Difference between revisions of "Edward Snowden"

From Wikispooks
Jump to navigation Jump to search
(crypto hole?)
m (Per today Russkie citizen)
 
(17 intermediate revisions by 8 users not shown)
Line 1: Line 1:
 
{{Person
 
{{Person
|constitutes=spook, computer expert
+
| constitutes     = Spook, Computer expert
|ON_constitutes=whistleblower
+
| ON_constitutes   = Whistleblower
|wikipedia=https://en.wikipedia.org/wiki/Edward_Snowden
+
| wikipedia       = https://en.wikipedia.org/wiki/Edward_Snowden
|image=Edward_Snowden.jpg
+
| image           = Edward_Snowden.jpg
|image_width=200px
+
| twitter          = https://twitter.com/Snowden
|twitter=Snowden
+
| birth_name       = Edward Joseph Snowden
|birth_name=Edward Joseph Snowden
+
| birth_date       = 1983-06-21
|birth_date=1983-06-21
+
| birth_place     = Elizabeth City, North Carolina, United States
|birth_place=Elizabeth City, North Carolina, United States
+
| exposed         = NSA/PRISM, NSA/Bullrun, NSA/Boundless Informant, NSA/Tempora
|exposed=NSA/PRISM, NSA/Bullrun, NSA/Boundless Informant, NSA/Tempora
+
| criminal_charge = Theft of government property, unauthorised communication of national defence information, and willful communication of classified intelligence to an unauthorised person
|criminal_charge=Theft of government property, unauthorised communication of national defence information, and willful communication of classified intelligence to an unauthorised person
+
| residence       = Russia
|residence=Russia
+
| description     = IT specialist and former contractor for the NSA, Edward Snowden's 2013 leaks about their mass surveillance programs were widely reported by the corporate media, an interesting contrast to the leaks of [[NSA#Whistleblowers|earlier whistleblowers]] that were roundly ignored.
|description=IT specialist and former contractor for the NSA, Edward Snowden's 2013 leaks about their mass surveillance programs were widely reported by the corporate media, an interesting contrast to the leaks of earlier [[whistleblowers]] that were roundly ignored.
+
| nationality     = American, Russian
|nationality=American
+
| criminal_charges = Theft of government property, unauthorized communication of national defense information, willful communication of classified intelligence to an unauthorized person (June 2013).
|criminal_charges=Theft of government property, unauthorized communication of national defense information, willful communication of classified intelligence to an unauthorized person (June 2013).
+
| website          = https://www.edwardsnowden.com
|employment=
+
| employment       ={{job
 +
|title=Spook
 +
|employer=CIA
 +
|start=2006
 +
|end=2009}}{{job
 +
|title=Contractor
 +
|employer=Dell
 +
|start=2009
 +
|end=2012}}
 
}}
 
}}
'''Edward Snowden''' is an American computer specialist, former [[CIA]] employee and [[NSA]] contractor who in 2013 disclosed [http://freesnowden.is/category/revealed-documents/index.html classified details of top-secret US mass surveillance programmes] to the press.
+
'''Edward Snowden''' is an American computer specialist, former [[CIA]] employee and [[NSA]] contractor who in [[2013]] disclosed classified details of top-secret US mass surveillance programmes to the press.<ref>http://freesnowden.is/category/revealed-documents/index.html</ref>
  
Snowden's identity was made public by ''[[The Guardian]]'' at his request on June 9, 2013. He explained:
+
Snowden's identity was made public by ''[[The Guardian]]'' at his request on June 9, [[2013]]. He explained:
:''"I have no intention of hiding who I am because I know I have done nothing wrong."''
+
{{QB|"I have no intention of hiding who I am because I know I have done nothing wrong."}}
  
==Background==
+
== Background ==
 
Snowden lived for some time in Switzerland. [[Ars Technica]] report that Snowden used the handle "TheTrueHOOHA" for some years there, noting that he opined that people who leak information should "be shot in the balls".<ref>http://arstechnica.com/tech-policy/2013/06/exclusive-in-2009-ed-snowden-said-leakers-should-be-shot-then-he-became-one/</ref>
 
