CyCon 2016; Tallinn, Estonia

31 May to 3 June 2016; Tallinn, Estonia

In today’s increasingly complex cyberspace we see a variety of actors struggling to gain or maintain their position. The ubiquitous use of information and communication technologies has had a profound influence on how these actors pursue their goals and interests. The 8th International Conference on Cyber Conflict (CyCon 2016) will focus on ‘cyber power’ as one of the core elements of relations between different stakeholders and will discuss how the traditional concept of ‘power’ applies to cyberspace.

Both ‘hard’ and ‘soft power’ are being employed to achieve strategic and political goals through technical, legal and economic means. But how can we assess such power? How can we ensure that such power remains in the right hands? How can we ensure or enforce ‘cyber power’ without risking conflict escalation? How can we respond to exercises of this power with the right tools and measures? Is there a way to maintain a balance of power in cyberspace?

 

More information and Call For Papers submission details available here.

Global Knowledge Networking Strategic Launch; Geneva, Switzerland

September 15-17, Geneva, Switzerland.
The Global Challenges Forum Foundation and the United Nations Institute for Training and Research (UNITAR) are pleased to co-host the launch of the Global Knowledge Networking initiative in collaboration with the United States Department of Defense and the Middlebury Institute of International Studies at Monterey. The purpose of the Global Knowledge Networking initiative is to address global peace and security challenges by fostering innovative partnerships in the area of training and education. The initiative promotes the development of a cooperative framework among stakeholders involved at different levels and in different capacities in the design and delivery of training and education as well as in the facilitation of knowledge and experience-sharing to address the needs of the next generation of leaders.
 
The launch of the Global Knowledge Networking initiative will convene an exciting group of keynote speeches, panels, and open forum discussions with experts from around the world. The purpose of the event will be to enhance the understanding of the role the initiative could play in empowering future leaders, their organizations, and institutions to address global peace and security challenges. Conference participants will have the opportunity to shape the vision, mission, core functions, and structures of a future, tangible manifestation of the Global KnowledgeNetworking initiative — namely, to promote peace and security by making knowledge actionable through a next-generation, educational platform and complementing operational hub to enable smart decision-making and global partnerships.​

Passwords in Theory

Passwords. The latchkeys of our digital lives. They are seemingly inescapable, yet also surprisingly ineffective at providing the security that forms the basis of our economic and personal activities.

Humans have used passwords for thousands of years. We first see them as watchwords, a secret code one gives to the watchguards in a military situation in order to  authenticate yourself as a friendly. These were used in classical times, and even during World War 2. During the D-Day operation disparate airborne forces, some many miles from their intended zones, had to authenticate themselves to other groups of Allied forces on the ground. Hence they developed a password based authentication system, as seen below:

Guard’s Challenge: “Flash!”

Friendly’s Password: “Thunder!”

Guard’s Countersign: “Welcome!”

If any of these parts were missed, either side would know they were not dealing with a friendly, and possibly open fire.

Passwords also served a historic role in secret societies, authenticating yourself to people who you may have never met, such as in the Freemason signal of distress, “O Lord, My God, Is there no help for the Widow’s Son?” given by a Master Mason when his life is in danger to signal to all other Freemasons nearby that he is a Master Mason and demands their aid. However, even in contemporary times, these types of passwords failed for a number of reasons. When the membership of the group is not strictly controlled group passwords can be released and become public, making the authentication that the password is designed to accomplish fail completely. For instance, the secret codes and handshakes of Freemasonry were widely published in the 1800’s.

In the military context, there is the story of the 414 B.C.E. siege of the Syracusan city of Epipole by the Athenians. The Athenians were routed in part due to reliance on their watchword, which was quickly learned and used by their enemies. Thucydides records the rout as follows:

“the Athenians were seeking for one another, taking all in front of them for enemies, even although they might be some of their now flying friends; and by constantly asking for the watchword, which was their only means of recognition, not only caused great confusion among themselves by asking all at once, but also made it known to the enemy, whose own they did not so readily discover, as the Syracusans were victorious and not scattered, and thus less easily mistaken. The result was that if the Athenians fell in with a party of the enemy that was weaker than they, it escaped them through knowing their watchword; while if they themselves failed to answer they were put to the sword.”

