Sat Apr 20 05:20:17 2024
EVENTS
 FREE
SOFTWARE
INSTITUTE

POLITICS
JOBS
MEMBERS'
CORNER

MAILING
LIST

NYLXS Mailing Lists and Archives
NYLXS Members have a lot to say and share but we don't keep many secrets. Join the Hangout Mailing List and say your peice.

DATE 2013-07-01

HANGOUT

2024-04-20 | 2024-03-20 | 2024-02-20 | 2024-01-20 | 2023-12-20 | 2023-11-20 | 2023-10-20 | 2023-09-20 | 2023-08-20 | 2023-07-20 | 2023-06-20 | 2023-05-20 | 2023-04-20 | 2023-03-20 | 2023-02-20 | 2023-01-20 | 2022-12-20 | 2022-11-20 | 2022-10-20 | 2022-09-20 | 2022-08-20 | 2022-07-20 | 2022-06-20 | 2022-05-20 | 2022-04-20 | 2022-03-20 | 2022-02-20 | 2022-01-20 | 2021-12-20 | 2021-11-20 | 2021-10-20 | 2021-09-20 | 2021-08-20 | 2021-07-20 | 2021-06-20 | 2021-05-20 | 2021-04-20 | 2021-03-20 | 2021-02-20 | 2021-01-20 | 2020-12-20 | 2020-11-20 | 2020-10-20 | 2020-09-20 | 2020-08-20 | 2020-07-20 | 2020-06-20 | 2020-05-20 | 2020-04-20 | 2020-03-20 | 2020-02-20 | 2020-01-20 | 2019-12-20 | 2019-11-20 | 2019-10-20 | 2019-09-20 | 2019-08-20 | 2019-07-20 | 2019-06-20 | 2019-05-20 | 2019-04-20 | 2019-03-20 | 2019-02-20 | 2019-01-20 | 2018-12-20 | 2018-11-20 | 2018-10-20 | 2018-09-20 | 2018-08-20 | 2018-07-20 | 2018-06-20 | 2018-05-20 | 2018-04-20 | 2018-03-20 | 2018-02-20 | 2018-01-20 | 2017-12-20 | 2017-11-20 | 2017-10-20 | 2017-09-20 | 2017-08-20 | 2017-07-20 | 2017-06-20 | 2017-05-20 | 2017-04-20 | 2017-03-20 | 2017-02-20 | 2017-01-20 | 2016-12-20 | 2016-11-20 | 2016-10-20 | 2016-09-20 | 2016-08-20 | 2016-07-20 | 2016-06-20 | 2016-05-20 | 2016-04-20 | 2016-03-20 | 2016-02-20 | 2016-01-20 | 2015-12-20 | 2015-11-20 | 2015-10-20 | 2015-09-20 | 2015-08-20 | 2015-07-20 | 2015-06-20 | 2015-05-20 | 2015-04-20 | 2015-03-20 | 2015-02-20 | 2015-01-20 | 2014-12-20 | 2014-11-20 | 2014-10-20 | 2014-09-20 | 2014-08-20 | 2014-07-20 | 2014-06-20 | 2014-05-20 | 2014-04-20 | 2014-03-20 | 2014-02-20 | 2014-01-20 | 2013-12-20 | 2013-11-20 | 2013-10-20 | 2013-09-20 | 2013-08-20 | 2013-07-20 | 2013-06-20 | 2013-05-20 | 2013-04-20 | 2013-03-20 | 2013-02-20 | 