Tag Archive for POTUS

Independence Day 2016

Independence Day is the time when Americans celebrate freedom from a tyrannical government in the 18th century. While gaining that freedom, the founding fathers used encryption. They used encryption while risking their lives to gain the freedom we celebrate on July 4th. The EFF documents how many of the Founding Fathers of the United States used encryption to secure our freedoms.

  • Thomas Jefferson Thomas Jefferson invented an encryption devicewas the principal author of the Declaration of Independence and the country’s third president. He is known to be one of the most prolific users of secret communications methods. He even invented his own cipher system—the “wheel cipher”  or the “Jefferson disk” as it is now commonly referred to. Mr. Jefferson also presented a special cipher to Meriwether Lewis for use in the Lewis and Clark Expedition.
  • George Washington was the first president of the United States. He frequently dealt with encryption and espionage issues as the commander of the Continental Army. He gave his intelligence officers detailed instructions on methods for maintaining the secrecy and for using decryption to uncover British spies.
  • John Adams was the second U.S. president. He used a cipher provided by James Lovell—a member of the Continental Congress Committee on Foreign Affairs. He was an early advocate of cipher systems—for correspondence with his wife, Abigail Adams while traveling.
  • James Madison was the author of the Bill of Rights and the country’s fourth president. He was a big user of enciphered communications. Numerous examples from his correspondence prove that. The text of one letter from Madison to Joseph Jones, a member of the Continental Congress from Virginia, dated May 2, 1782, was almost completely encrypted via cipher. And on May 27, 1789, Madison sent a partially encrypted letter to Thomas Jefferson describing his plan to introduce a Bill of Rights.

TechDirt correctly concludes that If encryption was good enough for the Founding Fathers to use in the 18th Century … it’s pretty ridiculous that we’re still having this debate now in this age of constant government monitoring, warrantless searches, corporate data aggregationdata sharing, and tools like IBM’s Non-Obvious Relationship Awareness software (NORA). The time is now to fight shortsighted “going dark” claims by the FBI and efforts by clueless politicians like Sen. Dianne Feinstein (D-CA) who have plans to ban encryption.

rb-

Seems to me that the biggest threat to America this Independence Day is the political ambitions of technically illiterate know-nothings in the gooberment. Be like the Founding Fathers and encrypt something start with HTTPS Anywhere from the EFF.

 

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Why NORAD Track Santa

Why NORAD Track SantaWhy did NORAD start tracking Santa? Since the tradition started in the Fifties, one might suspect that the big man’s red suit attracted the attention of anti-communist zealot Joe McCarthy. Or maybe Ike thought Santa was the beginning of an alien invasion. Or was it a typo? the good folks over at Mental Floss explain that On December 24, 1955, the red telephone at the Continental Air Defense Command (CONAD) Operations Center began to ring.

NORADThe article says the red phone meant it was either the Pentagon or CONAD commander-in-chief General Earle Partridge on the other end, and their reason for calling would probably not be pleasant. U.S. Air Force Col. Harry Shoup, director of operations at the center, rushed over to the phone and grabbed it.

“Yes, Sir, this is Colonel Shoup,” he barked.

Nothing but silence in response.

“Sir? This is Colonel Shoup,” he said.

Silence again.

“Sir? Can you read me alright?”

Finally, a soft voice on the other end.

“Are you really Santa Claus?” a little girl asked.

W.O.P.R.The Colonel told the author he was stunned for a second. He thought this was a joke. He looked around the room, expecting to see his men laughing at their prank, but found stony, serious faces all around.

He realized that there was “some screw-up on the phones,” and decided to play along.

“Yes, I am,” he answered. “Have you been a good little girl?”

The girl explained to Col. Shoup that she would leave some food out for both Santa and his reindeer and then recited her Christmas list to him. The Colonel thanked her for her hospitality, noting that Santa had a lot of traveling to do. How did he get to all those houses in one night, anyway, she asked.

Apparently, that was classified intelligence in Col. Shoup’s mind. “That’s the magic of Christmas,” he said. If anyone asks her about that, he said, she should tell them to stop asking so many questions or Santa would put them on the naughty list.

