Return to Video

Jacob, Laura Poitras: Reconstructing narratives

  • 0:00 - 0:10
    silent 31C3 preroll
  • 0:10 - 0:13
    Laura and Jacob silently on stage
    audio/video playback starts
  • 0:13 - 0:16
    Announcing person in video: Give
    a warm welcome to General Alexander!
  • 0:16 - 0:21
    video starts all over again,
    now at its titles
  • 0:21 - 0:24
    Announcing person in video: Give
    a warm welcome to General Alexander!
  • 0:24 - 0:30
    video:applause
  • 0:30 - 0:35
    Alexander: Thanks!
    Can you hear me?
  • 0:35 - 0:37
    Question: So does the NSA
    really keep a file on everyone?
  • 0:37 - 0:39
    Alexander: So many things you could
    say are funny but I think this requires
  • 0:39 - 0:44
    a very serious answer. First:
    No, we don’t, absolutely not.
  • 0:44 - 0:47
    And anybody who’d tell you that
    we’re keeping files or dossiers
  • 0:47 - 0:50
    on the American people:
    No, that’s not true.
  • 0:50 - 0:54
    And I will tell you that those who would
    want to weave the story, that we have
  • 0:54 - 0:59
    millions or hundreds of millions of
    dossiers on people is absolutely false.
  • 0:59 - 1:10
    title with music
    “Reconstructing Narratives”
  • 1:10 - 1:21
    audio/video playback stops
  • 1:21 - 1:24
    Jacob Appelbaum: That’s the first time
    I can remember not being wiretapped!
  • 1:24 - 1:34
    Laura laughs
    laughter and applause
  • 1:34 - 1:39
    Okay, well, it’s really a great
    honor to be back, and it’s
  • 1:39 - 1:41
    really one of the greatest pleasures
    of my life to be on stage with Laura,
  • 1:41 - 1:46
    who is one of the most fearless,
    fantastic journalists…
  • 1:46 - 1:54
    applause
  • 1:54 - 1:59
    …and we are here today
    to tell you a few things.
  • 1:59 - 2:04
    I am an American by birth
    and post-nationalist, I suppose,
  • 2:04 - 2:08
    by an accident of history. I’m
    here now working as a journalist
  • 2:08 - 2:13
    and Laura is working as a journalist.
    And I’ll let her introduce herself.
  • 2:13 - 2:16
    Laura Poitras: So, I’ve been working
    the last years, trying to document
  • 2:16 - 2:20
    the “War on Terror” and to understand
    it from a human perspective
  • 2:20 - 2:25
    and how we can understand it differently,
    if we understand its impact on people.
  • 2:25 - 2:29
    And today, what Jacob and
    I want to do is to talk about
  • 2:29 - 2:33
    how the narratives that
    we’ve been told are false,
  • 2:33 - 2:38
    and how we can construct new narratives
    that are based on objective facts.
  • 2:38 - 2:41
    Jacob: I think in some way some of
    the things we are saying will be
  • 2:41 - 2:44
    ‘preaching to the choir’, because it is
    through this community, that we have,
  • 2:44 - 2:48
    in fact, found some of the truths,
    that we will talk about today.
  • 2:48 - 2:55
    And the CCC to me is like home, so…
  • 2:55 - 3:01
    laughter and applause
  • 3:01 - 3:05
    And so, if it wasn’t for the CCC and
    your material support I don’t believe
  • 3:05 - 3:09
    that it would be possible for us to be
    here today. So, thank you all very much
  • 3:09 - 3:12
    for the large conspiracy that the German
    people and the international community
  • 3:12 - 3:15
    have brought.
    some laughter in the audience
  • 3:15 - 3:19
    We have just now simultaneously
    published on DER SPIEGEL’s website
  • 3:19 - 3:23
    two very large stories which we think will
    be of great interest, which we will take
  • 3:23 - 3:27
    a little bit of time to explain.
    But if you go to spiegel.de
  • 3:27 - 3:31
    you will see two stories.
    One is about cryptography
  • 3:31 - 3:38
    and one is about… the CIA.
    And about JPEL and NATO.
  • 3:38 - 3:41
    And this is very important, these stories
    being published at the same time,
  • 3:41 - 3:45
    we very much want to thank DER SPIEGEL
    and the colleagues who are in this room,
  • 3:45 - 3:48
    Andy Müller-Maguhn, Aaron Gibson
    and a number of other people,
  • 3:48 - 3:51
    Marcel Rosenberg and Holger Stark…
  • 3:51 - 3:59
    applause
  • 3:59 - 4:02
    We, as some background, have
    been working on these stories
  • 4:02 - 4:06
    really for a long time.
    The crypto story, I would say,
  • 4:06 - 4:10
    it’s something we’ve wanted to do for
    almost a year and a half, if not more.
  • 4:10 - 4:13
    And really, if you think about the
    investigations in the Cypherpunks movement
  • 4:13 - 4:18
    we’ve really wanted to have some of
    these answers for about 15 or 20 years.
  • 4:18 - 4:21
    Some of the answers are good and some
    of the answers are not so fantastic.
  • 4:21 - 4:25
    I guess, it depends on where you stand.
    But we hope that, by bringing this to you,
  • 4:25 - 4:28
    that it is really in the public interest.
    And that the public here is interested
  • 4:28 - 4:32
    and that you will take it to other places.
    That you will really take action, based on
  • 4:32 - 4:37
    what you see. Whether it is traditional
    action, whether it is civil disobedience,
  • 4:37 - 4:41
    whether it’s FOIAs, whether it’s
    something else, who knows, we hope
  • 4:41 - 4:44
    that you will feel empowered
    by the end of this talk.
  • 4:44 - 4:47
    Laura: And I’d just like to say
    that if anyone wants to open up
  • 4:47 - 4:50
    their laptops and look at some of
    the documents that we’ve published
  • 4:50 - 4:53
    we won’t be offended at all and,
    in fact, will be happy. I think it will
  • 4:53 - 4:56
    contribute to your experience
    of the talk today.
  • 4:56 - 5:00
    Voice from audience: Laura,
    it’s ‘/international’ on spiegel.de
  • 5:00 - 5:04
    Jacob: Great, ‘spiegel.de/international’
    And for everyone who can’t be here,
  • 5:04 - 5:08
    streaming, remember if the stream cuts out
    and you never see us again, it was murder!
  • 5:08 - 5:14
    Laura and audience laughing, some applause
  • 5:14 - 5:18
    Laura: So, one of the ways
    that the ‘War on Terror’ works
  • 5:18 - 5:22
    – and the way that war works in general –
    is how people are de-humanized
  • 5:22 - 5:32
    and reduced to numbers. This is a short
    video that I filmed about Guantanamo.
  • 5:32 - 6:38
    video with serious music
  • 6:38 - 6:43
    Laura: That was a video that I made
    about a former prisoner of Guantanamo.
  • 6:43 - 6:50
    His name was Adnan Latif. He
    was sent to Guantanamo in 2012.
  • 6:50 - 6:55
    And this is how he came home. He
    was on hunger strike for many years
  • 6:55 - 6:59
    before he died. And what
    was most shocking to me
  • 6:59 - 7:06
    is watching what happens when he returns
    home and that he’s listed as a number.
  • 7:06 - 7:10
    And that his family had to witness that.
    That that was a person who they were
  • 7:10 - 7:14
    seeing for the first time in many
    years, who is reduced to a number.
  • 7:14 - 7:18
    So today, what we’re publishing
    with DER SPIEGEL is looking at
  • 7:18 - 7:23
    how that process works.
    And it involves NATO’s JPEL kill list
  • 7:23 - 7:30
    that is being used in Afghanistan
    to target people for targeted killings.
  • 7:30 - 7:35
    We’re publishing along that some
    narratives of particular people
  • 7:35 - 7:40
    who are on the kill list. One
    particular case was a man
  • 7:40 - 7:46
    who was given the code
    name “Object Doody”.
  • 7:46 - 7:51
    He was targeted for killing,
    or for assassination.
  • 7:51 - 7:56
    A British Apache helicopter
    that was code named “Ugly 50”
  • 7:56 - 8:01
    was sent to kill him. This was on
    a day that the visibility was poor,
  • 8:01 - 8:05
    and they missed him and they
    shot a child and his father.
  • 8:05 - 8:09
    The child was killed immediately,
    the father was wounded.
  • 8:09 - 8:16
    The helicopter looped back
    around and killed its target.
  • 8:16 - 8:20
    Jacob: Right. So, part of what we are
    hoping to do here, just to make it
  • 8:20 - 8:26
    perfectly clear, is to expose information
    that people say doesn’t exist, with
  • 8:26 - 8:31
    a couple of goals. And one of those
    goals, to be very clear about it,
  • 8:31 - 8:34
    – even though this, I suppose, tilts
    me a little bit on the activist side
  • 8:34 - 8:39
    of journalism – is to stop the
    killing. That is an explicit goal
  • 8:39 - 8:43
    with this publication. The British
    Government and the American Government
  • 8:43 - 8:47
    – in various different ways NATO as well –
    they say, that these kind of things
  • 8:47 - 8:50
    really don’t exist. That they don’t
    happen this way. Any they talk about
  • 8:50 - 8:57
    the killing of people in a very…
    let’s say ‘mechanical fashion’.
  • 8:57 - 9:00
    Usually they say this evidence doesn’t
    exist, but the evidence does exist.
  • 9:00 - 9:06
    And, in fact, there are lists with
    names, just endless names.
