Showing posts with label surveillance. Show all posts
Showing posts with label surveillance. Show all posts
By Boris Lubarsky

Photo: Boris Lubarsky

On October 5, 2016 Edward Snowden participated in his second roundtable discussion at Georgetown University via Skype, from asylum in Moscow. Snowden is currently living in Russia after he leaked classified information in 2013, disclosing the government’s ongoing surveillance programs that included surveillance on American citizens. He is wanted by the United States’ government for theft of government property and violation of the Espionage Act.

The event coincided with the recent release of Oliver Stone’s new film “Snowden” and was moderated by Kevin Bankston, Director of New America’s Open Technology Institute. At the roundtable, Snowden discussed the role of encryption and the myth of ‘going dark.’

Recently, the FBI has warned that the encryption of electronic communications has led to terrorist’s ‘going dark’ or communicating in a way the FBI cannot access or intercept. FBI director James Comey called for telecommunications companies to expand and build up their real-time intercept capabilities. Director Comey further advocated that companies should always be able to decrypt any information sent using their service. Presently, Congress has yet to enact legislation that would prohibit end-to-end encryption.

Similarly, agencies within the EU and UK have also called for a legislative ban on end-to-end encryption. Earlier this year the French and German interior ministers advocated that internet companies should be able to decrypt any communication on its service. If these proposals were enacted it would effectively outlaw end-to-end encryption. The United Kingdom has also pushed to ban end-to-end encryption, with Prime Minister Cameron speaking against it and during a debate in the House of Lords Baroness Shields made a similar argument. “There is an alarming movement towards end-to-end encrypted applications,” she said. “It is absolutely essential that these companies which understand and build those stacks of technology are able to decrypt that information and provide it to law enforcement in extremis.”

End-to-end encryption is a system of communicating in which only the communicating users can read the message. End-to-end encryption works by providing both sender and recipient with an encryption key – only this key can unlock the contents of the message. Before an email is transmitted it is encrypted by the sender using his key, then the encrypted email is sent to the internet service provider which delivers the email to the intended recipient. While encrypted, the email is effectively garbled white noise – even if it were intercepted it would be unintelligible. The recipient uses his copy of the encryption key to unlock the message and read its contents.

Snowden, however, painted a starkly different picture than those advocating against encryption. Specifically, Snowden noted that encryption is not an insurmountable obstacle for intelligence services or law enforcement. “Anyone that says that information is going dark because encryption exists isn’t telling the truth.” Snowden mentioned numerous ways to surmount encryption but focused a common age-old method: allow the target to decrypt the information for you.

For an illustrative example, Snowden pointed to the 2015 arrest of Ross Ulbricht, the convicted ringleader of the infamous Silk Road Marketplace, an online black market selling everything from drugs to murder for hire. On the day of Ulbricht’s arrest, the FBI followed him to a public library and waited for him to unlock his computer and begin using it. Then two agents posing as quarreling lovers had a loud fight to distract Ulbricht; as soon as he turned to look at the disturbance an agent snatched his laptop and inserted a flash drive to clone the data on the computer. Only then was Ulbricht informed of his arrest and presented with a warrant. Ulbricht’s computer was encrypted, but by using standard police techniques the FBI was able to access the information anyway.

Snowden noted that, traditionally, law enforcement had to physically surveil the individual subject of an investigation and from that evidence obtain a warrant that allowed a search or seizure; however, with electronic communications the government could instead conduct mass surveillance for the same cost. Snowden further proposed that “when [the government] can monitor a hundred times as many people with the same amount of money – it’s time to review the privacy settings with fresh eyes; because with that order of magnitude change it’s a good rule of thumb for a review.” The advent of cellular phones and computers has created exactly this exponential decrease in the cost of surveillance.

Snowden acknowledged that encryption will raise the cost of surveillance worldwide, however this increase in cost means that “now they can’t do things in bulk and shifts from mass surveillance to individualized surveillance.” Snowden indicated that this individualized surveillance is exactly what law enforcement has traditionally done and strikes the correct balance between personal liberty and society safety.


Lastly, encryption is not just used by members of terrorist cells. Encryption provides law-abiding citizens a secure means to protect their data against criminals and hackers. The European Union Agency for Information and Security has supported encryption and come out strongly against back doors that would jeopardize end-to-end encryption. Technology companies such as Apple, Google, Facebook, and Microsoft all similarly support encryption and resist weakening that encryption with back door access.
By Kelley Chittenden

Two sources with direct knowledge of Facebook’s discussions with Egypt over its Free Basics service said the Egyptian government blocked it because Facebook refused to allow the government to circumvent security and conduct surveillance on its citizens, Reuters reports. Free Basics, which allows anyone with a computer or smartphone to access a limited set of free Internet services was launched in Egypt in October 2015 and used by over three million Egyptians, one third of whom had never previously had Internet access. Facebook strengthened security protections in September, allowing users to connect seamlessly with secured sites.
By Matt Klinger

Recent moves by Asian governments show that privacy protection is not just a concern in the United States. and European Union.