Red lineThat red phone, boy,” Col. Shoup later recalled to Mental Floss. “That’s either the old man—the four-star [General Partridge]—or the Pentagon. I was all shook up.

The red phone would keep ringing throughout the night. Not because of Soviet nukes or fighter planes heading toward U.S. soil, but because of a typo.

That day, Colonel Shoup would later learn, a local newspaper ran a Sears Roebuck ad inviting kids to contact Santa.

Sears typo for Santa“Hey Kiddies!” the ad read. “Call me on my private phone and I will talk to you personally any time day or night.” The ad listed Santa’s direct line, but the number in the copy was off by a digit. Instead of connecting to the special line Sears set up with a Santa impersonator, kids wound up calling a secret air defense emergency number.

After a few more Santa-related calls, Colonel Shoup pulled a few airmen aside and gave them a special assignment. They would answer the phone and give callers—barring the Pentagon, we assume—Santa’s current location as they “tracked” him on their radar.

rb-
And that is why NORAD tracks Santa. – Merry Christmas!

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Son of SOPA

Son of SOPAThere is a secret treaty that has wound its way through global governments. The secret treaty is called TPP. What is TPP? TPP is short for the secret Trans-Pacific Partnership trade agreement, or the evil Son of SOPA. The TPP agreement is between Australia, Brunei, Chile, Canada, Malaysia, Mexico, New Zealand, Peru, Singapore, Japan, Vietnam, and the United States.

The secret treaty was even kept from the U.S. Congress. However, the Washington Post reports that Verizon (VZ) and Cisco (CSCO) have had access to the secret treaty and they seem to be supporters. Many argue that a number of the terms that the U.S. inserted are unreasonable.

Trans-Pacific Partnership trade agreement

InfoSecurity-Magazine.com explains that a detailed analysis of the intellectual property chapter of the secret Trans-Pacific Partnership trade agreement is similar or worse than SOPA or ACTA. SOPA (Stop Online Piracy Act) and ACTA (Anti-Counterfeiting Trade Agreement) were halted largely by popular activism.

Copyright owners

The author says the common factor in both was the potential for copyright owners to force their will on the internet. Two of the key issues were to make ISPs liable for infringing content, and the ability to suspend the internet accounts of repeat infringers. A further criticism of ACTA is that it was negotiated in secret, and both the public and the national parliaments expected to simply accept the deal.

The article goes on to analyze the TPP IP chapter provided by WikiLeaks. The analysis shows that TPP is following a similar, but potentially more severe, path to that of ACTA or SOPA. Dr. Monica Horten, a visiting fellow at the London School of Economics & Political Science says the secret treaty, is the Holy Grail for big content.

Hoolywood's Holy Grail…the Holy Grail for Hollywood and the Motion Picture Association of America (MPAA).’ “It’s what they tried to do with the EU Telecoms Package, as well as in ACTA and in SOPA. It is Hollywood’s Holy Grail for online copyright enforcement”

Secret proposal

The blog reports that the U.S. and Australian government’s secret proposal supports efforts to make ISPs primarily responsible for removing copyrighted content from the internet. But the secret proposal also includes search engines, linking sites, and possibly even cloud computing services. Dr. Horten says TPP enforcement would be carried out by,

…disconnection of users (termination of Internet accounts), blocking and disabling of content, and even some level of monitoring obligation.

The US proposals also include a demand, that upon request, (rb- not surprisingly) any ISP would be obligated to provide details on their customers. Michael Geist, a Canadian law professor at the University of Ottawa told the author, “would require an overhaul of Canadian copyright law and potential changes to privacy law.”

Extending corporate copyrights

120 years oldThe U.S. is also planning to change copyright laws to benefit big pharma. TPP would extend corporate copyrights up to 120 years. Through manipulation of the process, big pharma could prevent affordable medications from ever being available to treat cancer, AIDS/HIV, or the common cold.

Opposition to TPP

Thankfully InfoSecurity Magazine says the secret TPP is not yet a done deal. Dr. Horton points out a brewing Internet cold war between the US and Canada. “The Canadians oppose it,” she added. “… Canada seems to be joined at least partially by an assortment that includes Mexico and Malaysia.

