Snowden says leaks fuelled needed debate

Former intelligence contractor Edward Snowden says he has no regrets over his leaks about mass surveillance programs, saying they sparked a needed public debate on spying and data collection.

Snowden, who spoke via video link from Russia to the SXSW festival in Austin, Texas, said he revealed the programs of the US National Security Agency and other such services to foster 'a better civic understanding' about what had been secret programs.

He said his decision to leak documents to journalists 'wasn't so I could single handedly change the government; what I wanted to do was inform the public so they could provide their consent to what we should do.'

Snowden, a former NSA contractor who has been in hiding in Russia and has been charged in the United States with espionage, maintained that 'every society in the world has benefited' from the debate on surveillance.

'Regardless of what happens to me, this is something we have a right to know,' he said on the link with members of the American Civil Liberties Union, who noted that the hookup was routed through seven proxy servers to keep his location secure.

Snowden, who appeared against a backdrop of a giant copy of the US constitution, said the NSA programs have fundamentally altered the rights outlined in the charter.

'The interpretation of the constitution has been changed from no unreasonable searches and seizures,' to any seizure is fine, just don't search it,'' he said.

Snowden said he chose to speak to SXSW because he believes it is important to encourage technology companies to make changes to stem mass surveillance.

'The people who are in the room in Austin right now, they are the folks who can really fix things through technical standards,' he said.

Snowden said more companies should adopt robust encryption that is built into communications without users having to use complex technical tools.

See the rest here:
Snowden says leaks fuelled needed debate

Congress on Privacy & Surveillance

Congress on Privacy & Surveillance [COPS]

A number of prominent international speakers will discuss your right to information self-determination, the politics of privacy, how to deal with the secret cosmopolitan state within a state, and how to go forward. It is a congress of individuals to represent what is not (yet?) represented by institutions.

Videos at links:

  • Caspar Bowden: FISA, PRISM and Data Protection
  • http://slideshot.epfl.ch/play/cops_bowden

  • Nikolaus Forgó: Privacy and European Law
  • http://slideshot.epfl.ch/play/cops_forgo

  • Axel Arnbak: The Question Lawyers Don't Ask: Can Law Address Total Transnational Surveillance?
  • http://slideshot.epfl.ch/play/cops_arnbak

  • Bruce Schneier: at Congress on Privacy & Surveillance
  • http://slideshot.epfl.ch/talks/179

  • Richard Hill: Internet Freedom, Snowden, and Dubai
  • http://slideshot.epfl.ch/talks/180

  • Bill Binney: Democracy and Surveillance Technology
  • http://slideshot.epfl.ch/talks/181

  • Jacob Appelbaum: at Congress on Privacy & Surveillance
  • http://slideshot.epfl.ch/talks/182

    Ten Steps You Can Take Right Now Against Internet Surveillance

    Ten Steps You Can Take Right Now Against Internet Surveillance

    https://www.eff.org/deeplinks/2013/10/ten-steps-against-surveillance

    One of the trends we've seen is how, as the word of the NSA's spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. But where to start?

    The bad news is: if you're being personally targeted by a powerful intelligence agency like the NSA, it's very, very difficult to defend yourself. The good news, if you can call it that, is that much of what the NSA is doing is mass surveillance on everybody. With a few small steps, you can make that kind of surveillance a lot more difficult and expensive, both against you individually, and more generally against everyone.

    Here are ten steps you can take to make your own devices secure. This isn't a complete list, and it won't make you completely safe from spying. But every step you take will make you a little bit safer than average. And it will make your attackers, whether they're the NSA or a local criminal, have to work that much harder.

