Edward Snowden makes video explaining how to avoid NSA tracking emails

Snowden made video to teach reporter how to speak with him securely It explains how to use Public Key Encryption to scramble online messages Privacy campaigners call on ordinary people to learn how to use the method

By Damien Gayle

Published: 06:17 EST, 14 May 2014 | Updated: 08:00 EST, 14 May 2014

46 shares

36

View comments

Whistleblower: The tutorial Edward Snowden made for reporters on to avoid NSA email surveillance has been made public for the first time

Ordinary people must learn to scramble their emails, privacy campaigners said today, as an encryption how-to video made by Edward Snowden was made public for the first time.

The former NSA employee who blew the whistle on the agency's all-pervasive online surveillance made the video to teach reporters how to communicate with him in secret.

The 12-minute clip, in which Mr Snowden has used software to distort his voiceover, explains how to use free software to scramble messages using a technique called Public Key Encryption (PKE).

View post:
Edward Snowden makes video explaining how to avoid NSA tracking emails

‘No Place to Hide’ by Glenn Greenwald portrays Edward Snowden as a ‘whistleblower in shining armor’

Glenn Greenwald, the reporter who broke the Edward Snowden story, offers further details on his contacts with Snowden and the US government's surveillance system.

There is very little middle ground with regard to Edward Snowden in polarized America. The former CIA snoop with a license to hack made a U-turn one year ago and blew the whistle on the surveillance state that he had served for eight years. Is he a hero or a felon, traitor or patriot, an immature narcissist or a martyr to the cause of freedom and privacy?

Subscribe Today to the Monitor

Click Here for your FREE 30 DAYS of The Christian Science Monitor Weekly Digital Edition

A few things seem indisputable. Snowden, a high school dropout who, in 2004 at age 21, enlisted in the US Army with the goal of freeing Iraqis from oppression, subsequently rose meteorically within Americas top-secret security apparatus. After a training accident cut his military career short, he went from security guard in 2005 to technical expert for the CIA in 2006. The following year he was stationed in Geneva, undercover with diplomatic credentials, as a cyber-security expert. Soon he would be earning well over six figures a year.

Clearly, this young man was really good with computers and that was enough for the CIA and later the National Security Agency (NSA). Both were hungry for talented people to staff their burgeoning digital data collection and surveillance projects with colorful names like PRISM and Blarney. Many new recruits on the frontlines of Americas cyber wars are, like Snowden, 20-somethings

In No Place to Hide: Edward Snowden, the NSA, and the US Surveillance State, bestselling author and Guardian journalist Glenn Greenwald tells how he broke the story on the trove of top secret documents that Snowden had spirited away from purportedly secure government computers. Snowden, it turns out, was a fan of Greenwalds reporting. He liked Greenwalds criticism of Americas post-9/11 security policies, including the warrantless wiretapping during George W. Bushs tenure. Snowden invited Greewald and another journalist to be the first to report on what he knew and the documents he had stolen. As shocking as anything else in this book is the fact that these three individuals months after documents had been downloaded appeared to be the only ones who were aware that Americas secrets had been compromised.

By 2010, having left the CIA, Snowden was working on NSA projects as a Dell Corporation employee. He had become disillusioned: The stuff I saw really began to disturb me. I could watch drones in real time as they surveilled the people they might kill. You could watch entire villages and see what everyone was doing. I watched NSA tracking peoples Internet activity as they typed. I became aware of how invasive US surveillance capabilities had become. And almost nobody knew it was happening.

What was happening included the wholesale amassing of metadata about hundreds of millions of Americans: with the help of major providers like Verizon, Google, and AT&T, the NSA was gathering, analyzing, and storing telephone records, e-mail and Skype traffic, Facebook and other social media activity from people at home and abroad. Who Americans were communicating with, where, when, and for how long had become fair game regardless of whether these citizens were active in Al Qaeda or the 4-H Club. The agency also has the capacity to extract the content of these communications if it sees fit. The Wall Street Journal reported that the NSA interception system has the capacity to reach roughly 75% of all US Internet traffic. Famously, the NSA also was listening to German Chancellor Angela Merkels telephone conversations.

Greenwald writes: [Snowdens] archive revealed the technical means used to intercept communications: the NSAs taping of Internet servers, satellites, underwater fiber-optic cables, local and foreign telephone systems, and personal computers. If the NSA didnt reach its goal of collecting it all, it was gathering enough 20 billion communication events (Internet and telephone) from around the world daily, according to Greenwald that the agency could hardly store, much less analyze it.

