Minneapolis CryptoParty

Just so everybody knows the newly established, and at this point entirely unofficial, Minnesota Pirate Party is hosting a CryptoParty on Monday, May 13th. The event will be held at 4200 Cedar Avenue in Minneapolis, MN and is planned to go from 18:00 to 21:00.

Although I’m not sure what specifically will be covered I’m going to make an effort to ensure e-mail encryption and, if time allows, Tor are discussed. Being a CryptoParty there will also be key signing and the usual such shenanigans.

How Private Corporations and the State Team Up to Spy on You

Most people who travel in libertarian circles are quick to point out the dangers of government spying. Many of those same people are unconcerned with spying performed by private entities. After all private entities are good, right? If we lived in a black and white world where public and private entities were clearly divided that would be true but we live in a world where private corporations are married to the state in such a way that it’s almost impossible to tell the two apart. Do libertarians who oppose state spying but condone spying done by private corporations oppose or support private corporations that spy on users and sell that data to the state? It’s an important question to ask because we live in a world where that happens with increasing frequency:

It’s no secret that we’re monitored continuously on the Internet. Some of the company names you know, such as Google and Facebook. Others hide in the background as you move about the Internet. There are browser plugins that show you who is tracking you. One Atlantic editor found 105 companies tracking him during one 36-hour period. Add data from your cell phone (who you talk to, your location), your credit cards (what you buy, from whom you buy it), and the dozens of other times you interact with a computer daily, we live in a surveillance state beyond the dreams of Orwell.

It’s all corporate data, compiled and correlated, bought and sold. And increasingly, the government is doing the buying. Some of this is collected using National Security Letters (NSLs). These give the government the ability to demand an enormous amount of personal data about people for very speculative reasons, with neither probable cause nor judicial oversight. Data on these secretive orders is obviously scant, but we know that the FBI has issued hundreds of thousands of them in the past decade — for reasons that go far beyond terrorism.

NSLs aren’t the only way the government can get at corporate data. Sometimes they simply purchase it, just as any other company might. Sometimes they can get it for free, from corporations that want to stay on the government’s good side.

Scenarios such as this moved me away from my original libertarian roots that believed private entities had a right to do as they please so long as they didn’t harm anybody to viewing many of those private entities are mere extensions of the state. These scenarios also jump-started with interest in crypto-anarchy, specifically the need for anonymity and strong encryption of communications. In our world we must assume that everybody is spying on you and take appropriate measures.

The 3D Printed Handgun Works

Yesterday I mentioned that Defense Distributed had announced the first handgun developed almost exclusive (the one exception is the nail that is used as a firing pin) on a 3D printer. Many people questioned if it would work or if it would explode into a million tiny plastic pieces, especially since the barrel was made of plastic. As it turns out the handgun worked pretty well:

On May 1st, Wilson assembled the 3D-printed pieces of his Liberator for the first time, and agreed to let a Forbes photographer take pictures of the unproven device. A day later, that gun was tested on a remote private shooting range an hour’s drive from Austin, Texas, whose exact location Wilson asked me not to reveal.

The verdict: it worked. The Liberator fired a standard .380 handgun round without visible damage, though it also misfired on another occasion when the firing pin failed to hit the primer cap in the loaded cartridge due a misalignment in the hammer body, resulting in an anti-climactic thunk.

Here’s a video of the test firing:

It’s obvious by looking at the gun and hearing about the failure to fire that the firearm is a prototype but, considering how quickly Mr. Wilson has been advancing the art of manufacturing firearms on 3D printers, this design will likely evolve very quickly. I wouldn’t be surprised to see a reliable, albeit ugly, design capable of firing multiple rounds by the end of the year.

Encrypt Your Data

Do you want another reason to encrypt your data? According to a former Federal Bureau of Investigations (FBI) counter-terrorism agent everything electronic communication is being intercepted:

On Wednesday night, Burnett interviewed Tim Clemente, a former FBI counterterrorism agent, about whether the FBI would be able to discover the contents of past telephone conversations between the two. He quite clearly insisted that they could:

BURNETT: Tim, is there any way, obviously, there is a voice mail they can try to get the phone companies to give that up at this point. It’s not a voice mail. It’s just a conversation. There’s no way they actually can find out what happened, right, unless she tells them?

