Edward Snowden responds to release of e-mail by U.S …

Read the document

An e-mail released by U.S. officials shows that Edward Snowden asked National Security Agency lawyers about legal authorities for NSA surveillance.

Related:

Ellen Nakashima and Barton Gellman

NSA, former intelligence contractor try to shape debate over whether he tried to blow whistle before leak.

Terrence McCoy

In an hour-long television interview, Snowden portrayed himself as a patriot who broke the law in an act of civil disobedience.

Q: How do you respond to todays NSA statement and the release of your email with the Office of General Counsel?

The NSAs new discovery of written contact between me and its lawyers - after more than a year of denying any such contact existed - raises serious concerns. It reveals as false the NSAs claim to Barton Gellman of the Washington Post in December of last year, that after extensive investigation, including interviews with his former NSA supervisors and co-workers, we have not found any evidence to support Mr. Snowdens contention that he brought these matters to anyones attention.

Todays release is incomplete, and does not include my correspondence with the Signals Intelligence Directorates Office of Compliance, which believed that a classified executive order could take precedence over an act of Congress, contradicting what was just published. It also did not include concerns about how indefensible collection activities - such as breaking into the back-haul communications of major US internet companies - are sometimes concealed under E.O. 12333 to avoid Congressional reporting requirements and regulations.

Go here to read the rest:
Edward Snowden responds to release of e-mail by U.S ...

NSA Finds 1 Email From Snowden Raising Question – ABC News

Edward Snowden says he repeatedly raised constitutional concerns about National Security Agency surveillance internally, but an NSA search turned up a single email in which Snowden gently asks for "clarification" on a technical legal question about training materials, agency officials said Thursday.

Snowden, a former NSA systems administrator whose leaks have exposed some of the agency's most sensitive spying operations, called himself a patriot in an interview this week with NBC News' Brian Williams. He said he felt he had no choice but to expose what he considered illegal NSA surveillance by leaking secret details to journalists.

NSA officials have said he gained access to some 1.7 million classified documents, though it's not clear how many he removed from the Hawaii facility where he worked as a contractor.

Asked by Williams whether he first raised his qualms with his bosses, he said, "I reported that there were real problems with the way the NSA was interpreting its legal authorities."

On Thursday, NSA released the email they said Snowden appeared to be referring to, which the agency says is the only communication from Snowden it could find raising any concerns. It was dated April 8, 2013, three months after Snowden first reached out to journalists anonymously. Former NSA chief Gen. Keith Alexander said the agency could find no one to whom Snowden voiced concerns verbally either.

In the email to NSA's general counsel's office, Snowden questions an NSA document showing the hierarchy of governing authorities, which appeared to put executive orders on par with federal statutes.

"I'm not entirely certain, but this does not seem correct, as it seems to imply executive orders have the same precedence as law," Snowden said in the email. "Could you please clarify?"

An unidentified NSA lawyer began his reply, "Hello, Ed," and told Snowden he was correct: Executive orders cannot override federal law.

In the NBC interview conducted in Moscow, where Snowden now lives outside the reach of pending U.S. criminal charges Snowden said the reply he got to his email was "more or less, in bureaucratic language, 'You should stop asking questions.'"

In fact, the lawyer's email to him concludes, "Please give me a call if you would like to discuss further."

More here:
NSA Finds 1 Email From Snowden Raising Question - ABC News

Edward Snowden didn’t email surveillance concerns …

President Obama's administration and a key senator on Thursday rebutted Edward Snowden's claim that he expressed concerns about the legality of government surveillance programs to his superiors at the National Security Agency before he exposed the programs and fled the country last June.

Snowden, a former contractor with the NSA who now resides in Moscow as a fugitive from the U.S. government, has been called a whistleblower by supporters who believe he exposed real wrongdoing in his leaks of classified programs. But the U.S. government has disputed that characterization, saying Snowden never raised concerns about the programs through any channels available to genuine whistleblowers.

Play Video

Col. Jeff McCausland (Ret.), CBS News Military Analyst, discusses Edward Snowden's first US network interview while in exile in Russia.