Snowden lived for some time in Switzerland. [[Ars Technica]] report that Snowden used the handle "TheTrueHOOHA" for some years there, noting that he opined that people who leak information should "be shot in the balls".<ref>http://arstechnica.com/tech-policy/2013/06/exclusive-in-2009-ed-snowden-said-leakers-should-be-shot-then-he-became-one/</ref>
  
==The Breaking Point==
+
==Limited hangout?==
In a 2014 interview, Snowden was asked "What was the decisive moment or was there a long period of time or something happening, why did you do this?"
+
Edward Snowden receives unusual friendly treatment and is given a platform by the {{ccm}} [https://en.wikipedia.org/wiki/Edward_Snowden], in stark contrast to the "supersensitive" information he leaks. He mostly details ''what'' the NSA does, but not ''how the NSA does it''. He defected to Moscow, supporting a common [[enemy image]]. Other NSA whistleblowers defected in a similar fashion to Moscow in 1960 (Martin and Mitchell case) [https://de.wikipedia.org/wiki/%C3%9Cberlaufen_von_Martin_und_Mitchell].
 +
 
 +
== The Breaking Point ==
 +
 
 +
In a [[2014]] interview, Snowden was asked "What was the decisive moment or was there a long period of time or something happening, why did you do this?"
 
{{QB|I would say sort of the breaking point is seeing the [[Director of National Intelligence]], [[James Clapper]], directly lie under oath to [[United States Congress|Congress]]. There’s no saving an intelligence community that believes it can lie to the public and the legislators who need to be able to trust it and regulate its actions. Seeing that really meant for me there was no going back. |Edward Snowden, February 2014<ref name="NDR">http://www.ndr.de/ratgeber/netzwelt/snowden277_page-2.html</ref>}}
 
{{QB|I would say sort of the breaking point is seeing the [[Director of National Intelligence]], [[James Clapper]], directly lie under oath to [[United States Congress|Congress]]. There’s no saving an intelligence community that believes it can lie to the public and the legislators who need to be able to trust it and regulate its actions. Seeing that really meant for me there was no going back. |Edward Snowden, February 2014<ref name="NDR">http://www.ndr.de/ratgeber/netzwelt/snowden277_page-2.html</ref>}}
  
==Activities==
+
== Activities ==
A key developer of the anonymous surfing tool, [[Tor]], whom Snowden had invited to a crypto-party in Hawaii stated in 2014 "There was nothing about Tor that he didn’t already know." Snowden ran more than one Tor exit nodes. While at the [[NSA]] in Hawaii, Snowden organised a crypto-party on December 11, 2012.<ref name="wired">http://www.wired.com/2014/05/snowden-cryptoparty/</ref>
+
 
 +
A key developer of the anonymous surfing tool, [[Tor]], whom Snowden had invited to a crypto-party in Hawaii stated in [[2014]] "There was nothing about Tor that he didn’t already know." Snowden ran more than one Tor exit nodes. While at the [[NSA]] in Hawaii, Snowden organised a crypto-party on December 11, 2012.<ref name="wired">http://www.wired.com/2014/05/snowden-cryptoparty/</ref>
 +
 
 +
=== The Leak ===
  
==The Leak==
 
 
{{FA|Edward Snowden Affair}}
 
{{FA|Edward Snowden Affair}}
  
==Revelations==
+
== Revelations ==
 +
 
 
Snowden has revealed a lots of names of information gathering programs and technologies, including [[PRISM]], [[NSA call database]], and [[Boundless Informant]]. He also revealed details of [[Tempora]], a British black-ops surveillance program run by the NSA's British partner, [[GCHQ]].  
 
Snowden has revealed a lots of names of information gathering programs and technologies, including [[PRISM]], [[NSA call database]], and [[Boundless Informant]]. He also revealed details of [[Tempora]], a British black-ops surveillance program run by the NSA's British partner, [[GCHQ]].  
  
===Undermining of Cryptography===
+
=== Undermining of Cryptography ===
Snowden revealed a classified decryption program code named [[Bullrun]], which according to a ''[[New York Times]]'' story, costs the NSA around $250 million per year to insert backdoors in cryptographic software and hardware.<ref>{{cite news| url=http://www.nytimes.com/interactive/2013/09/05/us/documents-reveal-nsa-campaign-against-encryption.html | work=The New York Times | title=Secret Documents Reveal N.S.A. Campaign Against Encryption | date=5 September 2013}}</ref>  A Presidential advisory committee subsequently set up to examine NSA's conduct recommended among other things that the US government "fully support and not undermine efforts to create encryption standards".<ref name="advisory_panel">{{cite web|url=http://arstechnica.com/information-technology/2013/12/nsa-should-stop-undermining-encryption-standards-obama-panel-says/|title=NSA should stop undermining encryption standards, Obama panel says|publisher=Ars Technica}}</ref> In April 21, 2014, [[NIST]] withdrew [[Dual_EC_DRBG]] from its draft guidance on random number generators recommending "current users of Dual_EC_DRBG transition to one of the three remaining approved algorithms as quickly as possible."<ref name="nist_abandonment">{{cite news| url=http://www.nist.gov/itl/csd/sp800-90-042114.cfm | work=National Institute of Standards and Technology | title=NIST Removes Cryptography Algorithm from Random Number Generator Recommendations | date=21 April 2014}}</ref> Weaknesses in the cryptographic security of the algorithm were known and publicly criticised well before the algorithm became part of a formal standard endorsed by the [[American National Standards Institute|ANSI]], [[International Organization for Standardization|ISO]], and formerly by the [[National Institute of Standards and Technology]] (NIST).  One of the weaknesses publicly identified was the potential of the algorithm to harbour a [[kleptographic]] [[backdoor (computing)|backdoor]] advantageous to the algorithm's designers—the United States government's [[National Security Agency]] (NSA)—and no-one else. In 2013, ''The New York Times'' reported that documents in their possession but never released to the public "appear to confirm" that the backdoor was real, and had been deliberately inserted by the NSA as part of the NSA's [[Bullrun (decryption program)|Bullrun]] decryption program.  In December 2013, a Reuters news article alleged that in 2004, before NIST standardized Dual_EC_DRBG, NSA paid [[RSA Security]] $10 million in a secret deal to use Dual_EC_DRBG as the default in the [[RSA BSAFE]] cryptography library, which resulted in RSA Security becoming the most important distributor of the insecure algorithm.<ref name="NSApaid">{{cite news | url=http://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220 | title=Exclusive: Secret contract tied NSA and security industry pioneer | date=December 20, 2013 | agency=Reuters | accessdate=December 20, 2013 | author=Menn, Joseph | location=San Francisco}}</ref>  RSA responded that they "categorically deny" that they had ever knowingly colluded with the NSA to adopt an algorithm that was known to be flawed, saying "we have never kept [our] relationship [with the NSA] a secret".<ref name="RSA Company Statements">{{cite web|last=The Security Division of EMC|first=RSA,|title=RSA Response to Media Claims Regarding NSA Relationship|url=https://blogs.rsa.com/news-media-2/rsa-response/|publisher=RSA|accessdate=22 December 2013}}</ref>
+
 
