Warning: Constant ABSPATH already defined in /home/public/wp-config.php on line 27
In Security Theater — Why Now?
On-line Opinion Magazine…OK, it's a blog
Random header image... Refresh for more!

In Security Theater

Terror Chicken

I would like to apologize to my readers for getting so upset over the revelations concerning the basis for the closing of all the embassies. I foolishly assumed that there was some truth buried in the leaked information to the media. I should have known better, and realized it was just another shallow public relations stunt on the part of the current administration to deflect attention from its gross abuse of the civil rights of US citizens. I wasn’t cynical enough.

Badtux explains what really happened. That’s right, all of it was based on some al Qaeda press releases in a terrorist wannabe chat room. There are several small consulting businesses who put out subscriber-only newsletters that contain the content of various chat rooms, so you don’t have to sneak in, the consultants are already there.

AQ is still using encrypted thumb drives and ‘Net cafés to communicate, and it is just as secure as it always has been.

This explains why everyone in Yemen knew about the session, they probably all know someone who is a terrorist wannabe who would have told them about it, and it also explains why the Yemeni government thought the US was overreacting, which they were.

You can probably subscribe to all of the newsletters for less than the annual salary of one system administrator.

14 comments

1 Kryten42 { 08.16.13 at 6:39 am }

Nice catch badtux.

You know, I covered the Bushmoron Administration via Loaded Mouth for years, and I have to say that the current Obama admin is starting to look worse in at least some ways (if that’s possible). Though in some kind of fairness, Obama is just continuing the practices started by Bush. *shrug*

Anyway Bryan, you are in a huge pool of company over this one, including myself. 🙂 I’m afraid that too many people are giving Obama far too much credit for being smarter or more clever than GW Bush. *shrug* It was an easy mistake to make given that anyone sane thought Bushmoron was the dumbest and most self-absorbed Prez ever. 😉

Ah well… maybe it *is* the water! 😈

2 Badtux { 08.16.13 at 10:39 am }

Kryten, the one thing I have to say in Obama’s favor is that he hasn’t started any wars. Yet. He still has three years so that “yet” is an important caveat.

Terrorist wannabe message boards as a reason to raise the alert level to 911. For messages that are probably just some creepy-ass teenager pranking the world. You have gotta be kiddin’ me. Let’s just hope that somebody up there in the Beltway doesn’t accidentally see glimpses of “Snakes on a Plane” while channel surfing, we’d probably have all our airports closed down the next day for a “credible terror threat”. SIIIIIIiiigh!

3 Bryan { 08.16.13 at 11:22 am }

Part of this crap is the budget process. In the 1970s it was becoming obvious that the Soviet Union was in decline but if that news leaked to Congress the budget would be cut. So the propaganda from the intel community kept saying they were a huge threat to keep the money flowing. This meant that many people thought that intel was surprised at the fall of the Soviet Union, when most people in intel were ‘surprised’ that it had managed to stay alive so long.

Same crap, the terrorists aren’t making enough serious attacks to scare people, so intel is using every excuse to justify the system they are building and the huge cost.

Now we have serious loss of life in Pakistan, Afghanistan, Iraq, Syria, Yemen, and Egypt, with other areas getting restless. If the US would stay to hell out of this mess, we would have to worry about foreigners blowing stuff up, and could concentrate on Americans blowing things up.

4 Kryten42 { 08.16.13 at 12:44 pm }

Ahh well.. Egypt! Now there’s a country the USA completely fails to understand (same with Turkey. Which should be surprising since they have supposedly been a long-time ally!) The USA seems somewhat taken aback that the Egyptian Military is basically saying STFU and get lost! 😆

Col. (Ret) Pat Lang has a good blog up about it (of course). 😀

Egyptian Crowd Control in Action

If you did not expect this, then you do not know Egypt. A maximum use of force against the unarmed is just about the only thing the Egyptian police and armed forces know to do or have any taste for. I am reminded of the Egyptair flight that was hijacked to Malta. the Egyptian Army showed up and shot the plane completely full of holes killing most of the passengers in the process. When asked “why,” by me for the CJCS (Admiral Crowe) the Egyptian commander said “To kill the hijackers.”

He also had this quite good blog post:

Embassy closure farce ends except in Yemen

Either the government had better information that it does not want to admit to or the whole thing was a hysterical reaction to marginal intelligence complicated by a desire to justify NSA surveillance programs.

What you said. 😉 (And as I thought. I have mentioned how far our own *security/intel* services have gone to protect their job’s and budgets (such as the Hilton Hotel Bombing by ASIO, etc), so I know how it goes. Another reason I decided to get out.