  • Use end-to-end encryption. We know the NSA has been working to undermine encryption, but experts like Bruce Schneier who have seen the NSA documents feel that encryption is still "your friend". And your best friends remain open source systems that don't share your secret key with others, are open to examination by security experts, and encrypt data all the way from one end of a conversation to the other: from your device to the person you're chatting with. The easiest tool that achieves this end-to-end encryption is off-the-record (OTR) messaging, which gives instant messaging clients end-to-end encryption capabilities (and you can use it over existing services, such as Google Hangout and Facebook chat). Install it on your own computers, and get your friends to install it too. When you've done that, look into PGP–it's tricky to use, but used well it'll stop your email from being an open book to snoopers. (OTR isn't the same as Google Chat's option to "Go off the record"; you'll need extra software to get end-to-end encryption.)
  • Encrypt as much communications as you can. Even if you can't do end-to-end, you can still encrypt a lot of your Internet traffic. If you use EFF's HTTPS Everywhere browser addon for Chrome or Firefox, you can maximise the amount of web data you protect by forcing websites to encrypt webpages whenever possible. Use a virtual private network (VPN) when you're on a network you don't trust, like a cybercafe.
  • Encrypt your hard drive. The latest version of Windows, Macs, iOS and Android all have ways to encrypt your local storage. Turn it on. Without it, anyone with a few minutes physical access to your computer, tablet or smartphone can copy its contents, even if they don't have your password.
  • Strong passwords, kept safe. Passwords these days have to be ridiculously long to be safe against crackers. That includes the password to email accounts, and passwords to unlock devices, and passwords to web services. If it's bad to re-use passwords, and bad to use short passwords, how can you remember them all? Use a password manager. Even write down your passwords and keeping them in your wallet is safer than re-using the same short memorable password -- at least you'll know when your wallet is stolen. You can create a memorable strong master password using a random word system like that described at diceware.com.
  • Use Tor. "Tor Stinks", this slide leaked from GCHQ says. That shows much the intelligence services are worried about it. Tor is an the open source program that protects your anonymity online by shuffling your data through a global network of volunteer servers. If you install and use Tor, you can hide your origins from corporate and mass surveillance. You'll also be showing that Tor is used by everyone, not just the "terrorists" that GCHQ claims.
  • Turn on two-factor (or two-step) authentication. Google and Gmail has it; Twitter has it; Dropbox has it. Two factor authentication, where you type a password and a regularly changed confirmation number, helps protect you from attacks on web and cloud services. When available, turn it on for the services you use. If it's not available, tell the company you want it.
  • Don't click on attachments. The easiest ways to get intrusive malware onto your computer is through your email, or through compromised websites. Browsers are getting better at protecting you from the worst of the web, but files sent by email or downloaded from the Net can still take complete control of your computer. Get your friends to send you information in text; when they send you a file, double-check it's really from them.
  • Keep software updated, and use anti-virus software. The NSA may be attempting to compromise Internet companies (and we're still waiting to see whether anti-virus companies deliberately ignore government malware), but on the balance, it's still better to have the companies trying to fix your software than have attackers be able to exploit old bugs.
  • Keep extra secret information extra secure. Think about the data you have, and take extra steps to encrypt and conceal your most private data. You can use TrueCrypt to separately encrypt a USB flash drive. You might even want to keep your most private data on a cheap netbook, kept offline and only used for the purposes of reading or editing documents.
  • Be an ally. If you understand and care enough to have read this far, we need your help. To really challenge the surveillance state, you need to teach others what you've learned, and explain to them why it's important. Install OTR, Tor and other software for worried colleagues, and teach your friends how to use them. Explain to them the impact of the NSA revelations. Ask them to sign up to Stop Watching Us and other campaigns against bulk spying. Run a Tor node, or hold a cryptoparty. They need to stop watching us; and we need to start making it much harder for them to get away with it.
  • Cops more likely to kill you than Terrorists

    Cops more likely to kill you than Terrorists


    http://randazza.wordpress.com/2013/08/07/cops-more-likely-to-kill-you-than-terrorists/

    The next time you hear some whining coward (by that, I mean the majority of the American public) apologizing for the loss of our civil liberties in the name of “safety” from “terrorism,” remind them of this fact: You are eight times more likely to be killed by a cop than by a terrorist.

    http://www.cato.org/blog/youre-eight-times-more-likely-be-killed-police-officer-terrorist

    It is a little more nuanced than that, but the point is well taken.

    http://politicalscience.osu.edu/faculty/jmueller//ABAFIN.PDF

    At Home With Glenn Greenwald

    At Home With Glenn Greenwald

    http://motherboard.vice.com/read/meet-glenn-greenwald?trk_source=features1

    http://youtu.be/hoCPdLh_FiQ

    Before the Snowden revelations, the journalist Glenn Greenwald lived in Brazil with his husband, David Miranda, because American law didn't recognize their marriage. After the Defense of Marriage Act was struck down last June—the same month that Greenwald began publishing his reporting on Edward Snowden's revelations about the NSA—the couple faced a new reason not to relocate back to New York.

    "The UK and US governments hate the journalism that we're doing," he told VICE at his home near Rio de Janeiro, regarding Miranda's 11-hour detention and questioning by authorities at an airport in London in July. He was held under an anti-terror law, which was "a way of saying look at what it is we can do to people who defy us if we choose."

    In that injustice, however, Greenwald found a silver lining. "At the time that it happened, I was angry, I felt helpless, I was furious they would target someone peripheral to these events, instead of me or Laura or the other journalists with whom we've been working," he said. "But at the same time I found it incredibly emboldening. They showed their true face to the world, or to me, about how abusive they are when it comes to the exercise of their power. And that made me know just how compelling it was to continue to bring transparency to what it is that they're doing. And it showed how they can't be trusted to exercise power without transparency and accountability."

    Greenwald's new media venture, First Look Media, backed by eBay founder Pierre Omidyar, carries with it the anti-establishment ethos that has marked his journey from lawyer to op-ed columnist to reporter for places like Salon and the Guardian. Amidst criticism of Omidyar and eBay, particularly over their record in defending privacy and press freedoms, Greenwald has insisted that First Look and its journalists, like Laura Poitras, Jeremy Scahill and Bruce Schneier, will have editorial independence to pursue stories about surveillance and other controversial topics. And it promises a new model for supporting independent journalism, with an organizational structure that combines a for-profit news technology company with a news non-profit.

    "Over time I realized that you can only make an impact on any single political issue if you start understanding and confronting and ultimately subverting the patterns of how media institutions function," said Greenwald. "Once I really started engaging with media institutions, it was a gradual process by which I started understanding how journalism functions but also doing the kind of journalism that I thought was needed."

    Greenwald doesn't want to call the US government a "tyranny," but he doesn't hesitate to say that with its surveillance power, it has the hallmarks of one. His concern for privacy, conversely, is rooted in his interest in human liberty.

    "As psychological studies show, as all kinds of social science demonstrates, when you know you're being watched, you make choices that you believe that the judgment of society demands that you make," he said. "It's only when you can behave and choose and explore without judgmental eyes being cast upon you, that's really the realm where dissent and creativity and exploration exclusively reside."

    "So there are all kinds of political dangers to having privacy eroded, but there also really significant harms on the human and individual and personal level," he continued. "And there aren't many people articulating its value or defending it from erosion, so I perceived this need of defense of this value that I consider to be most important."