From dfc38032500ecd4fe97668969c52c7e3a923fa33 Mon Sep 17 00:00:00 2001 From: Vincevrp Date: Sun, 20 Jan 2019 01:22:09 +0100 Subject: [PATCH] Move fourteen eyes and KDL to separate file --- _includes/sections/fourteen-eyes.html | 45 +++++++ _includes/sections/key-disclosure-law.html | 84 +++++++++++++ index.html | 139 +-------------------- 3 files changed, 132 insertions(+), 136 deletions(-) create mode 100644 _includes/sections/fourteen-eyes.html create mode 100644 _includes/sections/key-disclosure-law.html diff --git a/_includes/sections/fourteen-eyes.html b/_includes/sections/fourteen-eyes.html new file mode 100644 index 00000000..8fe0acf3 --- /dev/null +++ b/_includes/sections/fourteen-eyes.html @@ -0,0 +1,45 @@ +

Global Mass Surveillance - The Fourteen Eyes

+ +UKUSA Agreement + +

The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third-party countries can and do spy on each other.

+ +
+ {% include panel.html color="danger" + title="Five Eyes" + body=' +
    +
  1. Australia
  2. +
  3. Canada
  4. +
  5. New Zealand
  6. +
  7. United Kingdom
  8. +
  9. United States of America
  10. +
+ ' + %} + + {% include panel.html color="warning" + title="Nine Eyes" + body=' +
    +
  1. Denmark
  2. +
  3. France
  4. +
  5. Netherlands
  6. +
  7. Norway
  8. +
+ ' + %} + + {% include panel.html color="secondary" + title="Fourteen Eyes" + body=' +
    +
  1. Belgium
  2. +
  3. Germany
  4. +
  5. Italy
  6. +
  7. Spain
  8. +
  9. Sweden
  10. +
+ ' + %} +
diff --git a/_includes/sections/key-disclosure-law.html b/_includes/sections/key-disclosure-law.html new file mode 100644 index 00000000..b91b95d5 --- /dev/null +++ b/_includes/sections/key-disclosure-law.html @@ -0,0 +1,84 @@ +

Key Disclosure Law

+ +

Who is required to hand over the encryption keys to authorities?

+ +

Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.

Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).

+ +
+ + {% include panel.html color="danger" + title="Key disclosure laws apply" + body=' +
    +
  1. Antigua and Barbuda
  2. +
  3. Australia
  4. +
  5. Canada
  6. +
  7. France
  8. +
  9. India
  10. +
  11. Ireland
  12. +
  13. Norway
  14. +
  15. Russia
  16. +
  17. South Africa
  18. +
  19. United Kingdom
  20. +
+ ' + %} + + {% include panel.html color="warning" + title="Key disclosure laws may apply" + body=' +
    +
  1. Belgium *
  2. +
  3. Finland *
  4. +
  5. New Zealand (unclear)
  6. +
  7. The Netherlands *
  8. +
  9. United States (see related information)
  10. +
+ ' + %} + + {% include panel.html color="success" + title="Key disclosure laws don't apply" + body=' +
    +
  1. Czech Republic
  2. +
  3. Germany
  4. +
  5. Poland
  6. +
  7. Sweden (proposed)
  8. +
+ ' + %} + +
+ +

* (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself or family members.)

+ +

Related Information

+ + + +

Why is it not recommended to choose a US-based service?

+ +USA + +

Services based in the United States are not recommended because of the country's surveillance programs, use of National Security Letters (NSLs) and accompanying gag orders, which forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and transform the service into a tool of mass surveillance.

+ +

An example of this is Lavabit – a discontinued secure email service created by Ladar Levison. The FBI requested Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access +communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.

+ +

Ultimately, Levison turned over the SSL keys and shut down the service at the same time. The US government then threatened Levison with arrest, saying that shutting down the service was a violation of the court order.

+ +

Related Information

+ + diff --git a/index.html b/index.html index b945286d..6a19bb51 100644 --- a/index.html +++ b/index.html @@ -5,144 +5,11 @@ layout: default {% include sections/header.html %} - + {% include sections/fourteen-eyes.html %} -

Global Mass Surveillance - The Fourteen Eyes

+ {% include sections/key-disclosure-law.html %} - UKUSA Agreement - -

The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the Five Eyes, - focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to not spy on each other as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each other's citizens and share intelligence to avoid breaking domestic laws that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third-party countries can and do - spy on each other.

- - -
- {% include panel.html color="danger" - title="Five Eyes" - body=' -
    -
  1. Australia
  2. -
  3. Canada
  4. -
  5. New Zealand
  6. -
  7. United Kingdom
  8. -
  9. United States of America
  10. -
- ' - %} - - {% include panel.html color="warning" - title="Nine Eyes" - body=' -
    -
  1. Denmark
  2. -
  3. France
  4. -
  5. Netherlands
  6. -
  7. Norway
  8. -
- ' - %} - - {% include panel.html color="secondary" - title="Fourteen Eyes" - body=' -
    -
  1. Belgium
  2. -
  3. Germany
  4. -
  5. Italy
  6. -
  7. Spain
  8. -
  9. Sweden
  10. -
- ' - %} -
- - - -

Key Disclosure Law

Who is required to hand over the encryption keys to authorities?

-

Mandatory key disclosure laws require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant - is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.

Steganography involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an - adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).

- - -
- - {% include panel.html color="danger" - title="Key disclosure laws apply" - body=' -
    -
  1. Antigua and Barbuda
  2. -
  3. Australia
  4. -
  5. Canada
  6. -
  7. France
  8. -
  9. India
  10. -
  11. Ireland
  12. -
  13. Norway
  14. -
  15. Russia
  16. -
  17. South Africa
  18. -
  19. United Kingdom
  20. -
- ' - %} - - {% include panel.html color="warning" - title="Key disclosure laws may apply" - body=' -
    -
  1. Belgium *
  2. -
  3. Finland *
  4. -
  5. New Zealand (unclear)
  6. -
  7. The Netherlands *
  8. -
  9. United States (see related information)
  10. -
- ' - %} - - {% include panel.html color="success" - title="Key disclosure laws don't apply" - body=' -
    -
  1. Czech Republic
  2. -
  3. Germany
  4. -
  5. Poland
  6. -
  7. Sweden (proposed)
  8. -
- ' - %} - -
- -

* (people who know how to access a system may be ordered to share their knowledge, however, this doesn't apply to the suspect itself or family members.)

- -

Related Information

- - - - -

Why is it not recommended to choose a US-based service?

- - USA - -

Services based in the United States are not recommended because of the country's surveillance programs, use of National Security Letters (NSLs) and accompanying gag orders, which - forbid the recipient from talking about the request. This combination allows the government to secretly force companies to grant complete access to customer data and - transform the service into a tool of mass surveillance.

- -

An example of this is Lavabit – a discontinued secure email service created by Ladar Levison. The FBI requested Snowden's records after finding out that he used the service. Since Lavabit did not keep logs and email content was stored encrypted, the FBI served a subpoena (with a gag order) for the service's SSL keys. Having the SSL keys would allow them to access - communications (both metadata and unencrypted content) in real time for all of Lavabit's customers, not just Snowden's.

- -

Ultimately, Levison turned over the SSL keys and shut down the service at the same time. The US government then threatened Levison with arrest, - saying that shutting down the service was a violation of the court order.

Related Information

-

VPN providers with extra layers of privacy

+

VPN providers with extra layers of privacy