5 Bryan { 08.16.13 at 9:03 pm }

The US involvement in Egypt is a bribe to protect an Israeli border. To hell with that, let Israelis pay to protect their own borders. We have no business, and no real influence in the area. All the US does is piss local people off, and we can do that for free from the US. The US has become an excuse for every group of thugs in the area.

6 Kryten42 { 08.17.13 at 8:39 am }

Here’s a little laugh for you Bryan! 😉 😀

The end of my 6 Mth VPN subscription is near, and I am considering whether to renew with TUVPN or move to CyberGhost. I’m leaning towards CG as they have a lot more servers in more countries, and seem quite adamant they they store no user identifying data what-so-ever (no IP tracking etc).

Someone started a thread on their forum about the NSA spying and what CG would do if the USA requests info. The reply was amusing. 😀

CG Forum: USA governmet request for members personal information and data

This thread is also quite adamant about their feelings on privacy:
We don’t keep any logs!

Nice to see someone caring. And it’s amusing to see the same question asked in so many different ways! No wonder the admin got so frustrated! Don’t blame him! 😀

7 Bryan { 08.17.13 at 4:42 pm }

I have a feeling that NSA is going to shift to sniffers and impose them on people, which is something that Simple Circle implied when they shut down their e-mail service. If the company won’t keep logs, the CyberCon is probably ready to install the hardware to create their own, because they are that rabid.

Yes, CG does sound like the sort of place people need to be because they were already taking steps before this issue was on the front page. I do, however, understand how nervous users are, and how inclined they are to look for the possibility that someone may be hiding something from them.

Having logs might be handy occasionally, but not as nice as having customers, so there really isn’t a good economic reason to save much of the information at NSA is looking for if you aren’t in advertising. You could be selling the resources used to create and keep the logs instead of adding to your overhead costs.

Sooner or later someone is going to challenge these orders on economic grounds, i.e. compliance costs money and the government needs to pay the costs for what benefits them.

8 Kryten42 { 08.18.13 at 2:14 pm }

Also not keeping logs makes some economic sense. Less storage required, and management. But, as with most things, it’s a tradeoff.*shrug*

Here’s an updated post by Pat Lang:

Why are Clapper and Alexander still in government?

Indeed. But, we know why (and he was being somewhat rhetorical, though it is a very fair question.).

9 Bryan { 08.18.13 at 5:12 pm }

You have to go back to Clinton to find a National Security Advisor who actually knew something about National Security.

Obama is so afraid of being called weak on national security that he appoints Republicans to deflect the criticism, a tactic that doesn’t work, but he continues to do it. He never cleaned the Bush/Cheney moles out of the system, and doesn’t know anyone who could give him solid advice. He isn’t going to do anything without a resignation, and everyone knows it. He’ll fire Democrats on a rumor, but leaves Republicans in place even after solid evidence is produced to show they screwed up. He’s a wimp, and the spooks know it.

10 Kryten42 { 08.18.13 at 6:38 pm }

I was reminded of the intro to PGP that Phil Zimmerman wrote in the 90’s (before PGP was *Corpretised* (or compromised… same thing). BTW, did you know that PGP is now owned by Symantec (since 2010 I believe)? You can forget about that being secure for certain!

Anyway, I found a copy of his article on his website:

Why I Wrote PGP

It’s as relevant now, maybe more so than ever! He was insightful. And he’s right. It all started with CALEA!

And for the record, Clinton wasn’t lilly white in abusing people’s rights, not by a long shot. 🙂


You don’t have to distrust the government to want to use cryptography. Your business can be wiretapped by business rivals, organized crime, or foreign governments. Several foreign governments, for example, admit to using their signals intelligence against companies from other countries to give their own corporations a competitive edge. Ironically, the United States government’s restrictions on cryptography in the 1990’s have weakened U.S. corporate defenses against foreign intelligence and organized crime.

The government knows what a pivotal role cryptography is destined to play in the power relationship with its people. In April 1993, the Clinton administration unveiled a bold new encryption policy initiative, which had been under development at the National Security Agency (NSA) since the start of the Bush administration. The centerpiece of this initiative was a government-built encryption device, called the Clipper chip, containing a new classified NSA encryption algorithm. The government tried to encourage private industry to design it into all their secure communication products, such as secure phones, secure faxes, and so on. AT&T put Clipper into its secure voice products. The catch: At the time of manufacture, each Clipper chip is loaded with its own unique key, and the government gets to keep a copy, placed in escrow. Not to worry, though–the government promises that they will use these keys to read your traffic only “when duly authorized by law.” Of course, to make Clipper completely effective, the next logical step would be to outlaw other forms of cryptography.