Play Video

Former NSA contractor Edward Snowden says he is not under the control of the Russian government and hasn't given Russia any intelligence document...

Not so, Snowden told NBC News in an interview that aired Monday.

"I actually did go through channels and that is documented," Snowden said. "The NSA has records. They have copies of emails right now to their Office of General Counsel, to their oversight and compliance folks, from me raising concerns about the NSA's interpretations of its legal authorities."

"Now, I had raised these complaints not just officially in writing through email to these offices and these individuals but to my supervisors, to my colleagues in more than one office," he continued. "I reported that there were real problems with the way the NSA was interpreting its legal authorities and the response, more or less, in bureaucratic language, was 'you should stop asking questions.'"

In response, the NSA released the email exchange in question on Thursday. In a statement, the agency said Snowden "did not raise allegations or concerns about wrongdoing or abuse, but posed a legal question that the Office of General Counsel addressed. There was not additional follow-up noted."

Read the original:
Edward Snowden didn't email surveillance concerns ...

NSA Releases Snowden Email, Says He Raised No Concerns …

NSA headquarters in Fort Meade, Maryland. Image: Courtesy NSA

In response to claims by Edward Snowden that he raised concerns about NSA spying in emails sent to the spy agencys legal office, the NSA released a statement and a copy of the only email it says it found from Snowden.

That email, the agency says, asked a question about legal authority and hierarchy but did not raise any concerns.

NSA has now explained that they have found one e-mail inquiry by Edward Snowden to the Office of General Counsel asking for an explanation of some material that was in a training course he had just completed, the NSA said in a statement. The e-mail did not raise allegations or concerns about wrongdoing or abuse, but posed a legal question that the Office of General Counsel addressed. There was not additional follow-up noted.

There are numerous avenues that Mr. Snowden could have used to raise other concerns or whistleblower allegations, the statement continued. We have searched for additional indications of outreach from him in those areas and to date have not discovered any engagements related to his claims.

But Ben Wizner, Snowdens legal advisor and director of the ACLUs Speech, Privacy, and Technology Project, said the NSA is being disingenuous.

Snowden raised many complaints over many channels, he said in a statement today. The NSA is releasing a single part of a single exchange after previously claiming that no evidence existed.

The email, dated April 5, 2013, which was sent shortly before Snowden departed Hawaii for Hong Kong and released thousands of NSA documents to journalists, asks a question about the agencys mandatory USSID 18 training and Executive Orders orders that come from the president.

In his email, Snowden asked about the hierarchy for such presidential orders, asking whether these have the same precedence as law.

My understanding is that EOs may be superseded by federal statute, but EOs may not override statute. Am I correct in this? he wrote. He also wanted to know which of Department of Defense regulations and regulations from the Office of the Director of National Intelligence have greater precedence.

Excerpt from:
NSA Releases Snowden Email, Says He Raised No Concerns ...

Germany Chickens Out of Charging the US over NSA Spying on …

Guess whos too big of a coward to prosecute the NSA over the extensive surveillance practiced within the country? If you guessed Germany, then youre right and you get to jump on board the disappointment boat with the rest of us.

For months until now, the world has been wondering whether Germany will have the courage to go through with pressing charges against the United States, especially after conducting a very public investigation into the surveillance practices of the NSA, and particularly into the hacking of Angela Merkels phone.

It looks like diplomacy won over this time, even though the German politicians have been some of the most vocal in their disapproval of the NSA spying on Merkel and others, saying several times over that this is not something that is done among friends.

German media reports indicate that state officials dont believe they have enough evidence to press charges. This is, of course, a weak excuse that indicates the country would rather protect its relationship with the United States than the millions of citizens the NSA spied on.

Media reports over the past year have revealed leaked NSA documents indicating that the intelligence agency has been collecting some 500 million data connections in Germany each month, including phone calls, emails and chat logs. In fact, In January last year, there was a peak day when the agency collected 60 million communication connections.

Considering that the entire country has 80 million citizens, the impact of the collection program is extensive.

