{"id":1640,"date":"2014-01-30T05:50:51","date_gmt":"2014-01-30T10:50:51","guid":{"rendered":"http:\/\/www.opensource.im\/?p=1640"},"modified":"2014-01-30T05:50:51","modified_gmt":"2014-01-30T10:50:51","slug":"us-crypto-researchers-to-nsa-if-you-must-track-track-responsibly","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/us-crypto-researchers-to-nsa-if-you-must-track-track-responsibly.php","title":{"rendered":"US crypto researchers to NSA: If you must track, track responsibly"},"content":{"rendered":"<p><p>Technology                <\/p>\n<p>        Nidhi Subbaraman        NBC News      <\/p>\n<p>      Jan. 27, 2014 at 3:23 PM ET    <\/p>\n<p>      Jim Lo Scalzo \/ EPA, file    <\/p>\n<p>      A Maryland State Trooper sits in an unmarked SUV outside the      grounds of the National Security Administration just north of      Washington, in Fort Meade, Md.    <\/p>\n<p>    A group of cryptography researchers from universities around    the country iscondemning the weakening of security    infrastructure by the U.S. government and NSA, and warning    against storing mass amounts of sensitive data.  <\/p>\n<p>    In the open letter published Friday, the researchers write that    data collection activities uncovered in the last 10 months    stand to \"chill free speech and invite many types of abuse,    ranging from mission creep to identity theft.\"  <\/p>\n<p>    The group hopes to improve the knowledge of privacy-preserving    technology that already exists, that could aid legal    surveillance proceed in a targeted manner. Should the NSA    choose to use them, the cryptographic research community has    and is developing tools and projects that can \"protect civil    liberties while enabling legit government    searches,\"Amit Sahai, a crypto researcher at UCLA who    signed the letter, told NBC News. Though, \"the exact ways in    which they would fit together would very much depend on the    precise questions that need to be addressed.\"  <\/p>\n<p>    For example, Sahai noted that a kind of secure communication    protocol would let phone companies  rather than the government     hold onto cell phone data, while allowing government entities    to selectively search for information on a suspect. In this    setup, the phone companies would not be privy to the exact    searches, and the government would not have access to all    available data.<\/p>\n<p>    In 2010, the FBI followed digital crumbs to track down a    bank-robbing duo whod been involved in a spate of teller    heists across Arizona and Colorado. After getting the    greenlight from a judge, feds analyzed data from four Verizon    cell towers near affected banks, and found one number that had    accessed three of those towers on the days each of the banks    was robbed.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Originally posted here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/feeds.nbcnews.com\/c\/35002\/f\/663301\/s\/366a618a\/sc\/7\/l\/0L0Snbcnews0N0Ctechnology0Cus0Ecrypto0Eresearchers0Ensa0Eif0Eyou0Emust0Etrack0Etrack0Eresponsibly0E2D11988777\/story01.htm\" title=\"US crypto researchers to NSA: If you must track, track responsibly\">US crypto researchers to NSA: If you must track, track responsibly<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Technology Nidhi Subbaraman NBC News Jan. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-1640","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/1640"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=1640"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/1640\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=1640"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=1640"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=1640"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}