Categories
Links Writing

Question to SCOTUS: Can we even bring legal action over warrantless spying?

The EFF continues it’s long slog to challenge the US government’s warrantless wiretapping. At this point a series of cases have been dismissed, though the Supreme Court is now hearing a case to ascertain whether those who have been affected by the dragnet surveillance – lawyers, journalists, human rights lawyers – can challenge the statute given that it “prevents them from doing their job without taking substantial measures when communicating to overseas witnesses, sources and clients.”

This is an incredibly serious case. The outcome will not decide the legality of the statute itself but just whether it can be challenged. By anyone. A dismissal of the case – that is, a decision declaring that no one clearly has standing to challenge the statute – would prevent the existing intelligence operations from ever being challenged so long as the government avoids bringing warrantlessly-accessed data into a trial as evidence.

Watch this case; if it goes sideways then the American government will have (effectively) been given license by the highest court in the land to surveil Americans, without warrant, and without an effective means to prevent the surveillance.

Categories
Quotations

2012.10.30

It’s very complicated. It’s very cumbersome. There’s a lot of numbers involved with it.

Gov. Nikki Haley’s reason for why social security numbers stolen by a hacker weren’t encrypted
Categories
Links

While at first blush Lincoln Alexander has little to do with technology, the words that we exchanged when I received my first degree from Guelph continue to shape my engagement with technology. He also, in just a few sentences, gave me some of the best professional advice I’ve ever received in my life. Though our exchange at convocation wasn’t anywhere close to my first time speaking with Lincoln, nor would it be the last, it was the deepest and most significant. Alastair’s ‘goodbye’ captures my thoughts about Lincoln in as sincere a way as I’ve ever seen; I highly recommend watching Alastair’s address.

Categories
Videos

The many UI nightmares associated with Windows 8

Categories
Links

iMessage and ‘Secure’ Communications

Matthew Green has a good piece that discusses some of the security concerns around iMessage. Specifically he speaks to how, despite Apple’s assurances that it employs “secure end-to-end encryption,” the company still hasn’t properly explained how its encryption processes are established or deployed. Green does a good job explaining these concerns for a very non-technical audience. Highly recommended, especially if you happen to be using iMessage.

Categories
Links

When It Comes to Human Rights, There Are No Online Security Shortcuts

Patrick Ball has a good and highly accessible article over on Wired about why certain means of securing communications are problematic. It’s highly recommended. Rather than leave you with the overview of “this is what is said and why it’s important,” let me leave you with a key quotation from the article that (to my mind) nicely speaks to the author’s general mindset: “Good security is about not trusting people. It’s about studying math and software and assuring that the program cannot be turned to bad intent.”

Categories
Quotations

2012.8.13

Whenever we feel the urge to say “human values” or “social values,” perhaps we should immediately substitute a phrase closer to our intended meaning. If we mean “motives,” then let’s talk about them. If we mean “consumer preferences,” then say so. If we mean “the norms of a particular group in society,” then talk about those. If we mean “general moral principles that ought to guide our action,” then explore, define, and defend those principles. What we will find, I believe, is that these more specific topics are an improvement over the vague label, and that once we’ve begun using them, the word “values” can never again substitute meaningfully for more substantial terms and questions.

Langdon Winner, The Whale and the Reactor
Categories
Aside

Data Never Sleeps

How much media is generated every minute

Categories
Links

Vulnerabilities in Huawei Routers Discovered

While not exactly news that home and small enterprise routers tend to be insecure, the magnitude of the problems with Huawei’s devices was revealed at DefCon this year. Given the failure of the company’s engineers to recognize and navigate around longstanding security issues it seems particularly prudent for a public accounting of Huawei’s enterprise and ISP-focused routing products.

Categories
Quotations

2012.7.30

You hereby grant Ninja Tel permission to listen to, read, view and/or record any and all communications sent via the network to which you are a party,“ one section stated. “Before you get all upset about this, you already know full well that AT&T does this for the NSA. You understand that you have no reasonable expectation of privacy as to any on the Ninja Tel network. You grant Ninja Tel a worldwide, perpetual, assignable, royalty-free license to use any and all recorded or real-time communications sent via the Ninja Tel network to which you are a party. Don’t worry, most of this is for the lulz.

Ninja Tel Terms of Service (read more at Ars)