 

These cases demonstrate some of the foibles of authentication using passwords. Of course, these problems are also present in our modern authentication systems. If a site like Rockyou is hacked, and the results are published online (in that case 32.6 million unencrypted email addresses and passwords) all the accounts are compromised. Moreover, due to the disastrously bad habit of password reuse across multiple sites, the impact spirals outwards onto many other sites. The Rockyou hack was especially broadly damaging because it provided attackers with a ready made dictionary of popular passwords for future use in dictionary attacks on other sites. Another hack with a similarly massive impact was the attack on Adobe, wherein 153 million 3DES encrypted passwords alongside unencrypted password hints were released. The inimitable comic xkcd does an excellent job of explaining the impact:

Encryptic

Above was shown the risk posed by publication of passwords. But what about modern Syracusan eavesdroppers? Keyloggers have become an almost ubiquitous tool in the surreptitious theft of login credentials and can take any number of forms, starting with cheap hardware sitting between the input device and the computing device, looking something like this:

More advanced versions of this idea are seen in the NSA’s ANT (Advanced Network Technology) catalog, with a keylogger that can be remotely illuminated by a radar system to receive back the keystrokes as they happen. There are also similar devices that act as a wireless bridge, built into the hardware of peripheral devices (keyboards/mice etc)  to allow access even to systems which have been isolated from the internet for security reasons. There are also many types of software keyloggers, operating at different levels and possibly residing in various data storage locations in the computer, making removal very difficult.

One of the more ubiquitous (and tragically weak) password architectures is used by ATM systems. Journalist Brian Krebs has made a lot of progress tracking the physical keylogging and magnetic strip skimming devices used in this field of cybercrime, which vary widely between fake keypads, skimmers and hidden video cameras, capturing the card data and the insecure 4 digit numerical passwords used by these systems.

There is another common vulnerability in the password based authentication systems used today- the “Forgot your Password?” link next to every login box on the internet. These systems, and the ability to call in and have a password reset just by guessing a few personal details, have made the spread of breaches much easier (your email account being comprised lets an attacker also reset many of your other passwords). This is in response to most people not being able to remember long and complicated passwords, especially when those passwords are used rarely or saved in browsers, letting them pass from memory entirely.

Another related issue is the use of password keeping services. These have become a popular method of creating and storing long and complicated passwords for all of a user’s online accounts. One of the online services for this is LastPass. LastPass recently revealed that they have been hacked, and that the attackers gained an encrypted list of all master passwords used by users to access their password vaults. The breach also revealed unencrypted password hints and email addresses. While not as troubling as the Adobe or Rockyou breaches due to better use of cryptography and individual salts, this breach demonstrates the danger of trusting a single point of failure in a user’s password scheme.

The combination of these issues shows fundamental problems in how passwords are employed, and the tenuous grasp most users have on their security. One response to this problem is to use biometric identifiers in place of password systems. This approach is based on the idea that the biometric signs collected and verified by the system are unique to the user. The most prevalent biometric in use today is the fingerprint.  Fingerprint biometric systems have been employed on the recent lines of the Iphone (5s and the 6 series) and on a number of other Apple products under a system which they call Touch ID. Biometric Identifiers have also been added to many national passports.

There are a few problems here, and for certain individuals the risk posed by reliance on biometrics is much greater than that posed by properly implemented password systems. Fingerprints are especially problematic in this regard. In 2008 a hacking collective called the Chaos Computer Club published the fingerprints of then German Interior Minister Wolfgang Schauble. The fingerprint was printed on a piece of plastic and distributed with the group’s magazine. The group apparently acquired his fingerprint from a glass of water he had used at a conference. In 2014 the group also published the fingerprint of the Defense Minister, Dr. von der Leyen. They acquired her fingerprint using photos they had taken of her thumb from 9 feet away using a standard camera. Previous to this, Starbug (the researcher who cloned the defense minister’s fingerprint), demonstrated a hack of Apple’s Touch ID less than 48 hours after the release of the Iphone 5s, the first product to carry it. Other systems of biometric identification such as voice detection and retinal scans can be similarly collected and faked, but at greater cost and effort and to start with are much more prone to false negatives. It is also worth noting here that while she was Secretary of State, Secretary Clinton sent a memo (later released by Wikileaks) asking State Department employees to gather biometric data on other world leaders and international diplomats.

