign financial institution is even more audaciously illegal in view of the fact that the sanctions Washington imposed on Iran and requires other sovereign countries to obey are themselves strictly illegal. Indeed, in this case we have a case of triple illegality as the sanctions were imposed on the basis of concocted and fabricated charges that were lies.

…click on the above link to read the rest of the article…

The Rule Of Law No Longer Exists In Western Civilization

The Rule Of Law No Longer Exists In Western Civilization

My work documenting how the law was lost began about a quarter of a century ago. A close friend and distinguished attorney, Dean Booth, first brought to my attention the erosion of the legal principles on which rests the rule of law in the United States. My columns on the subject got the attention of an educational institution that invited me to give a lecture on the subject. Subsequently, I was invited to give a lecture on “How The Law Was Lost” at the Benjamin Cardozo School of Law in New York City.

The work coalesced into a book, The Tyranny Of Good Intentions, coauthored with my research associate, Lawrence M. Stratton, published in 2000, with an expanded edition published in 2008. We were able to demonstrate that Sir Thomas More’s warning about prosecutors and courts disregarding law in order to more easily convict undesirables and criminals has had the result of turning law away from being a shield of the people and making it into a weapon in the hands of government. That is what we witness in the saga of the Hammonds, long-time ranchers in the Harney Basin of Oregon.

With the intervention of Ammon Bundy, another rancher who suffered illegal persecution by the Bureau of Land Management but stood them off with help from armed militia, and his supporters, the BLM’s decades long persecution of the innocent Hammonds might have come to a crisis before you read this.

Bundy and militiamen, whose count varies from 15 to 150 in the presstitute media, have seized an Oregon office of the BLM as American liberty’s protest against the frame-up of the Hammonds on false charges. As I write the Oregon National Guard and FBI are on the way.

…click on the above link to read the rest of the article…

11 Years Later, We Finally Know What’s in a National Security Letter (It’s Bad)

11 Years Later, We Finally Know What’s in a National Security Letter (It’s Bad)

Back in 2004, Nicholas Merrill, who was then president of Calyx Internet Access, received a National Security Letter (NSL) from the FBI. These letters are notoriously authoritarian in that they come with a gag order that prevents the receiving party from even informing its customers it has received one.

Fortunately for us all, Nicholas Merrill refused to comply, and decided to fight the gag order in court. Eleven years later, his efforts have paid off, and we finally know just how awful these NSLs really are.

From ArsTechnica:

The National Security Letter (NSL) is a potent surveillance tool that allows the government to acquire a wide swath of private information—all without a warrant. Federal investigators issue tens of thousands of them each year to banks, ISPs, car dealers, insurance companies, doctors, and you name it. The letters don’t need a judge’s signature and come with a gag to the recipient, forbidding the disclosure of the NSL to the public or the target.

This is not what a free nation with appropriate due process looks like.

For the first time, as part of a First Amendment lawsuit, a federal judge ordered the release of what the FBI was seeking from a small ISP as part of an NSL. Among other things, the FBI was demanding a target’s complete Web browsing history, IP addresses of everyone a person has corresponded with, and records of all online purchases, according to a court document unveiled Monday. All that’s required is an agent’s signature denoting that the information is relevant to an investigation.

The FBI subsequently dropped demands for the information on one of Merrill’s customers, but he fought the gag order in what turned out to be an 11-year legal odyssey just to expose what the FBI was seeking. He declined to reveal the FBI’s target.

…click on the above link to read the rest of the article…

Obama’s Double-Standard on Leaks

Obama’s Double-Standard on Leaks


There he goes again. In recently proclaiming Hillary Clinton free of any national security breach — even as the FBI was continuing its investigation of her use of a potentially risky private email server for official business while she was Secretary of State — President Barack Obama continued his disturbing pattern of rendering his personal verdict ahead of legal proceedings in high-profile cases involving classified government information.

From Private Chelsea Manning to General David Petraeus to Edward Snowden and now to Hillary Clinton, the President has sounded off with his opinions on guilt or innocence — and on any alleged damage to national security — in advance of either a trial, or an indictment, or completion of an investigation.

Gen. David Petraeus in a photo with his biographer/mistress Paula Broadwell. (U.S. government photo)

Short version: whistleblowers Manning and Snowden clearly guilty; former high government officials Petraeus and Clinton — no problem.

In April 2011 — two years before court martial proceedings began and almost two years before Manning acknowledged being a source for hundreds of thousands of classified documents released by Wikileaks — Obama proclaimed Manning guilty. The materials Manning provided to Wikileaks exposed diplomatic secrets and U.S. military abuses in Iraq and Afghanistan, including showing greater numbers of civilian casualties than admitted publicly by U.S. officials.

Among the most shocking was the classified “collateral murder video” that showed U.S. military personnel in an Apache helicopter in a Baghdad suburb indiscriminately firing on and killing more than a dozen people — including rescuers and two Reuters employees — and wounding others, including two children.

…click on the above link to read the rest of the article…

The Unhackable iPhone Has Been Compromised: ‘Intelligence Agencies Can Intercept Calls, Messages, and Access Data’

The Unhackable iPhone Has Been Compromised: ‘Intelligence Agencies Can Intercept Calls, Messages, and Access Data’

unhackable-iphone

Iphone maker Apple, Inc. claimed last month that their latest iteration of the wildly popular handheld device was unhackable. According to HackRead, the company is so convinced of its security successes that they issued a statement saying that data stored on a phone secured with a front screen passcode was impossible to access – even by highly talented intelligence agencies:

The CIA and the FBI are always looking for backdoors in Apple devices, in fact, the agency spent years trying to hack iPhone and iPads according to documents released by NSA’s Edward Snowden.

