Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

District Attorney Arguing Against Encryption Handed Out Insecure Keylogging "Monitoring" Software
Techdirt ^ | 05/18/2016 | Tim Cushing

Posted on 05/18/2016 7:12:56 AM PDT by Cyberman

Beyond James Comey, there are still a few law enforcement officials beating the anti-encryption drum. Manhattan DA Cyrus Vance is one of those. He's been joined in this fight by some like-minded district attorneys from the other coast, seeing as New York and California both have anti-encryption bills currently working their way through local legislatures. Vance, along with Los Angeles County DA Jackie Lacey and San Diego County DA Bonnie Dumanis, penned an op-ed against encryption for the LA Times. In it, they argue that tech companies have set them up as "gatekeepers" of communications and data, which they believe law enforcement should always have access to, no matter what.

DA Dumanis goes even further in a press release issued by her office. Tech companies aren't just gatekeepers standing between law enforcement and data. They're "gatekeepers of justice," apparently standing between victims of crime and punishment of wrongdoers.

...Dumanis especially shouldn't be inserting herself into the encryption debate--not with her general disdain for the security of her constituents....

In 2012, Dumanis spent $25,000 in public money on 5,000 copies of a piece of “parental monitoring” software called ComputerCop. This CD-ROM, which was distributed to families throughout the county for free, included a video from Dumanis promoting the program as the “first step” in protecting your children online.

This first step, however, involved parents installing keylogger software on their home computers. This type of technology is a favorite tool of malicious hackers, since it captures everything a user types, including personal information such as passwords and credit card numbers. Not only did ComputerCop store keylogs in an unencrypted file on the person’s computer, but it also transmitted some of that information over unsecured connections to a mysterious third-party server....


(Excerpt) Read more at techdirt.com ...


TOPICS: Crime/Corruption; Government; Technical; US: California
KEYWORDS: badcopnodonut; bigbrother; encryption; privacy
Listening to this nitwit's views on computer security is like asking Jeb Bush for advice on how to win a Presidential election.
1 posted on 05/18/2016 7:12:56 AM PDT by Cyberman
[ Post Reply | Private Reply | View Replies]

To: Cyberman

For another ‘eye opener’ check out: Wireless Network Watcher


2 posted on 05/18/2016 7:22:12 AM PDT by GOPJ (Moms who strip daughters naked for strange men would be arrested EXCEPT in a Target dressing rooms.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cyberman

No one seems to be interested in VPN.
In theory, VPN should be very secure.
The Gov seems to be more interested in ‘file storage’ than the data transport.

Not sure why but it is something to think about.


3 posted on 05/18/2016 7:26:35 AM PDT by Zathras
[ Post Reply | Private Reply | To 1 | View Replies]

To: GOPJ

Wireless Network Watcher (WNW) is relatively benign. If you’re not smart enough to change the defaults on your home wireless router, you should have someone help you. Wireless access points are NOT something to trifle with.

Used to be that having an insecure LAN was no big deal, as physical access was required to do any damage. With wireless, however, your entire network is at risk if the AP is not secure.

WNW only enumerates endpoints on a wireless network that is A) insecure, B) unsecured, C) unencrypted. It’s helpful to use in your home environment to get an idea as to what’s out there, but it’s not exactly a useful forensic tool against entities who know their way around IPSEC, RADIUS, or have their home networks properly secured.


4 posted on 05/18/2016 7:36:59 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Zathras

They want to do away with encryption in general or at least provide a “back door” that any law enforcement agency or foreign actor could easily crack.

Encryption, by its nature, is not supposed to have backdoors. It’s intended to encrypt data at-rest and transmitted. If they require a backdoor for at-rest data, it’s only a matter of time before in-transit data, such as VPN traffic, would be required to have a backdoor as well.


5 posted on 05/18/2016 7:39:12 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: Cyberman
New York and California both have anti-encryption bills currently working their way through local legislatures

And you can bet your last dime that these far left legislatures will outlaw encryption, in the name of "terrorism", "safety" and "the children", those catch-all phrases used by scoundrels everywhere to advance their tyrannical agenda so as to put their boot on the necks of the people.

6 posted on 05/18/2016 7:45:24 AM PDT by bkopto
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cyberman

His heart was in the right place, but his head was up his ass..........................


7 posted on 05/18/2016 7:54:28 AM PDT by Red Badger (WE DON'T NEED NO STEENKING TAGLINES!...........................)
[ Post Reply | Private Reply | To 1 | View Replies]

To: rarestia
They want to do away with encryption in general or at least provide a “back door” that any law enforcement agency or foreign actor could easily crack.

