9/11 turned the USA into “Brazil” (MUST-READ)

“Once she began working on her surveillance film in 2011, she raised her digital security to an even higher level. She cut down her use of a cellphone, which betrays not only who you are calling and when, but your location at any given point in time. She was careful about e-mailing sensitive documents or having sensitive conversations on the phone. She began using software that masked the Web sites she visited. After she was contacted by Snowden in 2013, she tightened her security yet another notch. In addition to encrypting any sensitive e-mails, she began using different computers for editing film, for communicating and for reading sensitive documents (the one for sensitive documents is air-gapped, meaning it has never been connected to the Internet).

“These precautions might seem paranoid — Poitras describes them as ‘pretty extreme’— but the people she has interviewed for her film were targets of the sort of surveillance and seizure that she fears. William Binney, a former top N.S.A. official who publicly accused the agency of illegal surveillance, was at home one morning in 2007 when F.B.I. agents burst in and aimed their weapons at his wife, his son and himself. Binney was, at the moment the agent entered his bathroom and pointed a gun at his head, naked in the shower. His computers, disks and personal records were confiscated and have not yet been returned. Binney has not been charged with any crime.”

***

How Laura Poitras Helped Snowden Spill His Secrets
By PETER MAASS

This past January, Laura Poitras received a curious e-mail from an anonymous stranger requesting her public encryption key. For almost two years, Poitras had been working on a documentary about surveillance, and she occasionally received queries from strangers. She replied to this one and sent her public key — allowing him or her to send an encrypted e-mail that only Poitras could open, with her private key — but she didn’t think much would come of it.

The stranger responded with instructions for creating an even more secure system to protect their exchanges. Promising sensitive information, the stranger told Poitras to select long pass phrases that could withstand a brute-force attack by networked computers. “Assume that your adversary is capable of a trillion guesses per second,” the stranger wrote.

Before long, Poitras received an encrypted message that outlined a number of secret surveillance programs run by the government. She had heard of one of them but not the others. After describing each program, the stranger wrote some version of the phrase, “This I can prove.”

Read more.

Leave a Reply

Your email address will not be published. Required fields are marked *