  • 9:06 - 9:09
    And those people, in various different
    ways, are graded. They’re graded
  • 9:09 - 9:13
    with regard to the political consequence
    of those people being killed. As well as
  • 9:13 - 9:18
    some very small spreadsheet and on
    that spreadsheet, there’s a small box,
  • 9:18 - 9:25
    and that box explains their crimes.
    Next to that, there’s a Dollar figure
  • 9:25 - 9:29
    for a potential reward. And maybe there’s
    a restriction. Sometimes it says something
  • 9:29 - 9:34
    like “kinetic action prohibited”. For
    example. That’s because, by default,
  • 9:34 - 9:39
    “kinetic action” is not prohibited.
    That is because these are lists of names
  • 9:39 - 9:44
    of people to be found and to be
    murdered. And so of these lists…
  • 9:44 - 9:48
    we have an excerpt of these
    lists, being published today.
  • 9:48 - 9:54
    And the goal of publishing this is
    to show what needs to be done.
  • 9:54 - 9:58
    So these lists have redactions
    and the goal is that SPIEGEL,
  • 9:58 - 10:04
    along with hopefully others, will help
    us to continue to work to uncover
  • 10:04 - 10:08
    not only the fate of these people on these
    lists whose names are redacted, but also
  • 10:08 - 10:12
    the fate of people who are not yet on
    these kinds of lists. Maybe to move
  • 10:12 - 10:16
    to a world in which we don’t have lists
    for, what I would call, assassinations.
  • 10:16 - 10:20
    And that’s what SPIEGEL calls it as well.
    This is not, as some people would say,
  • 10:20 - 10:29
    a “Joint Prioritized Effects List”. This
    is an assassination program. And I think,
  • 10:29 - 10:33
    personally, that it is inappropriate for
    democratic societies to have them and
  • 10:33 - 10:37
    when they deny that they have them, we’d
    like to prove them wrong and publish them.
  • 10:37 - 10:40
    And so that is, what we have done today.
  • 10:40 - 10:53
    applause
  • 10:53 - 10:58
    Now, an important detail
    of this is: In the story,
  • 10:58 - 11:03
    the very specific story that is told in
    the SPIEGEL piece, as Laura mentioned,
  • 11:03 - 11:07
    there is an Apache helicopter. And
    that helicopter attempted to engage
  • 11:07 - 11:11
    with a so-called “legitimate target”. And
    part of what we hope to drive home
  • 11:11 - 11:16
    is this notion of legitimacy
    and targeting. In this case,
  • 11:16 - 11:21
    there is a value, that is assigned to
    a person. And that value is a number,
  • 11:21 - 11:26
    which includes the number of people who
    are not the target, that can be killed
  • 11:26 - 11:29
    in service of killing that person!
    That is completely innocent people,
  • 11:29 - 11:33
    who are allowed to be killed entirely. And
  • 11:33 - 11:38
    depending on the number there may be
    a call back to base or to a higher command.
  • 11:38 - 11:44
    But the number isn’t 1 before they have
    to make that call. They have discretion.
  • 11:44 - 11:49
    And in this case a child was killed with
    a Hellfire missile. And why is that?
  • 11:49 - 11:53
    Because technology mediates this
    type of killing and that technology is
  • 11:53 - 11:58
    not as precise as people would say.
    And so we have today published
  • 11:58 - 12:06
    the storyboard of this objective “Doody”,
    which is the name, D-O-O-D-Y.
  • 12:06 - 12:09
    That storyboard tells this and
    explains that a child was killed
  • 12:09 - 12:12
    with a Hellfire missile in service of
    killing someone else. And Laura
  • 12:12 - 12:21
    can explain what this person
    did to ‘deserve’ to be killed.
  • 12:21 - 12:25
    Laura: I mean, actually, what I wanted
    to transition to is looking at
  • 12:25 - 12:29
    actually the fact… the narrative is, that
    the government or governments are
  • 12:29 - 12:34
    targeting people, who are suspected
    of something. And in fact
  • 12:34 - 12:38
    what we learned, is that they’re targeting
    people based on as little information
  • 12:38 - 12:43
    as their telephone number, or a voice
    recognition. And they’re using those
  • 12:43 - 12:49
    as methods to target and kill people.
    One of the things, that we’ve learned
  • 12:49 - 12:53
    through the disclosures by Edward
    Snowden is that they’re targeting people
  • 12:53 - 12:58
    not just in war zones but internationally.
    They’re targeting us for surveillance
  • 12:58 - 13:05
    all over the world. And…
    this is a video of a target.
  • 13:05 - 13:13
    audio/video playback starts
    Man: This is the highest level! (in German)
  • 13:13 - 13:17
    Ali Fares: Mh-mh!
  • 13:17 - 13:20
    Netcologne, [inaudible], Teliast…
  • 13:20 - 13:27
    Oh my god, it’s so good documented!
  • 13:27 - 13:32
    That are most of the
    routers that I actually know.
  • 13:32 - 13:42
    Office, plied sky (?), and…
  • 13:42 - 13:44
    Man: This is an engineer?
    Ali: Yes.
  • 13:44 - 13:48
    Man: Engineer, engineer, engineer, engineer…
    Ali: Oh, yeah.
  • 13:48 - 13:53
    Man: …engineer, engineer.
    This is you?
  • 13:53 - 14:04
    Ali: Yes.
    audio/video playback stops
  • 14:04 - 14:09
    Jacob: So what you just saw there
    was “Engineers from Stellar”, and
  • 14:09 - 14:14
    that is a fantastic name for a company
    that gets compromised. It is important
  • 14:14 - 14:20
    to understand the notion of targeting
    with regard to why a target
  • 14:20 - 14:25
    considered legitimate in some cases can
    have this notion of collateral damage.
  • 14:25 - 14:30
    Now in the case of Stellar or in the case
    of Belgacom, which Laura revealed
  • 14:30 - 14:35
    with DER SPIEGEL, what we learn
    is that it isn’t actually the case
  • 14:35 - 14:40
    that a terrorist is involved
    with Belgacom or with Stellar.
  • 14:40 - 14:45
    It is that a kind of neo-colonialism
    is taking place in the digital era,
  • 14:45 - 14:49
    wherein the colonies, the networks,
    that they do not have through coercion
  • 14:49 - 14:55
    of the state or through other surveillance
    practices, they have to be compromised.
  • 14:55 - 15:00
    And those become targets and they
    become legitimate targets in theory
  • 15:00 - 15:05
    and in actuality, because of it’s
    usefulness. Because of the leverage
  • 15:05 - 15:10
    that it provides against a speculative
    target, someday in the future. That is,
  • 15:10 - 15:14
    these networks become compromised
    in service of being able to compromise
  • 15:14 - 15:20
    future networks and other people, just
    because they can. They set out to do that.
  • 15:20 - 15:24
    And so Stellar is an example of such a
    thing. And to be able to confront victims
  • 15:24 - 15:29
    this way, to show them that they’re
    compromised helps us to understand,
  • 15:29 - 15:34
    helps us to show that in fact we are
    directly, and indirectly impacted
  • 15:34 - 15:40
    by these types of activities. And when
    we think about this kind of targeting
  • 15:40 - 15:46
    we have to understand the scale.
    And this scale is sort of incredible.
  • 15:46 - 15:52
    The budget for targeted
    exploitation, for the NSA,
  • 15:52 - 15:57
    not speaking at all about the GCHQ,
    or the Defense Signals Directorate folks
  • 15:57 - 16:03
    over in Australia,
    there’s so much money,
  • 16:03 - 16:07
    when you look at the offensive warfare,
    that for 2013 alone there was
  • 16:07 - 16:12
    650 million Dollars spent
    on the GENIE program.
  • 16:12 - 16:15
    And the GENIE program is their
    offensive Cyber War program,
  • 16:15 - 16:20
    as they call it themselves, in which they
    build backdoors, like UNITEDRAKE
  • 16:20 - 16:26
    and STRAITBIZZARE and other tools like
    Regin, which you know as one of the tools,
  • 16:26 - 16:30
    I hope, that has been used in
    Belgacom and in other places.
  • 16:30 - 16:34
    So they target places like Stellar and
    Belgacom, but they also target places
  • 16:34 - 16:39
    like the European Union. In that
    case, the EU takes the place
  • 16:39 - 16:43
    of a terrorist. That is: they are the
    goal. They aren’t compromising
  • 16:43 - 16:47
    the EU’s networks just because
    someone interesting might show up,
  • 16:47 - 16:52
    they are compromising the EU’s
    networks, because the EU is
  • 16:52 - 16:56
    the equivalent to a terrorist to them. And
    they wish to have leverage and control.
  • 16:56 - 16:59
    Because that’s what surveillance is in
    this context. It’s exploitation of systems,
  • 16:59 - 17:03
    where they leverage access to that
    system, or whichever systems that they
  • 17:03 - 17:08
    have access to, to get more access,
    to have more control. Either politically
  • 17:08 - 17:13
    or technologically or both.
    Which ties of course into economics.
  • 17:13 - 17:20
    Now, in the case of GENIE 650 million
    Dollars is quite a great deal of money.
  • 17:20 - 17:26
    But for 2017 the projected budget
    for GENIE is a billion Dollars.
  • 17:26 - 17:31
    This is just the beginning of what
    we see. And these civilian targets
  • 17:31 - 17:35
    or these governmental targets that are
    being targeted in continental Europe,
  • 17:35 - 17:39
    they’re not alone. It is actually
    happening all around the world.
