FBI Director: Encryption a 'Technical Failure'
- Organized crime sting, Operation J-Tornado, lands first conviction
CBC
10 hours ago
Police and prosecutors have obtained their first conviction as a result of Operation J-Tornado, a large drug operation targeting organized crime,which saw 29 people arrestedin New Brunswick, Nova Scotia and Quebec.
Clifford Hughes,34, pleaded guilty in Saint Johnprovincial court on Fridayto possession of cocaine for the purpose of trafficking, possession of marijuana for the purpose of trafficking, and breach of an undertaking.
He was sentenced to three years in prison, based on a joint recommendation by the Crown and defence.
Delta Faucet - Touch2O Technology
Delta Faucet Canada Sponsored
?
Hughes was in possession of a Blackberry used to send encrypted messages between himself and another man, the courtroom heard.
Police could not crack the messages, but using an informant were able to put a bugged phone in the mix and figured out what happened.
In total, Hughes moved four ounces of cocaine and 16 poundsof marijuana, said Crown prosecutor Nicole Poirier.
Posted via CB1010-18-14 12:14 AMLike 0 -
Is what Apple/Google is doing to encrypt devices enough to keep NSA out? None of us can say for sure, but you can bet that that's the goal they are trying to achieve. Is it enough to virtually guarantee that lesser agencies (FBI, CIA, TSA, ATF, etc.) can't decrypt your device? Almost certainly.
And while I'm the last person to defend the government's breeches of domestic systems like Google, Microsoft, Apple, etc., the fact still is that when NSA was doing that, they were primarily targeting foreign terrorists, and the occasional domestic terrorists. I doubt they care too much about the receipts from the DJ gear I buy or my discussions about smartphones, even if they can read them. The fact that they could have made a copy of my entire mailbox makes me angry, but there's also nothing in it that's of any interest to them, and even with the money they have, they don't have nearly enough staff to read my (or your) stuff "just because". They simply index everything they have and then, when they need to investigate a terrorist act or something, they do searches and try to link people together. None of that will affect you or me.10-18-14 11:34 AMLike 0 - And that is the kind of "police work" I was referring to: the classic techniques police have been using for years/decades.
Is what Apple/Google is doing to encrypt devices enough to keep NSA out? None of us can say for sure, but you can bet that that's the goal they are trying to achieve. Is it enough to virtually guarantee that lesser agencies (FBI, CIA, TSA, ATF, etc.) can't decrypt your device? Almost certainly.
And while I'm the last person to defend the government's breeches of domestic systems like Google, Microsoft, Apple, etc., the fact still is that when NSA was doing that, they were primarily targeting foreign terrorists, and the occasional domestic terrorists. I doubt they care too much about the receipts from the DJ gear I buy or my discussions about smartphones, even if they can read them. The fact that they could have made a copy of my entire mailbox makes me angry, but there's also nothing in it that's of any interest to them, and even with the money they have, they don't have nearly enough staff to read my (or your) stuff "just because". They simply index everything they have and then, when they need to investigate a terrorist act or something, they do searches and try to link people together. None of that will affect you or me.
http://lifehacker.com/why-your-priva...nyt-164588465010-18-14 01:53 PMLike 4 -
Has there been some outright abuse - NSA simply looking at nudes because they can? I'm certain that has happened, and it's not right. But the vast majority of the time, that's not what they're doing.
I think it's important to be upset about what actually happened that was wrong, without letting yourself fall for some of the over-the-top conspiracy theories that a few folks like to spread around. When you do that, it just makes you look weak-minded, and we're better than that here (I hope).10-18-14 09:10 PMLike 0 -
While I am sure viewing nude pictures is not at the top of their list, how are you sure other nefarious activities do not comprise a rather significant amount of their time?
When it has been revealed that a rather significant portion of their time was used to engage in spying on behalf of business interests (Brazilian oil interests, etc.), it would not be a stretch to believe that they are engaged in other less-than-honourable activities.
I highly recommend you watch the PBS documentary "United States of Secrets" where, self admittedly, a program that was once developed to actually monitor terrorist activities became perverted into something totally opposite of that. Heck, a portion of the initial coding in the data dragnet program that was made to ignore data collected on American citizens was purposely removed. Now, why would that be?
Part 1:
Part 2:
It absolutely frustrates me and scares me that a government surveillance state, no matter how glacial of a pace it moves toward our personal lives, is becoming an accepted norm by the general populous.
BB-Z10/STL 100-3 Black/RFF91LW/Software Release 10.2.1.2977/OS 10.2.1.3247 /SanDisk Ultra 64 GB MicroSDXC Class 10/UnlockedLast edited by Smitty13; 10-19-14 at 01:10 AM. Reason: Formatting video links
10-18-14 09:51 PMLike 2 - Again, I agree with you that there is and has been abuse. Your example is a legit issue, no question.