The government initially claimed that using Clipper would be voluntary, that no one would be forced to use it instead of other types of cryptography. But the public reaction against the Clipper chip was strong, stronger than the government anticipated. The computer industry monolithically proclaimed its opposition to using Clipper. FBI director Louis Freeh responded to a question in a press conference in 1994 by saying that if Clipper failed to gain public support, and FBI wiretaps were shut out by non-government-controlled cryptography, his office would have no choice but to seek legislative relief. Later, in the aftermath of the Oklahoma City tragedy, Mr. Freeh testified before the Senate Judiciary Committee that public availability of strong cryptography must be curtailed by the government (although no one had suggested that cryptography was used by the bombers).

The government has a track record that does not inspire confidence that they will never abuse our civil liberties. The FBI’s COINTELPRO program targeted groups that opposed government policies. They spied on the antiwar movement and the civil rights movement. They wiretapped the phone of Martin Luther King. Nixon had his enemies list. Then there was the Watergate mess. More recently, Congress has either attempted to or succeeded in passing laws curtailing our civil liberties on the Internet. Some elements of the Clinton White House collected confidential FBI files on Republican civil servants, conceivably for political exploitation. And some overzealous prosecutors have shown a willingness to go to the ends of the Earth in pursuit of exposing sexual indiscretions of political enemies. At no time in the past century has public distrust of the government been so broadly distributed across the political spectrum, as it is today.

Throughout the 1990s, I figured that if we want to resist this unsettling trend in the government to outlaw cryptography, one measure we can apply is to use cryptography as much as we can now while it’s still legal. When use of strong cryptography becomes popular, it’s harder for the government to criminalize it. Therefore, using PGP is good for preserving democracy. If privacy is outlawed, only outlaws will have privacy.

11 Bryan { 08.18.13 at 8:59 pm }

GNU Privacy Guard is the standard OpenPGP software that people should use. With Symantec you can’t assume it won’t crash your computer, whether or not it actually encrypts anything. That crew has bought and destroyed an amazing number of formerly useful programs. I really don’t understand how they stay in business.

The thing people don’t understand about encryption is that businesses need to stay competitive. Most of the clients I had that used it, would have shown the government anything that was asked for without blinking, because they were protecting themselves from competitors.

In one case I dealt with a number of very expensive data sets with licenses that cost thousands every year. They were copyrighted, so that enters into the problem. The data needed to be changed into the formats that my client needed for what they were doing, and in that process the data was really cleaned up. What I did significantly increase the value of data because I converted it from a very machine and program specific format into one of the standard formats that almost all data base programs can use. If someone intercepted that data during transmission they would have a real competitive advantage of significantly lower cost of production. There would also be copyright issues because the owner of the data set would know the source of the new copy.

Those data sets were always encrypted, even when they were sent on physical media. Real money was riding on them being unique products.

There are more commercial uses for encryption, than personal uses, but the government is stuck in “Terrorists!” mode.

12 Badtux { 08.19.13 at 3:09 am }

As part of the group that opposed Clinton’s spy chip program (the so-called “Clipper chip” that was supposed to be embedded into every electronic device), I’m quite aware that Clinton was no civil libertarian. Most of the crap in the Patriot Act was crap that Clinton had tried to get passed after Oklahoma City that the Republicans wouldn’t go along with at the time because he was a Democrat. So our current state is something that’s been in progress for twenty years now. I don’t get why people are surprised, if they are surprised they have not been paying attention. But few people do, then wonder why they’re well and truly screwed. Sigh. WASF.

OpenPGP is indeed the one to use. I don’t trust any security software for which I do not have the source code, and if it is especially critical I will compile it myself from source rather than assume that someone else didn’t put back doors before doing so. Of course, I haven’t been doing anything that critical for years, so… (shrug).

13 Badtux { 08.19.13 at 3:13 am }

Oh yeah, the commercial uses were why Clinton finally relented on encryption export controls. The writing was on the wall when NIST selected a Belgium algorithm as AES. The foreign companies could embed AES in their software and sell it worldwide plus in the US, while US companies could only sell and/or legally use it within the US. That kind of competitive advantage for foreign companies simply could not be allowed.

14 Bryan { 08.19.13 at 10:22 am }

The export controls on things like dBASE II were absurd, as they were for most consumer software. I bought my encryption stuff from an Australian company to avoid dealing with all of that crap and to allow people to use my software anywhere they had an office, as some of my medium-sized clients had offices in Mexico and/or Canada – one was actually a Taiwan company office in the US.

When you are selling a service you have to be nice to your customers or they will leave. Handing over all of your customer’s information to the government without a court order specifically naming that customer is not nice – people don’t like it.