  • 17:39 - 17:42
    And these compromises, they happen
    in service of mass surveillance.
  • 17:42 - 17:47
    Whenever they don’t have the ability to
    mass-surveil a system they implant systems
  • 17:47 - 17:51
    along the way in order to surveil
    what goes in and out of them.
  • 17:51 - 17:56
    Systems are even used as what are called
    ‘Diodes’. And Diodes are essentially
  • 17:56 - 18:03
    another term which we see the Canadians
    use. Operational Relay Boxes or ORBs.
  • 18:03 - 18:06
    Anybody here that used to be a black hat,
    I know there are no more black hats here,
  • 18:06 - 18:12
    it’s all legitimate, but… except
    for that guy, in the front…
  • 18:12 - 18:16
    Everybody knows what you use those boxes
    for: You use them to jump from one network
  • 18:16 - 18:20
    to another network, so that when
    something is traced back it traces back
  • 18:20 - 18:23
    to that machine. In the case of the
    Canadian Service they themselves
  • 18:23 - 18:27
    talk about, a couple of times a year,
    compromising as many systems as they can
  • 18:27 - 18:31
    in non-Five-Eyes countries, in order to
    ensure that they have as many operational
  • 18:31 - 18:37
    relay boxes as they need for the
    coming year. These diodes mean
  • 18:37 - 18:42
    that when a system does a thing, it is
    absolutely not the case that we can say
  • 18:42 - 18:45
    the person who has purchased
    that system is responsible for it.
  • 18:45 - 18:49
    It is their official doctrine, in fact,
    to use other people’s computers
  • 18:49 - 18:54
    for their hacking. And that’s important,
    when we now consider, that they have
  • 18:54 - 19:00
    – in 2017 projected – a goal of
    having a billion Dollars to do that.
  • 19:00 - 19:05
    When we look at how that bounces out with
    Defense that is – not at all – balanced.
  • 19:05 - 19:11
    In fact, it is tilted entirely
    towards Offensive Warfare.
  • 19:11 - 19:15
    Laura: I was wondering, how many
    people in the room have gone online
  • 19:15 - 19:17
    to look at some of the
    documents that we released.
  • 19:17 - 19:21
    Jacob: Anyone? Hey, nice.
    Laura: Alright.
  • 19:21 - 19:25
    Jacob: Fantastic! So in
    the future, that is to say
  • 19:25 - 19:30
    in approximately 3 weeks, we plan to
    release, along with some of our colleagues
  • 19:30 - 19:34
    at SPIEGEL, and other people who
    are helping out, more information
  • 19:34 - 19:39
    about specific malware, specific
    cases in which it’s used
  • 19:39 - 19:42
    and details about information sharing
    with regard to the malware in terms of
  • 19:42 - 19:45
    how it’s harvested. We’re thinking
    probably in the second week of January
  • 19:45 - 19:49
    for that malware story. And we
    wanted to make sure to get it right
  • 19:49 - 19:55
    and we wanted people to focus on
    the specifics of the NATO kill lists
  • 19:55 - 20:00
    and to focus on cryptography.
    We thought, well, people here
  • 20:00 - 20:03
    in the audience would be able to handle
    all three, the rest of the world just
  • 20:03 - 20:08
    isn’t ready for it yet. So we had
    to take a little bit of a pause. So
  • 20:08 - 20:14
    more of the malware details will be
    released in about 3 weeks. Now for me,
  • 20:14 - 20:18
    one of the things that has, I would
    say for my entire adult life been
  • 20:18 - 20:22
    very interesting to me and before
    my adult life started, was a system
  • 20:22 - 20:24
    known as Echelon. Anybody
    here remember that system?
  • 20:24 - 20:26
    ‘Woohoow’, and laughter
  • 20:26 - 20:29
    jokingly: That’s the guy that built it!
    more laughter
  • 20:29 - 20:34
    I would guess… maybe not,
    sorry, I don’t want to… trying to
  • 20:34 - 20:38
    snitch jacket you there… But
  • 20:38 - 20:42
    I think it’s to me extremely
    important to hear about these
  • 20:42 - 20:47
    kinds of things, that sound totally crazy.
    Like the CIA torture report, for example.
  • 20:47 - 20:51
    That started out as a conspiracy [theory].
    And now we know, that America’s
  • 20:51 - 20:56
    official policy with the CIA was rape,
    anal rehydration. Those were
  • 20:56 - 21:01
    conspiracy theories which
    we now know to be facts.
  • 21:01 - 21:07
    So Echelon, the rumour of Echelon was
    this notion of planetary surveillance.
  • 21:07 - 21:11
    And of course it was Duncan Campbell who
    brought this forward in an European Union
  • 21:11 - 21:17
    report. He, in fact, very clearly outlined
    the interception capabilities
  • 21:17 - 21:24
    of the U.S. Government and others.
    Now, it is hard to actually imagine
  • 21:24 - 21:30
    planetary surveillance, on a scale, let’s
    say, your home, and how your home
  • 21:30 - 21:34
    fits into your city, and your city how it
    fits into a country, and the whole world.
  • 21:34 - 21:39
    And all of that being monitored.
    But what we found is that
  • 21:39 - 21:43
    during the Crypto Wars we thought that we
    had won. We thought that we had a way,
  • 21:43 - 21:47
    really, to change things. We thought that
    with cryptography we would be able
  • 21:47 - 21:52
    to change the entire balance. Even if
    something like planetary surveillance
  • 21:52 - 21:56
    would have come about. And so when
    Duncan Campbell released his reports
  • 21:56 - 22:00
    about Echelon in the very early 21st
    century I think a lot of people weren’t
  • 22:00 - 22:04
    as concerned about it as they should
    have been. And shortly after that
  • 22:04 - 22:09
    the ‘War on Terror’ really got
    off to a very, very big start.
  • 22:09 - 22:14
    It turns out that we weren’t as concerned
    as we should have been in the right areas.
  • 22:14 - 22:18
    And we I think can say now, that the first
    Crypto Wars were not won and in fact
  • 22:18 - 22:23
    the first Crypto Wars were probably
    – if anything – lost, or they’re still
  • 22:23 - 22:30
    going on now. If we were to delineate that
    and we were to talk about as an example,
  • 22:30 - 22:33
    the second Crypto Wars, what we would
    find is what has actually been happening
  • 22:33 - 22:39
    behind the scenes, and, thanks to Edward
    Snowden we actually have a great deal
  • 22:39 - 22:44
    of answers that we would
    probably not have otherwise.
  • 22:44 - 22:56
    applause
  • 22:56 - 23:01
    Now, it is important to understand
    that the context of this
  • 23:01 - 23:09
    is the notion that everyone is suspicious.
    That we live now in a world of total,
  • 23:09 - 23:13
    absolute surveillance which sometimes
    misses a thing, here or there.
  • 23:13 - 23:16
    But this is the goal: Collect it all!
    That’s General Alexander’s notion.
  • 23:16 - 23:21
    When he talks about his notion
    e.g. about dossiers it’s a trick.
  • 23:21 - 23:25
    It’s a rhetorical trick. Because what he
    means to say is that now dossiers
  • 23:25 - 23:30
    are dynamic. And that this information is
    not stored on lists, written down like in,
  • 23:30 - 23:33
    let’s say, the 50s. Rather they’re
    stored in databases that dynamically
  • 23:33 - 23:38
    will generate a list based on a query
    from an analyst. “Give me every person
  • 23:38 - 23:43
    that went to this website at this time”.
    And it of course expands, the notion is
  • 23:43 - 23:47
    that somehow this will only be used
    against terrorists. But what is a terrorist,
  • 23:47 - 23:52
    in this case? In some cases it actually
    includes people who are merely involved
  • 23:52 - 23:58
    in drugs, and part of that has been
    published as part of the JPEL kill lists.
  • 23:58 - 24:03
    That is to say: people who are definitely
    not terrorists, but who are otherwise
  • 24:03 - 24:08
    interesting targets, so there’s a sort of
    “bleed over”, and so we see the same thing
  • 24:08 - 24:12
    with surveillance and cryptography: It
    was for exceptional targets and now it is
  • 24:12 - 24:18
    for everyone. And so cryptography came
    as a liberator. And that was the idea.
  • 24:18 - 24:23
    But just as we showed a little bit ago,
    with STELLAR where they targeted engineers
  • 24:23 - 24:28
    specifically to have access to the
    infrastructure, so, too, we find
  • 24:28 - 24:34
    that for cryptography they sabotage
    critical infrastructure. We found, in fact,
  • 24:34 - 24:37
    so many different interesting things that
  • 24:37 - 24:42
    it’s actually hard to talk about
    it in only half an hour of time.
  • 24:42 - 24:46
    Laura: I’d like to just say, as one of
    the journalists who’s been publishing
  • 24:46 - 24:50
    on the documents I think that one of the
    most both important stories and the
  • 24:50 - 24:54
    most unsatisfying stories was the
    BULLRUN story that was published
  • 24:54 - 24:58
    by The New York Times, and the Guardian,
    and ProPublica. Because it did warn us
  • 24:58 - 25:02
    of how the NSA was
    attacking critical infrastructure
  • 25:02 - 25:06
    to make the internet insecure, and
    yet it didn’t tell us any specifics of
  • 25:06 - 25:09
    what they meant by that. And this is
    something that I think frustrated
  • 25:09 - 25:12
    many people in the audience, and so…
  • 25:12 - 25:16
    applause
  • 25:16 - 25:19
    And so the reporting
    that Jake’s been doing
  • 25:19 - 25:22
    along with Aaron Gibson
    and other people…
  • 25:22 - 25:25
    Jacob: Christian (?)…
    there in the audience.