CLEMENTE: “No, there is a way. We certainly have ways in national security investigations to find out exactly what was said in that conversation. It’s not necessarily something that the FBI is going to want to present in court, but it may help lead the investigation and/or lead to questioning of her. We certainly can find that out.

BURNETT: “So they can actually get that? People are saying, look, that is incredible.

CLEMENTE: “No, welcome to America. All of that stuff is being captured as we speak whether we know it or like it or not.”

Is Mr. Clemente telling the truth? Are all electronic communications being intercepted or is he putting out misinformation to make people believe the state is omnipotent? I’m not sure but encrypting your communications is the best defense against pervasive snooping and would render the state’s surveillance powers irrelevant.

I Love Living in the Era Gun Control Died

Gun rights activists are going to look back at this time period as the beginning of the end of gun control. Defense Distributed has announced the one thing that gun control advocates have feared, a handgun that can be printed on a 3D printer:

All sixteen pieces of the Liberator prototype were printed in ABS plastic with a Dimension SST printer from 3D printing company Stratasys, with the exception of a single nail that’s used as a firing pin. The gun is designed to fire standard handgun rounds, using interchangeable barrels for different calibers of ammunition.

Although the state can spend billions of dollars trying to combat printed firearms it, like the billions spent on stopping people from growing cannabis in their homes, will fail to accomplish the intended goal. Once something can be produced by anybody with minimal knowledge controlling that thing becomes impossible.

I doubt this handgun will be very robust or accurate but considering Defense Distributed indicated its intention to build an entirely printed gun last month and we have a working model this month it’s pretty easy to see how quickly this technology is going to mature.

Politics is Serious Business

If you pay any attention to Minnesota politics you probably know two things: Minnesota doesn’t appear to follow any specific political philosophy and our passive aggressive nature makes any political debate very boring. The person many Minnesotans refer to as Governor (I’m not sure why they all use that title, I think it’s supposed to indicate the person is a psychopath or crook or something), Mark Dayton, decided to hold a public meeting in Shakopee and wasn’t happy about the way he was treated. A few weeks ago the politicians in St. Paul decided to give themselves a 35 percent raise. As you can guess the people stuck footing the bill for the politicians’ salaries, the tax victims, weren’t overly happy. During his meeting in Shakopee Dayton tried to justify the raise and was appropriately heckled by the audience:

As he was explaining why, the audience heckled and interrupted him.

“Let me just finish,” he objected, according to video recorded by the Minnesota Jobs Coalition. “I’ve been all over the state and I’ve never had people behave this rudely. You know, if you want to say something, raise your hand and get a mic.”

Asked about the comment, the governor said on Tuesday that members of the audience did not just disagree with him they displayed “very juvenile kind of behavior,” which reminded him of the 9th graders he taught in a New York City public school decades ago.

“It was rude and if they can’t handle the truth, they can’t handle the truth, but that’s the truth as I perceived it,” Dayton said. He added that the audience applauded when he hushed the crowd, one of the few points of unanimity at the event.

Responses to the incident have been mixed but seem to be leaning towards disapproval, as you would expect from a state where people refuse to openly state their disagreements. A lot of people believe that politics is serious business and must only be conducted in the most bland lawyerly manner. Anybody who shows even an inkling of disrespect while discussing politics is derided and told that such behavior is unbecoming of civilized people (yet stealing more money from tax victims is somehow regarded as civilized behavior, go figure).

Fuck that. I hereby endorse the actions of the hecklers at Shakopee. The people were rightly pissed and being spoon-fed bullshit. Why should the audience act “civilized” under such conditions? Furthermore why should anybody be expected to show respect to a politicians? Politicians are little more than mobsters. They demand “protection” money and will kidnap you if you refuse to pay it, always try to take a cut of whatever economic activity is occurring on their turf, and claim their actions are legitimate because a bunch of people showed up to polling places and filled in an oval next to their name. In fact politicians are even worse than mobsters because mobsters usually admit that they’re stealing.

In fact I believe we’re taking this politics thing far too seriously. Listening to most people discuss political matters would lead you to believe such discussions actually mattered. The reality of the political system is that the state doesn’t listen to us mere peasants and does whatever it feels like doing. When somebody becomes too big of a thorn in the state’s side they have him kidnapped or killed and write off their act of malice as being legal and therefore, somehow, legitimate. This is why I prefer political discussions involved the Internet. Instead of a bunch of people discussing politic matters in a super serious fashion you get things like this:


Image swiped from Facebook.

Yes, that is a cat holding a gold Desert Eagle riding a fire breathing unicorn. That’s a political argument on the Internet and it’s far more productive than most political discussions in real life because you actually have something to show after the discussion concludes. That picture is awesome to look at in any context. Hell I want that picture on a poster so I can hang it in my living room.

I believe that Internet-based political discussions are more jovial because underneath the discussion is an implication that the situation will be worked around. Most of the real life political discussions I’ve been a party to involve people looking for political solutions. They discuss running or supporting candidates, introducing legislation, and playing within the rules set by the state. Denizens of the Internet generally discuss ways of bypassing new legislation. Sure, there are calls for writing congress critters but there are also people working on technology that renders proposed laws irrelevant. An Internet sales tax, for example, can be defeated by anonymizing transactions. Silk Road uses Tor hidden services and Bitcoin to bypass laws on drugs that haven’t received the state’s blessing. The proposed Cyber Intelligence Sharing and Protection Act (CISPA) can be rendered powerless with proper cryptography.

I think the general tendency to focus on practical solutions allows a great deal of the Internet to see politics for what it really is, a joke. It’s unfortunate that more people don’t see this. The people of Shakopee obviously realize that Dayton’s visit was mere lip service meant to shut the peasantry up and they acted accordingly. Those people should be applauded and looked at as an example of how political discussions should be held. What can I say, I’m a fan of calling a spade a spade and treating a joke as a joke.

Another Reason to Encrypt Your Data

In an interesting development a federal magistrate in Wisconsin has refused to order a suspect to decrypt his hard drive citing the Firth Amendment:

The issue is front and center as a federal magistrate is refusing to order a Wisconsin computer scientist to decrypt his data that the authorities seized from kiddie-porn suspect Jeffrey Feldman. The reason is simple: The Fifth Amendment right against compelled self-incrimination protects even those suspected of unsavory crimes, according to U.S. Magistrate William Callahan Jr. of Wisconsin, who wrote:

This is a close call, but I conclude that Feldman’s act of production, which would necessarily require his using a password of some type to decrypt the storage device, would be tantamount to telling the government something it does not already know with ‘reasonably particularity’—namely, that Feldman has personal access to and control over the encrypted storage devices. Accordingly, in my opinion, Fifth Amendment protection is available to Feldman. Stated another way, ordering Feldman to decrypt the storage devices would be in violation of his Fifth Amendment right against compelled self-incrimination. (.pdf)

The issue of whether or not being forced to decrypt information is a violation of the Firth Amendment is still being debated. In Colorado, for example, a woman was ordered by a court to decrypt her hard drive and the decision was upheld by a federal appeals court. I’m sure this decision will be appealed and that’s when this battle will become more interesting. Still, for the time being, this ruling gives yet another reason to encrypt your data. It may offer you some legal protection against the watchful eye of the state.

I Love the Future

The future we live in is great. In my pocket is a device that is able to give me access to the collected knowledge of mankind from almost anywhere in the world. My holster contains a firearm that has a frame made up mostly of plastic with sights that glow in the dark. My truck has oil in it that was developed entirely in a laboratory because dead dinosaurs aren’t thermally stable enough for my likings. The best part about the future though is that it’s constantly evolving. Within a few weeks, as Robb Allen pointed out, gun control will be a thing of the past:

After a panel on how copyright affects the 3D printing industry, he confirmed to Mashable what he had already hinted at before: that what was once unthinkable — a gun entirely made of 3D-printed parts — is actually right around the corner.

Will it work? Wilson thinks it will, and it won’t be just a one-shot wonder it will be able to fire a few shots before melting or breaking.

Wilson didn’t want to reveal too much about what could become the world’s first fully 3D-printed gun, saying he will make the actual announcement soon. He did reveal some details, however.

The gun will be made of 12 parts, all printed in ABS+, a very sturdy type of thermoplastic. There might be, perhaps, just one small metal part — a firing pin. While Wilson and his team are still designing the weapon, it won’t be a reproduction of an existing firearm, but instead a custom design.

Once an entire firearm can be manufactured on a 3D printer gun control will be dead. There is no way to stop the development of a tool when anybody can easily acquire the knowledge and means to create it. As I said, 3D printer technology will only become better and as it does the ability to create more complex devices, such as firearms, will become easier. At this point it’s merely a matter of time until the entire concept of gun control becomes nothing more than a pipe dream of tyrants.