The rest is here:
'No Place to Hide' by Glenn Greenwald portrays Edward Snowden as a 'whistleblower in shining armor'

Greenwald’s gripping tale of breaking Snowden leaks

In June 2013, Edward Snowden was sitting in his room at the Mira hotel in Hong Kong, watching the world react to the first of his explosive leaks about the NSA's out-of-control surveillance, when he was tipped off that the NSA might be closing in on him.

Snowden's identity as the source of the documents was still unknown to the public. But through a "net-connected device" he installed at his now-abandoned home in Hawaii to watch out for the watchers -- presumably an IP surveillance camera with microphone -- he knew when two people from the NSA showed up at the house looking for him, an NSA "police officer" and someone from human resources.

This is one of the new details revealed inNo Place to Hide, the much-anticipated book by journalist Glenn Greenwald, who worked with Snowden and documentary filmmaker Laura Poitras to publish a number of blockbuster stories about the NSA.

Snowden had known it would only be a matter of time before the NSA was on his trail -- he had intentionally left electronic footprints behind that would help the agency identify him as the leaker.

Though he could have covered his tracks -- the NSA's internal security was so poor the agency failed to catch him downloading thousands of documents over many weeks -- he hadn't wanted his colleagues to be subjected to needless suspicion or false accusations during the inevitable investigation that would follow the leaks. Snowden in fact intended to reveal his identity with the first story that was published, but Greenwald convinced him to wait so that the public's initial reactions would be focused on the NSA leaks and not the leaker.

The book, which is being released today, provides an extensive look at Greenwald's earliest encounters -- online and in person -- with the mysterious whistleblower who for months would only identify himself as Cincinnatus. It also expands on existing reporting about the agency's spy operations through the publication of more than 50 previously unpublished documents.

Although there may be little in the documents that's startling to anyone who has carefully followed the leak revelations over the last year, the book does a good job of providing an overview of what the documents and stories have revealed until now, while adding fresh detail. [One complaint with the book, however, is the lack of an index. Greenwald has said he plans to publish it online today, but this won't likely satisfy readers with print copies who don't want to jump on their computer or phone each time they want to find something in the book.]

Among the fresh details he reports -- the NSA routinely intercepts networking devices such as routers, servers, and switches as they're in transit from US sellers to international customers and plants digital bugging devices in them, before repackaging them with a factory seal and sending them on their way. Although it's been previously reported that the NSA, CIA and FBI intercept laptops to install spyware, the tampering with network hardware would potentially affect more users and data.

He also reports that US telecoms partnering with foreign telecoms to upgrade their networks help subvert foreign networks for the spy agency.

"The NSA exploits the access that certain telecom companies have to international systems, having entered into contracts with foreign telecoms to build, maintain, and upgrade their networks," he writes. "The US companies then redirect the target country's communications data to NSA repositories."

See the original post:
Greenwald's gripping tale of breaking Snowden leaks

Glenn Greenwald’s book reveals a wider net of US spying on envoys

By Charlie Savage

In May 2010, when the UN Security Council was weighing sanctions against Iran over its nuclear programme, several members were undecided about how they would vote. The American ambassador to the UN, Susan E Rice, asked the National Security Agency for help "so that she could develop a strategy," a leaked agency document shows.

The NSA swiftly went to work, developing the paperwork to obtain legal approval for spying on diplomats from four Security Council members Bosnia, Gabon, Nigeria and Uganda whose embassies and missions were not already under surveillance. The following month, 12 members of the 15-seat Security Council voted to approve new sanctions, with Lebanon abstaining and only Brazil and Turkey voting against.

Later that summer, Rice thanked the agency, saying its intelligence had helped her to know when diplomats from the other permanent representatives China, England, France and Russia "were telling the truth ... revealed their real position on sanctions... gave us an upper hand in negotiations... and provided information on various countries 'red lines.' "

The two documents laying out that episode, both leaked by the former NSA contractor Edward J Snowden, are reproduced in a new book by Glenn Greenwald, No Place to Hide: Edward Snowden, the NSA, and the US Surveillance State. The book is being published Tuesday.

Elements of the NSA's role in helping aid American diplomatic negotiations leading up to the Iran sanctions vote had been previously reported, including in an October 2013 article in the French newspaper Le Monde that focused on the agency's spying on French diplomats.

Greenwald's book also reproduces a document listing embassies and missions that had been penetrated by the NSA, including those of India, Brazil, Bulgaria, Colombia, the European Union, France, Georgia, Greece, Italy, Japan, Mexico, Slovakia, South Africa, South Korea, Taiwan, Venezuela and Vietnam. Aspects of that document were reported in June by The Guardian.