  • 25:25 - 25:28
    Laura: … is to dig in and to find out
    what those specifics are so that we can
  • 25:28 - 25:34
    actually warn people about what is safe
    and what’s not safe in cryptography.
  • 25:34 - 25:38
    Jacob: So, we have, let’s say, a little
    free time we’re gonna talk about this…
  • 25:38 - 25:42
    but I’d like to do some surveys: Who here
    uses PPTP? And don’t laugh at them
  • 25:42 - 25:46
    when they raise their hand, let
    them be honest… who uses it?
  • 25:46 - 25:47
    One guy!
    laughter
  • 25:47 - 25:50
    Ok, well, good news to this audience…
    stop doing that, we’re gonna tell you why
  • 25:50 - 25:56
    in a second. Laura laughs
    Who here uses IPSEC?
  • 25:56 - 26:00
    With a pre-shared key?
    Fantastic…
  • 26:00 - 26:03
    Stop doing that too…
    laughter
  • 26:03 - 26:07
    Raise your hand if you use SSH!
  • 26:07 - 26:09
    even louder laughter
    Laura laughs
  • 26:09 - 26:14
    Guess what…
    laughter, slight applause
  • 26:14 - 26:19
    In the documents that we’re publishing
    today we are showing in fact a series
  • 26:19 - 26:25
    of systems that, if we
    understand them correctly…
  • 26:25 - 26:30
    I wonder if I should say my next sentence…
    I say this only as myself and not as Laura.
  • 26:30 - 26:35
    I’d be surprised if some building weren’t
    burning, frankly. But… the NSA claims
  • 26:35 - 26:40
    to have databases for decryption, or an
    attack orchestration for PPTP and IPSEC,
  • 26:40 - 26:49
    which is not so surprising at all, but
    also for SSL and TLS, and… for SSH.
  • 26:49 - 26:53
    They have specific slides where they talk
    about the Debian weak number generation.
  • 26:53 - 27:00
    This is not that. For what we can tell
    they have separate programs for that.
  • 27:00 - 27:04
    So they of course have a way through the
    cryptographic exploitation services,
  • 27:04 - 27:08
    crypto-analysis exploitation services, to
    do certain decrypts. Now, they say:
  • 27:08 - 27:13
    “We stress: potential!”. It seems to be
    there’s a pattern. And the pattern is
  • 27:13 - 27:19
    things that are done entirely in software,
    in particular, those things as long as
  • 27:19 - 27:24
    there’s a good random number generator,
    and especially if it is Free Software,
  • 27:24 - 27:29
    what we find is that it seems to stand
    the test of time. That doesn’t mean
  • 27:29 - 27:33
    that it always will, because we found
    a couple of things. One of the things
  • 27:33 - 27:37
    is that we found that they log the
    cipher texts, and that they wait.
  • 27:37 - 27:42
    Sometimes to break it with brute-force, so
    we are also revealing today the location
  • 27:42 - 27:47
    of the two large supercomputers: That is
    at Oak Ridge National Laboratories and at
  • 27:47 - 27:52
    Fort Meade, for a program called LONGHAUL.
    The LONGHAUL I suppose as they
  • 27:52 - 27:59
    have named it appropriately, is for their
    long haul approach. Combined with things
  • 27:59 - 28:03
    like the massive data repository, or the
    Mission Data Center, the Mission Data
  • 28:03 - 28:09
    repository in places like Bluffdale, Utah.
    They plan and do store the cipher texts
  • 28:09 - 28:13
    of an unbelievable number of connections.
    When you make an SSL / TLS connection
  • 28:13 - 28:19
    the GCHQ keeps statistics. The Canadian
    CSE keeps statistics. They seem to log
  • 28:19 - 28:25
    metadata about the handshake in terms of
    TCP/IP, but also in terms of SSL and TLS
  • 28:25 - 28:30
    for the actual protocols. That is to say,
    they store the cryptographic handshakes,
  • 28:30 - 28:35
    and in some cases for specific selected
    data they take the entire flow. Now,
  • 28:35 - 28:40
    we have found claims that are kind
    of amazing: in the case of BULLRUN
  • 28:40 - 28:43
    the New York Times and the Guardian,
    and the rest of the collaborating
  • 28:43 - 28:48
    news organizations have often
    left out important details.
  • 28:48 - 28:52
    One of the important details which I find
    to be the most shocking and upsetting
  • 28:52 - 28:58
    is that the British alone by
    2010 – was it? – had 832 people
  • 28:58 - 29:05
    right into their BULLRUN program. That is
    832 people knew about their backdooring
  • 29:05 - 29:10
    and sabotage of crypto, just
    in the British Service alone.
  • 29:10 - 29:14
    And each of the Five-Eyes countries
    runs a similar program, like that.
  • 29:14 - 29:18
    With potentially similar numbers of
    people right into those programs.
  • 29:18 - 29:22
    They say something like: “3 people
    can keep a secret if 2 are dead”.
  • 29:22 - 29:27
    How about 832 British men? I’m not
    sure that that’s a really good bet.
  • 29:27 - 29:32
    And these guys have bet the farm on it.
    That is to say, they have slides and
  • 29:32 - 29:36
    presentations and intercepts where
    they decrypt SSL, where they discuss
  • 29:36 - 29:40
    decrypting SSL at a scale starting in
    the tens of thousands, moving into the
  • 29:40 - 29:44
    hundreds and millions of thousands.
    Hundreds of thousands, and millions, and
  • 29:44 - 29:48
    then into billions, actually. For TLS
    and SSL they actually have statistics
  • 29:48 - 29:53
    on the order of billions. Of all the
    major websites that everyone here
  • 29:53 - 29:58
    probably has used at one
    point or another in their life.
  • 29:58 - 30:04
    So, in the case of the Canadian Services
    they even monitored ‘Hockeytalk’,
  • 30:04 - 30:07
    to give you and idea about this. And they
    talk about it in terms of ‘warranted’
  • 30:07 - 30:12
    collection, and special source
    collection, and encrypted traffic
  • 30:12 - 30:17
    indeed does stand out. They have
    programs like QUICKANT, which is a
  • 30:17 - 30:21
    specific way of interfacing with
    a program called FLYING PIG.
  • 30:21 - 30:26
    FLYING PIG is an SSL/TLS database,
    it’s a knowledge database,
  • 30:26 - 30:30
    and QUICKANT seems to be what’s called
    a “Query Focused Data Set”. They try
  • 30:30 - 30:36
    to use that, from what we can tell,
    for doing low latency de-anonymization.
  • 30:36 - 30:40
    Some of the documents we’re releasing
    today will explain some of their failures.
  • 30:40 - 30:44
    Now, I think it’s important to be
    cautious about this because they have
  • 30:44 - 30:49
    many compartments for their data,
    that is to say they very clearly
  • 30:49 - 30:53
    have ways of keeping secrets even from
    themselves. But one of the things we found,
  • 30:53 - 30:57
    and that we’re publishing today also,
    is a FISA intercept. And to the best
  • 30:57 - 31:01
    of my knowledge, and I think that this is
    true, no one has ever published one
  • 31:01 - 31:06
    of these before. So, this is the basis for
    what you would call ‘parallel construction’,
  • 31:06 - 31:09
    actually, where they gather Intelligence
    and then they say, “whatever you do,
  • 31:09 - 31:13
    don’t use this in lawful investigation,
    don’t use this in a court,
  • 31:13 - 31:18
    it’s not evidence. But by the way,
    here it is”. So we’re publishing
  • 31:18 - 31:23
    one of those today and we have
    some, well, moderately good news.
  • 31:23 - 31:27
    In looking at these, what we have
    found is that they consistently break
  • 31:27 - 31:31
    various different types of encryption.
    So if you’re mailing around a Microsoft
  • 31:31 - 31:35
    .doc document that’s password protected
    there’s a good chance that they
  • 31:35 - 31:40
    send it to LONGHAUL using a thing
    called ISLANDTRANSPORT and then that,
  • 31:40 - 31:46
    if it can, through brute-force, is
    decrypted. And it is the case
  • 31:46 - 31:49
    that, when they do this decryption,
    they send it back and they include
  • 31:49 - 31:54
    the decrypted information in the FISA
    transcript. They do this for .rar files,
  • 31:54 - 31:58
    they do this for .doc files, they do this
    for a bunch of different systems. But we
  • 31:58 - 32:01
    don’t want to focus on what’s broken
    because The New York Times and
  • 32:01 - 32:05
    The Guardian and other places have
    already sort of said “everything is fucked”.
  • 32:05 - 32:08
    We wanted to try to
    make it a positive talk!
  • 32:08 - 32:18
    laughter and applause
  • 32:18 - 32:24
    And… so I think Laura here is just
    going to be able to show you in fact…
  • 32:24 - 32:27
    Laura: If it will play…
  • 32:27 - 32:35
    Jacob: Just drag it over… the other way…
  • 32:35 - 32:40
    So we wanted to show you… who here
    has heard about PRISM? Everyone?
  • 32:40 - 32:42
    What does that mean to you? It doesn’t
    mean anything, right? We just know
  • 32:42 - 32:46
    that it’s some massive surveillance
    program. We wanted to show you what
  • 32:46 - 32:54
    one of those PRISM records actually
    looks like which, in itself is, I think…
  • 32:54 - 32:56
    Laura: Sorry.