Another method towards more secure authentication is the use of Two Factor Authentication (2FA). This is absolutely commendable and should be pursued. A more in-depth analysis of 2FA is somewhat outside of the scope of this essay, but should be engaged in, as there have been a number of cases in recent memory where poor implementation has defeated what is theoretically a superior system to the use of a password alone.

The conclusion that I have reached is that the best authentication solution lies in strong passwords, held in the only electronically inviolate space, memory. This is obviously not an easy task, but avoids many of the pitfalls of other systems. The problem then falls on the two component parts- what is a strong password, and how do we hold it in memory?

Strong Passwords

To address what a strong password is, it is absolutely necessary to begin from an attacker’s perspective. How are passwords attacked? In general there are three common methods (outside of direct theft through eavesdropping as covered earlier). These are: Brute Force attacks, Dictionary (and targeted dictionary) attacks, and Rainbow Table attacks. A brute force attack tries all possible characters for a given keyspace. This attack will always work. However, at longer password lengths it quickly becomes uneconomical or downright infeasible. At less than eight characters it is still entirely possible, as a password that is exactly eight characters long, including upper and lowercase a-z, numbers, and special characters/punctuation will only have 94^8 possibilities, or a total of around 6 quadrillion. Sure, this seems insane, but a brute force attack against even a number that astronomical is well within the capabilities of  a dedicated and well resourced attacker. A four character password would only have 94^4 possibilities, or around 78 million. That is very much within the computation abilities of a smartphone or home computer to brute force within a reasonable timeframe. So to defeat the brute force attack, the key is to increase the length of the password. In this case, the attacker cannot usually assume a set password length, and so will try all 4 character passwords, then all five, all six and so on, which does add to the length of time necessary, but once the correct password is found the attack does not need to continue.

Dictionary attacks prey on an inherent weakness of users- the desire for simplicity. If choosing a six character password, an (english speaking) human is much more likely to pick kitten than they are to pick 1h4^B*.  If we go by the Oxford dictionary, there are only around 170,000 words in current use. Even when accounting in the dictionary for permutations like k1tt3n or K!tt3N, etc, a dictionary attack will take much less time to find most human generated passwords than a brute force attack. To defeat the dictionary attack: do not use single words, or single words with permutations as a password. However, let’s assume the attacker somehow knows we are only using all lowercase words and no numbers or special characters in our password and can design their attack accordingly. At one word long, the attacker needs to try 170,000 possibilities. At two (randomly chosen) words, they will need to deal with 170k^2 or about 29 billion possibilities. At three words in the phrase they are looking at 4.9 quadrillion. At four words they are already dealing with 835 quintillion, a keyspace that is essentially outside of the capabilities of even governments for the time being. An even more math heavy discussion of keyspace can be found here.

A targeted dictionary attacks preys on known information about the target. A custom dictionary is built and populated with common passwords and words which may be related to the target. To defeat this, passwords should have nothing to do with the user choosing them. No children, spouse, or pet names, no streets, no favorite bands or sports teams, no bible verses or names, etc.

To understand the rainbow table attack it is necessary to backtrack somewhat and explain how passwords are actually used and attacked in our systems. When a user types in their password, unless the system has been designed in a very insecure way (cough cough, Rockyou), that password is not used directly for authentication. The password is put through a one way fuction, called a hash function. This hash function runs on the user password, and only the output of the function is passed to the authentication service. The service then compares this received hash to the one listed in the database for that user, and decides to allow access or deny it. So (kitten) goes into the (hashFunction) yielding (1ad7e0fc), which is then checked against the database. The process with look something like this, of course dependent on the actual hash function used:

Notice here that small changes in the input result in very different output values. The important thing with hash functions is that the value created from the hash function and the hash function itself cannot be reversed to easily find the original input password. Even if the database or traffic of hashes is compromised by an attacker, all they have is the hashes, not the passwords used to generate them. They still cannot log in and gain the access of a normal user or impersonate them (one caveat is pass the hash attacks). To gain access they have to run the hash function themselves, brute forcing or dictionary attacking to find either the plaintext password that creates the hash, or another plaintext password which creates the same hash (called a collision). The Rainbow Table is a way to do the brute force attack beforehand, and simply have a rapidly searchable database of all of the possible hashes and the plaintext password that creates them. When combined with faster data storage methods such as solid state drives, the necessary plaintext password can be found very quickly indeed just by looking up the hash value. Mitigating the Rainbow table requires the system architect to use a system called cryptographic salting. In this system a different random string of characters is added to each password in the hashing process. The salt does not change on individual passwords, but each entry in the database has a different one. This means that to do a Rainbow Table attack, a full brute force table would need to be generated for every possible salt as well. This very quickly becomes impractical for just about all attackers.

The take away from this section is that passwords should be long, not consist of just one or two words even with permutations, and not be related to the user in any meaningful way. If words or a phrase are used, the words should ideally be uncommon, and numbers and special characters should also be used. Additionally, system architects need to use salts with hash functions to prevent Rainbow Table attacks. Password reuse across multiple sites should also be avoided if at all possible.

Memorable Passwords

As seen above, some of the optimal attributes for computer passwords are things like a high degree of randomness and a large character set. This, however, will result in passwords that are difficult for human users to remember; leading to practices such as keeping passwords written down at one’s desk or reliance on a password keeper in the cloud or otherwise. To balance these competing interests users need to develop personal systems for creating passwords that are both strong and memorable.

The “Arts of Memory” as they are commonly understood were first put forward by ancient Greeks. One of the first methods in those arts, the “Method of Loci”, was invented by the poet Simonedes of Ceos,  apocryphally after he stepped out of a dining hall moments before the hall collapsed and killed those inside. During the excavation Simonedes was called upon to name the guests that were inside. He was able to complete the task by imagining where each guest was seated. This method works by associating each piece of data (someone’s name) with a location in imaginary space, leveraging natural capabilities for spatial memory. In antiquity and in modernity this method has been used to accomplish incredible feats of memory, such as monks in the Middle Ages memorizing entire books, or Simon Reinhard setting a world record in 2010 by memorizing the order of a shuffled deck of cards in 21.9 seconds.

If using method of loci for passwords, a few methods could be used. One could be imagining your house, and moving through it. Standing at the front door is a jackalope in a coma, holding an “@” sign. On the coffee table there are six big ribbons. Walking to the fridge there are two carrots hanging from it (^^). At the door to your bedroom are 12 pebbles you know are formed from Gneiss.  Combined, this imaginary walk through your house would help you remember that your password is jackalope,@6RIBBONS^^Gneiss12. At 29 characters long, this password is a bit unwieldy to type in. However, even if the attacker is only looking for 29 character passwords (unlikely) they would be dealing with 1.6×10^57 or 1.6 octodecillion possibilities, which should be basically unguessable. A computer capable of computing 10 quadrillion hashes per second (or capable of making 10 quadrillion login attempts per second) would need almost 5.27 decillion years to fully complete a brute force attack. In practice, due to probability, a brute force attack only needs to complete half of the possibilities before it is more likely than not that the correct password has been found, reducing expected time to solve to 2.635 decillion years, or about 191 sextillion times as long as our universe has existed. Also in practice this 10 quadrillion hash per second computer attacking your password can be upgraded to be twice as fast every 18 months according to the projection known as Moore’s law, though Moore’s law is not expected to continue to hold up for very long into the future due to physical limitations of computer chips, barring major leaps forward in quantum computing or nanotechnology. Suffice it to say your 29 character password using 94 possible characters should be safe from brute force attacks at least until long after your great-great-grandchildren are dead.

This said, method of loci is hardly even necessary to memorize a complex password, though it could certainly be useful and with dedicated practice even allow one to remember a completely random password accurately. A single complex image in memory can be used. Images that work best in this setting are those that are particularly humorous, macabre, profane or bizarre, as those tend to stick in the mind more than images which are mundane. For instance two komodo dragons fighting over a rubber ducky covered in hollandaise sauce and standing on a giant pound scale is an image that could help you to reliably remember the password 2komodoON#HOLLANDAISEducky, which at 26 characters is quite secure.