 +
Snowden revealed a classified decryption program code named [[Bullrun]], which according to a ''[[New York Times]]'' story, costs the NSA around $250 million per year to insert [[backdoor]]s in cryptographic software and hardware.<ref>http://www.nytimes.com/interactive/2013/09/05/us/documents-reveal-nsa-campaign-against-encryption.html </ref>  A Presidential advisory committee subsequently set up to examine NSA's conduct recommended among other things that the US government "fully support and not undermine efforts to create encryption standards".<ref name=">http://arstechnica.com/information-technology/2013/12/nsa-should-stop-undermining-encryption-standards-obama-panel-says/</ref> In April 21, 2014, [[NIST]] withdrew [[Dual_EC_DRBG]] from its draft guidance on random number generators recommending "current users of Dual_EC_DRBG transition to one of the three remaining approved algorithms as quickly as possible."<ref name="nist_abandonment">http://www.nist.gov/itl/csd/sp800-90-042114.cfm</ref> Weaknesses in the cryptographic security of the algorithm were known and publicly criticized well before the algorithm became part of a formal standard endorsed by the [[American National Standards Institute|ANSI]], [[International Organization for Standardization|ISO]], and formerly by the [[National Institute of Standards and Technology]] (NIST).  One of the weaknesses publicly identified was the potential of the algorithm to harbour a [[kleptographic]] [[backdoor (computing)|backdoor]] advantageous to the algorithm's designers—the United States government's [[National Security Agency]] (NSA)—and no-one else. In 2013, ''The New York Times'' reported that documents in their possession but never released to the public "appear to confirm" that the [[backdoor]] was real, and had been deliberately inserted by the NSA as part of the NSA's [[Bullrun (decryption program)|Bullrun]] decryption program.  In December [[2013]], a Reuters news article alleged that in 2004, before NIST standardized Dual_EC_DRBG, NSA paid [[RSA Security]] $10 million in a secret deal to use Dual_EC_DRBG as the default in the [[RSA BSAFE]] cryptography library, which resulted in RSA Security becoming the most important distributor of the insecure algorithm.<ref name="NSApaid">http://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220 </ref>  RSA responded that they "categorically deny" that they had ever knowingly colluded with the NSA to adopt an algorithm that was known to be flawed, saying "we have never kept [our] relationship [with the NSA] a secret".<ref name="RSA Company Statements">https://blogs.rsa.com/news-media-2/rsa-response/</ref>
 +
 
 +
Sometime before its first known publication in [[2004]], a possible kleptographic [[backdoor (computing)|backdoor]] was discovered with the Dual_EC_DRBG's design, with the design of Dual_EC_DRBG having the unusual property that it was theoretically impossible for anyone but Dual_EC_DRBG's designers (NSA) to confirm the [[backdoor]]'s existence. [[Bruce Schneier]] concluded shortly after standardization that the "rather obvious" [[backdoor]] (along with other deficiencies) would mean that nobody would use Dual_EC_DRBG.<ref name="wired-schneier">https://web.archive.org/web/20140621062515/http://archive.wired.com/politics/security/commentary/securitymatters/2007/11/securitymatters_1115</ref>  The [[backdoor]] would allow NSA to decrypt for example [[Transport Layer Security|SSL/TLS]] encryption which used Dual_EC_DRBG as a CSPRNG.<ref name="green flaws">http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html</ref>
 +
 
 +
==Later activities==
 +
=== Architecture of Oppression ===
 +
{{YouTubeVideo
 +
|code=k5OAjnveyJo
 +
|align=right
 +
|width=300px
 +
|caption=[[COVID-19]] and the [https://www.realclearpolitics.com/video/2020/04/14/edward_snowden_goverments_are_using_coronavirus_to_build_global_architecture_of_oppression.html Architecture of Oppression] - [https://www.bitchute.com/video/7HVqKs0DXvs1/ Bitchute backup]
 +
}}
 +
 
 +
In an interview with [[VICE]] co-founder [[Shane Smith]] on 9 April [[2020]], Edward Snowden warned that governments are using the [[COVID-19/Pandemic|coronavirus pandemic]] as a pretext for building the "Architecture of Oppression".<ref>https://www.realclearpolitics.com/video/2020/04/14/edward_snowden_goverments_are_using_coronavirus_to_build_global_architecture_of_oppression.html</ref><ref>[https://medium.com/@caityjohnstone/they-are-rolling-out-the-architecture-of-oppression-now-because-they-fear-the-people-d0d374509d "They Are Rolling Out The Architecture Of Oppression Now Because They Fear The People"]</ref> The future may be unpredictable, but global pandemics aren’t. There isn’t a single government on the planet that hasn’t been warned, repeatedly, that at some point a viral pandemic will sweep the globe, causing untold death and economic disruption. And yet most failed to prepare for the [[COVID-19|novel coronavirus]]. Snowden said: “Every academic, every researcher who's looked at this knew this was coming. Yet when we needed it, the system has now failed us, and it has failed us comprehensively.”
 +
 
 +
'''Smith''': Why does it seem like we're so ill-prepared?
 +
 
 +
'''Snowden''': There is nothing more foreseeable as a public health crisis in a world where we are just living on top of each other in crowded and polluted cities, than a pandemic. And every academic, every researcher who's looked at this knew this was coming. And in fact, even intelligence agencies, I can tell you first hand, because I used to read the reports they had been planning for pandemics.
 +
 