2013-01-20 | 2012-12-20 | 2012-11-20 | 2012-10-20 | 2012-09-20 | 2012-08-20 | 2012-07-20 | 2012-06-20 | 2012-05-20 | 2012-04-20 | 2012-03-20 | 2012-02-20 | 2012-01-20 | 2011-12-20 | 2011-11-20 | 2011-10-20 | 2011-09-20 | 2011-08-20 | 2011-07-20 | 2011-06-20 | 2011-05-20 | 2011-04-20 | 2011-03-20 | 2011-02-20 | 2011-01-20 | 2010-12-20 | 2010-11-20 | 2010-10-20 | 2010-09-20 | 2010-08-20 | 2010-07-20 | 2010-06-20 | 2010-05-20 | 2010-04-20 | 2010-03-20 | 2010-02-20 | 2010-01-20 | 2009-12-20 | 2009-11-20 | 2009-10-20 | 2009-09-20 | 2009-08-20 | 2009-07-20 | 2009-06-20 | 2009-05-20 | 2009-04-20 | 2009-03-20 | 2009-02-20 | 2009-01-20 | 2008-12-20 | 2008-11-20 | 2008-10-20 | 2008-09-20 | 2008-08-20 | 2008-07-20 | 2008-06-20 | 2008-05-20 | 2008-04-20 | 2008-03-20 | 2008-02-20 | 2008-01-20 | 2007-12-20 | 2007-11-20 | 2007-10-20 | 2007-09-20 | 2007-08-20 | 2007-07-20 | 2007-06-20 | 2007-05-20 | 2007-04-20 | 2007-03-20 | 2007-02-20 | 2007-01-20 | 2006-12-20 | 2006-11-20 | 2006-10-20 | 2006-09-20 | 2006-08-20 | 2006-07-20 | 2006-06-20 | 2006-05-20 | 2006-04-20 | 2006-03-20 | 2006-02-20 | 2006-01-20 | 2005-12-20 | 2005-11-20 | 2005-10-20 | 2005-09-20 | 2005-08-20 | 2005-07-20 | 2005-06-20 | 2005-05-20 | 2005-04-20 | 2005-03-20 | 2005-02-20 | 2005-01-20 | 2004-12-20 | 2004-11-20 | 2004-10-20 | 2004-09-20 | 2004-08-20 | 2004-07-20 | 2004-06-20 | 2004-05-20 | 2004-04-20 | 2004-03-20 | 2004-02-20 | 2004-01-20 | 2003-12-20 | 2003-11-20 | 2003-10-20 | 2003-09-20 | 2003-08-20 | 2003-07-20 | 2003-06-20 | 2003-05-20 | 2003-04-20 | 2003-03-20 | 2003-02-20 | 2003-01-20 | 2002-12-20 | 2002-11-20 | 2002-10-20 | 2002-09-20 | 2002-08-20 | 2002-07-20 | 2002-06-20 | 2002-05-20 | 2002-04-20 | 2002-03-20 | 2002-02-20 | 2002-01-20 | 2001-12-20 | 2001-11-20 | 2001-10-20 | 2001-09-20 | 2001-08-20 | 2001-07-20 | 2001-06-20 | 2001-05-20 | 2001-04-20 | 2001-03-20 | 2001-02-20 | 2001-01-20 | 2000-12-20 | 2000-11-20 | 2000-10-20 | 2000-09-20 | 2000-08-20 | 2000-07-20 | 2000-06-20 | 2000-05-20 | 2000-04-20 | 2000-03-20 | 2000-02-20 | 2000-01-20 | 1999-12-20