I'm talking about the folks who say "Apple/Google/Microsoft/Yahoo/etc. are in cahoots with the government to give them all of your data, and have secret meetings where they do this, etc." Clearly that is not the case. When the government gets into those systems, it is in spite of those companies' efforts to keep them out.
Of course, those companies all have to comply with legal requests for data, but that's not at all the same thing as installing a dedicated OC48 line to the FBI so they can hoover up everything that they want, or whatever people imagine is happening.10-18-14 10:47 PMLike 0 - Again, I agree with you that there is and has been abuse. Your example is a legit issue, no question.
I'm talking about the folks who say "Apple/Google/Microsoft/Yahoo/etc. are in cahoots with the government to give them all of your data, and have secret meetings where they do this, etc." Clearly that is not the case. When the government gets into those systems, it is in spite of those companies' efforts to keep them out.
Of course, those companies all have to comply with legal requests for data, but that's not at all the same thing as installing a dedicated OC48 line to the FBI so they can hoover up everything that they want, or whatever people imagine is happening.
Leak after leak that is presented to us courtesy of that one specific contractor has shown that many of these companies as well as cellular providers (e.g. AT&T) have provided the NSA carte blanche access to their data.
I needn't point any further than the example of Skype. Pre-Microsoft acquisition, Skype was a security beast which boasted a decentralized, encrypted P2P network, making decryption and overall detection very difficult. Upon the Skype acquisition by Microsoft, all of Skype's under the hood components changed to make all traffic flow through centralized Microsoft servers. Coincidentally, internal slides leaked (in the link above) also show that nearly the exact same date of that acquisition became the data that the NSA magically had access to Skype call and message data.
I honestly wonder sometimes if pointing out this factual evidence is even worth my time, as some people truly do believe that this is all just some elaborate tinfoil hat conspiracy theory.
Edit: SpellingLast edited by Smitty13; 10-18-14 at 11:50 PM.
10-18-14 11:31 PMLike 3 - The problem is with your stance is, is that it has been proven to varying degrees a very wide majority of these companies have been willing partners to the alphabet agencies, or in some cases, unwilling partners who cannot speak up due to a National Security Letter forbidding them from speaking out.
Leak after leak that is presented to us courtesy of that one specific contractor has shown that many of these companies as well as cellular providers (e.g. AT&T) have provided the NSA carte blanche access to their data.
I needn't point any further than the example of Skype. Pre-Microsoft acquisition, Skype was a security beast which boasted a decentralized, encrypted P2P network, making decryption and overall detection very difficult. Upon the Skype acquisition by Microsoft, all of Skype's under the hood components changed to make all traffic flow through centralized Microsoft servers. Coincidentally, internal slides leaked (in the link above) also show that nearly the exact same date of that acquisition became the data that the NSA magically had access to Skype call and message data.
I honestly wonder sometimes if pointing out this factual evidence is even worth my time, as some people truly do believe that this is all just some elaborate tinfoil hat conspiracy theory.
Edit: Spelling10-19-14 09:43 AMLike 0 - Where the argument is weak is that I fail to see proof of these companies being "willing" participants in the past. Participating? Absolutely, because they had no other legal recourse. But willing? Color me skeptical because otherwise it's a mighty coincidental timing that both Apple and Google somehow lost the keys to their houses at pretty well their next really major upgrade.
And IMO there is plenty of tinfoil hat conspiracy nut ranting going around. GOVERNMENT is spoken of as this thing but it is made up of an awful lot of generally normal people, as flawed as you and I, and some in positions of power will abuse it. As a matter of principle it is right and good that you and I oppose unwarranted snooping, but note that just where along that slippery slope the definition of "unwarranted" is, is a personal choice.10-19-14 09:59 AMLike 0 - Yeah. Some will be used unwittingly with the "I'm not doing anything wrong" argument to disparage those like minded individuals like myself. Then after that, it will become so obvious that even those individuals wake up. But it will be too late for them as no one will be left/there to assist at that point. We are now told to be politically correct, and understand that we don't know how to govern our own lives. We ALL need to be compliant with this new globalist social welfare. Of course, to keep us safe.....
So while everyone watches football today, someone else is drafting some more legislation about what we are "allowed" to do in our own country.
Posted via CB1010-19-14 10:05 AMLike 0 - Where the argument is weak is that I fail to see proof of these companies being "willing" participants in the past. Participating? Absolutely, because they had no other legal recourse. But willing? Color me skeptical because otherwise it's a mighty coincidental timing that both Apple and Google somehow lost the keys to their houses at pretty well their next really major upgrade.
And IMO there is plenty of tinfoil hat conspiracy nut ranting going around. GOVERNMENT is spoken of as this thing but it is made up of an awful lot of generally normal people, as flawed as you and I, and some in positions of power will abuse it. As a matter of principle it is right and good that you and I oppose unwarranted snooping, but note that just where along that slippery slope the definition of "unwarranted" is, is a personal choice.