Another method of generating long memorable passwords is to create acronyms from memorized songs or phrases. For instance, in this case “row, row row, your boat gently down the stream, merrily, merrily, merrily, merrily, life is such a dream” could create the password 3R,ybgdts,4M,lisad if you remember to put in the commas and add numbers and capitalization for repeated words. This password is only 18 characters long, so not as secure by several orders of magnitude in comparison to some of our others, but is sufficient. Also, general knowledge of this method means that acronyms made from popular songs will be added to dictionary lists for dictionary attacks, including permutations, so well known songs or phrases from Shakespeare, the Bible or famous oratory are generally inadvisable. However if you memorized a song from someone’s b-track, or a random passage from Derrida or Joyce’s Ulysses, this method could prove workable and generally safe, especially if other characters are added in within your capabilities to remember them.

Conclusions

One of the safest systems of authentication we currently have is the use of a secret password. However, there are issues, including eavesdroppers and leak of passwords files, which can be very compromising. The best security strategy is one where a user has long and complex passwords for every login that she or he uses. The best way to maintain these passwords is by keeping them in the only safe space, the inside of your head. To aid in the task of maintaining a long list of passwords in memory, it is very helpful to use memory techniques and methods for creating complex passwords that are memorable.

 

 

 

Encryption as a Human Right- the Growth of “the Right to be Let Alone”

“The intensity and complexity of life, attendant upon advancing civilization, have rendered necessary some retreat from the world, and man, under the refining influence of culture, has become more sensitive to publicity, so that solitude and privacy have become more essential to the individual; but modern enterprise and invention have, through invasions upon his privacy, subjected him to mental pain and distress, far greater than could be inflicted by mere bodily injury.” – The Right to Privacy, Warren and Brandeis, 1890

The UN Human Rights Council Special Rapporteur on freedom of opinion and expression, David Kaye, has released a report declaring use of encryption and anonymization to be a Human Right. This development comes amid increasing movement by governments worldwide to restrict the use of these technologies.

Before addressing the content of the report it may prove instructive to delve into the foundations of privacy law in the West. One of the outstanding texts from the development period of privacy law is Warren and Brandeis’ “The Right to Privacy“, published in 1890. That essay concentrates primarily on establishing the idea of a right to privacy by examining common law in the US and the United Kingdom, and while it has little to say on the issue of government regulation of encryption per se, there is clear precedent for protection of a person’s papers and effects under the fourth amendment. The essay also establishes privacy as a right “to be let alone”. Warren and Brandeis focus specifically on the injury that may be caused by publication of material without the consent of those involved. One can see the Apple ICloud celebrity leak as a modern example of this type of damage.

So the picture that emerges here are two very different classes of privacy encroachment. The first is the publication of private details, be they of celebrities or not. This issue has dramatically changed in the age of self publishing, where there are essentially no barriers to entry for publishing, especially online. Many of the celebrity leaks have proven impossible to “un-publish” from the internet, and there is effectively no legal remedy for those who have been harmed.  The second encroachment relates to the role of government, a debate which has reached a fever pitch due to disclosure of numerous secret programs and secret laws by whistleblowers such as Edward Snowden.

The report by the Human Rights Council lays out other international foundations for privacy law, among them Article 12 of the Universal Declaration on Human Rights, which demands: “No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.” Further along, Article 19 states that “Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.”

So here are two moral justifications for privacy of individuals, that they are entitled to be “Let Alone” and that they have a right to free expression and opinion without interference. In practice, of course, limitations on these rights have been made in the public interest. A mafia kingpin may have his phone tapped or his mail opened by appropriate authorities under a legal framework, and this encroachment is seen generally as positive for the community, in that it serves the needs of justice. However, a program that taps all the phones in a country without any due process for individuals would violate the rights of opinion and security in property (including intangible goods). The balance here is difficult to strike, but considering that the effort here has been underway for quite a long time, it is entirely possible to reach a balance of the concerns of justice and of civil liberty, and most societies, through the use of warrants and court processes, have reached such a balance.

