Privacy Tools Raise Red Flag for Intelligence Agencies

22 Jun

by Andrew Leonard / Salon

General Keith Alexander (Credit: Reuters/Yuri Gripas)

General Keith Alexander (Credit: Reuters/Yuri Gripas)

Use privacy tools, go directly to jail. OK, that’s not exactly the bombshell revealed by Thursday’s installment of leaked NSA documents, but the truth is close enough for serious discomfort. According to the documents, using privacy tools that encrypt your communications and hide your identity is like waving a red flag in front of the surveillance state bull.

Within minutes of the release of two new documents describing the NSA’s policies on what communications data can be gathered without a warrant, privacy geeks seized upon one particular passage:

“In the context of a cryptanalytic effort, maintenance of technical data bases requires retention of all communications that are enciphered or reasonably believed to contain secret meaning, and sufficient duration may consist of any period of time during which encrypted material is subject to, or of use in, cryptanalysis….”

In other words, as Cato fellow Julian Sanchez tweeted, if you use encryption to make your communications private, and the NSA discovers that, it can grab your data and hold on to it until it cracks the code.

It gets worse. Defenders of the NSA’s snooping program have gone to great lengths to assure American citizens that the ability to gather data is restricted to foreign targets. But if the NSA can’t figure out who or where you are, because you’re using privacy tools, it assumes you are a foreign citizen by default.

“A person… whose location is unknown will not be treated as a United States person, unless such person can be positively identified as such, or the nature or circumstances of the person’s communications give rise to a reasonable belief that such person is a United States person.”

So to recap, if you use privacy tools that hide your identity, the NSA assumes you are not a U.S. citizen, which gives it the authority to surveil your communications. And the sheer fact that you are encrypting your data in the first place means the government can hold on to that data as long as it wants.

So go ahead! Use that Tor browser and PGP encryption. But make sure to wave hello to the NSA spook watching you when you take your privacy tools out for a spin.

(For more information on the NSA leaked documents, Forbes’ Andy Greenberg has an excellent rundown.)

2 Responses to “Privacy Tools Raise Red Flag for Intelligence Agencies”

  1. Rikki June 22, 2013 at 5:45 pm #

    This is why you and your friends should send ALL messages with pgp encryption – even if they can crack the messages, it’d be great for them to waste all the time and resources to learn you sent someone a message saying ‘who wants to go get pizza?’. Any obfuscation is still helpful, and the more, the merrier! If you are an activist, you’ve already been ‘red flagged’, so why not just make it harder and harder to see who that is and what they are doing? I’d say keep at it, but recognize that no digital medium is ever truly secure.

  2. Razer Ray (@AuntieImperial) June 23, 2013 at 11:13 am #

    The answer to their maintaining all encrypted data for further analysis is simple. Send LOTS of encrypted data. Preferably LARGE FILES containing images of… “Cheezeburger Cats”… to your SenatorialScum and CongresssFreaks

    The NSA can haz MY Cheezeburger! Have LOTS of them!

    “…and imagine if 50 people a day walked in sang a bar of Alice’s Restaurant and walked out… They MIGHT think it’s a movement!” ~~Arlo Guthrie, Alice’s Restaurant Masacree

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: