“America cannot be intimidated” – Bullshit

On 9/11, we all take a moment to remember the tragedy of that day so many years ago, and the sacrifice of the victims, first responders, soldiers, and others who were lost as a result. It is a time for solemn reflection, but also maybe a time for a reality check.

America fancies itself the Chuck Norris of nations. Our cultural identity is tightly wrapped in our being mighty, righteous, and unshakable. But if we’re truly honest with ourselves, if we dig under that facade of bravado, we see that we are scared as hell… and 9/11 made that possible.

Fear has always been a tool for control. It’s baked into the human condition. But 9/11 was a gateway that turned fear into a political industry. The fear that 9/11 was only the beginning was used to conflate a fear of Al-Qaeda into a fear of Muslims and the Middle East, which sold the war on Iraq. That same fear was exploited to strip away many of our rights to privacy and personal freedom. That worked so well, it spawned an entire media empire dedicated to making us afraid.

Today we are still afraid of Islamic terrorism, but we’re also afraid of North Korea, socialism, gun laws, climate scientists, taxes, immigrants, PoC, the LBGT, drugs, China, non-Christians, gluten, and even our own government. America cannot be intimidated? Bullshit. America has institutionalized intimidation.

The objective of terrorism is to instill fear. Fear is debilitating. People make poor choices when they are afraid. The 9/11 terrorists made us momentarily afraid. But opportunistic Americans have turned that into a state of perpetual fear. The terrorists have succeeded beyond bin Laden’s wildest dreams, but only because of what we’ve done to ourselves. The terrorists lit a fire, but we fed it and fanned it.

If you want to truly honor the legacy of 9/11, conquer your fear. If you want to make America great again, conquer your fear. Fear is the mind killer.


Why the FBI vs. Apple Matters

iphone-6s-tear-downTo most Americans, Apple’s refusal to unlock the San Bernadino shooter’s iPhone seems an untenable position. After all, Farook is a known terrorist who committed a horrific crime. That a legal warrant should be issued to search his every sock drawer and hard drive to uncover links to other terrorists or plots is patently obvious. Clearly Apple should just give the FBI what they want. So why is Apple balking? And why does most of the tech community side with them?

The facts are a bit confusing to those outside the tech community. The average American doesn’t (and probably doesn’t want to) understand the intricacies of data encryption and security. With that in mind, I’m going to try to make a more real-world analogy that everyone can relate to, but still illustrates the problem at hand. To do that, let’s assume that this is the 1960s. “Ivan” has just committed an act of terror in the name of the USSR. He was killed in the event, but police suspect he may have had microfilmed plans and lists of other Soviet agents inside the US.

The FBI discovers Ivan has a safety deposit box at the local bank. They go to the court and get a warrant, present it to the bank, and the bank manager opens the box inside the vault and surrenders the contents inside to the authorities.

This situation is similar to requests Apple has responded to many times before. It is a request for something Apple has possession of (e.g. iMessage conversations on its servers) which are turned over willingly with the proper legal authorization. This is how most people seem to be thinking of the Farook iPhone case, but it is not similar to the current case at all.  For that, let’s move on to the next scenario.

Police then discover that Ivan has an ACME Self Destructing Safe in his basement. The feds know this safe is equipped with an acid release failsafe inside the unit such that if the wrong combination is tried too many times or they attempt to force open the safe, the acid is released and all contents of the safe are destroyed.

The FBI then goes to the ACME company and asks them to open the safe. But ACME explains that even they don’t have the combination. Only Ivan did, and he’s gone. ACME doesn’t own the safe or any of its contents. It just designed and built it. Then the FBI comes back to ACME with a new plan and a court order to make ACME implement it. They want ACME to build them a device that can neutralize the acid failsafe so that the police can then just crack the safe.

However, ACME is aware that this acid neutralizing device will actually work on any of their safes, not just Ivan’s. Further, they know their safes are the bane of the FBI, and that police have hundreds of these legally confiscated safes from other crimes stored in evidence lockers across the country. The FBI would love to open them all.

ACME is worried that eventually one of the neutralizing devices or the plans for one will get out in the public or on the black market, and once that horse is out of the barn, there’s no putting it back. They realize that what the FBI is asking them to do is effectively remove the acid failsafe as a security feature from everyone’s safe, not just Ivan’s. This compromises the safety of ACME’s many legitimate customers who have trusted them to secure their belongings.

Further, the security industry as a whole is worried that if ACME yields, it sets the precedent that no one can build and sell uncrackable safes or unbreakable locks. Every security system must be penetrable by the police without the owner’s cooperation. But such a built in weakness is also exploitable for nefarious purposes, both by corrupt government agents as well as theives and spies.

This is the situation Apple finds itself in with the locked iPhone. Once it builds the crack tool, there is no reality under which it would be used just once and destroyed. Even if that tool was safely destroyed, the FBI would be back next week with another warrant for another iPhone, and they would be forced to build it again. Eventually, it becomes impractical to destroy and rebuild the tool each time, so the issue becomes about controlling access to the tool.

