[perpass] Cops hate encryption but the NSA loves it when you use PGP

Dave Crocker <dhc@dcrocker.net> Sat, 30 January 2016 16:51 UTC

Return-Path: <dhc@dcrocker.net>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA3F71B3C29 for <perpass@ietfa.amsl.com>; Sat, 30 Jan 2016 08:51:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.5
X-Spam-Level:
X-Spam-Status: No, score=-1.5 tagged_above=-999 required=5 tests=[BAYES_50=0.8, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1rbGgaBVYKgQ for <perpass@ietfa.amsl.com>; Sat, 30 Jan 2016 08:51:17 -0800 (PST)
Received: from sbh17.songbird.com (sbh17.songbird.com [72.52.113.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8118A1B3C25 for <perpass@ietf.org>; Sat, 30 Jan 2016 08:51:17 -0800 (PST)
Received: from [192.168.1.87] (76-218-10-206.lightspeed.sntcca.sbcglobal.net [76.218.10.206]) (authenticated bits=0) by sbh17.songbird.com (8.13.8/8.13.8) with ESMTP id u0UGpGvx001161 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=NOT) for <perpass@ietf.org>; Sat, 30 Jan 2016 08:51:16 -0800
To: perpass@ietf.org
From: Dave Crocker <dhc@dcrocker.net>
Organization: Brandenburg InternetWorking
Message-ID: <56ACE9FF.3080606@dcrocker.net>
Date: Sat, 30 Jan 2016 08:51:11 -0800
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.5.1
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.0 (sbh17.songbird.com [72.52.113.17]); Sat, 30 Jan 2016 08:51:17 -0800 (PST)
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/mcJXtKreaQy1dKSNOUbMBTmhfJs>
Subject: [perpass] Cops hate encryption but the NSA loves it when you use PGP
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: dcrocker@bbiw.net
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 30 Jan 2016 16:51:19 -0000

Cops hate encryption but the NSA loves it when you use PGP
It lights you up like a Vegas casino, says compsci boffin

By Iain Thomson
Jan 27 2016
<http://www.theregister.co.uk/2016/01/27/nsa_loves_it_when_you_use_pgp/>

Although the cops and Feds wont stop banging on and on about encryption 
– the spies have a different take on the use of crypto.

To be brutally blunt, they love it. Why? Because using detectable 
encryption technology like PGP, Tor, VPNs and so on, lights you up on 
the intelligence agencies' dashboards. Agents and analysts don't even 
have to see the contents of the communications – the metadata is enough 
for g-men to start making your life difficult.

"To be honest, the spooks love PGP," Nicholas Weaver, a researcher at 
the International Computer Science Institute, told the Usenix Enigma 
conference in San Francisco on Wednesdy. "It's really chatty and it 
gives them a lot of metadata and communication records. PGP is the NSA's 
friend."

Weaver, who has spent much of the last decade investigating NSA 
techniques, said that all PGP traffic, including who sent it and to 
whom, is automatically stored and backed up onto tape. This can then be 
searched as needed when matched with other surveillance data.

Given that the NSA has taps on almost all of the internet's major trunk 
routes, the PGP records can be incredibly useful. It's a simple matter 
to build a script that can identify one PGP user and then track all 
their contacts to build a journal of their activities.

Even better is the Mujahedeen Secrets encryption system, which was 
released by the Global Islamic Media Front to allow Al Qaeda supporters 
to communicate in private. Weaver said that not only was it even harder 
to use than PGP, but it was a boon for metadata – since almost anyone 
using it identified themselves as a potential terrorist.

"It's brilliant!" enthused Weaver. "Whoever it was at the NSA or GCHQ 
who invented it give them a big Christmas bonus.”

<snip>