{"id":14342,"date":"2013-06-25T14:41:47","date_gmt":"2013-06-25T21:41:47","guid":{"rendered":"http:\/\/www.backwoodshome.com\/blogs\/ClaireWolfe\/?p=14342"},"modified":"2013-06-25T14:41:47","modified_gmt":"2013-06-25T21:41:47","slug":"since-were-all-suspects-anyhow","status":"publish","type":"post","link":"https:\/\/www.clairewolfe.com\/blog\/2013\/06\/25\/since-were-all-suspects-anyhow\/","title":{"rendered":"Since we&#8217;re all suspects, anyhow &#8230;"},"content":{"rendered":"<p>One databit that arose out of Edward Snowden&#8217;s NSA snooping revelations is one most of us missed. It&#8217;s another that comes in the category of tiny, fascinating, but completely unsurprising. To wit (<a href=\"http:\/\/www.guardian.co.uk\/world\/2013\/jun\/20\/fisa-court-nsa-without-warrant\" target=\"_blank\">according to <i>The Guardian<\/i><\/a>):<\/p>\n<blockquote><p>Fisa court-approved policies allow the NSA to &#8230;. Retain and make use of &#8220;inadvertently acquired&#8221; domestic communications if they contain usable intelligence, information on criminal activity, threat of harm to people or property, <b>are encrypted<\/b> [emphasis mine], or are believed to contain any information relevant to cybersecurity;<\/p><\/blockquote>\n<p>Never mind the &#8220;inadventently acquired&#8221; bit. That and James Clapper&#8217;s &#8220;not wittingly&#8221; whopper are just cover for the fact that these totalitarians aren&#8217;t ready to admit that they&#8217;re already grabbing everything that&#8217;s within their reach. They&#8217;ll make the admission of omni-surveillance later, after they&#8217;ve &#8220;made it legal&#8221; via memo, executive order, or secret-court ruling. And after, of course, some future leaker forces them to reveal it.<\/p>\n<p>The interestingly unsurprising tidbit in the above is that when they accidentally (wink-wink-nod-nod) gather our encrypted communications, they&#8217;re &#8220;legally&#8221; allowed to hang on to them. And presumably to try to decrypt and make use of them, though that isn&#8217;t specified.<\/p>\n<p>Once upon a time, say 20 years ago, such illicitly gathered stuff would have been considered &#8220;the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Fruit_of_the_poisonous_tree\" target=\"_blank\">fruit of the poisonous tree<\/a>&#8221; and beyond rightful government use. But that was when we still pretended to be a nation <a href=\"http:\/\/nationalparalegal.edu\/conlawcrimproc_public\/ProtectionFromSearches&#038;Seizures\/ExclusionaryRule.asp\" target=\"_blank\">of laws<\/a>. That was when we actually dealt with real evidence coming out in court &#8212; not secret surveillance resulting in secret evidence and secret busting up of secret <i>terr&#8217;ist<\/i> plots that we&#8217;d really be grateful to know were stopped, but if they told us they&#8217;d have to then send a Predator drone to our house.<\/p>\n<p>&#8212;&#8211;<\/p>\n<p>Sadly, I can already hear some freedomistas muttering, &#8220;Well, thank heaven I never encrypt&#8221; or &#8220;See, I told you; encryption only calls attention to you.&#8221;<\/p>\n<p>But that misses the point. First of all, you probably <i>do<\/i> encrypt, whether you know it or not, as a fair bit of modern communication travels under encryption even when we&#8217;re not aware of the fact. (Think <a href=\"http:\/\/webdesign.about.com\/od\/http\/g\/bldefhttps.htm\" target=\"_blank\">online banking or shopping<\/a>.) But an even bigger issue is that, since we&#8217;re all criminal suspects in the government&#8217;s eyes, anyhow, we might as well <del datetime=\"2013-06-25T21:19:54+00:00\">enjoy our Outlaw status<\/del> do even more things to secure our communications. <\/p>\n<p>Because face it, those bastards are scanning your cookie recipes if you send them in the open, and you might as well force them into the extra work of code-breaking if they want to learn whether you use butter or shortening with your chocolate chips.<\/p>\n<p>Still, most people aren&#8217;t going to encrypt their emails or phone calls. Even most freedomistas aren&#8217;t going to take many steps to protect their communications against snoops. To whatever extent anybody actually notices it, this revelation that encrypted exchanges are right up there with the &#8220;threat of harm to people or property&#8221; for villainousness will sadly add justification for whatever do-nothingness we&#8217;re already inclined to do &#8230; er, not do.<\/p>\n<p>The real reasons we don&#8217;t do a better job of securing our communications are many and varied. We&#8217;re sometimes lazy. We&#8217;re ofttimes busy. Secure communication is confusing and time-consuming to set up. Most of us have no way of knowing whether our security measures are actually effective. An awful lot of so-called &#8220;security&#8221; relies on unproven claims and trust. And once we&#8217;ve made a decision to use better security, we find ourselves in a maze of choices and terminology that would stump anyone shy of <a href=\"http:\/\/catb.org\/~esr\/faqs\/linus\/\" target=\"_blank\">Linus Torvalds<\/a>.<\/p>\n<p>The one good thing in the wake of the NSA revelations is that some of that is changing.<\/p>\n<p>More later.<\/p>\n<p>&#8212;&#8211;<\/p>\n<p>(Tip o hat to S for the heads up about &#8220;inadvertently acquired&#8221; encrypted communications.)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One databit that arose out of Edward Snowden&#8217;s NSA snooping revelations is one most of us missed. It&#8217;s another that comes in the category of tiny, fascinating, but completely unsurprising. To wit (according to The Guardian): Fisa court-approved policies allow the NSA to &#8230;. Retain and make use of &#8220;inadvertently acquired&#8221; domestic communications if they contain usable intelligence, information on criminal activity, threat of harm to people or property, are encrypted [emphasis mine], or are believed to contain any information relevant to cybersecurity; Never mind the &#8220;inadventently acquired&#8221; bit. That and James Clapper&#8217;s &#8220;not wittingly&#8221; whopper are just cover for&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/www.clairewolfe.com\/blog\/2013\/06\/25\/since-were-all-suspects-anyhow\/\">Continue reading<span class=\"screen-reader-text\">Since we&#8217;re all suspects, anyhow &#8230;<\/span><\/a><\/div>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,28],"tags":[],"class_list":["post-14342","post","type-post","status-publish","format-standard","hentry","category-thuggery-and-bad-law","category-privacy-and-self-ownership","ratio-natural","entry"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/posts\/14342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/comments?post=14342"}],"version-history":[{"count":0,"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/posts\/14342\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/media?parent=14342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/categories?post=14342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.clairewolfe.com\/blog\/wp-json\/wp\/v2\/tags?post=14342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}