    Jacob: It’s okay.
  • 32:56 - 33:01
    …it’s a rather unexciting document, except
    for the fact that we get to show it to you.
  • 33:01 - 33:05
    Which is great. [to Laura:]
    I think if you escape for the…
  • 33:05 - 33:15
    Laura: …escape out of here?
  • 33:15 - 33:19
    Jacob: There it is. Hey FBI, fuck you!
  • 33:19 - 33:30
    laughter and applause
  • 33:30 - 33:33
    So I take great pleasure in being able to
    say that this couldn’t have happened
  • 33:33 - 33:43
    without Laura!
    cheers and applause
  • 33:43 - 33:48
    But if you look here you see
    ‘SIGAD US-984XN’. That’s PRISM!
  • 33:48 - 33:54
    And this is your dossier for PRISM.
    some shouts from audience
  • 33:54 - 33:57
    From audience: “O3”, “Larger!”
    Laura: Yeah.
  • 33:57 - 34:00
    audience laughs
    document on screen is zoomed in
  • 34:00 - 34:05
    audience goes: “Aaaah!”
    cheers and applause
  • 34:05 - 34:08
    And if you’re wondering about the
    redactions, it’s all Andy Müller-Maguhn.
  • 34:08 - 34:13
    slight laughter
    Shouted from audience: Fuck you!!
  • 34:13 - 34:15
    Jacob laughs
  • 34:15 - 34:20
    Jacob: Here’s the good news! The FBI
    regularly lies to the American Public.
  • 34:20 - 34:22
    And to the rest of the world.
    Then they say they’re ‘going dark’.
  • 34:22 - 34:26
    What we found in the study of these
    FISA intercepts is that basically
  • 34:26 - 34:31
    no one uses cryptography. And basically
    everyone that uses cryptography is broken,
  • 34:31 - 34:38
    except for – well, let’s say –
    2 things. Thing No.1 is OTR.
  • 34:38 - 34:49
    big applause and cheers
  • 34:49 - 34:52
    Very important to go with it is you’ll
    notice that there’s some metadata.
  • 34:52 - 34:55
    And it’s just metadata. But as the U.S.
    Government has said in public, they
  • 34:55 - 35:01
    kill people with metadata. So up there
    you’ll see that, I believe this was Yahoo,
  • 35:01 - 35:04
    is that right, Andy?
    Andy M.-M. answers from audience
  • 35:04 - 35:08
    Yeah, I think… it could be Gmail, or could
    be Yahoo, I forgot which one this one is.
  • 35:08 - 35:11
    We’re releasing, you know, enough
    for you to figure it out on your own.
  • 35:11 - 35:15
    Hopefully this isn’t you, if so, I’m
    sorry we redacted your information.
  • 35:15 - 35:19
    Cause if it was me I wouldn’t want it to
    be redacted. But you’ll see that it’s
  • 35:19 - 35:24
    a user name, IP address as well as
    a time and a date. And you also see
  • 35:24 - 35:29
    other IP addresses associated with it. Those
    are used for selector-based surveillance.
  • 35:29 - 35:33
    Which if you haven’t been following along
    at home it means that they can take
  • 35:33 - 35:36
    that information, put it into other
    databases, and the things like XKeyscore,
  • 35:36 - 35:41
    and pull up other information that will be
    related. But most importantly here is,
  • 35:41 - 35:46
    you see what is essentially a chat log. As
    if it had been created on your computer.
  • 35:46 - 35:51
    Now, don’t log – it’s rude. They did it
    for you anyway. And what you see is
  • 35:51 - 35:55
    “OC – No decrypt available for
    this OTR encrypted message”.
  • 35:55 - 36:00
    In other documents we see them saying
    “cryptographic exploitation services”.
  • 36:00 - 36:07
    “We can’t decrypt it, it’s off the
    record”. Quite a nice endorsement!
  • 36:07 - 36:13
    And what we have also found is
    that they do the same thing for PGP.
  • 36:13 - 36:24
    applause
  • 36:24 - 36:28
    Now in other cases they do decrypt the
    messages. So instead of telling you
  • 36:28 - 36:33
    about everything “It’s broken!”
    what we wanted to do is to suggest:
  • 36:33 - 36:38
    “Look at the composition of OTR, find
    Ian Goldberg who’s here somewhere,
  • 36:38 - 36:42
    ask him to review your cryptographic
    protocol”. Maybe don’t – he’s probably
  • 36:42 - 36:48
    already overwhelmed. But Snowden said
    this in the very beginning. He said:
  • 36:48 - 36:51
    “Cryptography, when properly implemented,
    is one of the few things that you can
  • 36:51 - 36:57
    rely upon”. And he’s right. And we
    see this. This is the message.
  • 36:57 - 37:01
    These things are not to be used in legal
    proceedings. And yet here we see them
  • 37:01 - 37:06
    anyway. And what we see is that even
    there, in the most illegal of settings,
  • 37:06 - 37:11
    essentially, they can’t decrypt it. Now the
    sad part is that not everyone is using it.
  • 37:11 - 37:15
    But the good news is that when you use it,
    it appears to work. When you verify
  • 37:15 - 37:19
    the fingerprint, e.g. We didn’t find
    evidence of them doing active attacks
  • 37:19 - 37:23
    to do man-in-the-middle attacks. But
    that’s easy to solve. OTR allows you
  • 37:23 - 37:28
    to authenticate. PGP and Gnu-PG allow
    you to verify the fingerprint. We did find
  • 37:28 - 37:32
    evidence of them having databases, filled
    with cryptographic keys, that were pilfered
  • 37:32 - 37:38
    from routers, and compromising machines.
    So rotate your keys frequently,
  • 37:38 - 37:43
    use protocols that are ephemeral. They
    themselves find that they are blinded
  • 37:43 - 37:48
    when you use properly implemented
    cryptography. So Gnu-PG
  • 37:48 - 37:53
    – Werner Koch I think is in the audience –
    Gnu-PG and OTR are 2 things that
  • 37:53 - 37:58
    actually stop the spies from
    spying on you, with PRISM.
  • 37:58 - 38:02
    applause, some cheers
  • 38:02 - 38:10
    Laura: to Jake Would you mind if I ask…
    for a volunteer to … computers …?
  • 38:10 - 38:14
    Jacob: So, we have some other really
    good news. And that good news
  • 38:14 - 38:21
    is this: There are… in some of the
    slides that are being released
  • 38:21 - 38:24
    a matrix – not ‘the Matrix’
    that you’re hoping for –
  • 38:24 - 38:26
    laughter
  • 38:26 - 38:32
    but we can talk about that program later
    laughter
  • 38:32 - 38:39
    I’m not even joking. But…
    laughter
  • 38:39 - 38:43
    There are some other things. One of the
    things that they talk about in this matrix
  • 38:43 - 38:49
    is, what’s hard, and what’s easy.
    And in the case of ‘Hard’
  • 38:49 - 38:55
    they describe Redphone, and that means
    Signal, the program by Christine Corbett
  • 38:55 - 39:03
    and Moxy Marlinspike as ‘catastrophic’.
    applause
  • 39:03 - 39:07
    They say: “Tails and Tor – catastrophic”.
  • 39:07 - 39:16
    cheers and applause
  • 39:16 - 39:19
    So what that really means is that we
    now understand some things that
  • 39:19 - 39:24
    they have trouble with. And how they
    will take action to try to sabotage it
  • 39:24 - 39:27
    is clear. They will try to sabotage the
    Random Number Generators like they did
  • 39:27 - 39:32
    with Dual_EC_DRBG. They will
    try to sabotage the platforms.
  • 39:32 - 39:36
    They will try to force companies to be
    complicit. I think the German word is
  • 39:36 - 39:40
    ‘Gleichschaltung’. You’re all familiar:
    with that? That is the process that is
  • 39:40 - 39:45
    happening now in America. With these
    crypto programs. That’s what PRISM is.
  • 39:45 - 39:49
    PRISM is when companies would like
    to fight against it. And that’s not to
  • 39:49 - 39:53
    call them ‘victims’, most of them are
    willing. This is still what they’re
  • 39:53 - 39:57
    forced into. That is the legal regime.
    And it is when you take responsibility
  • 39:57 - 40:00
    using the strong crypto that you can
    set that in a different direction.
  • 40:00 - 40:04
    Those companies actually can’t really
    protect you. They are, in fact,
  • 40:04 - 40:11
    secretly in some cases, and sometimes
    willingly, complicit in that. And, so
  • 40:11 - 40:16
    if you use Redphone and Signal, if you
    use something like Tor, and Gnu-PG
  • 40:16 - 40:20
    with a properly sized key – don’t
    use like a 768 bit RSA key
  • 40:20 - 40:24
    or something stupid like that…
    If you use OTR,
  • 40:24 - 40:30
    if you use jabber.ccc.de – buy that guy
    who runs that a beer, by the way –
  • 40:30 - 40:31
    applause
  • 40:31 - 40:35
    if you use these things in concert
    together, you blind them.
  • 40:35 - 40:38
    So this is the good news. And the
    documents that support this
  • 40:38 - 40:42
    are online. We have some other bad
    news, though. There exists a program
  • 40:42 - 40:47
    which they call ‘TUNDRA’. TUNDRA – it’s
    not exactly clear what the details are.
  • 40:47 - 40:53
    But they say that they have a handful
    of crypto-analytic attacks on AES.
  • 40:53 - 40:57
    Obviously they can’t break AES, or
    they would be able to break OTR.
  • 40:57 - 41:01
    But what it suggests is that they
    have a conflict of interest.
  • 41:01 - 41:05
    Well, they’re both supposed
    to protect our information
  • 41:05 - 41:09
    and, of course, to exploit it. If they
    have attacks against AES, much like
  • 41:09 - 41:12
    if they have attacks against SSH as they
    claim in the Caprius database,
  • 41:12 - 41:17
    in that program then it shows that
    conflict of interest runs very deep.
  • 41:17 - 41:20
    Against our critical infrastructure.
    Against the most important systems
  • 41:20 - 41:25
    that exist. Protect our data. And it
    shows a sort of hegemonic arrogance.
  • 41:25 - 41:29
    And that arrogance is to suggest that
    they’ll always be on top. I had
  • 41:29 - 41:33
    the misfortune of meeting General
    Alexander, quite recently. In Germany.
  • 41:33 - 41:39
    And after failing to have him arrested,
    which was a funny story in itself,
  • 41:39 - 41:44
    I asked him what he thought he was doing.
    Another person there stood up and said:
  • 41:44 - 41:49
    “What about who comes after you next?” And
    he didn’t quite understand the question.
  • 41:49 - 41:53
    But his answer was pretty eerie: He
    said: “Nobody comes after us next”.
  • 41:53 - 41:57
    faint laughter
  • 41:57 - 42:00
    “Thousand-year Reich”. That is
    exactly what he was saying. And
  • 42:00 - 42:04
    when I confronted him about accountability
    for things like kill lists, and crypto
  • 42:04 - 42:08
    he said that he was just
    following orders. Literately.
  • 42:08 - 42:12
    laughter and some applause
  • 42:12 - 42:17
    So. Now we know what blinds
    them. And we understand
  • 42:17 - 42:20
    what they do with things when they’re
    not blinded. Their politics include
  • 42:20 - 42:25
    assassinations but it doesn’t just
    end there. It includes torture,
  • 42:25 - 42:30
    it includes kidnapping. It includes buying
    people. And then sending their bodies home
  • 42:30 - 42:35
    with a number. Instead of a name.
    It includes de-humanizing them.
  • 42:35 - 42:39
    So we want to encourage everyone here to
    feel empowered with this knowledge,
  • 42:39 - 42:45
    which is a little difficult. But, Werner
    Koch, are you in the room?
  • 42:45 - 42:48
    positive
    Could you stand up?
  • 42:48 - 42:53
    applause
  • 42:53 - 42:57
    Stay, stand there, just
    stay, stand there!
  • 42:57 - 43:02
    Laura: Stay up, stand up!
    Jacob: And Ian Goldberg,
  • 43:02 - 43:04
    are you in the room?
    I’m sorry to do this…
  • 43:04 - 43:12
    There is Ian!
    ongoing applause
  • 43:12 - 43:15
    …and Christine Corbett…
    Christine Corbett, are you in the room?
  • 43:15 - 43:19
    From Signal?
    Laura: Stay… keep standing!
  • 43:19 - 43:24
    Jacob: Stand up! Stand up!
    applause
  • 43:24 - 43:30
    These people, without even knowing it,
    without even trying, they beat them!
  • 43:30 - 43:47
    cheers and strong applause
  • 43:47 - 43:56
    Laura: So,…
  • 43:56 - 44:00
    don’t sit down guys! So,
    last night I screened my film
  • 44:00 - 44:03
    “Citizenfour” here, and there were some
    questions, and somebody asked
  • 44:03 - 44:10
    what can they do to support the work that
    Snowden has done, and the journalists.
  • 44:10 - 44:13
    And actually what I should have said
    and I didn’t say in the moment is that
  • 44:13 - 44:18
    actually everybody should fund the work
    that you guys do. And I mean that,
  • 44:18 - 44:23
    because, literally, my work would not be
    possible without the work that you do.
  • 44:23 - 44:28
    So I would like it if everybody in this
    room when they leave here in the next week
  • 44:28 - 44:31
    to reach out and fund these projects.
    Because without these projects
  • 44:31 - 44:38
    the journalism that Glenn and I, and Jake
    have done would literally not be possible.
  • 44:38 - 44:50
    strong applause, some cheers
  • 44:50 - 44:59
    And…
  • 44:59 - 45:02
    Jacob: Just to be clear, since this video
    will definitely be played at a grand jury
  • 45:02 - 45:06
    against the both of us, I wanna make
    it perfectly clear that defense
  • 45:06 - 45:10
    of the U.S. Constitution is the Supreme
    defense, your honor! And, secondly,
  • 45:10 - 45:13
    that those gentlemen had nothing
    to do with any of this at all!
  • 45:13 - 45:16
    laughter, some applause
  • 45:16 - 45:21
    So, now, hold your applause, I’m sorry.
    I mean – they deserve it forever.
  • 45:21 - 45:25
    If it wasn’t for them we definitely would
    not have made it here today. So it is
  • 45:25 - 45:29
    Free Software. For freedom, literately,
    as Richard Stallman talks about it.
  • 45:29 - 45:33
    Empowered, with strong mathematics,
    properly implemented
  • 45:33 - 45:37
    that made this possible. It is not
    hopeless. It is, in fact, the case
  • 45:37 - 45:41
    that resistance is possible. And, in fact,
    I think the CCC… If I have learned
  • 45:41 - 45:45
    one lesson from the Chaos
    Computer Club and this community –
  • 45:45 - 45:50
    it’s that it’s mandatory. That we have
    a duty to do something about these things.
  • 45:50 - 45:55
    And we can do something about it.
    So what we need to recognize,
  • 45:55 - 45:59
    and what I hope that we can bring
    to you is that there is great risk,
  • 45:59 - 46:02
    for Laura, in particular. In making
    these kinds of things possible.
  • 46:02 - 46:06
    But that we are in it together.
    When Julian and I gave a talk
  • 46:06 - 46:09
    with Sarah Harrison last year, and we
    talked about “Sysadmins of the world,
  • 46:09 - 46:13
    uniting” we didn’t just mean
    sysadmins. We meant:
  • 46:13 - 46:18
    recognize your class interests, and
    understand that this is the community
  • 46:18 - 46:23
    that you are a part of. At least a small
    part of. And that we’re in it together.
  • 46:23 - 46:28
    We need people like Christine Corbett,
    working on Signal. We need people
  • 46:28 - 46:33
    like Ian Goldberg breaking protocols and
    building things like OTR. And Werner Koch.
  • 46:33 - 46:37
    We need Adam Langley building things
    like Pond. But we need everybody to do
  • 46:37 - 46:41
    whatever they can to help with these
    things. It requires everyone; and
  • 46:41 - 46:45
    every skill is valuable to contribute to
    that. From all the people that work on Tor
  • 46:45 - 46:50
    to people that work on Debian. That work
    on free software, for freedom, literately.
  • 46:50 - 46:55
    So what we wanted to do was to say that we
    should align with these class interests.
  • 46:55 - 46:59
    And that we should recognize them. And
    that we should work together to do that.
  • 46:59 - 47:03
    And it is this community who can help
    to really change things in the rest
  • 47:03 - 47:07
    of the world. Because it is in fact only
    this community and some of the people
  • 47:07 - 47:12
    in this room, and around the world to tie
    in to it, that have blinded these people!
  • 47:12 - 47:16
    Everyone else seems to have
    either gone complicitly;
  • 47:16 - 47:20
    or they have designed it
    incompetently and broken,
  • 47:20 - 47:24
    and it is not good. So that
    is important to recognize.
  • 47:24 - 47:28
    Every person, if you are here you are
    out of a small set of people in the world,
  • 47:28 - 47:32
    use that power wisely. Help these people
    to do that. And that will help us all
  • 47:32 - 47:36
    to continue. Not only to reveal these
    things but to fundamentally shift
  • 47:36 - 47:41
    and change that. For everyone, for the
    whole planet. Without any exception.
  • 47:41 - 47:45
    So, on that note we’d like
    to take some questions!?
  • 47:45 - 47:46
    Laura: Yeah!
  • 47:46 - 48:02
    strong applause and cheers
  • 48:02 - 48:05
    Herald waving at the speakers
    to approach stage center
  • 48:05 - 48:17
    standing ovations
  • 48:17 - 48:22
    Herald gently pushing the
    speakers to stage center
  • 48:22 - 48:48
    continued standing ovations
  • 48:48 - 49:02
    Laura: Thank you!
    continued standing ovations
  • 49:02 - 49:05
    Jacob: Wow!
    Herald: So, everybody who has a question
  • 49:05 - 49:10
    please stand in front of
    one of the 6 microphones
  • 49:10 - 49:14
    that are in this room, and,
    Signal Angel? Are you there?
  • 49:14 - 49:19
    Signal Angel: Yeah, I’m here!
    Herald: Are there questions from the internet?
  • 49:19 - 49:23
    Signal Angel: Yeah, so the first one would
    be: What should we do about SSH now?
  • 49:23 - 49:26
    laughter
    Laura laughs
  • 49:26 - 49:28
    Jacob: Well,
    to Laura: shall I?
  • 49:28 - 49:32
    Laura: Yeah.
    Jacob: I wanna be clear.
  • 49:32 - 49:37
    We don’t understand, we only know what
    they claim. And I don’t wanna hide that
  • 49:37 - 49:41
    and say that they didn’t claim anything.
    But they do have claim. They claim
  • 49:41 - 49:46
    it as potential. What I would say is:
    what about these NIST curves?
  • 49:46 - 49:51
    What about NIST-anything? The documents
    that we’ve released specifically talk
  • 49:51 - 49:55
    about something that’s very scary.
    They say that it is Top Secret,
  • 49:55 - 49:59
    in a classification guide, that the
    NSA and the CIA work together
  • 49:59 - 50:03
    to subvert standards. And we even released
    as part of the story an example of them
  • 50:03 - 50:08
    going – the NSA, that is –
    to an IETF meeting
  • 50:08 - 50:12
    to enhance surveillance
    with regard to Voice-over-IP.
  • 50:12 - 50:17
    They’re literally amongst us. So
    what do we do? First, find them.
  • 50:17 - 50:20
    Second, stop them!
    mumbles and faint applause
  • 50:20 - 50:24
    Question: Thank you!
    Herald: Microphone 2, please!
  • 50:24 - 50:26
    Question: Can you talk about, do you
    plan on releasing the source material,
  • 50:26 - 50:29
    eventually? Or will it always be redacted?
  • 50:29 - 50:34
    Jacob: Well, some of this is already
    out right now, without redactions.
  • 50:34 - 50:38
    With the exception of
    very few sets of redactions.
  • 50:38 - 50:41
    For agent’s names, and things where
    legally… we will go to prison. I mean,
  • 50:41 - 50:44
    I’m not adverse to that.
    But I’d like to wait a while.
  • 50:44 - 50:46
    laughter
  • 50:46 - 50:49
    Question: What about
    in 15..20 year’s time?
  • 50:49 - 50:52
    Laura: Yeah, I mean, I think there
    are 2 questions there as how to…
  • 50:52 - 50:54
    scaling (?) the reporting. But I agree,
    it needs to happen. And I think
  • 50:54 - 50:58
    it’s a valid criticism. I need to do more
    of it. I think certain things, I think,
  • 50:58 - 51:01
    will… I would say should continue to
    be redacted, at least for the short term.
  • 51:01 - 51:04
    Which I think is like there are a lot of
    names, you know, e-mail addresses,
  • 51:04 - 51:07
    phone numbers. All these kinds of
    specifics, I think, we’ll continue to redact.
  • 51:07 - 51:11
    And then we’re working on scaling.
    I haven’t really had time to think about
  • 51:11 - 51:14
    15 years from now. So, but of
    course, I think at some point
  • 51:14 - 51:18
    this questions-of-names becomes
    less of an issue. But I do here
  • 51:18 - 51:21
    the criticism that we need
    to be doing more publishing!
  • 51:21 - 51:25
    Jacob: If we live that long! I hope
    you’ll help us! Laura laughs
  • 51:25 - 51:29
    Next question?
    Herald: Next question from the internet, please!
  • 51:29 - 51:32
    Signal Angel: So how reliable
    is this source on OTR,
  • 51:32 - 51:36
    can that be verified with
    a second source, somehow?
  • 51:36 - 51:39
    Jacob: Well, I think that’s
    a really good question.
  • 51:39 - 51:43
    From what we know, cryptographically,
    OTR which has been analyzed
  • 51:43 - 51:46
    by a number of people hasn’t been broken.
  • 51:46 - 51:50
    And what it appears to be the
    case in these FISA intercepts,
  • 51:50 - 51:54
    alone, that is one set of things. Where
    they produce one set of evidence
  • 51:54 - 51:59
    from one set of people. And there are
    other documents, from a different section,
  • 51:59 - 52:04
    from different agencies, that essentially
    say something completely the same.
  • 52:04 - 52:09
    That is: Everything we see seems
    to support that. And I would say
  • 52:09 - 52:13
    maybe Julian is not the best
    example of how great OTR is.
  • 52:13 - 52:18
    But I think I am. I rely on it every day
    for almost all of my communications.
  • 52:18 - 52:22
    And I feel pretty confident, combined
    with this, as well as talking with people
  • 52:22 - 52:26
    in the Intelligence community
    who actually use OTR, and PGP,
  • 52:26 - 52:30
    amazingly enough. So I feel
    pretty good about it. And
  • 52:30 - 52:35
    the most important part is that they don’t
    have super powers. They have backdoors.
  • 52:35 - 52:40
    E.g. I really would encourage people
    to look at the Cavium (?) hardware.
  • 52:40 - 52:43
    I don’t really know why. But it seems
    to be that they’re obsessed with this.
  • 52:43 - 52:47
    And you can look at the documents and
    you can see that. Look at the hardware.
  • 52:47 - 52:51
    Crypto hardware. And imagine that it’s
    compromised. They spend tens of millions
  • 52:51 - 52:55
    of Dollars to backdoor these things. And
    they work with agencies around the world
  • 52:55 - 52:59
    to make that happen. So, would make
    sense that OTR would be safe, actually.
  • 52:59 - 53:03
    It doesn’t interface with any hardware.
    And it would make sense because the math
  • 53:03 - 53:09
    seems to be good. And it seems to be vetted.
    And that seems to be their weakness.
  • 53:09 - 53:14
    Question: Thanks.
    Herald: Number 4, please!
  • 53:14 - 53:16
    Question: Hello. I have… actually, it may
    be a little odd question. But I wanted
  • 53:16 - 53:22
    to ask it anyway. Regarding the
    term ‘War on Terror’ in general.
  • 53:22 - 53:27
    Because all of these things, the
    Torture Report, the NSA spying,
  • 53:27 - 53:31
    is all being done in the name of
    the ‘War on Terror’. Even though
  • 53:31 - 53:35
    we know a number of the people who were
    tortured were innocent and were in no way
  • 53:35 - 53:42
    terrorists. We know torture does not
    work as an interrogation method.
  • 53:42 - 53:45
    And we know a vast majority of the people
    who are being spied on are completely
  • 53:45 - 53:50
    innocent and did nothing wrong. And
    I wanted to know whether maybe we might
  • 53:50 - 53:55
    actually be inadvertently lending (?) an
    amount of credibility to the whole thing
  • 53:55 - 54:00
    by using the term
    ‘War on Terror’ in the first place.
  • 54:00 - 54:03
    Laura: Yeah, I mean, actually, I think…
    Right, we’re talking about ‘Reconstructing
  • 54:03 - 54:06
    Narratives’, and that’s maybe one we
    should binoc (?). This is really the
  • 54:06 - 54:10
    ‘War on pretty much Everyone’.
    And so, I agree with that.
  • 54:10 - 54:14
    I think… and I stopped using it for
    a long time. I think that I began
  • 54:14 - 54:18
    re-using it, I think,
    when nothing changed.
  • 54:18 - 54:20
    And, in fact, I think I was one of those
    people who thought things were changed
  • 54:20 - 54:23
    under Obama. And there would be some
    accountability, like if you torture people
  • 54:23 - 54:28
    you’re held accountable for torturing
    people. And then there didn’t. So,
  • 54:28 - 54:31
    yeah, I agree, we need a new term for that
    to describe… Mainly, (?) some people are
  • 54:31 - 54:36
    calling it the ‘Endless War’, which
    I hope is that isn’t actually true.
  • 54:36 - 54:39
    But I do think that that’s a term that
  • 54:39 - 54:44
    comes with the narrative
    of the Government.
  • 54:44 - 54:47
    Jacob: I think, because I’ve been living in
    Germany for a while I actually don’t use
  • 54:47 - 54:51
    the ‘War on Terror’ as a sentence,
    ever. I say ‘Imperialist War’.
  • 54:51 - 54:54
    Because that’s what it is. It’s Imperialist
    war. And it’s an Imperialist war on you,
  • 54:54 - 54:58
    as a person, your liberties. It’s not
    about privacy. It’s about choice.
  • 54:58 - 55:02
    It’s about dignity. It’s about agency.
    And of course, I mean these guys
  • 55:02 - 55:07
    are murderers and rapists. We
    shouldn’t dignify them. I mean they’re
  • 55:07 - 55:10
    absolutely awful. The Torture Report
    really shows that. But it doesn’t matter
  • 55:10 - 55:15
    that torture doesn’t work. That’s like
    – as is often said – you know this notion
  • 55:15 - 55:21
    like, what (?) is slavery economically
    viable? Who fucking cares? It’s slavery!
  • 55:21 - 55:30
    applause
    Question: Thank you!
  • 55:30 - 55:32
    Herald: Number 1, please!
  • 55:32 - 55:36
    Question: Do you think, since it’s
    kind of obvious, that we should reject,
  • 55:36 - 55:41
    or mostly reject, the projects that are
    influenced by Governmental Institutions
  • 55:41 - 55:46
    like NIST? Do you have any
    information to how they react
  • 55:46 - 55:50
    when they see that you use
    smaller projects like e.g. Paths (?)
  • 55:50 - 55:57
    to encrypt your harddrive,
    and some odd crypto scheme?
  • 55:57 - 56:00
    Jacob: Well, one of the things
    we found is that Truecrypt, e.g.
  • 56:00 - 56:04
    withstands what they’re trying to do.
    And they don’t like it. I really wonder
  • 56:04 - 56:09
    if someone could figure out why Truecrypt
    shut down. That would be really interesting.