 +
'''Smith''': Are autocratic regimes better at dealing with things like this than democratic ones?
 +
 
 +
'''Snowden''': I don't think so. I mean, there are arguments being made that [[China]] can do things that the [[United States]] can't. That doesn't mean that what these autocratic countries are doing is actually more effective.
 +
 
 +
'''Smith''': If you're looking at countries like [[China]], where cases seem to have levelled off, how much can we trust that those numbers are actually true?
 +
 
 +
'''Snowden''': I don't think we can. Particularly, we see the Chinese government recently working to expel Western journalists at precisely this moment where we need credible independent warnings in this region.
  
Sometime before its first known publication in 2004, a possible kleptographic [[backdoor (computing)|backdoor]] was discovered with the Dual_EC_DRBG's design, with the design of Dual_EC_DRBG having the unusual property that it was theoretically impossible for anyone but Dual_EC_DRBG's designers (NSA) to confirm the backdoor's existence. [[Bruce Schneier]] concluded shortly after standardization that the "rather obvious" backdoor (along with other deficiencies) would mean that nobody would use Dual_EC_DRBG.<ref name="wired-schneier">{{cite news | url=http://archive.wired.com/politics/security/commentary/securitymatters/2007/11/securitymatters_1115 | title=Did NSA Put a Secret Backdoor in New Encryption Standard? | work=[[Wired News]] | date=2007-11-15 | author=[[Bruce Schneier]] | archiveurl=https://web.archive.org/web/20140621062515/http://archive.wired.com/politics/security/commentary/securitymatters/2007/11/securitymatters_1115 | archivedate=2014-06-21 | deadurl=no}}</ref>  The backdoor would allow NSA to decrypt for example [[Transport Layer Security|SSL/TLS]] encryption which used Dual_EC_DRBG as a CSPRNG.<ref name="green_flaws">{{cite web|url=http://blog.cryptographyengineering.com/2013/09/the-many-flaws-of-dualecdrbg.html|title=The Many Flaws of Dual_EC_DRBG|author=Matthew Green}}</ref>
+
'''Smith''': It seems that [coronavirus] may be the greatest question of the modern era around civil liberties, around the right to privacy. Yet no one's asking this question.
  
 +
'''Snowden''': As [[authoritarianism]] spreads, as emergency laws proliferate, as we sacrifice our rights, we also sacrifice our capability to arrest the slide into a less liberal and less free world. Do you truly believe that when the first wave, this second wave, the 16th wave of the coronavirus is a long-forgotten memory, that these capabilities will not be kept? That these datasets will not be kept? Will those capabilities begin to be applied to small-time criminality, for political analysis, for doing things like performing a census, political polling?
  
 +
No matter how it is being used, what is being built is the Architecture of Oppression. And you might trust who is dealing with it today. You might trust who runs it. You don't care about [[Mark Zuckerberg]]. But someone else will have this data eventually, some other country. In your country, a different president will have this data eventually. And someone will abuse it.<ref>''[https://www.vice.com/en_us/article/bvge5q/snowden-warns-governments-are-using-coronavirus-to-build-the-architecture-of-oppression Snowden Warns Governments Are Using Coronavirus to Build the 'Architecture of Oppression’"]''</ref>
  
 +
== External links ==
 +
* [https://twitter.com/KerrHugh/status/454933553348759552/photo/1 Hugh Kerr speaking to the NUJ on defending Edward Snowden and other journalists exposing state surveillance] 11 April 2014
 +
 +
=== Related Discussions ===
 +
*https://SaidIt.net/s/whatever/comments/653g/usa_donald_trump_plans_to_drop_charges_against/
 +
*https://SaidIt.net/search?q=Snowden
 +
*https://SaidIt.net/search?q=Limited+Hangout
  
 
{{SMWDocs}}
 
{{SMWDocs}}
 +
 
==References==
 
==References==
 
{{Reflist}}
 
{{Reflist}}
 
==External links==
 
*[https://twitter.com/KerrHugh/status/454933553348759552/photo/1 Hugh Kerr speaking to the NUJ on defending Edward Snowden and other journalists exposing state surveillance] 11 April 2014
 
