{"id":25326,"date":"2014-08-05T14:42:27","date_gmt":"2014-08-05T18:42:27","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25326"},"modified":"2014-08-05T14:42:27","modified_gmt":"2014-08-05T18:42:27","slug":"as-evidence-mounts-its-getting-harder-to-defend-edward","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/edward-snowden\/as-evidence-mounts-its-getting-harder-to-defend-edward.php","title":{"rendered":"As evidence mounts, it\u2019s getting harder to defend Edward &#8230;"},"content":{"rendered":"<p><p>By Stewart Baker August 3         <\/p>\n<p>    The evidence is mounting that Edward Snowden and his journalist    allies have helped al Qaeda improve their security against NSA    surveillance. In May, Recorded Future, a predictive    analyticsweb intelligence firm,    publisheda    persuasive timelineshowing that Snowdens revelations    about NSAs capabilities were followed quickly by a burst of    new, robust encryption tools from al-Qaeda and its affiliates:  <\/p>\n<p>    This is hardly a surprise for those who live in the real world.    But it was an affront to Snowdens defenders, whove long    insisted that journalists handled the NSA leaks so responsibly    that no one can identify any damage that they have caused.  <\/p>\n<p>    In damage control mode, Snowdens defenders first    responded to the Recorded Future analysis by pooh-poohing the    terrorists push fornew encryption tools. Bruce    Schneierdeclared    that the change might actually hurt al Qaeda: I think this    will help US intelligence efforts. Cryptography is hard, and    the odds that a home-brew encryption product is better than a    well-studied open-source tool is slight.  <\/p>\n<p>    Schneier is usually smarter than this. In fact, the product al    Qaeda had been recommending until the leaks, Mujahidin    Secrets,probably didqualify ashome-brew    encryption.Indeed, Bruce Schneier dissedMujahidin    Secretsin 2008 on precisely that ground, saying No one    has explained why a terrorist would use this instead    ofPGP.  <\/p>\n<p>    But as a secondRecorded Future postshowed,the    products that replacedMujahidin Secretsrelied    heavily on open-source and proven encryption    software.Indeed, one of them uses Schneiers own,    well-tested encryption algorithm, Twofish.  <\/p>\n<p>    Faced with facts thatcontradicted his original defense of    Snowden, Schneier was quick tooffer    a new reason why Snowdensleaks and al Qaedas response    to them still wouldnt make any difference:  <\/p>\n<p>      Whatever the reason, Schneier says, al-Qaidas new encryption      program wont necessarily keep communications secret, and the      only way to ensure that nothing gets picked up is to not send      anything electronically. Osama bin Laden understood that.      Thats why he ended up resorting to couriers. Upgrading      encryption software might mask communications for al-Qaida      temporarily, but probably not for long, Schneier said.It is      relatively easy to find vulnerabilities in software, he      added. This is why cybercriminals do so well stealing our      credit cards. And it is also going to be why intelligence      agencies are going to be able to break whatever software      these al-Qaida operatives are using.    <\/p>\n<p>    So, if you were starting to think that Snowden and his band of    journalist allies might actually be helping the terrorists,    theres no need to worry, according to Schneier,    becauseall encryption software is so bad that NSA will    still be able to break the terrorists communications and    protect us. Oddly, though, thats not what he says when he    isnt on the front lines with the Snowden Defense Corps.    Ina    2013 Guardian articleentitled NSA surveillance: A    guide to staying secure, for example, he offers very different    advice, quoting Snowden:  <\/p>\n<p>      Encryption works. Properly implemented strong crypto systems      are one of the few things that you can rely on.    <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.washingtonpost.com\/news\/volokh-conspiracy\/wp\/2014\/08\/03\/as-evidence-mounts-its-getting-harder-to-defend-edward-snowden\/\" title=\"As evidence mounts, it\u2019s getting harder to defend Edward ...\">As evidence mounts, it\u2019s getting harder to defend Edward ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> By Stewart Baker August 3 The evidence is mounting that Edward Snowden and his journalist allies have helped al Qaeda improve their security against NSA surveillance. In May, Recorded Future, a predictive analyticsweb intelligence firm, publisheda persuasive timelineshowing that Snowdens revelations about NSAs capabilities were followed quickly by a burst of new, robust encryption tools from al-Qaeda and its affiliates: This is hardly a surprise for those who live in the real world. But it was an affront to Snowdens defenders, whove long insisted that journalists handled the NSA leaks so responsibly that no one can identify any damage that they have caused<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-25326","post","type-post","status-publish","format-standard","hentry","category-edward-snowden"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25326"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25326"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25326\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}