Therein lies the weakness. In a world where horses don’t exist, no one has to worry about watching the barn door. But once you create a horse, then the door becomes a liability. And because horses are useful, eventually you have multiples… then multiple barns… and multiple doors. It’s only a matter of time before one gets loose. After all, no security system is perfect.


Did Snowden Execute the NSA’s Corbomite Maneuver?

TheCorbomiteManeuver
Star Trek’s episode “The Corbomite Maneuver” teaches the value of a high stakes bluff.

The NSA debacle gets more weird by the minute. First, the NSA get “outed” for doing what pretty much everyone thought they were doing anyway. Government officials promptly and predictably lose their collective shit, because apparently they were the only ones in the dark.

Then the whistleblower/traitor outs himself as the highly skilled tech with the keys to the information kingdom who couldn’t live with his conscience any longer. Sounds noble. But he’s quickly unmasked as a man who by all accounts was dramatically unqualified for the position he apparently held. Okay, maybe he’s a tech savant of sorts. At this point I was still trying to give him the benefit of the doubt.

However, Snowden then starts giving interviews claiming the NSA has lots of capabilities, that to many of us in the technical community, just seem damned unlikely. Are they collecting data? Sure. Are they trying to analyze and mine it? Sure. But reconciling and normalizing zetabytes of heterogeneous data is damned hard, and most often yields digital gludge. Their data repository is likely way more plentiful than their information repository. Then along come companies like Google to start piling on, indicating how the NSA Prism program really works with them. And frankly, Google’s story is far more technically plausible than Snowden’s.

For added measure, Snowden’s latest interview asserts that the NSA isn’t just snooping on US citizens, but is actively hacking China’s networks as well. Ummm… duh. Does anybody really hope that’s not happening? Especially since they’re beating on our firewalls every day like a jockey on an indolent donkey? But what has this got to do with Fourth Amendment rights, the privacy of American citizens, or the overreach of government? Did he not understand the mission of the NSA when he took the job?

And finally, the boy genius is hiding out in Hong Kong, a place with an extradition policy so friendly to the U.S. that jaywalkers are frequently remanded to the States for unpaid tickets.  This dude is no rocket surgeon.

So what gives? Why is this guy talking? And why is anyone listening?

Fair warning: what follows is pure unadulterated speculation. But someday I aspire to become a pundit on a network news channel, so I need the practice.

I think Snowden is the key operative in the NSA’s version of “The Corbomite Maneuver”. As you may recall, Corbomite was the substance Capt. Kirk claimed the enterprise was coated in. Kirk claimed Corbomite reflected any attack back on the attacker, and thus bluffed Balok into backing off despite his superior power.

I think Snowden is touting the powers of the NSA’s Corbomite. He’s a patsy—promoted beyond his capability, given access to staged capability, and indirectly urged to “blow the whistle”. He’s disclosing the capability the NSA wishes it had. Capability that would send our enemies into a technical paranoid frenzy. The goal? Forcing Al Qaeda to resort to old school postal mail and coded classified ads to communicate. Starting a cyber cold war with China by convincing them there would be technological Mutually Assured Destruction. This is a game of hacker-poker, and we just raised.

Either that, or Snowden’s an ego fueled blowhard. It’s hard to tell.


CISPA – Big Brother Never Sleeps

big-brother-posterIt’s likely you’ve never heard of the Cyber Intelligence Sharing and Protection Act, also known as CISPA.  It is the latest round in the never-ending litany of SOPA-like bills designed to clamp down on the scourge that is the Internet.  And it just cleared the House last week by a pretty comfortable margin.  Comfortable that is, unless you’re a user of the Internet.

Much like the Protecting Children From Internet Pornographers Act of 2011, CISPA cloaks itself with a title that’s hard to be opposed to.  Cyber-terrorism is a very real threat, and who in their right mind would be against a measure to protect us from a cyber-attack?  Ahhh… if only it actually achieved that goal.

What CISPA actually does is provide immunity to ISPs and online  service providers for responding to government requests for information about the cyber-activities of anyone related to cybersecurity, cyber crime, protecting people from harm, protecting children from exploitation, and national security.  Note that the bill does not compel companies to turn over such information, and because it’s a voluntary request, it requires no court approval or any other sort of burden of reasonable cause.  But keep in mind that during the post 9/11 illegal wiretapping scandals, AT&T, Verizon, and other companies were only too willing to hand over your data.  So much so that there were efforts to prosecute the telecom companies for violating citizen’s rights, which ultimately required that the telcos be granted immunity.  Under CISPA, they will have permanent immunity as CISPA explicitly states that companies may provide requested information “notwithstanding any other provision of law.”  In other words, CISPA trumps all other laws.

CISPA would “waive every single privacy law ever enacted in the name of cybersecurity,” Rep. Jared Polis, a Colorado Democrat and onetime Web entrepreneur, said during the House debate. “Allowing the military and NSA to spy on Americans on American soil goes against every principle this country was founded on.”