Key: Value:

Key: Value:

MESSAGE
DATE 2013-07-24
FROM Ruben Safir
SUBJECT Subject: [NYLXS - HANGOUT] Prying Eyes

http://news.cnet.com/8301-13578_3-57595202-38/feds-put-heat-on-web-firms-for-master-encryption-keys/



Feds put heat on Web firms for master encryption keys

Whether the FBI and NSA have the legal authority to obtain the master
keys that companies use for Web encryption remains an open question, but
it hasn't stopped the U.S. government from trying.
Declan McCullagh
by Declan McCullagh
July 24, 2013 4:00 AM PDT

0 comments
Facebook0
Twitter0
Linked In78
Google +
More

Large Internet companies have resisted the government's demands for
encryption keys requests on the grounds that they go beyond what the law
permits, according to one person who has dealt with these attempts.

Large Internet companies have resisted the government's demands for
encryption keys requests on the grounds that they go beyond what the law
permits, according to one person who has dealt with these attempts.
(Credit: Declan McCullagh)

The U.S. government has attempted to obtain the master encryption keys
that Internet companies use to shield millions of users' private Web
communications from eavesdropping.

These demands for master encryption keys, which have not been disclosed
previously, represent a technological escalation in the clandestine
methods that the FBI and the National Security Agency employ when
conducting electronic surveillance against Internet users.

If the government obtains a company's master encryption key, agents
could decrypt the contents of communications intercepted through a
wiretap or by invoking the potent surveillance authorities of the
Foreign Intelligence Surveillance Act. Web encryption -- which often
appears in a browser with a HTTPS lock icon when enabled -- uses a
technique called SSL, or Secure Sockets Layer.

"The government is definitely demanding SSL keys from providers," said
one person who has responded to government attempts to obtain encryption
keys. The source spoke with CNET on condition of anonymity.

The person said that large Internet companies have resisted the requests
on the grounds that they go beyond what the law permits, but voiced
concern that smaller companies without well-staffed legal departments
might be less willing to put up a fight. "I believe the government is
beating up on the little guys," the person said. "The government's view
is that anything we can think of, we can compel you to do."

A Microsoft spokesperson would not say whether the company has received
such requests from the government. But when asked whether Microsoft
would turn over a master key used for Web encryption or server-to-server
e-mail encryption, the spokesperson replied: "No, we don't, and we can't
see a circumstance in which we would provide it."

Google also declined to disclose whether it had received requests for
encryption keys. But a spokesperson said the company has "never handed
over keys" to the government, and that it carefully reviews each and
every request. "We're sticklers for details -- frequently pushing back
when the requests appear to be fishing expeditions or don't follow the
correct process," the spokesperson said.

Sarah Feinberg, a spokeswoman for Facebook, said that her employer has
not received requests for encryption keys from the U.S. government or
other governments. In response to a question about divulging encryption
keys, Feinberg said: "We have not, and we would fight aggressively
against any request for such information."

Apple, Yahoo, AOL, Verizon, AT&T, Opera Software's Fastmail.fm, Time
Warner Cable, and Comcast declined to respond to queries about whether
they would divulge encryption keys to government agencies.

Encryption used to armor Web communications was largely adopted not
because of fears of NSA surveillance -- but because of the popularity of
open, insecure Wi-Fi networks. The "Wall of Sheep," which highlights
passwords transmitted over networks through unencrypted links, has
become a fixture of computer security conventions, and Internet
companies began adopting SSL in earnest about three years ago.

"The requests are coming because the Internet is very rapidly changing
to an encrypted model," a former Justice Department official said. "SSL
has really impacted the capability of U.S. law enforcement. They're now
going to the ultimate application layer provider."

An FBI spokesman declined to comment, saying the bureau does not
"discuss specific strategies, techniques and tools that we may use."

NSA director Keith Alexander, shown here at a Washington, D.C. event
this month, has said that encrypted data are "virtually
unreadable."

NSA director Keith Alexander, shown here at a Washington, D.C. event
this month, has said that encrypted data are "virtually unreadable."
(Credit: Getty Images)

Top secret NSA documents leaked by former government contractor Edward
Snowden suggest an additional reason to ask for master encryption keys:
they can aid bulk surveillance conducted through the spy agency's fiber
taps.

One of the leaked PRISM slides recommends that NSA analysts collect
communications "upstream" of data centers operated by Apple, Microsoft,
Google, Yahoo, and other Internet companies. That procedure relies on a
FISA order requiring backbone providers to aid in "collection of
communications on fiber cables and infrastructure as data flows past."

Mark Klein, who worked as an AT&T technician for over 22 years,
disclosed in 2006 (PDF) that he met with NSA officials and witnessed
domestic Internet traffic being "diverted" through a "splitter cabinet"
to secure room 641A in one of the company's San Francisco facilities.
Only NSA-cleared technicians were allowed to work on equipment in the
SG3 secure room, Klein said, adding that he was told similar fiber taps
existed in other major cities.
Related posts

House narrowly rejects bid to curb NSA domestic surveillance
FISA court renews authority to collect phone records
Town considers licenses for 'drone hunting'
Group of tech giants to demand greater NSA transparency
Man offers NSA-spotting tour on Facebook; police not amused

But an increasing amount of Internet traffic flowing through those fiber
cables is now armored against surveillance using SSL encryption. Google
enabled HTTPS by default for Gmail in 2010, followed soon after by
Microsoft's Hotmail. Facebook enabled encryption by default in 2012.
Yahoo now offers it as an option.