  • 56:09 - 56:16
    applause
  • 56:16 - 56:20
    I can also tell you that after I met
    General Alexander, and I told him
  • 56:20 - 56:24
    to go fuck himself as hard as
    possible with a chainsaw…
  • 56:24 - 56:29
    whoohoo’s, cheers and applause
  • 56:29 - 56:32
    I hope he’s watching this video!
    laughter
  • 56:32 - 56:37
    He actually went to, let’s say my
    employer who shall remain anonymous
  • 56:37 - 56:43
    someone in the audience laughs
    and, … sorry Roger!
  • 56:43 - 56:46
    laughter
    …and my understanding is they also
  • 56:46 - 56:50
    went to our funders, and said:
    “What’s this guy? What’s he doing?”,
  • 56:50 - 56:55
    you know, and they tried to pressure. And
    my employer, who shall remain anonymous,
  • 56:55 - 56:59
    did not cave. But, yeah,
    they exert pressure!
  • 56:59 - 57:07
    applause
  • 57:07 - 57:10
    Herald: Another question
    from the internet, please!
  • 57:10 - 57:17
    Signal Angel: Yeah, so, these files
    are pretty shocking, or revealing.
  • 57:17 - 57:19
    Were they part of the stuff that
    came out in summer last year?
  • 57:19 - 57:25
    And where was the bottleneck?
    Why do they come out now?
  • 57:25 - 57:26
    Jacob: Oh that’s a question for you!
  • 57:26 - 57:30
    Laura: Yeah! So in this case
  • 57:30 - 57:34
    this was a number of reasons. One is
  • 57:34 - 57:37
    that we’ve been slowed
    to scale the reporting.
  • 57:37 - 57:41
    And it was also the case
    that some of the files
  • 57:41 - 57:44
    I personally didn’t have
    access to, during that time
  • 57:44 - 57:48
    when the story actually first
    came out. And then also
  • 57:48 - 57:54
    just the time of reporting and
    researching the documents.
  • 57:54 - 57:57
    Herald: Number 3, please!
  • 57:57 - 58:01
    Question: Thanks for the talk! It was
    great! I support totally the idea that
  • 58:01 - 58:07
    we need strong crypto. And I think that
  • 58:07 - 58:09
    strong crypto needs also support,
    and we should all use it. But I think
  • 58:09 - 58:12
    strong crypto is not the whole
    answer to the political situation
  • 58:12 - 58:15
    that we have. And I think…
  • 58:15 - 58:21
    applause
  • 58:21 - 58:26
    …I think that this community of
    hackers and nerds needs to build
  • 58:26 - 58:30
    stronger ties with political movements
    and be part of political movements.
  • 58:30 - 58:34
    I know you are, and I think that
    we can’t solve the political dilemma
  • 58:34 - 58:37
    with just strong crypto. So we need both.
  • 58:37 - 58:46
    applause
  • 58:46 - 58:48
    Herald: And another
    question from the internet!
  • 58:48 - 58:51
    No more questions from the
    internet. So, number 3, please!
  • 58:51 - 58:55
    Question: Yes, thank you also very much
    for the talk. I want to ask a question
  • 58:55 - 58:59
    about Citizenfour, and especially the
    ending, of Citizenfour, where there’s
  • 58:59 - 59:05
    a strong suggestion that army base here
    in Germany, called Ramstein is essential
  • 59:05 - 59:11
    in these killings that you addressed
    tonight. What would be your… like,
  • 59:11 - 59:16
    are you gonna give more information
    that’s not just suggestional? And
  • 59:16 - 59:20
    what would you want, like, especially
    this audience to engage in?
  • 59:20 - 59:24
    Laura: I mean, so, there is gonna
    be more reporting on that topic
  • 59:24 - 59:29
    that I’m working with, and my colleague
    Jeremy Scahill, at the Intercept.
  • 59:29 - 59:33
    And unfortunately I can’t say more
    than that, other than, we will be
  • 59:33 - 59:36
    coming out with more information that
    will go beyond what you see in the film.
  • 59:36 - 59:42
    So, for sure. And it deals with
    how Ramstein is part of the
  • 59:42 - 59:45
    infrastructure and architecture
    of communication.
  • 59:45 - 59:47
    Jacob: Shut it down! Shut it down!
  • 59:47 - 59:53
    applause
  • 59:53 - 59:56
    Herald: Number 5, please!
  • 59:56 - 60:00
    Question: Is there a minimum key length
    that you would consider unsafe?
  • 60:00 - 60:03
    Jacob: Yeah, so, actually I’m glad you
    asked that question. I was sort of hoping
  • 60:03 - 60:06
    someone will do that. Okay. So. There are
    some documents from the GCHQ
  • 60:06 - 60:10
    where they talk about their super
    computing resources. And,
  • 60:10 - 60:16
    about 3 years ago they were
    talking about 640 bit keys
  • 60:16 - 60:20
    being something that they sort of casually
    take care of. Now at the same time that
  • 60:20 - 60:24
    that was happening Arjen Lenstra
    had, I think, factored 768 bit,
  • 60:24 - 60:29
    and it took, what was it, Alex?
    3 years? On a bunch…
  • 60:29 - 60:33
    listens to answer from audience
    Year and a half! So, I think pretty much
  • 60:33 - 60:37
    anything less than 1024 [bit] is a bad
    idea. There are other documents
  • 60:37 - 60:41
    where they specifically say, if
    it’s 1024 bit RSA, it’s a problem.
  • 60:41 - 60:45
    But you need to think about it,
    not about what they can do today.
  • 60:45 - 60:47
    First of all they have different
    compartments. One of those compartments
  • 60:47 - 60:51
    obviously is dedicated to any maths
    that they’ve got that speed that up.
  • 60:51 - 60:55
    But another point is that because of
    things like the massive data repository
  • 60:55 - 60:58
    – the mission data repository of
    Bluffdale, Utah – you’re not encrypting
  • 60:58 - 61:03
    for today. I mean, you are! But you’re
    also encrypting for 50 years from today.
  • 61:03 - 61:07
    So, personally, I use 4096 bit
    RSA keys, and I store them
  • 61:07 - 61:10
    on a hardware token, which
    hopefully doesn’t have a backdoor.
  • 61:10 - 61:15
    But I trust Werner [Koch]. That’s
    the best I can do, unfortunately.
  • 61:15 - 61:17
    Which is pretty good. But…
    laughter
  • 61:17 - 61:22
    But I think e.g. that the best key sizes,
  • 61:22 - 61:25
    you need to think about them in terms of
    what you’re actually doing; and how long.
  • 61:25 - 61:29
    And then think about composition. That is…
    it’s not just about encrypting something
  • 61:29 - 61:33
    with, like, a 4096 bit RSA key.
    Also make it hard for them to target you
  • 61:33 - 61:37
    for surveillance in the
    first place. So, e.g.
  • 61:37 - 61:40
    when you can, use systems where
    you can composite (?) with Tor. Use things
  • 61:40 - 61:43
    that are totally ephemerally keyed. So
    they can’t break in, steal the key and
  • 61:43 - 61:47
    decrypt things in retrospect. Make it
    really hard for them to make it valuable.
  • 61:47 - 61:51
    There’s an economic point to that
    collection as well as a mathematical point.
  • 61:51 - 61:55
    Actually they sort of balance each other
    out. So anyway, don’t use small key lengths.
  • 61:55 - 62:00
    And maybe also consider looking at the
    work that DJB and Tanja have been doing,
  • 62:00 - 62:05
    about Elliptic Curves stuff.
    And I think, really look to them!
  • 62:05 - 62:08
    But these guys [=NSA] aren’t special.
    They don’t have super powers.
  • 62:08 - 62:11
    But when you use things that
    are closed-source software…
  • 62:11 - 62:14
    I mean, Richard Stallman was really right.
    I mean, I know that it pains some of you
  • 62:14 - 62:17
    to know that. But he was really right.
    laughter
  • 62:17 - 62:20
    And he deserves a lot of love for that!
  • 62:20 - 62:30
    applause
  • 62:30 - 62:32
    Free software, with software
    implementations with large keys.
  • 62:32 - 62:36
    That’s what you want. And when you can:
    protocols that allow for ephemeral keying,
  • 62:36 - 62:39
    or where they have forward secrecy.
    Things like Pond, things like OTR,
  • 62:39 - 62:43
    things like Redphone and Signal.
    And GnuPG. GnuPG has the caveat (?) that
  • 62:43 - 62:46
    if they ever get into your system later
    they can of course decrypt other messages.
  • 62:46 - 62:52
    So you have to consider all that. Not just
    key size. And GnuPG has safe defaults.
  • 62:52 - 62:55
    So if you’re choosing key sizes,
    hopefully you’re using that.
  • 62:55 - 62:58
    Libraries like Salt also
    make safe choices. So,
  • 62:58 - 63:03
    hopefully that answers your question and
    you use strong crypto in the future.
  • 63:03 - 63:06
    Herald: So thank you very
    much for the talk. Thank you!
  • 63:06 - 63:09
    I saw a lot of people being
    shocked in that room.
  • 63:09 - 63:14
    A lot of tears of, I think,
    proudness and hope.
  • 63:14 - 63:18
    I saw… that gives me a really good
    feeling. So thank you for the talk.
  • 63:18 - 63:21
    Give them a very warm applause!
  • 63:21 - 63:34
    applause
  • 63:34 - 63:38
    silent postroll titles
  • 63:38 - 63:46
    Subtitles created by c3subtitles.de
    in the year 2017. Join, and help us!
Title:
Jacob, Laura Poitras: Reconstructing narratives
Description:

more » « less
Video Language:
English
Duration:
01:03:46

English subtitles

Revisions