White House Says It Had 'No Role' In UK Detention Of David Miranda, But Did Have A 'Heads Up'

from the and-what-did-it-say-in-response? dept

The White House has now come out with a statement insisting that it had no role in the detention of Glenn Greenwald’s partner, David Miranda, but did say that UK intelligence gave the US “a heads up” that it “might” happen. Of course, ironically named White House spokesperson Josh Earnest also refused to say whether the US approved or disapproved of the detention.

Meanwhile, it’s been noted by some that Miranda was, in fact, carrying a USB key that contained some relevant information, but Greenwald has said that he’s not worried at all about it, because the data was encrypted:

“We both now typically and automatically encrypt all documents and work we carry – not just for the NSA stories,” says Greenwald via email. “So everything he had – for his personal use and everything else – was heavily encrypted, and I’m not worried at all that they can break that.”

Either way, under the rules in the UK, they could only detain Miranda to determine if he was involved in terrorist activities. Doing investigative journalism is not a terrorist activity unless you’re an authoritarian police state. Either way, it really does appear that this abuse of power is likely to backfire big time on the UK (and the US, whatever its role). It’s unlikely that it did anything to help stop the dissemination of this kind of information, but did reveal the thuggish tactics and police-state mentality by the UK government.

Filed Under: , , , ,

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “White House Says It Had 'No Role' In UK Detention Of David Miranda, But Did Have A 'Heads Up'”

Subscribe: RSS Leave a comment
64 Comments
Ninja (profile) says:

The White House has now come out with a statement insisting that it had no role in the detention of Glenn Greenwald’s partner, David Miranda, but did say that UK intelligence gave the US “a heads up” that it “might” happen.

When you have to speak out to assure people you didn’t do something then there are two possible interpretations:

1- You did/were related to it.
2- Your credibility is so low that people will automatically assume you did it.

Either way people will assume they were responsible for it.

Anonymous Anonymous Coward says:

Re: Re: Re:

So far as I can discern, David Miranda is a Brazilian citizen, who was flying from Berlin to Rio, via a plane change in London. Like Snowden, he was just passing through. Makes one wonder if he was in an International zone and never entered Great Britain?

So there was no spying on an American Citizen. In that respect it would seem all is hunkey dory.

As mentioned below, they will get just the next story, when they finally break the encryption, which might be in time to verify it against the published article.

Anonymous Coward says:

Re: Re:

Iwonder if they ordered the decryption of said devices under threat of a 2 year jail sentence for not giving up encryption keys/passwords.

That was my first thought too. If he’s got encrypted data, he can be ordered to provide the keys, or be thrown in jail. I’m wondering if they just imaged everything had hadn’t discovered the encryption by the end of the 9 hours.

Would look pretty stupid in court though.

Considering how this was handled, I highly doubt that they care how it would look. What’s important to them is that they sent a message to other journalists that aiding those who embarrass the government will be punished.

Cloudsplitter says:

Re: Re: Re: Re:

This just means travel must not pass though the UK, it was a dumb move, they could have gone from Paris to Rio. On the question of the encrypted data, as a citizen of Brazil not engaged in any terrorist acts, he should have braced them, and told them a code that was not right, when it did not work, all he could say was dam that’s what they gave me, sometime you need to call their bluff.

Anonymous Coward says:

Re: Re: Re:

That was my first thought too. If he’s got encrypted data, he can be ordered to provide the keys, or be thrown in jail. I’m wondering if they just imaged everything had hadn’t discovered the encryption by the end of the 9 hours.

Demanding he provide the encryption keys would likely be useless as odds are good he wouldn’t have the keys.

Michael (profile) says:

No Role

The White House has now come out with a statement insisting that it had no role in the detention of Glenn Greenwald’s partner, David Miranda, but did say that UK intelligence gave the US “a heads up” that it “might” happen

No role? Clearly they had at least the “we were told it may happen” role going. If someone tells me they are going to commit an act of terrorism, or commit a serious crime, or violate someone’s civil rights, is not doing anything about it “no role”? If so, I think the NSA has clearly thrown out a net that is WAY too big.

aldestrawk says:

Re: Re: Re:2 Re:

He is a newbie, at least at the level that Snowden required for communication. It was Laura Poitras (who Miranda was visiting in Germany) who was ready to use the cryptography tools that Snowden wanted used. That is why Ms. Poitras was the first to really communicate with Snowden.

http://www.nytimes.com/2013/08/18/magazine/laura-poitras-snowden.html?pagewanted=all&_r=0

Cloudsplitter says:

Re: Re: Re:2 Re:

Given the time GG, and crew have had, and what they have been trough in the past, one must assume that they had more then enough time to deploy some seriously heavy encryption, and may be a OTP, but this begs the question, GG is releasing data slowly, a major crowd sourced data dump is possible, grabbing computers and data sticks is like grabbing paper, so 19th century, data is every where, and no where. Them boys at White Hall, and the White House just don’t get it. Never send everything at one time, Never use just one courier.

Josh in CharlotteNC (profile) says:

Re: Re:

Barring huge advances in quantum computers or large number factorization, they’re fine from brute force decryption. So long as the algorithm is secure, we’re talking heat death of the universe timescales with current and reasonably predictable CPU speed increases.

Of course, that still leave the door open for rubber-hose decryption (otherwise known as ‘Tell us the key or we’ll keep beating you with this rubber hose.’). Which they’re half a step away from using if they’re willing to detain people only tangentially related to the case.

John Fenderson (profile) says:

Re: Re: Re:

So long as the algorithm is secure, we’re talking heat death of the universe timescales with current and reasonably predictable CPU speed increases.

I hear this claimed a lot (especially by crypto companies), but it’s really very misleading. All commonly used crypto algorithms can be broken in a handful of years, worst case, by anyone who has a moderately sized budget.

Those “heat death of the universe” estimates are assuming naive brute-force encryption. In the real world, that is not how it’s done.

That said, encryption is useful and necessary — but it won’t keep your secrets forever if someone wants to crack it badly enough.

Anonymous Anonymous Coward says:

Re: Re: Re: Re:

That said, encryption is useful and necessary — but it won’t keep your secrets forever if someone wants to crack it badly enough.


Just like locks. They are there to help keep honest people honest. If someone wants to get in, they will. More or better locks just take longer.

What does that say about folks who try to break encryption?

One supposes that there is some legitimate use for breaking encryption. How should that line be defined?

John Fenderson (profile) says:

Re: Re: Re:2 Re:

What does that say about folks who try to break encryption?

They like to solve puzzles — just like most of the people who learn how to pick locks.

One supposes that there is some legitimate use for breaking encryption. How should that line be defined?

There are many legitimate reasons to break encryption (or pick locks). Have you ever lost your key?

I don’t think it’s necessary to define a “line” as such. Breaking encryption is not, in itself, a big deal. The big deal is what happens after the encryption is broken.

Anonymous Anonymous Coward says:

Re: Re: Re:3 Re:

Breaking encryption is not, in itself, a big deal. The big deal is what happens after the encryption is broken.


Agreed. And it brings up motive. Is it someone trying to open bank accounts, or someone looking for critical business information, or someone tearing open an article that might not look favorably on some government official, or are they opening the pictures Auntie took of the kids over summer vacation at the beach?

I think it is in the motive area that the line might be needed. Someone put a lock on that file for a reason. What reason might one have that is legitimate to unlock that file? Where might that line be drawn?

Josh in CharlotteNC (profile) says:

Re: Re: Re: Re:

All commonly used crypto algorithms can be broken in a handful of years, worst case, by anyone who has a moderately sized budget.

I don’t think you understand the math involved here. To put it very simply, Moore’s law has held pretty steady at doubling compute power (give or take) at 18 months to 2 years. I’ll give you the benefit of the doubt and say we can lower that to 1 year.