However, as it is apt to do, technology often throws a wrench in our attempts to balance competing concerns. This is the story of encryption. Encryption is hardly a new technology. Taking it from the greek roots, cryptography is the study of secret (crypto-) writing (-graphy). The classical Greeks themselves employed it within their military and government systems to ensure security. However, in the modern era the ubiquitous accessibility and necessity of secure communication (especially with the rise of the internet) has changed the landscape dramatically. The situation then arises where, even if it is in the public interest and under agreed upon legal frameworks to do so, enforcement bodies may never be able to decipher communications of their targets, legitimate or otherwise. “Strong” encryption is the backbone of much of the system of global commerce and communications that allows the internet to function economically.

The proponents of weakening encryption to make messages available to law enforcement often trot out a menagerie of bugbears, among them terrorists, financial criminals and child pornographers, all of whom are able to use encryption and anonymization technologies to evade the law and continue their activities against the public interest. In recent speeches James Comey, the director of the FBI, has lamented “Going Dark“, or the loss of surveillance capabilities against these targets leading to increased risk to the public. However, these government groups still recognize the importance of encryption in maintaining the “Right to be Let Alone” in the face of unauthorized actors; be they hackers, foreign governments, or what-have-you. In an attempt to balance these concerns governments have proposed a number of methods to preserve  individual security while at the same time allowing the government unfettered access to communications.  These include key escrow, where a copy or portions thereof of every user’s cryptographic key is held in a government repository, limiting the strength of cryptography to what can be easily broken by a government’s computing power but not the computing power of an ordinary ne’er-do-well,  and cryptographic backdoors which due to eccentricities of cryptosystems will allow individuals with secret knowledge of the system to break the encryption but no one else.

All of these proposals are problematic, mostly on the grounds of efficacy and human rights. Key escrow was proposed in the United States under the “clipper chip” system during the infamous “crypto wars” of the early 1990’s. While the most appealing of the proposed alternatives from an individual security perspective, the idea was seen as too Orwellian to be implemented in a nation that is generally distrustful of government. Even if the access to this key repository was controlled through a process of warrants, the existence of such a repository presents an outsize security risk in the event of a data breach. Also, under the routinely opaque processes of bureaucratic governance there is no surety that even the established protocols for obtaining the crypto keys of individuals would  always be followed.

Key shortening and other limitations on the strength of cryptographic technology also presents an outsize threat to the individual, as the processing power of governments, corporations, and hackers has grown. Where before only the NSA had the computing power to break certain algorithms, now that power has been democratized. A miscreant with a botnet or buying time on cloud servers could crack open the communications of one of their targets just as quickly as most foreign governments could. So then key shortening is shown to not be security at all anymore.

Finally, backdoors are the most troubling solution.   If a cryptosystem is presented as secure, but in reality has a weakness that allows it to be quickly broken open at limited computational cost by anyone who knows the secret, the personal security of every user of that system is now dependent on the security of that secret. If that secret escapes, then all is compromised. This sort of “Master Key” system is born of a particular type of hubris, that no one else is quite as clever as we are, and that therefore our secret is safe and will remain so. Unfortunately this method has been attempted covertly at least once, and exposed for the massive risk it is.

So in the face of absolutely justified concerns for the public safety with regards to encryption and anonymization, what can be done to balance these concerns with our tradition of human rights and free expression? While law enforcement bodies are justified in their fears of “Going Dark”, as of yet no proposals give appropriate concern to the established “Right to be Let Alone” or the traditions of international human rights. This act of balancing concerns continues, but the Special Rapporteur is absolutely correct in prioritizing fundamental human rights over law enforcement concerns.

 

 

 

A Heroin Dealer Tells the Silk Road Jury What It Was Like to Sell Drugs Online

A Heroin Dealer Tells the Silk Road Jury What It Was Like to Sell Drugs Online

For its two and a half years online, thousands of drug dealers sold every kind of narcotic imaginable on the anonymous online marketplace known as the Silk Road. But put one of the site’s heroin dealers in a courtroom and ask him questions under oath, and the scale and consequences of that drug empire suddenly […]

The post A Heroin Dealer Tells the Silk Road Jury What It Was Like to Sell Drugs Online appeared first on WIRED.



Gag Order Prevented Google from Disclosing WikiLeaks Probe for 3 Years

A month ago, Google said it does not publicly address individual cases when it comes to government requests for customer data “to help protect all our users.”