For instance, just this month Japan issued a voluntary code of practice for businesses that collect and use personal data.  In addition, earlier this year, Vietnam created new sanctions for certain violations involving data privacy, while the government of Hong Kong issued a best practices guide for developing a privacy management program. 

These efforts add further complexity to the patchwork of privacy regulations and best practices companies should follow when operating in Asia.  
By Matt Klinger

To prevent surveillance by the National Security Agency (N.S.A), some large companies with customers outside the U.S. are offering to store their client's data entirely abroad.  

Microsoft, for instance, recently indicated it would give customers some choice about where their data is stored.  Similarly, a Dutch telecom operator plans to set up servers in the Netherlands so that its encrypted data never leaves the country, while an alliance of German phone and internet operators have discussed doing a similar thing.  Going even a step further, Brazil has considered legislation that would force companies like Facebook to store data on Brazilian users inside the country.  And some European Union (E.U.) officials support requiring E.U. citizens' data to be stored within the union's borders.

But how effective are such measures likely to be?  Not very, according to some analysts, including a retired deputy director of the N.S.A.  It seems foreign countries that want to protect their citizens' data will have to benefit from legal reforms, such as changes to U.S. law or the adoption of a binding international instrument.  But such measures are unlikely to take effect soon, if at all.
By Matt Klinger

Last month the European Court of Human Rights (ECHR) fast-tracked a case filed by a London-based activist groups against the U.K. government for its alleged involvement in the U.S. National Security Agency's PRISM surveillance program.

The groups filed their complaint with the ECHR in September, alleging the U.K. intelligence services participating in PRISM were violating Article 8 of the European Convention on Human Rights.  In particular, Article 8 requires that any government interference in an individual's private or family life must be "in accordance with the law" and "necessary in a democratic society."  The U.K. government now has until May 2nd to respond to several questions from the court.

Axel Arnbak at Freedom to Tinker has insightfully analyzed how the court is likely to approach the case.
By Matt Klinger

In response to concerns about government surveillance, the Internet Engineering Task Force (IETF), which develops technical standards for the internet, is working on a plan to expand the use of encryption on the web.  Most web traffic today is exchanged under the hyper text transfer protocol (HTTP), an unencrypted medium.  Some sites, however, like banks, online retailers, and Gmail, use HTTPS, which incorporates encryption into the exchange.  The IETF hopes to produce a standard by the end of 2014 that encourages the use of HTTPS for all web traffic, although adoption by websites would not be mandatory.

Salon reports the IETF is also looking into make anonymous surfing of the web easier by expanding the use of Tor - a networking software that anonymizes web traffic.  Journalists, activists, and others across the globe use Tor to protect their communications.  Meanwhile, the U.S. National Security Agency and its British counterpart seem intent on cracking the software.  Ironically, Tor's precursors were developed by the U.S. Department of Defense to safeguard its communications and the U.S. government reportedly still funds around 60 percent of Tor's development tab.
By Matt Klinger

"The first major statement by the UN on privacy in 25 years" appeared last month when the General Assembly's committee on humanitarian issues unanimously approved a resolution on "the right to privacy in the digital age."  

Brazil and Germany, which recently learned the U.S. National Security Agency had intercepted the communications of their top leaders, sponsored the non-binding measure.  The resolution calls on member states to review their legislation and practices regarding communications surveillance with an eye toward upholding the right to privacy.  The resolution also calls for a U.N. report on the protection and promotion of privacy in the context of "domestic and extraterritorial surveillance . . . including on a mass scale."  

The committee's consensus approval indicates the resolution will easily pass in the General Assembly when it comes up for a vote this December. 
By Stephen Kozey

Undoubtedly one of the hottest topics in international law right now is drone warfare, and the peace group CODEPINK is ready to bring you two full days of discussion on the issues surrounding the use (and misuse) of drones. Their 2013 Drone Summit will feature numerous notable speakers, including Cornel West, and film screenings throughout the weekend. In addition to question of international law posed by the use of drones, the Summit will include discussion of their use inside U.S. borders.

Georgetown Law will be hosting the event on Saturday and Sunday, November 16 and 17, in Hart Auditorium.
One of GJIL’s sister journals, the Georgetown Law Journal, will be hosting a daylong symposium on Nov. 8 about “disruptive technology.” It promises to be interesting given all the international drama surrounding technology of late -- from surveillance programs to intellectual property.  

The keynote will be delivered by Neal Katyal, Georgetown professor and national security guru. Other panels will focus on 3-D printing and patents, driverless cars and tort liability, and mass surveillance technology.