Now, with the new upgraded operating systems, Apple has termed it “impossible” to access any data from Apple devices. Though, the company can still access data from older phones.

According to the Apple’s response to the court, 90 percent of the devices has ios 8 installed and with the type of encryption already there in the phone, it’s nearly impossible to access the data without the passcode, which is only known to the original owner. Even Apple itself cannot find the code.

But as we already know from recent hacks of Department of Defense computers, essential domestic grid infrastructure computers, and even NASA’s in-orbit spacecraft, in the digital age nothing is ever really secure.

Within hours of Apple releasing their latest iOS 9 update a cyber security firm known as Zerodium issued a challenge to the hacker community and offered up a $1 million bounty for any team that could bypass Apple’s latest security features. For weeks it appeared that Apple was right. Scores of hackers around the world burned the midnight oil trying to hack the iphone before Zerodium’s bounty expired.

But just few hours before the challenge came to end, one team submitted their exploits and vulnerabilities and Zerodium has confirmed that the Apple’s iOS 9 has been compromised.

…click on the above link to read the rest of the article…

Why Saudi Ties to 9/11 Mean U.S. Ties to 9/11

Bandar

Why Saudi Ties to 9/11 Mean U.S. Ties to 9/11

Media interest in Saudi Arabian connections to the crimes of 9/11 has centered on calls for the release of the 28 missing pages from the Joint Congressional Inquiry’s report. However, those calls focus on the question of hijacker financing and omit the most interesting links between the 9/11 attacks and Saudi Arabia—links that implicate powerful people in the United States. Here are twenty examples.

  1. When two of the alleged 9/11 hijackers, Khalid Al-Mihdhar and Nawaf Al-Hazmi, came to the U.S. in January 2000, they immediately met with Omar Al-Bayoumi, a suspected Saudi spy and an employee of a Saudi aviation company. Al-Bayoumi, who was the target of FBI investigations in the two years before 9/11, became a good friend to the two 9/11 suspects, setting them up in an apartment and paying their rent.
  2. Al-Mihdhar and Al-Hazmi then moved in with a long-time FBI asset, Abdussattar Shaikh, who was said to be a teacher of the Saudi language. Shaikh allowed them to live in his home for at least seven months, later saying that he thought they were only Saudi students. In an unlikely coincidence, both Al-Bayoumi and Shaikh also knew Hani Hanjour, the alleged pilot of Flight 77. Although Shaikh was reported to be a retired professor at San Diego State University, the university had no records of him. He was then said to be a professor at American Commonwealth University but that turned out to be a phony institution. During the 9/11 investigations, the FBI refused to allow Shaikh to be interviewed or deposed. The FBI also tried to prevent the testimony of Shaikh’s FBI handler, which occurred only secretly at a later date. Despite having a very suspicious background, the FBI gave Shaikh $100,000 and closed his contract.
  3. Journalist Joseph Trento claimed that an unnamed former CIA officer, who worked in Saudi Arabia, told him that Alhazmi and Almihdhar were Saudi spies protected by U.S. authorities….click on the above link to read the rest of the article…

The Big Secret That Makes the FBI’s Anti-Encryption Campaign a Big Lie

The Big Secret That Makes the FBI’s Anti-Encryption Campaign a Big Lie

To hear FBI Director James Comey tell it, strong encryption stops law enforcement dead in its tracks by letting terrorists, kidnappers and rapists communicate in complete secrecy.

But that’s just not true.

In the rare cases in which an investigation may initially appear to be blocked by encryption — and so far, the FBI has yet to identify a single one — the government has a Plan B: it’s called hacking.

Hacking — just like kicking down a door and looking through someone’s stuff — is a perfectly legal tactic for law enforcement officers, provided they have a warrant.

And law enforcement officials have, over the years, learned many ways to install viruses, Trojan horses, and other forms of malicious code onto suspects’ devices. Doing so gives them the same access the suspects have to communications — before they’ve been encrypted, or after they’ve been unencrypted.

Government officials don’t like talking about it — quite possibly because hacking takes considerably more effort than simply asking a telecom provider for records. Robert Litt, general counsel to the Director of National Intelligence, recently referred to potential government hacking as a process of “slow uncertain one-offs.”

But they don’t deny it, either. Hacking is “an avenue to consider and discuss,” Amy Hess, the assistant executive director of the FBI’s Science and Technology branch, said at an encryption debate earlier this month.

The FBI “routinely identifies, evaluates, and tests potential exploits in the interest of cyber security,” bureau spokesperson Christopher Allen wrote in an email.

Hacking In Action

There are still only a few publicly known cases of government hacking, but they include examples of phishing, “watering hole” websites, and physical tampering.

Phishing involves an attacker masquerading as a trustworthy website or service and luring a victim with an email message asking the person to click on a link or update sensitive information.

…click on the above link to read the rest of the article…

Olduvai IV: Courage
Click on image to read excerpts

Olduvai II: Exodus
Click on image to purchase

Click on image to purchase @ FriesenPress