Then, not much later on, it was revealed that the NSA was spying on state leaders, including Angela Merkel, the German Chancellor. The reaction was swift at the time, with Germany not fearing to point the finger at the United States.

The White House reportedly assured Merkel that shed be taken off the spying list, but it wasnt long after that that new reports indicated the NSA had chosen to spy on a close advisor to the Chancellor instead.

Discussions among German politicians in recent months have been laced with arguments about whether or not to bring Edward Snowden to the country to testify. Some believe that everything can be done via a letter or through a video conference, while others consider that Snowden would offer more valuable information if he were there in person.

Ever since this bickering started, it was obvious that lawmakers feared about how inviting Snowden over would impact Germanys relationship with the United States.

Original post:
Germany Chickens Out of Charging the US over NSA Spying on ...

NSA Releases Snowden Email, Says He Raised No Concerns About Spying

NSA headquarters in Fort Meade, Maryland. Image: Courtesy NSA

In response to claims by Edward Snowden that he raised concerns about NSA spying in emails sent to the spy agencys legal office, the NSA released a statement and a copy of the only email it says it found from Snowden.

That email, the agency says, asked a question about legal authority and hierarchy but did not raise any concerns.

NSA has now explained that they have found one e-mail inquiry by Edward Snowden to the Office of General Counsel asking for an explanation of some material that was in a training course he had just completed, the NSA said in a statement. The e-mail did not raise allegations or concerns about wrongdoing or abuse, but posed a legal question that the Office of General Counsel addressed. There was not additional follow-up noted.

There are numerous avenues that Mr. Snowden could have used to raise other concerns or whistleblower allegations, the statement continued. We have searched for additional indications of outreach from him in those areas and to date have not discovered any engagements related to his claims.

But Ben Wizner, Snowdens legal advisor and director of the ACLUs Speech, Privacy, and Technology Project, said the NSA is being disingenuous.

Snowden raised many complaints over many channels, he said in a statement today. The NSA is releasing a single part of a single exchange after previously claiming that no evidence existed.

The email, dated April 5, 2013, which was sent shortly before Snowden departed Hawaii for Hong Kong and released thousands of NSA documents to journalists, asks a question about the agencys mandatory USSID 18 training and Executive Orders orders that come from the president.

In his email, Snowden asked about the hierarchy for such presidential orders, asking whether these have the same precedence as law.

My understanding is that EOs may be superseded by federal statute, but EOs may not override statute. Am I correct in this? he wrote. He also wanted to know which of Department of Defense regulations and regulations from the Office of the Director of National Intelligence have greater precedence.

Go here to see the original:
NSA Releases Snowden Email, Says He Raised No Concerns About Spying

What is an Encryption Key? (with picture)

Encryption is a form of security that turns information, images, programs, or other data into unreadable cipher by applying a set of complex algorithms to the original material. These algorithms transfer the data into streams or blocks of seemingly random alphanumeric characters. An encryption key might encrypt, decrypt, or perform both functions, depending on the type of encryption software being used.

There are several types of encryption schemes, but not all are secure. Simple algorithms can be easily broken using modern computer power, and yet another point of weakness lies in the decryption method. Even the most secure algorithms will decrypt for anyone who holds the password or key.

Symmetric types of encryption schemes use a single password to serve as both encryptor and decryptor. Supplying the encryption key, one can mount the drive and work in an unencrypted state, then return the drive to cipher when finished.

The algorithms used are considered very secure, with one of this type adopted as the Advanced Encryption Standard (AES) used by the U.S. Government for storing classified and top secret information. The one weakness of symmetric encryption programs is that the single key must necessarily be shared, presenting an opportunity for it to be leaked or stolen. Part of key management involves changing the key often to improve security.

Public asymmetric encryption schemes also use highly secure algorithms with a different method of encrypting and decrypting. This software uses two keys, known as a key pair. One is the public key, and can be freely shared or given to anyone because its only job is to encrypt. The other key is the private key, and is not shared. The private key is required to decrypt anything that has been encrypted by the public key.

