{"id":1268,"date":"2014-01-27T14:52:09","date_gmt":"2014-01-27T19:52:09","guid":{"rendered":"http:\/\/www.opensource.im\/?p=1268"},"modified":"2014-01-27T14:52:09","modified_gmt":"2014-01-27T19:52:09","slug":"prominent-cryptography-and-security-researchers-deplore-nsas-surveillance-activities","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/prominent-cryptography-and-security-researchers-deplore-nsas-surveillance-activities.php","title":{"rendered":"Prominent cryptography and security researchers deplore NSA&#8217;s surveillance activities"},"content":{"rendered":"<p><p>    Some of the most    prominent cryptography and security researchers in U.S.    academia have condemned the U.S. National Security Agencys    surveillance practices and called for change.  <\/p>\n<p>    Media reports    since last June have revealed that the US government conducts    domestic and international surveillance on a massive scale,    that it engages in deliberate and covert weakening of Internet    security standards, and that it pressures US technology    companies to deploy backdoors and other data-collection    features, the researchers said in an open    letter published Friday. As leading members of the US    cryptography and information-security research communities, we    deplore these practices and urge that they be changed.  <\/p>\n<p>    The letter was    signed by 53 people, most of them professors at top U.S.    universities and research institutions. The list includes some    of the biggest names in computer science, technology policy and    cryptography like Hal Abelson, professor at the Massachusetts    Institute of Technology and founding director of Creative    Commons and the Free Software Foundation; Edward Felten, the    director of the Center for Information Technology Policy at    Princeton University and former chief technologist for the U.S.    Federal Trade Commission; MIT professor Ronald Rivest, a    pioneer of modern public-key cryptography and of one the    creators of the widely used RSA encryption algorithm; and    renowned cryptographer Bruce Schneier.  <\/p>\n<p>    Dutch    cryptographer Niels Ferguson is also on the list. Ferguson was    one of the two Microsoft employees who in 2007 reported that    the Dual_EC_DRBG pseudorandom number generator standardized by    the U.S. National Institute of Standards and Technology had a    potential backdoor. According to media reports based on    documents leaked by former government contractor Edward    Snowden, the NSA pushed this flawed random number generator as    a standard as part of its efforts to defeat encryption.  <\/p>\n<p>    Inserting    backdoors, sabotaging standards, and tapping commercial    data-center links provide bad actors, foreign and domestic,    opportunities to exploit the resulting vulnerabilities, the    letter said. The choice is not between allowing the NSA to spy    or not, but between having a communications infrastructure    thats vulnerable to attack at its core and one thats by    default secure for all users, they said.  <\/p>\n<p>    Every country,    including our own, must give intelligence and law-enforcement    authorities the means to pursue terrorists and criminals, but    we can do so without fundamentally undermining the security    that enables commerce, entertainment, personal communication,    and other aspects of 21st-century life, the researchers said    in the letter. We urge the US government to reject    society-wide surveillance and the subversion of security    technology, to adopt state-of-the-art, privacy-preserving    technology, and to ensure that new policies, guided by    enunciated principles, support human rights, trustworthy    commerce, and technical innovation.  <\/p>\n<p>    The letter also    called for the U.S. government to subject all mass-surveillance    activities to public scrutiny, saying that the threat they pose    to privacy and democracy is evident, while the value they have    in preventing terrorism is unclear. They noted that the five    principles described on the reformgovernmentsurveillance.com    website that was set up by AOL, Apple, Facebook, Google,    LinkedIn, Microsoft, Twitter and Yahoo in response to the NSA    surveillance revelations provide a good starting point for    finding a way forward.  <\/p>\n<p>    According to    those principles, governments should, among other things, limit    surveillance to specific, known users rather than collect    Internet communications in bulk; set up an independent court    review system that includes an adversarial process; allow    companies to publish the number and nature of government    demands for user information; and permit the transfer of data    across borders, working with other governments to resolve    conflicts of legislation governing lawful requests for    data.  <\/p>\n<p>    According to    Matthew Green, a cryptography research professor at Johns    Hopkins University in Baltimore and one of the people who    signed the letter, the joint statement is indicative of the    trust the NSA has lost among academics.  <\/p>\n<p>    Up until 2013 if    youd asked most US security researchers for their opinions on    NSA, you would, of course, have heard a range of views, Green    said Saturday in a     blog post. But you also might have heard notes of (perhaps    grudging) respect. This is because many of the NSAs public    activities have been obviously in everyones interesthelping    to fund research and secure our information systems.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/2091720\/prominent-cryptography-and-security-researchers-deplore-nsas-surveillance-activities.html\" title=\"Prominent cryptography and security researchers deplore NSA's surveillance activities\">Prominent cryptography and security researchers deplore NSA's surveillance activities<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Some of the most prominent cryptography and security researchers in U.S. academia have condemned the U.S. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-1268","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/1268"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=1268"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/1268\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=1268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=1268"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=1268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}