[165496] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: The US government has betrayed the Internet. We need to take it

daemon@ATHENA.MIT.EDU (Naslund, Steve)
Fri Sep 6 12:04:37 2013

From: "Naslund, Steve" <SNaslund@medline.com>
To: NANOG <nanog@nanog.org>
Date: Fri, 6 Sep 2013 16:02:20 +0000
In-Reply-To: <CA+E3k910LLV1P68n9nwEODyg++Csuokkz3pNvDet9VUKTf5hCA@mail.gmail.com>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

I am unclear on what you mean by technical choice.  Are you talking about a=
 technical solution to keep the government from seeing your traffic?  That =
will not work for two main reasons.

1.  The government has a lot more resources and motivation than the average=
 company when it comes to security systems.  They do not have to be profita=
ble, just effective.  Most companies only invest in the security that they =
are required to provide.  As a private entity they will be unlikely to want=
 to get in a technological arms race with the NSA.  Remember these are the =
guys that also design some of the most sophisticated encryption systems in =
the world and have nearly limitless computing power to break such systems. =
 They attract some of the most brilliant mathematical minds in the world an=
d actively pursue these employees.  You are really unlikely to out "securit=
y engineer" the NSA especially since the USG can control legally what techn=
ology you are allowed to use and export.  Who designed your encryption algo=
rithm and which one of your employees is a qualified cryptographer that can=
 assure you that it is secure enough.  Is he qualified to tell you what bac=
kdoors or capability NSA has to break that encryption method?  Do you have =
the technical experts to assure you that no US intelligence service has pen=
etrated your human or technical resources?  Do you think no one in your org=
anization would plug something into your network if it comes with a bag of =
cash or a threat attached to it.  If so, I think the NSA might offer you a =
lucrative job.  Remember these are the same guys who are supposed to break =
the communications of foreign governments and by all accounts are fairly go=
od at it.  I don't want to bet my job on defeating them.

2. If the political environment allows, they will simply pass laws along th=
e lines of CALEA to give them the legal right to tap your traffic.  Even if=
 you won the technological battle they can instantly trump you with key esc=
row and other such legal force means to defeat you.  If the political will =
exists they can pass a law requiring you to pass them all information in pl=
ain text.  Game over, you lose.  Just try to defy a FISA court order or ref=
use a CALEA tap and see how long you are in business.  There is always a de=
bate of privacy vs security and there always has been in one form or the ot=
her.  This is expressed by the people of this country in their political an=
d economic choices.  I know it does not seem like it sometimes but the gove=
rnment will only do what the majority of the people will accept most of the=
 time.  Every decision a politician makes is a balance between what he want=
s and what he thinks he can get away with.  He want the information but it =
is only useful if he maintains his access to power.

As you see, the ONLY solution is the political will to limit the government=
s powers. The only way that is done is to threaten the power structure or f=
inancial structure.  The history of the best technical solution winning ins=
ide the US Government structure is pretty weak.  POSIX compliance, ADA prog=
ramming, need I say more?  I say this as a former network engineer in the U=
nited States Air Force.  As far as both parties being responsible for this,=
 I agree completely. Everyone knows that information is power and everyone =
wants as much information as they can get.  The only way to influence that =
is to make the cost of illegal information collection too high a price to p=
ay for the politicians.  The NSA will only use the technology they are allo=
wed to use by whomever is in power.  No one over there wants to go to jail =
and most government employees do not want to put their neck on the line if =
they know there is no safety net.  The Director of NSA answers to the Presi=
dent.  His job is to get the information the USG wants and not get anyone f=
ired doing it.  Everything he does is about that balance.  If he does not d=
o it, the President will appoint someone who does.  Historically the NSA is=
 directed by a General officer from the military.  They generally follow th=
e orders they are given by the President and that is where the power really=
 lies.  It is the job of the Congress to oversee that and ensure the limita=
tions are being followed.  If that is not happening, it is up to the citize=
ns to replace the President or Congress with someone who will follow the wi=
ll of the people.

Steve

 =09

-----Original Message-----
From: Royce Williams [mailto:royce@techsolvency.com]=20
Sent: Friday, September 06, 2013 9:56 AM
To: NANOG
Subject: Re: The US government has betrayed the Internet. We need to take i=
t back

[snip]

http://www.motherjones.com/kevin-drum/2010/02/daniel-ellsberg-limitations-k=
nowledge

I think that Schneier's got it right.  The solution has to be both technica=
l and political, and must optimize for two functions: catch the bad guys, w=
hile protecting the rights of the good guys.

When the time comes for the political choices to be made, the good technica=
l choices must be the only ones available.

Security engineering must pave the way to the high road -- so that it's the=
 only road to get there.

Royce

[snip]


home help back first fref pref prev next nref lref last post