{{Stub}}
 
 
{{DEFAULTSORT:Snowden, Edward}}
 
[[category:Spooks]]
 
[[category:Whistleblowers]]
 

Latest revision as of 16:32, 26 September 2022

"Whistleblower"
Person.png Edward Snowden   Twitter WebsiteRdf-entity.pngRdf-icon.png
(Spook, Computer expert)
Edward Snowden.jpg
BornEdward Joseph Snowden
1983-06-21
Elizabeth City, North Carolina, United States
ResidenceRussia
NationalityAmerican, Russian
Criminal charge
Theft of government property, unauthorized communication of national defense information, willful communication of classified intelligence to an unauthorized person (June 2013).
Exposed • NSA/PRISM
• NSA/Bullrun
• NSA/Boundless Informant
• NSA/Tempora
Member ofBelmarsh Tribunal, Sam Adams Award
IT specialist and former contractor for the NSA, Edward Snowden's 2013 leaks about their mass surveillance programs were widely reported by the corporate media, an interesting contrast to the leaks of earlier whistleblowers that were roundly ignored.

Employment.png Spook Wikipedia-icon.png

In office
2006 - 2009
EmployerCIA

Employment.png Contractor

In office
2009 - 2012
EmployerDell

Edward Snowden is an American computer specialist, former CIA employee and NSA contractor who in 2013 disclosed classified details of top-secret US mass surveillance programmes to the press.[1]

Snowden's identity was made public by The Guardian at his request on June 9, 2013. He explained:

"I have no intention of hiding who I am because I know I have done nothing wrong."

Background

Snowden lived for some time in Switzerland. Ars Technica report that Snowden used the handle "TheTrueHOOHA" for some years there, noting that he opined that people who leak information should "be shot in the balls".[2]

Limited hangout?

Edward Snowden receives unusual friendly treatment and is given a platform by the commercially-controlled media [1], in stark contrast to the "supersensitive" information he leaks. He mostly details what the NSA does, but not how the NSA does it. He defected to Moscow, supporting a common enemy image. Other NSA whistleblowers defected in a similar fashion to Moscow in 1960 (Martin and Mitchell case) [2].

The Breaking Point

In a 2014 interview, Snowden was asked "What was the decisive moment or was there a long period of time or something happening, why did you do this?"

I would say sort of the breaking point is seeing the Director of National Intelligence, James Clapper, directly lie under oath to Congress. There’s no saving an intelligence community that believes it can lie to the public and the legislators who need to be able to trust it and regulate its actions. Seeing that really meant for me there was no going back.

Activities

A key developer of the anonymous surfing tool, Tor, whom Snowden had invited to a crypto-party in Hawaii stated in 2014 "There was nothing about Tor that he didn’t already know." Snowden ran more than one Tor exit nodes. While at the NSA in Hawaii, Snowden organised a crypto-party on December 11, 2012.[3]

The Leak

Full article: Edward Snowden Affair

Revelations

Snowden has revealed a lots of names of information gathering programs and technologies, including PRISM, NSA call database, and Boundless Informant. He also revealed details of Tempora, a British black-ops surveillance program run by the NSA's British partner, GCHQ.

Undermining of Cryptography

Snowden revealed a classified decryption program code named Bullrun, which according to a New York Times story, costs the NSA around $250 million per year to insert backdoors in cryptographic software and hardware.[4] A Presidential advisory committee subsequently set up to examine NSA's conduct recommended among other things that the US government "fully support and not undermine efforts to create encryption standards".[5] In April 21, 2014, NIST withdrew Dual_EC_DRBG from its draft guidance on random number generators recommending "current users of Dual_EC_DRBG transition to one of the three remaining approved algorithms as quickly as possible."[6] Weaknesses in the cryptographic security of the algorithm were known and publicly criticized well before the algorithm became part of a formal standard endorsed by the ANSI, ISO, and formerly by the National Institute of Standards and Technology (NIST). One of the weaknesses publicly identified was the potential of the algorithm to harbour a kleptographic backdoor advantageous to the algorithm's designers—the United States government's National Security Agency (NSA)—and no-one else. In 2013, The New York Times reported that documents in their possession but never released to the public "appear to confirm" that the backdoor was real, and had been deliberately inserted by the NSA as part of the NSA's Bullrun decryption program. In December 2013, a Reuters news article alleged that in 2004, before NIST standardized Dual_EC_DRBG, NSA paid RSA Security $10 million in a secret deal to use Dual_EC_DRBG as the default in the RSA BSAFE cryptography library, which resulted in RSA Security becoming the most important distributor of the insecure algorithm.[7] RSA responded that they "categorically deny" that they had ever knowingly colluded with the NSA to adopt an algorithm that was known to be flawed, saying "we have never kept [our] relationship [with the NSA] a secret".[8]