In some instances however, this is not at all hard to gauge given the facts. Let's take AT&T for example. (Summary found here: http://www.dslreports.com/shownews/A...ll-Data-126555)
Not only have they complied with the demands of the alphabet agencies in terms of cloning fibre lines at network heads to allow for on demand data snooping, but even had their legal department assist the CIA by providing them with information on how best to skirt the law and what loopholes to look for. To top it off, they are provided $10 million per year for their services.
Does this sound like a company that was dragged kicking and screaming, or a company that saw a way to increase revenue and grab those lucrative government cellular contracts? If they were coerced or forced, why would they be receiving any money?
I think the answer is very clear here. People can surely point to grey area where the answer may not be so clear, but they cannot paint all instances with the same brush when they are so blatantly different.
Edit: Spelling
BB-Z10/STL 100-3 Black/RFF91LW/Software Release 10.2.1.2977/OS 10.2.1.3247 /SanDisk Ultra 64 GB MicroSDXC Class 10/Unlocked10-19-14 12:01 PMLike 0 - We've known that the phone carriers have been compromised since forever. They can be powerfully coerced due to various laws and the fact that they rely on the government for access to the airwaves.
But that's not nearly the same as saying that the major tech companies are willfully assisting the government - the fact that Microsoft integrated a major product that they bought with their own servers and systems is hardly proof of that; it's what any company would do in their situation. I don't believe any broad-based, willful conspiracies exist, and that's the "tinfoil had" stuff I'm talking about, stuff like: "Apple, Google, and Microsoft are all in bed with the government and so they have all your data!" I hear stuff like that a lot, and it simply isn't true.
Again, no one is saying that very real lines aren't being crossed, and that mistakes have been heavily exploited, but that's not at all the same thing. We should be angry and wary about what the government has done, and what they have done is plenty bad enough without embellishing it further.10-19-14 12:35 PMLike 0 - We've known that the phone carriers have been compromised since forever.
Similarly, you have forgotten one major point of what I referenced earlier, while AT&T is a major cellular carrier, they are also an internet provider, hence my reference to fibre line cloning. What more do you possibly want to display the complete and utter compliance of AT&T with the alphabet agencies? A signed Memo of Understanding by the CEO with the subject line, "I Agree to Wholesale Customer Data"? You are truly grasping at straws in this argument.
I don't believe any broad-based, willful conspiracies exist
A conspiracy theory would be along the lines of people perpetuating the idea that the Queen of England is in fact an alien sent to destroy Earth. Highly ludicrous. The idea that mass government surveillance has now percolated into many US tech firms with approval in exchange for monetary gain is not a conspiracy theory as leaks have been given to show this true.
Instances of mass data collection by the US government is well documented and supported by numerous data sources. Heck, do you think they built that massive Utah data center just to merely spy upon a select few individuals?
the fact that Microsoft integrated a major product that they bought with their own servers and systems is hardly proof of that; it's what any company would do in their situation.
In addition to that, you are showing your ignorance of how data works. If you were a company, would you wish to use a data transfer protocol that essentially is of little cost to you? Or would you choose to set up expensive equipment to make no noticeable gains in the end user experience? This is exactly what Microsoft did by setting up their "supernodes" to route all traffic through their servers. Would you invest great deals of man power and financial resources to retool a program that, for all intents and purposes, was working smoothly to begin with? Spare me the rhetoric on how this helped maintain an index of peers and handles NAT/firewall traversal for peers. This has been investigated and debunked to death.
I highly suggest you go back and watch the documentary I referenced you to...ah, who am I kidding? Of course you're going to reply and say you watched it and still hold the same position. I have come to learn that debating people who are willfully blind to the facts will inevitably lead you to nowhere.Last edited by Smitty13; 10-20-14 at 12:51 AM.
boi2012 likes this.10-19-14 01:25 PMLike 1
- Forum
- Popular at CrackBerry
- General BlackBerry News, Discussion & Rumors
FBI Director: Encryption a 'Technical Failure'
« BlackBerry is aiming at Professionals, which is good.... but.........
|
Would you use some BlackBerry Web services ? »
Similar Threads
-
Media Card Encryption Question
By lerac in forum BlackBerry Q10Replies: 4Last Post: 10-20-14, 08:46 AM -
Encryption
By iLarco in forum Ask a QuestionReplies: 1Last Post: 10-12-14, 09:27 AM -
Email From Director of ShopBlackberry
By Skillshop in forum BlackBerry PassportReplies: 7Last Post: 10-11-14, 03:49 PM -
Director of ShopBlackBerry: E-mail Response To Poor Customer Service
By RafiqK in forum BlackBerry PassportReplies: 10Last Post: 10-10-14, 11:55 PM -
What are the draw backs of encryption?
By Jacob Janeiro in forum Ask a QuestionReplies: 7Last Post: 10-09-14, 03:31 PM
LINK TO POST COPIED TO CLIPBOARD