Security

What can IT do in the fight against government surveillance tactics?

Will the fight for privacy and freedom from government surveillance reach the grassroots of IT departments?

digitalpadlock-v1-620x350-620x350-620x350-620x350.jpg
Lately, we've learned many things about what the NSA and other government intelligence agencies around the world do, what their capabilities are, and just how far they are willing to go to ensure that they have the ability to know everything we do online. It used to be that the big debate was around email and phone calls, where your own ISP or an upstream provider could see all the traffic going by their network and tap into it. Without encryption, these protocols are like postcards left in the wild, for all to find. Certainly some criminal activities can be found this way, and while many are shocked at the invasion of privacy, no technically savvy person imagined that a plain text email was very secure.

That's where encryption comes in: SSL, TLS, and even end to end solutions like PGP or Truecrypt. We used to think that if we encrypted our message before sending it out, then no one could read it. Your financial transactions wouldn't be spied upon by the IRS, your Amazon purchases wouldn't be linked to you by Homeland Security, and your business documents shared securely with partners wouldn't be spied upon by foreign interests. However, this perfect solution started disintegrating in front of our eyes pretty quickly as we've learned more about PRISM and other government programs. Bruce Schneier, a top researcher in Internet security, has written several interesting posts about encryption, summarizing what can and can't be gathered by third parties. Suffice it to say that encrypting your online data isn't the end of the journey.

Even if the NSA can't brute force your encrypted data, it turns out that there are many more ways they can find what they are looking for. The math behind encryption may be solid, but if a protocol includes code "helpfully" provided by the NSA, then that code can't be trusted. SSL may be unbreakable, but if the NSA gathers the keys from all the major Internet companies, then they don't even have to brute force it, they can simply use those keys. Basically, encryption, especially public key encryption, which relies on a central authority, can't be trusted because of many potential vulnerabilities. So what is we to do if we still care about privacy? Things are indeed looking bleak, but there is still a light at the end of the tunnel, and this may be where you come in.

A lot of what the government has been doing in secret is made possible in part because of IT pros like you. This isn't to say that most of the honest workers in IT are complicit, but data leaks out to the government because companies are forced to play by secret rules, with laws no one knows about, and warrants issued without any real due process. But clever people can come up with quite a few alternatives to simply rolling over and abandoning all sorts of online privacy.

One example is Google implementing Perfect Forward Secrecy. One of the type of requests they received from governments was to hand out their past SSL keys. Since they aren't used to encrypt current traffic, they aren't technically needed anymore. But any past data collected by governments could be unencrypted with those keys, creating a massive breach of privacy. With Perfect Forward Secrecy, your SSL connections basically create new, temporary keys for each session. This makes that type of request completely worthless.

Meanwhile, new startups and apps are being created around the heightened desire from customers to have secure alternatives. Silent Circle just released an Android app which allows secure file sharing and text messaging between users. Of course, if the government doesn't like a company offering a secure alternative, they have the power to shut them down. Lavabit is a recent example of a startup owner who tried to fight against the secret orders of the NSA to access its secure messaging service; Lavabit closed shop rather than betray the privacy of its users. So while security and privacy issues are being debated in the houses and parliaments of various countries around the world, the battleground is now shifting to the IT pros and developers on the ground.

Are there things that developers and IT pros could do to help keep privacy alive? Just think how users would react if a pop-up message appeared warning them all their messages were now being sent directly into NSA headquarters? What if a webcam showed to the world your servers, and one day an anonymous device appeared, or the cam feed went dead, in a sort of dead-man-switch system to prevent tampering? These and other clever ideas are popping up in forums and on mailing lists.

So, what do you think? Is it possible to beat the powers-that-be at their own game? What are the possibilities at the grassroots level in the fight to maintain privacy on the Internet?

About Patrick Lambert

Patrick Lambert has been working in the tech industry for over 15 years, both as an online freelancer and in companies around Montreal, Canada. A fan of Star Wars, gaming, technology, and art, he writes for several sites including the art news commun...

7 comments
williamjacobs
williamjacobs

Emerson visited Thoreau in jail and asked, “Henry, what are you doing in there?” Thoreau replied, “Waldo, the question is what are you doing out there?”

http://thoreau.eserver.org/wendy.html

Is there no justification for breaking any law Congress may choose to pass?  Even if it violates the US Constitution?  Is it still illegal if one breaks unconstitutional laws? 

Just some questions for the proud law-abiding citizens out there.


JihadMeAtHello
JihadMeAtHello

@dogknees please show one instance where the author indicates people should do something illegal???

dogknees
dogknees

There's an interesting "tone" to this article that seems to be encouraging people to act illegally if they don't agree with the law as it stands. Curious that IT professionals would be encouraging others to break the law.

zazimi
zazimi

I'll second what Firedrake said.

Firedrake
Firedrake

Just the fact you would have cause to write an article with such a Title speaks volumes about the direction this country has taken in the last decade or two. Sad but true, the Athenian Republic's got nothin' on us.

monsuco
monsuco

Really and truly, the NSA's activities are a political issue. As an IT professional it's my duty to keep my organization's computers running smoothly. I'm not here to fight the NSA.

The best thing most companies need to do is to stop logging as much user data. Google, Facebook, Apple, etc. need to quit constantly tracking users.

Google, Apple and Blackberry  design mobile devices that have the ability to encrypt themselves and they apparently can decrypt the phones if they need to. There are rumors about Microsoft Windows' Bitlocker and Apple Mac OSX's File Vault functions also containing some sort of back door. This is stupid. Never, under any circumstances, should an encryption scheme have a back door. Don't design products this way.

Using GnuPG and TrueCrypt to encrypt communication and/or files. Both are open source (well, GPG is, TrueCrypt is mostly open though there are some who have gripes with the license). TrueCrypt can be used to encrypt Windows and LUKS can encrypt Linux. Open source programs, in general, aren't as worrisome. They won't have back doors because their code is open to the public.

I suppose IT departments could install HTTPS Everywhere, a Firefox and Chrome extension that forces websites to use SSL when available, though some sites don't cooperate with it.  You could also switch browsers over to using ixQuick/Startpage or Duck Duck Go as their search engine. Those two don't log user data like Google and Yahoo! do.

HypnoToad72
HypnoToad72

That's remarkably simple to answer:


1.  Don't hand over sensitive data

2.  Obey data privacy, HIPAA, and other regulations - ironic as they may be

3.  Companies needn't lobby government or take corporate welfare, which in turn might give the government a notion of entitlement to data companies collect for their own marketing purposes

4.  Don't collect anything to begin with, even if that means less personalized adware - the problem here is the sharp increase of "free" apps, since people do not want to spend real money (even if our currency was removed from the gold standard in 1974 and accidentally rendered not-real money as a result.  Nixon wasn't perfect but he was better than some of his replacements over the last 40 years...  even Mike Stivic would agree.)  Since free apps are ad-driven...


Editor's Picks

IT Buying Cycle

Learn more