Tales from the crypt(-oparty)

Cover photo

My story on Chicago’s CryptoParty scene appeared on the cover of the Chicago Reader last week.

Thanks for reading, folks. It’s a long piece, so if you get through it, kudos to you. And bravo if you somehow manage to not get lost as you go, with all the techno-terminology. We tried to make it as friendly to novices as we could. Especially the sidebar, about helpful tools.

I guess this makes me Chicago’s crypto educator in chief?

I’d like to paste below a few sections that got cut from the final story. The Reader editors know: people just don’t read long, meandering pieces anymore. It’s either solidly on-topic or people click away.

About the psychological science behind surveillance:

Psychological studies bear out the detriments of surveillance. Knowing or suspecting that you’re being watched definitely changes a person’s behavior, according to several controlled, peer-reviewed studies. Stress and anxiety tend to rise under surveillance, according to a 1996 study in the Journal of Applied Psychology. And job performance suffers under constant watch, according to a 1992 study in the journal Applied Ergonomics. (While anyone with a helicopter boss could tell you that, a proper study isolated that cause from other potential factors.)

And since the 1950s, psychologists have known that surveillance encourages social conformity in a person even when their larger social group is “obviously wrong,” writes the neuroscientist Chris Chambers, in an article in The Guardian.

About the applications of crypto to whistleblowing:

Conversations at CryptoParty often revolve around government transparency and corporate accountability. Many planners and attendees use freedom of information laws to demand answers from public entities. Their questions are often, but not always, about surveillance. (Institutional racism comes in at a close second.)

But as a transparency tool, the Freedom of Information Act is limited. No one can prove whether an agency is withholding something. There are no audits of FOIA offices or officers. Even if you sue, as I have, judges simply take an agency at its word that it gave you everything it found—and that it searched in all the possible places.

And what about all the things we scribes don’t think to ask, or won’t know to ask? That stuff will only see the light of day if whistleblowers choose to tell someone outside their offices. And in the private sector, forget about it—unless a whistleblower tries to tell the public about a hidden danger. Cryptography can protect whistleblowers’ identities when the government won’t.

If a whistleblower tries to tell the public about a hidden danger, cryptography can protect their identity when the government won’t. These days, governments seem a lot more interested in punishing whistleblowers than protecting them. Just ask John Kiriakou, who, when asked to be a part of the CIA’s torture program, instead blew the whistle on it. Or William Binney, who built the NSA’s surveillance apparatus after 9/11 and saw it get out of hand. Binney narrowly avoided jail. Kiriakou spent time in prison for his classified leaks. Former General David Petraeus, part of Washington’s “in crowd,” was fired for leaking classified information but has not faced any charges.

eBay entrepreneur could make the powerful and corrupt shiver

If the stories are saying what I think they are, one of the biggest barriers to doing important journalism—heavy security protecting your sources and research—will soon be less about cobbling together your own ragtag system and more about buying into a proven solution.

Let’s just hope they open the source code.

I’m excited about Greenwald and Omidyar’s new organization for its journalism potential, but even more excited about the fact that it’s getting into the “technology” business to produce tech for “new media.” That’s so incredibly vague, but I suspect it’ll be looking to fill the need for end-to-end-secure products that are easy enough for everyone to use.

For example, PGP (the widely used e-mail encryption scheme) works, and is fun for those who use it, but I posit that’s in part because it has such a small user base. It’s like you’re in a little club. And in fact, the not-insignificant setup work and learning curve can fuel a nice smug attitude with every use.

It shouldn’t be this way. If everyone encrypted their communication, corporations and governments wouldn’t be developing the huge profiles on us that they do. (If you don’t care about that, read this right now, then return if you’d like.) Lots of folks wish for the ability to evade the dragnet—and journalists NEED to—so I figured it was only a matter of time before someone capitalized on these gaps.

(Of course, PGP is only good so far as the NSA doesn’t have quantum computing, which it looks like they don’t at the moment…and so far as they don’t keylog everyone, or in particular, YOU. I hope First Look Media makes some software that detects and eludes keyloggers.)

What are the gaps as I see them? I already mentioned encrypted e-mail and keylogging. (OTR chat is pretty easy enough already.) To head off the potential fall of RSA, they could ramp up the development of elliptic curve cryptography. They could get into making whole-drive encryption systems that rely on both hardware and software-level encryption. I suspect they could develop software (free software as a loss-leader??) that helps folks pick strong, easy-to-remember passwords. They could use Poitras’ experience in mail drops and drive-wiping to create systems for that with less friction.

I don’t think they could compete with LastPass or 1Password. I don’t think they could compete with Freedom of the Press Foundation’s SecureDrop system for anonymous submissions. They could manufacture extremely cheap burner phones whose cases decompose in landfills when you toss ’em. If the battery were easier to disconnect, people would be more inclined to do that whenever they weren’t using it. No GPS transponder, obviously, but tower triangulation is a problem. I wonder if there’s software akin to TOR that could mask what towers your signal is going through. (hint hint)

Seriously, the opportunity for providing secure systems to journalists, in particular, is huge. After the past year’s disclosures, inkbloods are shaking in their boots.

In a few years, if journos like me are armed with the right tools, I suspect any sufficiently corrupt politician or corporate executive will be doing the same.