Revelations about NSA spying abroad, including on officials of American allies, has fuelled anger at the United States. But Caitlin Hayden, an NSA spokeswoman, noted that President Barack Obama sought to address those issues in January when he promised greater limits on spying aimed at allies and partners.

"While our intelligence agencies will continue to gather information about the intentions of governments as opposed to ordinary citizens around the world, in the same way that the intelligence services of every other nation do, we will not apologise because our services may be more effective," she said.

Rice's request for help in May 2010 was recounted in an internal report by the security agency's Special Source Operations division, which works with telecommunications companies on the American network.

Read more here:
Glenn Greenwald’s book reveals a wider net of US spying on envoys

Here’s how to chat with your Facebook friends using end-to-end encryption

Facebooks messaging application doesnt support encryption, but an open-source chat program, Cryptocat, has made it possible to chat with friends there over an encrypted connection.

The programs founder, Nadim Kobeissi, wrote Monday that the latest 2.2 version of Cryptocat can log a user into Facebook and pull his contact list in order to set up an end-to-end encrypted conversation.

Effectively, what Cryptocat is doing is benefitting from your Facebook Chat contact list as a readily available buddy list, he wrote.

The move could augment Cryptocats user base since new users wont have the chore of building a new contacts list, although they would need to download Cryptocats browser extension or iPhone application to benefit from encryption.

The security of emails and messages was brought sharply into focus by secret documents leaked by former U.S. National Security Agency contractor Edward Snowden revealing sophisticated online surveillance techniques used by the spy agency.

Facebook has said it could enable end-to-end encryption between users exchanging data, but said such technology is complicated and makes it harder for people to communicate.

Messages exchanged using Facebook are protected by SSL (Secure Sockets Layer) encryption, but that only encrypts data between an end user and Facebook. The social networking service would have access to the clear text of those conversations, which potentially could be surrendered to law enforcement under a court order.

(Click to enlarge.)

If two people are using Cryptocat, Facebook will know an exchange occurred between the two users and the time of their chat. But the messages themselves will only say: [encrypted message].

The fact that Facebook knows two people are chatting, a type of information known as metadata, should not be a deal breaker, Kobeissi wrote. Users presumably know theyre divulging that information already to Facebook by using their service.

See the article here:
Here's how to chat with your Facebook friends using end-to-end encryption

Cloud Computing Demands Cloud Data Encryption

Enterprises that have adopted the cloud are finding that while cloud computing confers very real benefits, it also creates significant security challenges, which traditional network and perimeter security measures are inadequate to address. Organizations must protect their data, rather than their infrastructure, if they use the cloud at all. Cloud data encryption is the answer.

When it comes to security, 2013 was the year of Edward Snowden. The NSA whisteblower exposed a vast, secretive program of systematic electronic surveillance. The implications for the enterprise are disturbing, especially in light of the NSA's infiltration of major cloud service providers' data centers worldwide. And eavesdropping hasn't been the only way that government agencies have gotten their hands on private data. A 2014 transparency agreement led to revelations of tens of thousands of government data requests voluntarily fulfilled by major cloud service providers in the last year alone.

Government spying isn't enterprises' only concern, of course. As more and more sensitive datamuch of it protected by data privacy regulations like HIPAA, HITECH, GLBA, and PCI DSSmakes its way into the cloud, the threats of data theft and inadvertent data leakage loom ever larger. Data breaches and compliance violations are serious business. Penalties can hit seven figures, and mandatory breach disclosures can deal catastrophic damage to organization's reputations.

Traditionally, enterprises have sought to secure their data from theft and leakage by locking it down behind a corporate perimeter, keeping it under the enterprise's control and rendering it less vulnerable to access by third parties. These days, however, many companies are finding the on-premises model untenable. Data is proliferating thanks to technology movements like Big Data and the Internet of Things. Meanwhile, mobility and BYOD demand anytime, anywhere access to applications and data. Supporting all these initiatives in-house would cost more than many organizations are willingor ableto invest, making the cloud an attractive alternative.

But with cloud computing comes a loss of control. When your data's housed on a third party's servers, how confident can you be that it's safe? And even if your cloud service providers make good on their promises of cloud encryption, who's to say they won't turn your data over to government agencies without your knowledge or consent? What about all the copies of your data being made, moved, and backed up as part of your cloud service providers' everyday operations?

For these reasons, 2014 looks set to be the year of encryption, as Enterprise Networking Planet contributor Paul Rubens wrote for BBC.com. Cloud data encryption solves many of the control challenges that enterprises face in the cloud. Even if cloud service providers are infiltrated or compelled to disclose data, for example, whatever is encrypted will remain unreadable to unauthorized viewers as long as enterprises retain control of their encryption keys. Additionally, placing the focus on the data rather than on infrastructure helps ensure that data will remain safe even if hardware vulnerabilities are exploited.

One common cloud data encryption solution involves service providers encrypting customers' data. That's the approach that major cloud service providers like Microsoft, Google, and Yahoo are taking. To help other cloud hosts and service providers offer encryption services, EMC last week announced its choice of the AFORE Solutions CloudLink SecureVSA to anchor its Encryption as a Service (EaaS) offering. EMC touts EaaS as a way for cloud hosts and cloud service providers to "offer their customers simple to deploy, pay-as-you-go data encryption," according to an AFORE statement.

What may make EaaS particularly attractive, both to the cloud service providers that offer it and the enterprises looking to adopt it, is its flexibility. CloudLink supports both VMware vSphere and Microsoft Hyper-V; runs in private, hybrid, and public cloud environments; and requires no additional hardware to deploy. It provides strong AES 256-bit encryption for data in rest and motion and, perhaps most critically, includes options for customers to manage their own encryption keys, ensuring the continued protection of their data even in the event of a breach. Service providers looking to beef up their security offerings and assuage their customers' security concerns may find it a useful tool. So might customers hoping to streamline their cloud encryption efforts.

On the other hand, for enterprises who've adopted any of a number of popular public cloud services like Salesforce, Box, Dropbox, or Google, client-side cloud data encryption may be the way to go. A number of cloud encryption gateways exist to enable enterprises to detect and encrypt sensitive data at the moment it leaves the corporate perimeter. These solutions require an infrastructure investment but can provide peace of mind for enterprises unwilling to trust cloud service providers' encryption promises.

Among vendors offering cloud encryption gateways, CipherCloud stands out with the robustness of its offering. CipherCloud's cloud data encryption solution comes pre-integrated with a number of popular public cloud services and boasts easy integration with any other cloud service the customer chooses. The vendor claims this helps ensure that encrypted data remains searchable, sortable, and reportablein other worlds, functionalin the cloud. A number of different encryption and tokenization options and granular control of their application to different data types helps enterprises maintain control over their data protection, as does enterprise-exclusive encryption key access and management. And data discovery and DLP tools enable customers to gain visibility and control of all their protected cloud data and the activity around it.

Link:
Cloud Computing Demands Cloud Data Encryption

Press Release: ADVA Optical Networking Launches Industry First with 100G Metro and Built-in Encryption

Press Release: ADVA Optical Networking Launches Industry First with 100G Metro and Built-in Encryption

ADVA Optical Networking SE / ADVA Optical Networking Launches Industry First with 100G Metro and Built-in Encryption . Processed and transmitted by NASDAQ OMX Corporate Solutions. The issuer is solely responsible for the content of this announcement.

New Technology Delivers Most Secure Transport for Big Data Era

Martinsried/Munich, Germany. May 14, 2014. ADVA Optical Networking http://www.advaoptical.com/ today launched its new 100G Metro technology http://www.advaoptical.com/en/innovation/100g-transport.aspx with built-in on-the-fly encryption. Fully integrated into the ADVA FSP 3000 http://www.advaoptical.com/en/products/scalable-optical-transport/fsp-3000.aspx , this is the first solution available on the market capable of transporting 100Gbit/s data rates with integrated line-side encryption. Designed specifically for users who need to transport enormous amounts of data in the most secure way possible, the ADVA 100G Metro with built-in encryption has already been deployed by a number of enterprises and service providers. Based upon the 4x28G technology of the original ADVA 100G Metro, this new solution continues to push the boundaries of 100Gbit/s connectivity services.

"The security of data has never been so important; its integrity never so public. We're living in a new era of data awareness," said Uli Schlegel, director, data center business development, ADVA Optical Networking. "In the wake of Heartbleed and other data security scares, businesses are only too aware of how vulnerable their mission-critical data is. How susceptible it is to theft and malicious use. Data security is now of paramount importance. At the same time, the volume of data has never been so immense. Transporting and protecting this data requires something purpose built, something special. That's what sets our 100G Metro with built-in encryption technology apart. It's the only product on the market capable of securely transporting big data."