Sometime before its first known publication in 2004, a possible kleptographic backdoor was discovered with the Dual_EC_DRBG's design, with the design of Dual_EC_DRBG having the unusual property that it was theoretically impossible for anyone but Dual_EC_DRBG's designers (NSA) to confirm the backdoor's existence. Bruce Schneier concluded shortly after standardization that the "rather obvious" backdoor (along with other deficiencies) would mean that nobody would use Dual_EC_DRBG.[9] The backdoor would allow NSA to decrypt for example SSL/TLS encryption which used Dual_EC_DRBG as a CSPRNG.[10]

Later activities

Architecture of Oppression

COVID-19 and the Architecture of Oppression - Bitchute backup

In an interview with VICE co-founder Shane Smith on 9 April 2020, Edward Snowden warned that governments are using the coronavirus pandemic as a pretext for building the "Architecture of Oppression".[11][12] The future may be unpredictable, but global pandemics aren’t. There isn’t a single government on the planet that hasn’t been warned, repeatedly, that at some point a viral pandemic will sweep the globe, causing untold death and economic disruption. And yet most failed to prepare for the novel coronavirus. Snowden said: “Every academic, every researcher who's looked at this knew this was coming. Yet when we needed it, the system has now failed us, and it has failed us comprehensively.”

Smith: Why does it seem like we're so ill-prepared?

Snowden: There is nothing more foreseeable as a public health crisis in a world where we are just living on top of each other in crowded and polluted cities, than a pandemic. And every academic, every researcher who's looked at this knew this was coming. And in fact, even intelligence agencies, I can tell you first hand, because I used to read the reports they had been planning for pandemics.

Smith: Are autocratic regimes better at dealing with things like this than democratic ones?

Snowden: I don't think so. I mean, there are arguments being made that China can do things that the United States can't. That doesn't mean that what these autocratic countries are doing is actually more effective.

Smith: If you're looking at countries like China, where cases seem to have levelled off, how much can we trust that those numbers are actually true?

Snowden: I don't think we can. Particularly, we see the Chinese government recently working to expel Western journalists at precisely this moment where we need credible independent warnings in this region.

Smith: It seems that [coronavirus] may be the greatest question of the modern era around civil liberties, around the right to privacy. Yet no one's asking this question.

Snowden: As authoritarianism spreads, as emergency laws proliferate, as we sacrifice our rights, we also sacrifice our capability to arrest the slide into a less liberal and less free world. Do you truly believe that when the first wave, this second wave, the 16th wave of the coronavirus is a long-forgotten memory, that these capabilities will not be kept? That these datasets will not be kept? Will those capabilities begin to be applied to small-time criminality, for political analysis, for doing things like performing a census, political polling?

No matter how it is being used, what is being built is the Architecture of Oppression. And you might trust who is dealing with it today. You might trust who runs it. You don't care about Mark Zuckerberg. But someone else will have this data eventually, some other country. In your country, a different president will have this data eventually. And someone will abuse it.[13]

External links

Related Discussions


 

Quotes by Edward Snowden

PageQuoteSource
Nieuwsuur“The AIVD and MIVD are subordinates of the Americans. The Dutch work for the Americans. They do what we tell them to do. They aren't valued because of their capacity, but just because they give us a free passage, that's what the NSA uses them for. (...) Look what France is doing and even they couldn't stop all those terror attacks”Nieuwsuur
Privacy“Privacy is the right from which all others are derived. Without privacy there is only society, only the collective, which makes them all be and think alike. You can’t have anything yourself, you can’t have your own opinions, unless you have a space that belongs only to you. Arguing that you don’t care about privacy because you have nothing to hide is like saying you don’t care about freedom of speech because you have nothing to say...”Medium