Canadian flagMeanwhile, 80 U.S. law professors sent a letter to President Obama, Congress, and Ambassador Michael Froman to object to the secrecy of the TPP. The lawyers warn that the “TPP is following a process even more secretive than ACTA, which is amplifying public distrust and creating an environment conducive to an unbalanced and indefensible final product.

Internet freedom advocacy group The EFF analyzed the TPP also. The EFF’s review of the “temporary copies” language found the U.S. proposal would make anyone who ever views content on their device could potentially be found liable of infringement. The TPP language follows:

EFFEach Party shall provide that authors, performers, and producers of phonograms have the right to authorize or prohibit all reproductions of their works, performances, and phonograms, in any manner or form, permanent or temporary (including temporary storage in electronic form).

The Free Press said, The chief negotiators are congregating in Utah on Nov. 19–24 to hammer out key details — and President Obama has signaled his intention to move the treaty forward.

rb-

Click here to tell Congress and the White House to reject the TPP.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

From Madison to PRISM

From Madison to PRISMThe folks at Whocalledmyphone.net have given us this excellent infographic. It traces the battle between the right to privacy and the prying eyes of the government. The infographic follows the erosion of privacy from the Bill of Rights to Prism. For more details, you can also check out the EFF page Timeline of NSA Domestic Spying.

Privacy vs. Security infographic
Image compliments of Who Called My Phone

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

POTUS Declares War on Patent Trolls

POTUS Declares War on Patent TrollsPresident Barack Obama has declared that it is time to get tough on “patent trolling.” Paul Marks at New Scientist writes that when ordinary activities like using Wi-Fi in a coffee shop or updating smartphone apps provoke lawsuits you know something is seriously amiss with the legal system. Firms that buy up obvious patents that the US Patent and Trademark Office (USPTO) should never have granted in the first place are called patent trolls according to the author.

US Patent and Trademark OfficeThe troll then “asserts” these patents by threatening to sue businesses that infringe them. Many will then settle out of court and pay an often business-crippling license fee.

As followers of Bach Seat know, there are a number of patent troll lawsuits related to wireless.  In 2011, Boston University’s law school estimated that dealing with patent trolling cost businesses in the US $29 billion (rb- which I originally covered here).

Seal of the President of the United StatesPresident Obama says the cash should have been spent on generating products, services, and jobs. So the White House is asking Congress to force the USPTO to narrow the scope of patents within the next six months so that whole fields cannot be trolled. Mr. Obama also wants to prevent patents from being asserted against the users of technologies, like coffee shops, rather than manufacturers. The White House says trolls will have to come clean about their identity, and not hide their “abusive litigation and settlement extraction” behind a thicket of shell companies.

This is a bold step forward by President Obama, and if these legislative proposals are enacted the playing field will be leveled,” Alan Schoenbaum, general counsel for the troll-fighting web hosting firm Rackspace told New Scientist. What’s crucial, Mr. Schoenbaum says, is that the President’s changes make sure trolls have something to lose when they fail in court. In essence, the U.S. legal system is unbalanced. In the UK, for instance, the loser pays. “That keeps frivolous lawsuits down to a minimum,” he says. “But ‘loser pays’ is rare in the U.S.

Rackspace logoThe author asks how can patent trolls be identified? Rackspace’s Schoenbaum says there are plenty of ways, “Trolls don’t invent, make or develop anything. Between 70 and 90% of their patents are software or business-method patents, and in virtually all cases the patent is invalid.

But San Francisco-based, “patent buster” Gregory Aharonian, who invalidates patents by finding previous inventions using the same ideas, told New Scientist he thinks it will be trickier to identify patent trolls. He told the author, “It is going to be hard for Obama to deal with the troll definition problem … Anyone who asserts an invalid patent, under any conditions, is a troll.” Mr. Aharonian says that some large technology firms behave like trolls when they assert overly broad or obvious patents they never exploit.

The only move that will crush the troll phenomenon is vastly improved patent quality, Mr. Aharonian says. “What upsets people Stack of moneymore is not the assertion tactics, but the crap being asserted.”

 rb-

This story barely had a full news cycle. The opportunity is dead and lost as the White House spin machine deals with the PRISM spying scandal.

Related articles
  • Stop Patent Trolls (sweenylegal.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.