"Strongly encrypted data are virtually unreadable," NSA director Keith
Alexander told (PDF) the Senate earlier this year.

Unless, of course, the NSA can obtain an Internet company's private SSL
key. With a copy of that key, a government agency that intercepts the
contents of encrypted communications has the technical ability to
decrypt and peruse everything it acquires in transit, although actual
policies may be more restrictive.

One exception to that rule relies on a clever bit of mathematics called
perfect forward secrecy. PFS uses temporary individual keys, a different
one for each encrypted Web session, instead of relying on a single
master key. That means even a government agency with the master SSL key
and the ability to passively eavesdrop on the network can't decode
private communications.

Google is the only major Internet company to offer PFS, though Facebook
is preparing to enable it by default.

Even PFS isn't complete proof against surveillance. It's possible to
mount a more advanced attack, sometimes called a man-in-the-middle or
active attack, and decode the contents of the communications.

A Wired article in 2010 disclosed that a company called Packet Forensics
was marketing to government agencies a box that would do precisely that.
(There is no evidence that the NSA performs active attacks as part of
routine surveillance, and even those could be detected in some
circumstances.)

The Packet Forensics brochure said that government agencies would "have
the ability to import a copy of any legitimate key they obtain
(potentially by court order)." It predicted that agents or analysts will
collect their "best evidence while users are lulled into a false sense
of security afforded by Web, e-mail or VOIP encryption."

With a few exceptions, even if communications in transit are encrypted,
Internet companies typically do not encrypt e-mail or files stored in
their data centers. Those remain accessible to law enforcement or the
NSA through legal processes.

Leaked NSA surveillance procedures, authorized by Attorney General Eric
Holder, suggest that intercepted domestic communications are typically
destroyed -- unless they're encrypted. If that's the case, the
procedures say, "retention of all communications that are enciphered" is
permissible.

Valerie Caproni, who was the FBI's general counsel at the time this
file photo was taken, told Congress that the government needs
"individualized solutions" when "individuals who put
encryption on their traffic."

Valerie Caproni, who was the FBI's general counsel at the time this file
photo was taken, told Congress that the government needs "individualized
solutions" when "individuals who put encryption on their traffic."
(Credit: Getty Images)

It's not entirely clear whether federal surveillance law gives the U.S.
government the authority to demand master encryption keys from Internet
companies.

"That's an unanswered question," said Jennifer Granick, director of
civil liberties at Stanford University's Center for Internet and
Society. "We don't know whether you can be compelled to do that or not."

The government has attempted to use subpoenas to request copies of
encryption keys in some cases, according to one person familiar with the
requests. Justice Department guidelines say subpoenas may be used to
obtain information "relevant" to an investigation, unless the request is
"unreasonably burdensome."

"I don't know anyone who would turn it over for a subpoena," said an
attorney who represents Internet companies but has not fielded requests
for encryption keys. Even a wiretap order in a criminal case would be
insufficient, but a FISA order might be a different story, the attorney
said. "I'm sure there's some logic in collecting the haystack."

Kurt Opsahl, a senior staff attorney at the Electronic Frontier
Foundation, challenged the notion that current law hands the government
the power to demand master encryption keys. Even with a FISA order for
the private key, Opsahl said, the amount of technical assistance that a
company must provide to the NSA or other federal agencies "has a limit."

Federal and state law enforcement officials have previously said
encrypted communications were beginning to pose an obstacle to lawful
surveillance. Valerie Caproni, the FBI's general counsel at the time,
told a congressional hearing in 2011, according to a transcript:

Encryption is a problem, and it is a problem that we see for certain
providers... For individuals who put encryption on their traffic, we
understand that there would need to be some individualized solutions if
we get a wiretap order for such persons... We are suggesting that if the
provider has the communications in the clear and we have a wiretap
order, that the provider should give us those communications in the
clear.

