A Key NSA Overseer’s Alarming Dismissal of Surveillance Critics

The NSA's inspector general mischaracterized Edward Snowden's critique of the agency in remarks at Georgetown.

An NSA data-collection facility in Utah. (Reuters)

The National Security Agency's overseers have a spotty-at-best post-9/11 track record. The NSA carried out an illegal program of warrantless wiretapping during the Bush Administration. Even after the President's Surveillance Program was reformed, the agency built a surveillance dragnet that collected information on the private communications of millions of totally innocent Americans, a dramatic change in approach carried out without popular input or consent. And according to the FISA-court judges charged with overseeing the NSAthe very people who signed off on the phone dragnet, among other thingsthe agency has violated the Fourth Amendment and the law on at least thousands of occasions.

Some of those violations affected millions of people.

As well, insufficient operational security recently resulted in the theft of a still unknown number of highly classified documents by an employee of an NSA subcontractor. Civil libertarians and national-security statists alike have reason to be upset.

For all of these reasons, it must be a tough time to be George Ellard, the NSA's inspector general. The entity that he headsdeclares itself"the independent agent for individual and organizational integrity" within the NSA. "Through professional inspections, audits, and investigations," its website adds, "we work to ensure that the Agency respects Constitutional rights, obeys laws and regulations, treats its employees and affiliates fairly, and uses public resources wisely."

Since taking his post in 2007, Ellard has scarcely made a public statement. This week, however, he participated in a conference at Georgetown, and while efforts were reportedly made to keep his press exposure to a minimum, his remarks have been reported.

They're interestingand do not inspire confidence. We begin with the account provided by Kevin Gosztola:

Ellard was asked what he would have done if Snowden had come to him with complaints. Had this happened, Ellard says would have said something like, "Hey, listen, fifteen federal judges have certified this program is okay." (He was referring to the NSA phone records collection program.) "I would also have an independent obligation to assess the constitutionality of that law," Ellard stated. "Perhaps its the case that we could have shown, we could have explained to Mr. Snowden his misperceptions, his lack of understanding of what we do."

Even on their own, these comments are strange. Many aspects of the Section 215 phone dragnet are now public. Edward Snowden is on record with specific objections to them. The same goes for lots of other NSA initiatives: As they've been publicly fleshed out, Snowden has articulated why he believes the public ought to know about them. If Ellard understands what has transpired since last June, why is he speaking as if Snowden's leaks could've been averted if his supposed "misperceptions" had been corrected? That possibility isn't consistent with the facts. Knowing their actual nature, Snowden still thinks the programs should be public.

Read the original here:
A Key NSA Overseer's Alarming Dismissal of Surveillance Critics

Q&A: Schneier on trust, NSA spying and the end of US internet hegemony

Avere takes Edge-Core to the cloud

RSA 2014 Bruce Schneier is the man who literally wrote the book on modern encryption, publishing Applied Cryptography in 1994, and for the past 20 years has been an important and sometimes outspoken voice in the security industry.

He founded the firm Counterpane Internet Security (later sold to BT), and is also a board member of the Electronic Frontier Foundation and an Advisory Board Member of the Electronic Privacy Information Center.

More recently he's been working on documents released by Edward Snowden on NSA activities and presented his findings at this year's RSA conference in San Francisco. The Register took the opportunity of sitting down with Schneier at the event and chewing through the current state of security, privacy and government intrusion online.

The Reg: This conference opened with a statement from RSA chief Art Coviello regarding the use of the flawed NSA-championed Dual Elliptic Curve Deterministic Random Bit Generator in an encryption toolkit product.

Coviello said RSA did all it could to secure its software. What's your take on the affair?

Schneier: I believe that's true. When NIST came out with that RNG standard, it was one of four choices available, and those choices tracked other crypto suites. It made sense in a holistic way that there should be an elliptic curve in there. It was slower, it was kludgier, but some people thought that was a plus, not a minus.

By 2007 there was the first inkling that there might be a backdoor, but it was just guessing and it is part of the NIST standard. Any toolkit that says "we're compliant" [with a particular standard], which I'm sure is a requirement for all sorts of contracts, had to implement it.

My guess is that RSA didn't know anything was amiss and when a large customer comes in with technical changes that dont really matter you just do them. I think RSA was more a victim here, and I think it's been unfortunate that over the last couple of months they haven't been able to tell their story clearly.

It's hard to tease out who did what and when. Certainly, I didn't boycott the RSA conference I'm here for myself and the attendees, not for RSA and if I was going to list companies to boycott because of their NSA collaboration, RSA wouldnt even make the top 10.

Excerpt from:
Q&A: Schneier on trust, NSA spying and the end of US internet hegemony

How to Turn Off BitLocker® encryption Password for a Drive/Partition In Windows® 8.1 – Video


How to Turn Off BitLocker encryption Password for a Drive/Partition In Windows 8.1
If you want to update your PC or share drive with other user for a while, you can choose to turn off the BitLocker Encryption password. Here is how you can ...

By: iYogi

Go here to read the rest:
How to Turn Off BitLocker® encryption Password for a Drive/Partition In Windows® 8.1 - Video

How to encrypt your Kindle Fire HDX

Beyond just using a PIN code lock screen, Amazon's Kindle Fire HDX and HDX 8.9-inch tablets can also be secured with device encryption.

Device encryption can be a great way to keep your data secure in case it falls into the wrong hands. For many users, however, it can be overkill and there's usually a performance hit to a device that's been encrypted. Using a PIN code to lock the device is usually an effective deterrent and software tools like Find My iPhone and Android Device Manager can help track, lock, or wipe lost devices.

Unfortunately for Kindle Fire HDX owners, there's no app available that's comparable to Find My iPhone or Android Device Manager. If you want to be extra cautious with your data or if you're using a Kindle Fire HDX in an enterprise environment, here's how to encrypt it:

Step 1: Make sure you have the latest version of Fire OS installed, then fully charge your Kindle Fire HDX.

Step 2: With your Kindle Fire HDX plugged in to a wall charger, go to Settings > Security, then select Encryption.

Step 3: Tap on the "Encrypt tablet" button. If your Fire HDX isn't fully charged or plugged in, you won't see this option.

Step 4: If you have a PIN, you'll need to enter it, then set an encryption password. This password is different than your lock screen PIN. It will be used only when you boot up the Kindle Fire HDX.

Step 5: After you've entered your encryption password, tap the "Continue" button to begin the encryption process.

Your Kindle Fire HDX will reboot, then begin encrypting. Depending on the amount of data stored on your Kindle Fire HDX, the process could take up to an hour to complete, though our test Kindle only took 12 minutes.

Keep in mind that there's no way to decrypt your Kindle Fire HDX once it's been encrypted. To remove the encryption, you'll have to perform a factory reset and erase all your data. Additionally, if the wrong encryption password is entered 30 consecutive times, your Kindle Fire HDX will automatically be reset to factory defaults and your data erased.

Original post:
How to encrypt your Kindle Fire HDX

Accelerating the Network with Open Source Software, Erik Ekudden | OpenDaylight Summit 2014 – Video


Accelerating the Network with Open Source Software, Erik Ekudden | OpenDaylight Summit 2014
The OpenDaylight Project is an example of how openness, collaboration and innovation are changing the way networks develop. Open Source projects are helping ...

By: opendaylightproject

See the article here:
Accelerating the Network with Open Source Software, Erik Ekudden | OpenDaylight Summit 2014 - Video