Asymmetric encryption software is widely used for making email and instant messaging private. Users can install one of many available encryption programs, and the program generates a key pair for the user. The encryption key, or public key of the key pair, can be sent to others who are also running a compatible encryption program.

Once another person has the public key, he or she can send encrypted messages to the owner of the public key. After a message has been encrypted, even the author cannot decrypt it. In the encryption process, the algorithms are based on the key pair, and only the private key of that specific key pair can reverse the encryption process. The mail or message is then sent to the owner of the public key.

Upon receipt of the mail, the private key will request a passphrase before decrypting. For maximum security, this passphrase should be supplied manually, but software will allow a user to store the passphrase locally so that messages can be decrypted automatically. Asymmetric encryption is considered more secure than symmetric encryption, because the key that triggers decryption is not shared.

Regardless of the type of encryption, if someone gains access to a computer, the data is only as secure as the passphrase that protects the encryption key. The best passphrases are alphanumeric and random, though these are harder to remember. If someone must pick something recognizable, he or she should avoid addresses, license plate numbers, names, pets, or other easily cracked passwords, and include numbers plus characters that are neither letters nor numbers. Most importantly, each password should be completely unique from all others in use, as adopting a single password or a "theme" on passwords vastly reduces security and increases vulnerability.

See the original post:
What is an Encryption Key? (with picture)

TrueCrypt’s cryptic warning is downright alarming

TrueCrypt urges users to abandon its popular disk-encryption tool.

Popular encryption program TrueCrypt released a peculiar statement on its SourceForge page, warning users about a potential vulnerability and recommending they abandon TrueCrypt.

"WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues," says the red text atop the page. The warning further states that the app ceased development in May, after Microsoft ended support of Windows XP. The developers recommend migrating any True Crypt-encrypted data to encrypted disks supported by users' OS.

The use of TrueCrypt had increased in recent months, thanks to Edward Snowden's endorsement. The latest build is still offered on the site, despite speculation around its legitimacy and suspicions that it may contain malware. But the statement recommends the program be used for migration purposes only.

We recommend you stick with your platform's encryption: BitLocker for Windows and FileVault for Mac. There's not enough evidence to conclude that the TrueCrypt site was hacked, nor does the message imply a damaging practice, but still we recommend that you avoid TrueCrypt for the time being.

Here are a few alternative encryption tools for backing up your disk:

Read more:
TrueCrypt's cryptic warning is downright alarming

TrueCrypt Abruptly Ceases Development: Users Puzzled Over Sudden Discontinuation Of Popular Encryption Software

The abrupt discontinuation of the popular open-source encryption software TrueCrypt has left its users puzzled.

Users looking to download the TrueCrypt program on Wednesday from its official website were greeted with an ominous message warning users that the encryption software was inherently insecure.

The warning message reads:

WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues.

Following the initial warning message posted on the TrueCrypt site were instructions for migrating data from TrueCrypt to BitLocker, an encryption solution developed by Microsoft Corp. (NASDAQ:MSFT). According to TrueCrypts page, development behind the software ceased in May as Microsoft ended its support for Windows XP.

From TrueCrypts page:

This page exists only to help migrate existing data encrypted by TrueCrypt.

The development of TrueCrypt was ended in May after Microsoft terminated support of Windows XP. Windows 8/7/Vista and later offer integrated support for encrypted disks and virtual disk images. Such integrated support is also available on other platforms (click here for more information). You should migrate any data encrypted by TrueCrypt to encrypted disks or virtual disk images supported on your platform.

While alternative encryption solutions are available on Windows, Linux and Mac OSX, TrueCrypt was especially popular with users such as journalists for its hidden volume encryption feature, which created a hidden pocket of data within a standard TrueCrypt storage volume. This allowed its users some plausible deniability for that hidden data, even if they were forced to give up their password to the visible TrueCrypt encrypted storage volume.

Further adding to the mystery behind the abrupt change with TrueCrypt, the software has also been updated to provide only read-only access to data volumes created by previous versions of the encryption software.

Read the original post:
TrueCrypt Abruptly Ceases Development: Users Puzzled Over Sudden Discontinuation Of Popular Encryption Software