No Secrets Allowed – You, me, and the NSA makes three. – Reality check



No Secrets Allowed – You, me, and the NSA makes three. – Reality check

0 15


no_secrets_anymore


On Github steveklabnik / no_secrets_anymore

No Secrets Allowed

You, me, and the NSA makes three.

By @steveklabnik

Reality check

"This isn't new."

COINTELPRO

FBI records show that 85% of COINTELPRO resources targeted groups and individuals that the FBI deemed "subversive", including communist and socialist organizations; organizations and individuals associated with the Civil Rights Movement, including Martin Luther King, Jr. and others associated with the Southern Christian Leadership Conference, the National Association for the Advancement of Colored People, and the Congress of Racial Equality and other civil rights organizations; black nationalist groups; the American Indian Movement; a broad range of organizations labeled "New Left", including Students for a Democratic Society and the Weathermen; almost all groups protesting the Vietnam War, as well as individual student demonstrators with no group affiliation; the National Lawyers Guild; organizations and individuals associated with the women's rights movement; nationalist groups such as those seeking independence for Puerto Rico, United Ireland, and Cuban exile movements including Orlando Bosch's Cuban Power and the Cuban Nationalist Movement; and additional notable Americans —even Albert Einstein, who was a socialist and a member of several civil rights groups, came under FBI surveillance during the years just before COINTELPRO's official inauguration.

The remaining 15% of COINTELPRO resources were expended to marginalize and subvert white hate groups, including the Ku Klux Klan and the National States' Rights Party.

Historical figures investigated by the US government:

  • First Lady Eleanor Roosevelt (3,000 pages)
  • Frank Sinatra (1,300 pages)
  • Marilyn Monroe
  • John Lennon (300 pages, deportation attempt)
  • The Beatles
  • Martin Luther King, Jr.
  • Senator Barry Goldwater.

Church Committee

Over 26,000 individuals were at one point catalogued on an FBI list of persons to be rounded up in the event of a "national emergency". Over 500,000 domestic intelligence files were kept at the FBI headquarters, of which 65,000 of were opened in 1972 alone. At least 130,000 first class letters were opened and photographed by the FBI from 1940 to 1966 A quarter of a million first class letters were opened and photographed by the CIA from 1953 to 1973. Millions of private telegrams sent from, to, or through the United States were obtained by the National Security Agency (NSA), under a secret arrangement with U.S. telegraph companies, from 1947 to 1975. Over 100,000 Americans have been indexed in U.S. Army intelligence files. About 300,000 individuals were indexed in a CIA computer system during the course of Operation CHAOS. Intelligence files on more than 11,000 individuals and groups were created by the Internal Revenue Service (IRS), with tax investigations "done on the basis of political rather than tax criteria".

"2013 mass surveillance disclosures"

Any byte that leaves your computer unencrypted is essentially public.

"I have nothing to hide" means "I am under-informed."

Cell phones are inherently spy devices.

Metadata

Both innocent and vitally important counter-terrorism?

“A young woman calls her gynecologist; then immediately calls her mother; then a man who, during the past few months, she had repeatedly spoken to on the telephone after 11pm; followed by a call to a family planning center that also offers abortions. A likely storyline emerges that would not be as evident by examining the record of a single telephone call.”

A few trusty, well-worn tools

Tor

Example: end-to-end timing attack

GPG

Public vs. Symmetric Key Encryption

Web of Trust

Key-signing parties

Security Culture

What do?

Take some time to learn some basic concepts.

Start using tools, even if you don't know what you're doing.

Help out, especially with UI/UX.

Consider the security & privacy implications of products you build.

Fin.

@steveklabnik