"One of the biggest problems with compelling the [private key] is it
gives you access to not just the target's communications, but all
communications flowing through the system, which is exceedingly
dangerous," said Stanford's Granick.

Update, 11:40 a.m. PT: Adds additional comments from a Facebook
representative saying the company has not received such requests.

Disclosure: McCullagh is married to a Google employee not involved with
this issue.

  1. 2013-07-01 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Wished you were there...
  2. 2013-07-04 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] video miracles
  3. 2013-07-10 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] [group-digests-at-linkedin.com: The OU Job Board will be running a
  4. 2013-07-11 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] bad day at the office
  5. 2013-07-14 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Digital Revolution Stage II
  6. 2013-07-14 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] charter fishing
  7. 2013-07-14 Paul Robert Marino <prmarino1-at-gmail.com> Re: [NYLXS - HANGOUT] Digital Revolution Stage II
  8. 2013-07-15 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] getting a college education
  9. 2013-07-15 einker <eminker-at-gmail.com> Subject: [NYLXS - HANGOUT] Dell Add-in cards for Workstations and Dell Dimension PCs
  10. 2013-07-15 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] Dell Add-in cards for Workstations and Dell
  11. 2013-07-15 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] Dell Add-in cards for Workstations and Dell
  12. 2013-07-16 From: "Paul Robert Marino" <prmarino1-at-gmail.com> Re: [NYLXS - HANGOUT] Dell Add-in cards for Workstations and Dell Dimension PCs
  13. 2013-07-16 From: "Paul Robert Marino" <prmarino1-at-gmail.com> Re: [NYLXS - HANGOUT] Dell Add-in cards for Workstations and Dell Dimension PCs
  14. 2013-07-17 Paul Robert Marino <prmarino1-at-gmail.com> Subject: [NYLXS - HANGOUT] Weird Linux network question
  15. 2013-07-17 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] Weird Linux network question
  16. 2013-07-21 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] all your phones be mine
  17. 2013-07-21 From: "Paul Robert Marino" <prmarino1-at-gmail.com> Re: [NYLXS - HANGOUT] all your phones be mine
  18. 2013-07-21 From: "Paul Robert Marino" <prmarino1-at-gmail.com> Re: [NYLXS - HANGOUT] all your phones be mine
  19. 2013-07-22 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Big Brother is Watching You
  20. 2013-07-22 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Lt Gov caught getting blown by secretary at 100MPH by black box
  21. 2013-07-23 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] linux in government
  22. 2013-07-23 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] open everything
  23. 2013-07-23 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Free Software Jobs
  24. 2013-07-23 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Attempt Patent the World Wide Web - win $100mil
  25. 2013-07-24 Ruben <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] wall street
  26. 2013-07-24 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Gnome Blow up
  27. 2013-07-24 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Prying Eyes
  28. 2013-07-26 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] death by iphone
  29. 2013-07-26 Robert Menes <viewtiful.icchan-at-gmail.com> Re: [NYLXS - HANGOUT] death by iphone
  30. 2013-07-26 Elfen Magix <elfen_magix-at-yahoo.com> Re: [NYLXS - HANGOUT] death by iphone
  31. 2013-07-28 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Cure Suicide Now - More Coffee
  32. 2013-07-29 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] career moves
  33. 2013-07-29 Robert Menes <viewtiful.icchan-at-gmail.com> Re: [NYLXS - HANGOUT] career moves
  34. 2013-07-29 Elfen Magix <elfen_magix-at-yahoo.com> Re: [NYLXS - HANGOUT] career moves
  35. 2013-07-29 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] career moves
  36. 2013-07-29 Elfen Magix <elfen_magix-at-yahoo.com> Re: [NYLXS - HANGOUT] career moves
  37. 2013-07-31 Paul Robert Marino <prmarino1-at-gmail.com> Re: [NYLXS - HANGOUT] Free Software Jobs
  38. 2013-07-31 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] Free Software Jobs
  39. 2013-07-31 Paul Robert Marino <prmarino1-at-gmail.com> Re: [NYLXS - HANGOUT] Big Brother is Watching You

NYLXS are Do'ers and the first step of Doing is Joining! Join NYLXS and make a difference in your community today!