.......or domestic blackmailer or ex spouse or their lawyer or the teenage hacker next door.......................

8 posted on 05/18/2016 7:56:33 AM PDT by Red Badger (WE DON'T NEED NO STEENKING TAGLINES!...........................)
[ Post Reply | Private Reply | To 5 | View Replies]

To: rarestia

I’ve been studying encryption theory for three years now.
I do know that the more secure and simple a system is, the more it seems to attract Gov interference.

TrueCrypt was driven out of the market for whole disk encryption and the ‘story’ was their was a security breach.
Turns out that was a lie.

Something is going on but not sure yet what it is.


9 posted on 05/18/2016 8:00:18 AM PDT by Zathras
[ Post Reply | Private Reply | To 5 | View Replies]

To: bkopto

The California bill has been shot down.


10 posted on 05/18/2016 8:05:49 AM PDT by Coronal
[ Post Reply | Private Reply | To 6 | View Replies]

To: Cyberman

It is interesting to have observed over time how reliant law enforcement has become on technology to solve crimes. The days of true gumshoe detective work are gone. Law enforcement now relies on the criminals to create all the evidence they need in the form of data crumbs left across cyber space. Think about the difference between Jethro Gibbs (NCIS) and Joe Friday (Dragnet)..


11 posted on 05/18/2016 8:08:03 AM PDT by IamConservative (There is no greater threat to our freedoms than Bipartisanship.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Cyberman

So they pass laws? So you get encription software from a source outside the state and use it anyhow. How would a law like this even get enforced?


12 posted on 05/18/2016 8:10:36 AM PDT by Seruzawa (If you agree with the French raise your hand. If you are French raise both hands)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Zathras
Something is going on but not sure yet what it is.

Because something is happening here
But you don’t know what it is
Do you, Mister Jones?

13 posted on 05/18/2016 8:11:07 AM PDT by Stentor ("Hiding behind 'conservative' while America goes down the toilet is not acceptable anymore." LS)
[ Post Reply | Private Reply | To 9 | View Replies]

To: rarestia

The only reason the government isn’t demanding access to VPN is because they already have it.


14 posted on 05/18/2016 9:12:37 AM PDT by MeganC (The Republic of The United States of America: 7/4/1776 to 6/26/2015 R.I.P.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: MeganC

There’s nothing special about VPN vs. any other encryption modality. VPN requires the use of certificates to secure the tunnels created whether you’re using PPTP, IKE, L2TP or SSTP. You can use CHAP or pass your credentials in cleartext, but that defeats the purpose of encrypted tunnels.

By that rationale, your statement insinuates that they have access to any encryption modality, which has been proven to be false or at least difficult to prove.


15 posted on 05/18/2016 9:20:52 AM PDT by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: Zathras
Something is going on but not sure yet what it is.

I am. The government does not believe you have any right to privacy whatsoever. On the other hand, they can make anything they want "classified" and we have no recourse.

16 posted on 05/18/2016 10:41:48 AM PDT by zeugma (Today is Pungenday, the 65th day of Discord in the YOLD 3182)
[ Post Reply | Private Reply | To 9 | View Replies]

To: IamConservative

>The days of true gumshoe detective work are gone. Law enforcement now relies on the criminals to create all the evidence they need in the form of data crumbs left across cyber space.

The stark difference between a Free nation, and People, and a Socialist/police-State

Considering we are *ALL* criminals, multiple times per day, per the plethora of ‘laws’ on the books (and ignorant, mostly, of said breaks), I fail to see how you are shocked, I say SHOCKED, at your conclusion. /I wish

No-knock raids, rubber-stamped warrants, NSA and the like...all they need is to round up each/every electronic device and throw you in the slammer for many, many years on any number of trumped up charges.


17 posted on 05/18/2016 1:15:47 PM PDT by i_robot73 ("A man chooses. A slave obeys." - Andrew Ryan)
[ Post Reply | Private Reply | To 11 | View Replies]

To: rarestia

Tech Support Scam Blurs the Line with Ransomware, Locks Users’ Computers

Scammers are constantly evolving their mode of operation

http://news.softpedia.com/news/tech-support-scam-blurs-the-line-with-ransomware-locks-users-computers-504208.shtml


18 posted on 05/20/2016 6:57:03 AM PDT by KeyLargo
[ Post Reply | Private Reply | To 4 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson