We discuss the use of phone cloning by US Marshall’s and other law enforcement while engaging protestors in Portland, OR. We talk about UpTurn’s recent report concerning widespread use of cellphone extraction tools to copy and search the contents of cell phones captured during interactions with cops. Finally, we talk about Keyword Searches, where (often without warrants) google hands over information from peoples google searches to law enforcement.
Sean Swain Update
We’ll also be presenting a segment by Sean’s fiance, Lauren, about his current silencing and the injustice of his case. More on president-in-exile Sean Swain can be found at Swain2020.Org and SeanSwain.Org.
Digital Security Tools for Organizing with the CLDC
We’re happy to share the rest of our conversation with Michele Gretes, director of the Digital Security project at the Civil Liberties Defense Center, and Cora Borradaile, who is on the board of the CLDC. For this podcast special, you’ll hear the two discuss different tools for more secure, encrypted communication that is available on various platforms to folks organizing. They publish guides on CLDC.org/Security. We discuss the end-to-end encrypted alternative to Slack (Keybase) **, pgp email encryption (particularly the enigmail tool), Signal Messenger, problems with Whatsapp, Cryptpad, Jitsi, Wire, VPNs and The Onion Router,the TorBrowser, OnionShare, Zoom, Protonmail and some of the challenges of running longstanding movement infrastructure such as the RiseUp collective does (plus their file sharing and pad services). Check our show notes for links to some of these projects.
** Keybase was just purchased by Zoom. See the CLDC article.
Norman Shamas updates on FOSTA and digital harm reduction
This week, we continue our look at sex, work and the state with guest, Norman Shamas. Norman Shamas is an activist and educator whose work focuses on human-centered information and digital security and privacy. Now, Norman is not a lawyer but shares their insights about the legal situation around FOSTA, or Fighting Online Sex Trafficking Act that passed into law in the U.S. last year and it’s implications for sex workers, for those trying to fight sex trafficking and for people communicating desire without coercion or monetary exchange, folks looking for a hookup. This interview was conducted for our Error451 podcast, an occasional project focusing on digital security and tech from an anarchist perspective, but because of the prescience of Norman’s words, we wanted to share it as an episode for the airwaves. Later in the interview we talk about Norman’s writing a bit, including issues around queer dating apps and how they’ve been used to persecute folks for their sexualities and genders in various parts of the world and how we can pressure app developers and platforms to take the security of their users more seriously.
For the full conversation including links to articles and subjects we talk about, as well as this week’s Sean Swain segment, check out our podcast version available at thefinalstrawradio.noblogs.org. Subcribing to our show is free and easy if you have a computer or a smart phone. There are some instructions up at our website under the “podcasting” tab at the top of the page.
If you’re in New York, there are rolling demo’s at the Brooklyn Metropolitan Detention Center where it was discovered that prisoners have been held with limited heat and electricity for days now during this time of record-breaking cold, as reported in the New York Times on February 1st. To keep up on actions around this, one can check out IWOCNYC, the New York City Incarcerated Workers Organizing Committee where demo’s are being announced. If you’re concerned for the health and safety of the over 1,000 prisoners at the MDC Federal jail but can’t make it to a demo, the group Sunset Park for a Liberated Future has called for a phone zap. Those wanting to participate can call Warden Herman Quay & Associate Warden David Ortiz at 718-840-4200. You can also call
Nicole McFarland, US Marshall Assistant Chief at 718-840-4200 ext. 41740.
“I’m a resident of NYC and am very concerned about the situation at MDC. People are living in intolerable conditions without heat or hot meals. This is unacceptable and a violation of human rights. I believe this poses serious harm to the health and safety of people at MDC and fails to meet Eighth Amendment standards prohibiting cruel and unusual punishment. What is your action plan to stop this immediately? What do you commit to in ending this suffering of people in your custody?”
This week, we’d like to share a conversation had a little bit ago with Kali Kaneko, from LEAP. Leap Encryption Access Project, like pEp featured in our prior Error451 interview, is an open-source project meant to ease… access to encryption (and it’s a project). At a point in the past, LEAP had an interest in shifting paradigm of email but is now focusing mainly on distribution, upkeep, and improvement of it’s VPN service, Bitmask. Bitmask is partnering with Riseup Black and Calyx (and hopefully other trustworthy projects) to expand access to free, psuedonymized web traffic with ease.
Here’re a few links Kali sent my way for sharing and further investigation:
On this episode I’m joined by Hernani Marques, a hacker and member of the pEp Foundation, talking about Pretty Easy Privacy, a concerted attempt to make adoption of end-to-end email encryption easier and more ubiquitous through automation of key-making and management through partnering with programs like Outlook and Thunderbird. To learn more about pEp, check out the foundation’s website and follow or get in touch with Hernani via their website, vecirex.net.
If you have a topic or guest suggestion for Error451, find us via our contact page on our website and drop us a line. To hear past episodes of the podcast, click the link in these shownotes or find them up at our website or in our podcast feed. Subscribing to our show is free and easy.
a computer security engineer and an open source software developer. He writes about technical topics like digital and operational security, encryption tools, whistleblowing, and hacking using language that everyone can understand, but without dumbing it down. An avid user of Qubes and Linux, he develops security tools such as OnionShare.”
Micah is kind enough in this conversation to break down the Efail scandal that rocked security-minded folks in mid-May. A weakness in the way that many email clients handled PGP & S/MIME came to light months after it was discovered by a team of security investigators. Micah explains how this encryption works, what was found out, safer approaches to encrypted messaging. We also talk a little about threat modeling and quantum computing.
Send encrypted text messages to Micah using Signal Messenger at (415) 964-1601. Here’s a link to a cool article Micah published at The Intercept about a method of cheaply creating a second signal account, so you can give out a signal # without giving away your personal phone number.
A change of plans: instead of airing the interview with comrades in Yogyakarta about May Day repression of anarchists there, we’re including that in the radio show for next Sunday. So, instead, kick back with this new issue of #Error451 !
The CLOUD Act (Clarifying Lawful Overseas Use of Data Act) got passed by the U.S. Congress earlier this year and signed into law by President Trump. It’s a revision of the 1986 Stored Communications Act. Basically, it allows U.S. cops from local up to Federal to request data belonging to persons of interest that is stored on overseas servers from the private corporations or organizations storing it. If the U.S. executive makes an agreement with the foreign power where the data is stored, that power also gets a degree of access to the data of persons of interest to the overseas powers. Basically, governments can more easily spy on folks around the world!
We talk a bit about the implications of the Act, how it came to pass and the types of practices and services folks can engage to help protect themselves from some of these government excesses.
This week on Error451, William Budington and Bursts chat about the Facebook and Cambridge Analytica scandal. We’ve seen Congressional hearings and M. Zuckerburg give testimony, we’ve seen punditry, we’ve seen evasion.
For the episode, the two chat about what’s going on with the hullabaloo and different solutions privacy advocates have proposed.
This week’s installment of #error451 podcast, Bursts and William Budington speak about facial recognition technology. We chat about how different methods are employed, scanning of social media by police and security forces, different methods used to avoid it such as camouflage, lights, makeup and masks, the Google Arts & Culture app comparing people’s selfies to the contents of art museums and more.
This week on Error451, William Budington and Bursts chat about eavesdropping by digital devices. This conversation happened before the Cambridge Analytica & Facebook scandal, but covers some of the same material.
Do Facebook, Amazon, Google and other big data companies listen through your device to your conversations and target marketing at you based on your choices? What tools do platforms like those mentioned above have and what are their interests in your real-life movements, the sites you visit, how long you stay on a page and where you go next?
In a past episode, we had spoken about Apps tracking us and communicating via mic and speaker in subsonic levels with advertising devices. More on specifically Cambridge Analytica and Facebook is coming to Error451 soon!