More Thoughts on CISPA

HR3523, the Cyber Intelligence Sharing and Protection Act (CISPA), which passed the House today, has been making news as of late. If passed into law, the bill would allow government agencies to share data with one another and allow private corporations to share data with the state without concerning themselves with any contractual obligations:

At that Committee meeting (1:01:45), the bill’s chief sponsor Chairman Rogers emphatically repeated his earlier assertions that CISPA wouldn’t breach private contracts in response to questions from Jared Polis:

Polis: Why wouldn’t it work to leave it up, getting back to the contract part, and I think again there may be a series of amendments to do this, if a company feels, if it’s voluntary for companies, why not allow them the discretion to enter into agreements with their customers that would allow them to share the information? …

Rogers: I think those companies should make those choices on their own. They develop their own contracts. I think they should develop their own contracts. They should enforce their own contracts in the way they do now in civil law. I don’t know why we want to get in that business.

[…]

And yet… for all Rogers’ bluster, CISPA moots private contracts—and House Republican leadership won’t fix the problem, even when five of their GOP colleagues offer a simple, elegant fix.

This is the same stubborn refusal to accept criticism and absorb new information that brought us SOPA, PIPA and a host of other ill-conceived attempts to regulate the Internet. It’s the very opposite of what should be the cardinal virtue of Internet policy: humility. Tinkering with the always-changing Internet is hard work. But it’s even harder when you stuff your fingers in your ears and chant “Lalalala, I can’t hear you.”

I think this brings up an important point that is often lost on people. As it currently stands most people rely on the service provider to protect their privacy. People who use services such as Gmail, Yahoo! Mail, Facebook, Twitter, etc. assume that those companies will prevent prying eyes from viewing unauthorized third-parties. This is a poor assumption for multiple reasons. First, most service providers make their money off of selling their customers’ information. There is an assumption that such information is anonymized to a point but there is no guarantee. I believe the conflict of interest is obvious. Reason number two is that even if a service provider does protect your privacy there is no guarantee that unauthorized third-parties won’t gain access by bypassing implemented security measures. The third reason is that customer information is often an asset that is sold off when a company becomes insolvent. If your e-mail provider were to enter bankruptcy they may be required to sell you information as part of their asset sale. Fourth, the state reserves the right to render contractual agreements irrelevant with the mere issuance of a subpoena. CISPA, ultimately, isn’t granting private entities the ability to violate their contractual agreements without legal consequences, it merely removes the requirement that a subpoena be issued before the contract can be violated.

The reason I advocate crypto-anarchy is because it’s a solution to all of the above mentioned problems. Imagine a world where everybody encrypted their e-mails. While the e-mails may be stored on an e-mail provider’s server the data would be unusable to them or unauthorized third-parties. The same applies to encrypted instant messages, web page requests, etc. Anonymizing tools can prevent service providers and anybody with access to their data from identifying your person or your location. Having encrypted data from an unknown person makes decryption difficult since you don’t know who to coerce the required keys out of.

Even if CISPA is passed there are many ways for your information to fall into unauthorized hands. Crypto-anarchy renders all of these threats irrelevant while begging politicians to not pass CISPA doesn’t. Solve all of the problems instead of a single minor one, use cryptographic tools today.

IBM Executives are Heading to Washington to Lobby in Favor of CISPA

Speaking of the Cyber Intelligence Sharing and Protection Act (CISPA), it appears that executives from IBM are heading to Washington DC to lobby in favor of passing the bill:

Nearly 200 senior IBM executives are flying into Washington to press for the passage of a controversial cybersecurity bill that will come up for a vote in the House this week.

The IBM executives will pound the pavement on Capitol Hill Monday and Tuesday, holding nearly 300 meetings with lawmakers and staff. Over the course of those two days, their mission is to convince lawmakers to back a bill that’s intended to make it easier for industry and government to share information about cyber threats with each other in real time.

IBM has a history of helping governments collect data on their citizens. Considering the consequences of their last marriage with the state I should be surprised by this news. But we all know that there is big money in selling customer data to the state. It’s always disappointing when a technology company sells computer users down the river. Fortunately CISPA is irrelevant thanks to cryptography technology.