Paul Kocher, president and chief scientist of Cryptography Research, in an interview about the NSA’s ability to crack mobile and Internet encryption technologies in order to eavesdrop on online communications and other activities. ProPublica, Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security.
The News: The Guardian, The New York Times and ProPublica have partnered on the Edward Snowden NSA leaks to reveal that “the NSA has secretly and successfully worked to break many types of encryption, the widely used technology that is supposed to make it impossible to read intercepted communications.”
Key Takeaway, Part 01: “For the past decade, NSA has led an aggressive, multipronged effort to break widely used Internet encryption technologies… [Now] vast amounts of encrypted Internet data which have up till now been discarded are now exploitable.”
Key Takeaway, Part 02: “Some of the agency’s most intensive efforts have focused on the encryption in universal use in the United States, including Secure Sockets Layer, or SSL; virtual private networks, or VPNs; and the protection used on fourth-generation, or 4G, smartphones.”
Key Takeaway, Part 03: “Beginning in 2000, as encryption tools were gradually blanketing the Web, the NSA invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth.”
FJP: “Stealth” is an interesting word choice here. The reason for that is that back in the 90s, the NSA wanted backdoor access to encryption technologies via what it called the Clipper Chip. Proposed during the Clinton administration, and debated publicly, the effort went nowhere with critics pointing out the obvious privacy concerns as well as the economic concerns of US companies being required to allow intelligence agencies access to its encryption technologies. (Read: why would any foreign entity — government, business, individual or otherwise — choose a US technology solution that it knew wasn’t secure?)
As Techdirt notes, “That fight ended with the NSA losing… and now it appears that they just ignored that and effectively spent the past few decades doing the same exact thing, but in secret.”
Very Interesting Aside, Part 01: “Intelligence officials asked The Times and ProPublica not to publish this article, saying that it might prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read. The news organizations removed some specific facts but decided to publish the article because of the value of a public debate about government actions that weaken the most powerful tools for protecting the privacy of Americans and others.”
Very Interesting Aside, Part 02: ProPublica explains why it published the story.
ProPublica turns campaign spending on its head a bit with an interactive that lets Users track who’s making money off it. So, instead of looking at who’s donating to campaigns and Super PACs, they look at the top 200 recipients of campaign largesse.
Topping the list, Mentzer Media Services. The former Swift Boat Veterans for Truth video producers have raked in a cool $25 million so far doing work for Karl Rove’s American Crossroads and Restore our Future, a Super PAC that supports Mitt Romney.
For the journogeeks, a ProPublica post explains the tech behind the interactive.
To assemble the data, we used the New York Times’ Campaign Finance API to grab ID numbers for FEC filings. From there, we grabbed the filings thesmelves by passing each of the filing IDs to FECh, a handy Ruby gem also written by the Times. Then we filtered out ones marked as amendments or as quarterly, year-end or monthly aggregations.
Using Google Refine, a tool for cleaning messy data, we clustered recipient organization names and merged ones that differed slightly; for example, we merged together payments marked “Google” and “Google Inc.” We then selected the top 200 recipients across all of the committees and campaigns we are tracking.
The interactive — A Tangled Web: Who’s Making Money from All This Campaign Spending?
The nerdery — Untangling a Web of FEC Data.
ProPublica is looking for a full-time intern to participate in a new investigative project focused on digital privacy, security and freedom. The intern will work closely with a senior reporter doing original research and story development and regularly blogging. When appropriate, the intern will share writing credit on major stories. Prior experience in the area of cyber security, digital freedom and privacy is preferred but not a must. Investigative reporting skills and knowledge of Mandarin, Arabic or Russian are a plus. Compensation is $700 per week.
ProPublica — and the internship — is based in New York City.
— First Ever Pulitzer For Non-Print Series via slashdot
Paul Steiger, Editor in Chief, ProPublica, writing today about the non-profit’s Pulitzer win for National Reporting. ProPublica reporters Jesse Eisinger and Jake Bernstein won the award for a series on Wall Street bankers who enriched (or tried to) themselves at the expense of their clients and — in some cases — their firms.
This is the first time a digital only series has won the Pulitzer.
Congratulations to an exceptional organization for showing what a non-profit can do in journalism.