Built upon Advanced Encryption Standard (AES) with a key size of 256 bits, the ADVA 100G Metro with built-in encryption features a Diffie Hellmann dynamic key exchange with over 60 exchanges per hour. It provides encryption at the lowest network layer and is completely agnostic to protocols such as Fibre Channel, InfiniBand and Ethernet. It also supports a wide variety of data rates from 5Gbit/s, to 10Gbit/s to 40Gbit/s and onto 100Gbit/s. To ensure compatibility in point-to-point and multi-hop infrastructures, the ADVA 100G Metro with built-in encryption uses optical transport network (OTN) framing. It also adds very little latency to the transmission link - less than 150 nanoseconds - compared to our non-encrypted version. This stands in stark contrast to higher layer encryption technologies that often add significant overhead and multiply the latency of the data stream.

One of the most unique features of the ADVA 100G Metro with built-in encryption is that it also encrypts the header and checksum of the signal, not just the payload or select bytes in the header. Every bit that enters one of our client ports is encrypted. This is one of the most important aspects to comprehensive data security. There are no snippets or breadcrumbs that remain unencrypted, nothing that may be intercepted. What's more, with the ADVA 100G Metro with built-in encryption it is possible to separate network and encryption management. This ensures extremely granular control as to who has access to your business' encryption management. This is vital for any organizations that are leasing encrypted services and don't want their service provider to be privy to their encrypted data.

"The introduction of our 100G Metro proved to be a defining moment in the big data era. One that introduced 100Gbit/s data transport to a whole new market," commented Christoph Glingener, CTO, ADVA Optical Networking. "Cost, space and power consumption have long been defining factors for data center connectivity. Now a fourth one has joined the list of top criteria - security. Businesses need to know that their data is intact and safe. They need to know their data can withstand any attempts at network intrusion, any attempts to be stolen. That's what our 100G Metro with built-in encryption does. It provides businesses with the most robust security possible; it provides them with a genuine peace of mind. With this technology they can focus purely on their core business objectives and not the security of their data."

Watch the latest 100G Metro with built-in encryption video for more information: http://adva.li/secure.

# # #

Continued here:
Press Release: ADVA Optical Networking Launches Industry First with 100G Metro and Built-in Encryption

Facebook encourages email providers to deploy STARTTLS encryption to block spy agencies

Facebook is pushing for more email providers to use STARTTLS, a technology that encrypts emails as they pass between servers and clients, after an analysis showed that any SMTP (Simple Mail Transfer Protocol) server that adds the feature now would start encrypting over half of its outbound email traffic.

STARTTLS is an extension for several communication protocols, including IMAP and POP3, SMTP, FTP and XMPP and allows a plain text connection to be upgraded to an encrypted one using the TLS (Transport Layer Security) or SSL (Secure Sockets Layer) protocols.

Researchers at Facebook recently analyzed a days worth of the companys email logs to determine how widely STARTTLS is deployed among email servers around the world. The company is in a good position to run such a test because it sends several billion notification emails every day to user email addresses hosted across millions of domain names.

We found that 76 percent of unique MX hostnames [email server hostnames] that receive our emails support STARTTLS, the Facebook researchers said Tuesday in a blog post. As a result, 58 percent of notification emails are successfully encrypted.

SSL certificates are successfully validated for around half of encrypted email traffic and the other half is opportunistically encrypted, the researchers said.

By opportunistic encryption Facebook refers to encrypted connections that are established despite the SSL certificate presented by the server not passing strict validation criteria. This can happen if the certificate is not signed by a trusted certificate authority, is expired or was not issued for the host name where it was used.

The Facebook researchers found that for over 99 percent of emails that were encrypted using opportunistic encryption the reason for certificate validation failures was a hostname mismatch, the certificates being otherwise acceptable.

Seventy-four percent of MX hosts that supported STARTTLS provided perfect forward secrecy (PFS), a property of some TLS cipher suites that prevents the decryption of previously captured traffic if the servers private key is later compromised.

The majority of email traffic sent by Facebook to servers with STARTTLS support was encrypted with the ECDHE-RSA-RC4-SHA and DHE-RSA-AES256-SHA cipher suites, but that was probably the result of those suites being preferred by the major email providers. When counted by unique deployments, the majority of servers used DHE-RSA-AES128-SHA.

The second most prevalent cipher suite by unique server IP addresses was AES128-SHA, which is concerning because it does not provide perfect forward secrecy, the Facebook researchers said.

The rest is here:
Facebook encourages email providers to deploy STARTTLS encryption to block spy agencies