Yet all this begs the question, will it make us safer?  After all, in the last decade Americans have repeatedly shown that they are willing to sacrifice considerable freedoms in the interest of domestic security.

The fundamental issue would seem to be that this is a bill about cyber-security. Yet the allowances to deploy the law for purposes such as protecting children from exploitation seem pretty hard to defend as essential to preventing cyber-terrorism.  Still, it’s hard to argue that protecting children is a bad thing.

Moreover, the issue would seem to be the relative ease by which potential cyber-terrorists could thwart the efforts enabled by CISPA.  VPN tunnels and anonymous proxy services are well known technologies, and would make it impossible for anyone monitoring network traffic to even determine who was talking to whom, much less eavesdrop on the conversation.  You could certainly argue that the average citizen might not have the geeky skills to set up such a secure Internet connection.  But certainly anyone with the mad tech skills to conduct cyber-terrorism is going to be able to handle an encrypted network tunnel.  Don’tcha think?

So who are we catching here?  One possibility is that this is all just more security theater.  We’ll spend a lot of money and politicians will use CISPA as a campaign slogan, but it will have very little net impact on security.  Another possibility is that CISPA will be exploited for less noble purposes, unrelated to cyber-terrorism.  Instead of hunting down Chinese hackers, it will be used to hunt down your spouse streaming an illegally broadcast Celtics game on her laptop.

The bottom line is that this bill will not accomplish what it purports to.  The bill is highly focused on domestic surveillance, and there is no evidence that we are at risk of a domestic cyber-attack from citizens with poor tech skills.  Further, there are ample laws on the books now that allow the government a pretty wide berth to eavesdrop on citizens when they can show cause.  And those laws have already been routinely circumvented in the name of national security.  If anything, we need to be shoring up the Fourth Amendment, not tearing it to shreds.

Just because technology provides the means to unobtrusively invade our personal privacy does not mean we should be surrendering those rights.

Fortunately, while CISPA started out with bipartisan support, it has become a partisan issue.  It may have been passed by the House, but its chances of getting through the Senate are slim, and Obama has already threatened a veto.  Yet this is no time for complacency.  These sorts of bills just keep on coming, and sooner or later, one of them will slip through.

Be vigilant.


Big Brother Likes to Watch

big-brother-posterSOPA and PIPA may be dead, but the battle is far from over.  The dust had barely settled from the online community’s successful revolt against Hollywood’s attempt to toss out due process in an effort to protect it’s Luddite-like business model when Rep. Lamar Smith, SOPA’s author, introduced the Protecting Children From Internet Pornographers Act of 2011.

That doesn’t even sound related does it?  Further, it’s obviously about protecting children, and who could be against that? Well, that’s kind of the point. The problem is, this bill doesn’t really introduce any additional protections for children or make any bold new strides to stamp out child porn.  At least not directly.

What the bill does require is that your ISP maintain a record of what IP addresses are assigned to you for 18 months.  It is required to keep those records sealed, unless the government, and only the government, requests them.

Some sites are reporting the bill requires ISPs to keep a record of every site you visit.  That’s not true, unless you live in Hawaii, where a separate and unrelated state bill has been proposed requiring your ISP to keep tabs on your every YouTube view and Facebook stalking venture.  The federal bill makes no such requirement.

This means the Fed won’t have the ability under this bill to demand your Internet history as part of an investigation.  But, if it is monitoring network traffic or if it seizes a web server and the logs on that server, they can trace your activity back to your house.

So in theory, FBI agents bust a child porn provider, find out that someone at the address 123.123.123.123 has been a heavy user, and grab the ISP records to find out that on the day in question, that address was assigned to your house.  Then you hear a knock on the door.  Okay, if you’re into child porn, then someone should knock at your door and haul your ass away.  But what if it wasn’t you?  What if your neighbor jacked your WiFi, and he’s the real pervert?  What if you own a coffee shop and provide free WiFi to your customers?  Are you now suspect because of their actions?

And you’d have to be completely naive to think this tactic only applies to child porn.  Gee, have you been to Megaupload or Pirate Bay lately?  And there’s the SOPA/PIPA tie in.  Once this data is being collected and is at the government’s disposal, it will be used for all manner of things.  This isn’t about protecting the children. That’s just the ruse to get the law passed.

And before someone argues that if you’ve got nothing to hide you shouldn’t be worried… that’s not the point.  The Forth Amendment guarantees a right to privacy.  The Supreme Court recently ruled that your car can’t be GPS tagged without a warrant.  This means the police can’t decide to electronically track and log wherever you go in the real world so that  just in case they uncover a crime, they can go back and see who was near the scene when it was committed.  The virtual world should not be different.

As ill-conceived as they were, SOPA and PIPA were at least upfront about their intentions and motivations.  Hiding behind the specter of child porn to erode constitutional rights is despicable.  The children deserve better.