 

Related Quotations

PageQuoteAuthorDate
Ron Johnson“We met delegation after delegation of European representatives. Basically the entire conversation was about Edward Snowden, about tapping Angela Merkel's phone. But then Charlie Hebdo happened. I haven't heard a word about Edward Snowden or what the American security services were trying to do. What I'm hearing now is 'Where's America?'”Ron Johnson2017
Nieuwsuur“The AIVD and MIVD are subordinates of the Americans. The Dutch work for the Americans. They do what we tell them to do. They aren't valued because of their capacity, but just because they give us a free passage, that's what the NSA uses them for. (...) Look what France is doing and even they couldn't stop all those terror attacks”Edward Snowden
Nieuwsuur
UFO“So, are Unacknowledged Special Access Programs out of control in the United States? Good question. The term "Special Access Program", let alone "Unacknowledged Special Access Program", is only very seldom mentioned in the media. For example, these terms have not been mentioned at all in relation to the NSA spy revelations in recent years of William Binney and Edward Snowden, even though one would expect that many of the NSA spy programs as PRISM, Stellar Wind, Boundless Informant and JTRIG fell into this category. The term "Special Access Program" did recently surface with regard to the Hillary Clinton email scandals. As Obama's secretary of state, Clinton, against protocol, maintained a private mailbox full of information on all kinds of Special Access Programs. No details on these programs have been provided.”Joël van der Reijden

 

Related Documents

TitleTypePublication dateAuthor(s)Description
Document:Checkbook Journalism & Leaking to the Highest Biddersarticle8 December 2013Sibel EdmondsA hard-hitting article on the Edward Snowden affair. Its author speaks with considerable authority on matters concerning intel/security whistle-blowing matters in the USA
Document:Cryptome’s searing critique of Snowden Incarticle13 February 2016Tim ShorrockCommentary on an interview with John Young and his wife Deborah Natsios by Pit Schultz of reboot.fm at the 'Transmedia 2016' event in Berlin on 6 February 2016
Document:GCHQ and Me: My Life Unmasking British EavesdroppersArticle3 August 2015Duncan CampbellNo one at the May 2015 conference on intelligence, security and privacy argued against greater openness. Thanks to Edward Snowden and those who courageously came before, the need for public accountability and review has become unassailable.
Document:Greenwald-Omidyar Joint Venture: The Blurring Lines Between Being A Source & Being A Journalistarticle13 December 2013Sibel Edmonds
Document:Mr Snowden, It’s Time to Come Out and Take a Stand Publicly as to Your Intentionsarticle15 December 2013Sibel Edmonds
Document:Omidyar’s PayPal Corporation Said To Be Implicated in Withheld NSA Documentsarticle11 December 2013Sibel Edmonds
Document:Saving Agent Snowden From His Handlers Greenwald & Omidyararticle24 October 2013Yoichi ShimatsuA long article on the Edward Sowden affair and the proposed 'alternative news' and whistleblowing-transparency initiative recently announced by Glenn Greenwald of Edward Snowden and Wikileaks revelations fame. It also contains plausible information about SIS involvement during the flight of Edward Snowden to Moscow via Hong Kong.
Document:Selling Secrets?article1 December 2013Glenn GreenwaldGlenn Greenwald's personal apologia - cum - mia-culpa. Written in response to devastating criticism of his motives and actions in the Edward Snowden affair to date.
Document:The Doomsday Insurance Cache That Was, and Then Never Wasarticle3 January 2014Sibel EdmondsPart 1 of a promised series of articles dissecting the published statements of the principal characters in what has become known as the Edward Snowden Affair. It highlights some glaring inconsistencies between those of Greenwald and Snowden and puts a shrewd question-mark over corporate media coverage of them.
Document:Vladimir Putin Interviewinterview5 September 2013Vladimir PutinPress interview with Vladimir Putin ahead of the September 2013 G20 meeting in St Petersburg
Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.



References