But on Wednesday, Google changed course after being ripped for failing to notify WikiLeaks that three years ago, Google handed over data to federal authorities about three staffers of the secret-spilling site as part of the government’s espionage probe of the site and its founder, Julian Assange. The reason for the three-year delay, Google said, was because it had been under a gag order that it was fighting.

“From January 2011 to the present, Google has continued to fight to lift the gag orders on any legal process it has received on WikiLeaks,” Al Gidari, a Google lawyer told The Washington Post. He said the media giant’s policy is to always challenge indefinite gag orders. The gags on these were partly lifted, he said.

Read 8 remaining paragraphs | Comments

CoinTerra, Yet Another Troubled Bitcoin Miner Startup, Goes Bust

The venture-backed Bitcoin startup CoinTerra has filed for bankruptcy, making it the second major miner manufacturer to do so in recent months.

The Chapter 7 filing, which begins the process of liquidating company assets, was submitted on Saturday and comes just weeks after a Utah-based data center sued CoinTerra over a contract dispute.

In June 2014, CoinTerra was sued by a California man for failing to deliver his miner on time. According to court filings, CoinTerra has $10 million to $50 million in combined estimated assets and liabilities and around 400 creditors spread out worldwide from Canada to Russia to Hong Kong.

Read 4 remaining paragraphs | Comments

Canada Joins World Powers in Spying on Smartphone and Download Data

Canada Joins World Powers in Spying on Smartphone and Download Data

In North America, the Canadians have long had to play country mouse to the flashier city mouse of the U.S. It’s the latter that gets all the attention, while the former sits quietly in a corner. But recent stories have shown just how big a player the Canadians are becoming—at least in the surveillance realm.

The post Canada Joins World Powers in Spying on Smartphone and Download Data appeared first on WIRED.



Silk Road Trial: Prosecutors Compare Ulbricht’s E-Mail with DPR’s Online Life

NEW YORK—IRS Special Agent Gary Alford showed a jury personal e-mails from Ross Ulbricht’s Gmail account that prosecutors say line up with chats and other records from the Silk Road drug-trafficking site.

In 2013, Alford searched through the Gmail account belonging to Ulbricht, the 30-year-old Texan who stands accused of being the mastermind behind the Silk Road drug-trafficking website. Alford’s testimony today compared information found on Ulbricht’s computer, including Silk Road expense sheets and chats with administrators, with Ulbricht’s personal Gmail account. Alford also looked through Ulbricht’s Facebook posts.

Prosecutors weren’t able to show any direct mentions of Silk Road on Ulbricht’s Gmail or on Facebook. Instead, they associated e-mails from Ulbricht’s personal life and receipts for travel and electronics with the data found on his laptop, which was open to a Silk Road management page when he was arrested in San Francisco.

Read 13 remaining paragraphs | Comments

Drone Maker to Add No-Fly Firmware to Prevent Future White House Buzzing

In the wake of a National Geospatial-Intelligence Agency employee’s late-night drunken mischief with a DJi Phantom 2 consumer quadrocopter drone over White House airspace, President Barack Obama called for new laws to govern the use of unmanned aerial vehicles. Meanwhile, the company that manufactured the drone used in the ill-fated flight has announced that it will issue a mandatory upgrade to the firmware for its Phantom 2 line of products to make sure that customers comply with the FAA’s no-fly zone around DC.

In a press release issued this morning, DJI announced that the firmware update “will help users comply with the FAA’s Notice to Airmen (NOTAM) 0/8326, which restricts unmanned flight around the Washington, DC metropolitan area.The updated firmware (V3.10) will be released in the coming days and adds a No-Fly Zone centered on downtown Washington, DC and extends for a 25 kilometer (15.5 mile) radius in all directions. Phantom pilots in this area will not be able to take off from or fly into this airspace.”

DJI’s Phantom 2 drones already have firmware settings that prevent them from being flown near airports and other places where officials have set restrictions on flight. According to the company’s statement, DJI is also continuing to update the no-fly zone list for future firmware releases to prevent flights in other sensitive areas—and to prevent drones from being flown across national borders.

Read 4 remaining paragraphs | Comments