Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

Judi Lynn

(160,707 posts)
Tue Oct 14, 2014, 05:40 PM Oct 2014

Are Covert Ops Compatible With Democracy?

October 14, 2014
Global Subversion Begets a Question for Ed Snowden

Are Covert Ops Compatible With Democracy?

by BILL BLUNDEN


It’s part of the public record that the NSA has engaged in an industry-wide campaign to weaken cryptographic protocols and insert back doors into hi-tech products sold by U.S. companies. We also know that NSA officials have privately congratulated each other in successfully undermining privacy and security across the Internet. Hence it’s only logical to assume that the NSA’s numerous subversion programs extend into foreign “commercial entities”. Thanks to documents recently disclosed by the Intercept we have unambiguous confirmation.

Hi-tech subversion underscores the fact that the whole tired debate regarding cryptographic keys held in escrow for so-called lawful interception (what the Washington Post called “secret golden keys”) only serves to distract the public from programs aimed at wielding covert back doors. In other words, by reviving the zombie idea of an explicit back door the editorial board at the Washington Post is conveniently ignoring all of the clandestine techniques that already exist to sidestep encryption. In a nutshell: zero-day bugs and malware often trump strong crypto.

On an aside it’s interesting to observe the citadel of free thinkers at the Electronic Frontier Foundation continue to promote cryptographic tools as a privacy tonic with a faith that’s almost religious while conspicuously neglecting other important aspects of operational security. The EFF cheerfully provides a litany of alleged success stories. Never mind all of the instances in which the users of said cryptographic tools were compromised, even users who specialized in computer security.

Infiltrating the Media

The NSA’s campaign to undermine software and hardware is mirrored by parallel efforts in other domains. Specifically, the Church Committee and Pike Committee investigations of the 1970s unearthed secret programs like Operation Mockingbird which were conducted to infiltrate the media and develop an apparatus, a Mighty Wurlitzer of sorts, that allowed government spies to quietly influence public perception. The findings of congressional investigators have been substantiated by writers like Deborah Davis and Carl Bernstein.

More:
http://www.counterpunch.org/2014/10/14/are-covert-ops-compatible-with-democracy/

Latest Discussions»Issue Forums»Editorials & Other Articles»Are Covert Ops Compatible...