{"id":25297,"date":"2014-08-03T22:40:57","date_gmt":"2014-08-04T02:40:57","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25297"},"modified":"2014-08-03T22:40:57","modified_gmt":"2014-08-04T02:40:57","slug":"volokh-conspiracy-as-evidence-mounts-its-getting-harder-to-defend-edward-snowden","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/volokh-conspiracy-as-evidence-mounts-its-getting-harder-to-defend-edward-snowden.php","title":{"rendered":"Volokh Conspiracy: As evidence mounts, it\u2019s getting harder to defend Edward Snowden"},"content":{"rendered":"<p><p>By Stewart Baker August 3 at 9:39 PM         <\/p>\n<p>    The evidence is mounting that Edward Snowden and his journalist    allies have helped al Qaeda improve their security against NSA    surveillance. In May, Recorded Future, a predictive analytics    firm, publisheda    persuasive timelineshowing that Snowdens revelations    about NSAs capabilities were followed quickly by a burst of    new, robust encryption tools from al-Qaeda and its affiliates:  <\/p>\n<p>    This is hardly a surprise for those who live in the real world.    But it was an affront to Snowdens defenders, whove long    insisted that journalists handled the NSA leaks so responsibly    that no one can identify any damage that they have caused.  <\/p>\n<p>    In damage control mode, Snowdens defenders first    responded to the Recorded Future analysis by pooh-poohing the    terrorists push fornew encryption tools. Bruce    Schneierdeclared    that the change might actually hurt al Qaeda: I think this    will help US intelligence efforts. Cryptography is hard, and    the odds that a home-brew encryption product is better than a    well-studied open-source tool is slight.  <\/p>\n<p>    Schneier is usually smarter than this. In fact, the product al    Qaeda had been recommending until the leaks, Mujahidin    Secrets,probably didqualify ashome-brew    encryption.Indeed, Bruce Schneier dissedMujahidin    Secretsin 2008 on precisely that ground, saying No one    has explained why a terrorist would use this instead    ofPGP.  <\/p>\n<p>    But as a secondRecorded Future postshowed,the    products that replacedMujahidin Secretsrelied    heavily on open-source and proven encryption    software.Indeed, one of them uses Schneiers own,    well-tested encryption algorithm, Twofish.  <\/p>\n<p>    Faced with facts thatcontradicted his original defense of    Snowden, Schneier was quick tooffer    a new reason why Snowdensleaks and al Qaedas response    to them still wouldnt make any difference:  <\/p>\n<p>      Whatever the reason, Schneier says, al-Qaidas new encryption      program wont necessarily keep communications secret, and the      only way to ensure that nothing gets picked up is to not send      anything electronically. Osama bin Laden understood that.      Thats why he ended up resorting to couriers.    <\/p>\n<p>      Upgrading encryption software might mask communications for      al-Qaida temporarily, but probably not for long, Schneier      said.It is relatively easy to find vulnerabilities in      software, he added. This is why cybercriminals do so well      stealing our credit cards. And it is also going to be why      intelligence agencies are going to be able to break whatever      software these al-Qaida operatives are using.    <\/p>\n<p>    So, if you were starting to think that Snowden and his band of    journalist allies might actually be helping the terrorists,    theres no need to worry, according to Schneier,    becauseall encryption software is so bad that NSA will    still be able to break the terrorists communications and    protect us. Oddly, though, thats not what he says when he    isnt on the front lines with the Snowden Defense Corps.    Ina    2013 Guardian articleentitled NSA surveillance: A    guide to staying secure, for example, he offers very different    advice, quoting Snowden:  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/feeds.washingtonpost.com\/c\/34656\/f\/636635\/s\/3d2582fe\/sc\/24\/l\/0L0Swashingtonpost0N0Cas0Eevidence0Emounts0Eits0Egetting0Eharder0Eto0Edefend0Eedward0Esnowden0C20A140C0A80C0A30Ca0Ae828ca0E8ae20E4240A0Ea77a0E2847c46c53560Istory0Bhtml0Dwprss0Frss0Inational\/story01.htm\/RK=0\/RS=lG.H4PVMhPDSk8kzLoBR99ImUC0-\" title=\"Volokh Conspiracy: As evidence mounts, it\u2019s getting harder to defend Edward Snowden\">Volokh Conspiracy: As evidence mounts, it\u2019s getting harder to defend Edward Snowden<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> By Stewart Baker August 3 at 9:39 PM The evidence is mounting that Edward Snowden and his journalist allies have helped al Qaeda improve their security against NSA surveillance. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-25297","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25297"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25297"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25297\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}