Journalist Greenwald refuses to speak to Germany’s NSA scandal inquiry

Greenwald on Friday said he had turned down an invitation to testify before the German parliament later this summer about the NSA spying scandal. The US journalist said that while he was "very supportive of any attempt by the German Parliament to conduct a serious investigation into NSA spying on Germans," the existing Bundestag inquiry was not that.

"Unfortunately, German politicians have demonstrated, with their refusal to interview the key witness in person - Edward Snowden - that they care far more about not upsetting the US than they do about conducting a serious investigation," he said in a statement.

Greenwald (pictured above) had been expected to speak to the Bundestag on September 11 via video link from Rio de Janeiro, Brazil, where he lives.

Lawmakers hesitant on Snowden

Reports, many of which were written by Greenwald, based on Snowden-provided documents, have over the past year revealed the far-reaching extent of US espionage on German soil - ranging from mass internet data collection to tapping Chancellor Angela Merkel's cell phone.

Despite harsh words for Washington from German lawmakers, there has been hesitancy on the part of Berlin to bring Snowden to the country.

German opposition politicians from the Green and Left parties for months lobbied to have Snowden appear before the Bundestag to discuss the scope of US spying in the country. However, the ruling coalition has thus far refused, with the apparent justification it would harm German-American relations. The US has issued an arrest warrant for the 31-year-old whistleblower.

Parliamentarians from Merkel's conservative Christian Democrats and their junior coalition partners, the center-left Social Democrats, have said they want an "informal discussion" with Snowden in Moscow before a formal hearing on German soil.

'Illusion of an investigation'

"I am not willing to participate in a ritual that is intended to cast the illusion of an investigation, but which is actually designed to avoid any real investigation, placate the German public with empty symbolism, and keep the culprit - the US Government - happy," said Greenwald.

Read this article:
Journalist Greenwald refuses to speak to Germany's NSA scandal inquiry

Hands-on: miniLock’s powerful file encryption is dead simple to use

The creator of Cryptocat, Nadim Kobeissi, is back with another easy-to-use encryption tool. This time it's a Chrome app that aims to make it easy to create and share single encrypted files with others. Called miniLock, the app is freely available on the Chrome Web Store.

Similar to other encryption tools, miniLock relies on public key cryptography. Under this scheme you have to share your public key with others so they can encrypt files meant for you and only you. But unlike many encryption toolswhich are often difficult to useminiLock is very easy to understand and takes away a lot of the pain typically associated with encryption tools.

The public key itself, dubbed your miniLock ID, is relatively short at around 45 characters. That's long enough to easily fit in a tweet, as the miniLock site says. But it's still too long to easily remember, so you'll have to write it down or save it in a password manager like LastPass or KeePass.

For encryption, miniLock uses Curve25519 elliptic curve cryptography, which is the same cryptography used in Kobeissi's Cryptocat. The problem with encryption tools, however, often isn't the strength of their encryption but how well it's implemented.

On the miniLock site you can find a recent miniLock security auditby penetration testing firm Cure53. The report gives miniLock a clean bill of health stating that "MiniLock is a one-purpose app offering this one particular feature [encryption] and appears to be doing that as well as possible...The code is soundly and neatly written, well structured, minimal and therefore offers no sinks for direct exploitation."

That's just one report, however, and others will no doubt sink their teeth into miniLock and try to find exploits. Judging the quality of the cryptography is beyond the scope of this article. But as it's a new app, miniLock may not yet be the best choice for anyone encrypting documents in a high-stakes environment (political oppression, corporate secrecy). That said, it's definitely worth keeping tabs on to see what the security community has to say about miniLock in the future.

For anyone that wants to dive in right away, here's a quick hands-on with miniLock on a Windows 8.1 PC.

miniLock after a public key is generated.

To get started, visit the Chrome Web Store and install miniLock as you would any other Chrome app. Once it's installed you can either launch it right from the Chrome Web Store or the Chrome App Launcher in your taskbar, if you've installed that.

When it starts up, miniLock will ask you to sign in with your email address and a passphrase. These two pieces will be used to generate your miniLock ID, which should take only a second or two.

Read the rest here:
Hands-on: miniLock's powerful file encryption is dead simple to use

Volokh Conspiracy: As evidence mounts, it’s getting harder to defend Edward Snowden

By Stewart Baker August 3 at 9:39 PM

The evidence is mounting that Edward Snowden and his journalist allies have helped al Qaeda improve their security against NSA surveillance. In May, Recorded Future, a predictive analytics firm, publisheda persuasive timelineshowing that Snowdens revelations about NSAs capabilities were followed quickly by a burst of new, robust encryption tools from al-Qaeda and its affiliates:

This is hardly a surprise for those who live in the real world. But it was an affront to Snowdens defenders, whove long insisted that journalists handled the NSA leaks so responsibly that no one can identify any damage that they have caused.

In damage control mode, Snowdens defenders first responded to the Recorded Future analysis by pooh-poohing the terrorists push fornew encryption tools. Bruce Schneierdeclared that the change might actually hurt al Qaeda: I think this will help US intelligence efforts. Cryptography is hard, and the odds that a home-brew encryption product is better than a well-studied open-source tool is slight.

Schneier is usually smarter than this. In fact, the product al Qaeda had been recommending until the leaks, Mujahidin Secrets,probably didqualify ashome-brew encryption.Indeed, Bruce Schneier dissedMujahidin Secretsin 2008 on precisely that ground, saying No one has explained why a terrorist would use this instead ofPGP.

But as a secondRecorded Future postshowed,the products that replacedMujahidin Secretsrelied heavily on open-source and proven encryption software.Indeed, one of them uses Schneiers own, well-tested encryption algorithm, Twofish.

Faced with facts thatcontradicted his original defense of Snowden, Schneier was quick tooffer a new reason why Snowdensleaks and al Qaedas response to them still wouldnt make any difference:

Whatever the reason, Schneier says, al-Qaidas new encryption program wont necessarily keep communications secret, and the only way to ensure that nothing gets picked up is to not send anything electronically. Osama bin Laden understood that. Thats why he ended up resorting to couriers.

Upgrading encryption software might mask communications for al-Qaida temporarily, but probably not for long, Schneier said.It is relatively easy to find vulnerabilities in software, he added. This is why cybercriminals do so well stealing our credit cards. And it is also going to be why intelligence agencies are going to be able to break whatever software these al-Qaida operatives are using.

So, if you were starting to think that Snowden and his band of journalist allies might actually be helping the terrorists, theres no need to worry, according to Schneier, becauseall encryption software is so bad that NSA will still be able to break the terrorists communications and protect us. Oddly, though, thats not what he says when he isnt on the front lines with the Snowden Defense Corps. Ina 2013 Guardian articleentitled NSA surveillance: A guide to staying secure, for example, he offers very different advice, quoting Snowden:

More here:
Volokh Conspiracy: As evidence mounts, it’s getting harder to defend Edward Snowden

DN! Goes Inside Assange’s Embassy Refuge to Talk WikiLeaks, Snowden and Winning Freedom – Video


DN! Goes Inside Assanges Embassy Refuge to Talk WikiLeaks, Snowden and Winning Freedom
"In a Democracy Now! special, we go inside the Ecuadorian embassy in London to interview Wikileaks founder Julian Assange. He has been holed up there for mor...

By: TheEthanwashere

Link:
DN! Goes Inside Assange’s Embassy Refuge to Talk WikiLeaks, Snowden and Winning Freedom - Video