Q: What would a secure algorithm need to do to keep up with a doubling of computer power every year?

A: Add single bit to the key length each year. Instead of a 256-bit key, you’d need a 257-bit key.

Today, assume a 256-bit key encrypted with algorithm X takes 1 year to brute force.

A 512-bit key encrypted with the same algorithm will take the same amount of time (1 year) to brute force over250yearsfrom*now assuming yearly doubling of compute power.

For any serious modern crypto system, key lengths are much longer, and the algorithms are more robust.

Those “heat death of the universe” estimates are assuming naive brute-force encryption. In the real world, that is not how it’s done.

And that’s specifically why I qualified that statement with “so long as the algorithm is secure” – because modern techniques are to find a weakness in the algorithm or implementation of the system. If a flaw is discovered in the algorithm, all bets are off. If a flaw is discovered in the implementation, all bets are off (example: Android bitcoin wallet using stupid method to generate random numbers, story last week).

If you want a good example of the difference between attacking an algorithm, and attacking the implementation, head over to ArsTechnica and read up on their password cracking stories. All of that is attacking the implementation of how passwords are stored, and how people choose passwords. And yet, with the big password disclosures, there are still some fraction of the lists that remain uncracked – because those passwords cannot be predicted using the methods and would still take absurdly long lengths of time to crack trying every possibility.

John Fenderson (profile) says:

Re: Re: Re:2 Re:

I understand the math very, very well. But there are a number of assumptions in your argument that, while commonly true, don’t hold up in the world of professional code-cracking. For example, Moore’s law applies to the number of transistors that can be placed in a given area, not to computing power directly. As a rule of thumb, the two correlate assuming that you are always comparing the same types of machines. The von Neumann machine that is your PC, for example. However, there are other types of computing machines that correlate differently, and for certain specialized applications, can perform better than von Neumann by many orders of magnitude.

Researchers using specialized machines have proven that it is feasible to break almost every commonly used encryption there is in a reasonable amount of time (a few years). It’s expensive, which means that you’d have to be very special for someone to put the effort in, but it is feasible.

Also, this news that it’s even easier than thought before.

Encryption is powerful and everyone should be using it. I am very pro-encryption. But I think people tend to feel more secure than is warranted when they begin to use it. Encryption is no panacea.

Kenneth Michaels (profile) says:

Thuggish Police State Tactics in the UK

It “did reveal the thuggish tactics and police-state mentality by the UK government.”

Hello? This headline from 2012, for example: “PM apologises for MI5’s role in murder of Ulster lawyer.” For the past 4 decades the UK has shown “thuggish” tactics in northern Ireland. Killing the accused’s lawyers was par for the course in 1989. Not much has changed really.

out_of_the_blue says:

Hmm, I'd paid no attention, BUT this raises a point:

Reporters are usually little concerned about gov’t learning that they know some secret — in the given case, where the one knowing isn’t the source, hasn’t been kidnapped, only searched — because of course the gov’t knows generally what any given person knows, so THIS very public stunt does them almost no good…

And then if you ask WHY, one possibility is that it yet again boosts Greenwald into spotlight, even though he’s revealed almost nothing that I didn’t know years ago, and in this instance reveals even less, only hints that he has secrets on a thumb drive.

So IF “they” were trying to enhance Greenwald’s credibility, this looks quite like a stunt. — And that is yet again consistent with limited hangout psyop, where Greenwald is fed some minor information that “they” want revealed in order to acquaint populace with actualities, and thereby increase the actual effect, not at lessen it.

Just sayin’. Don’t fall for the obvious story.

Anonymous Coward says:

“I’m not worried at all that they can break that.”

Strong words for someone who a few months ago didn’t even use PGP. Of course I have every reason to believe he’s made every precaution possible to protect his data and has received immeasurable help with this task. Still, with the most powerful spy agency at your virtual door all it takes is a single mistake to be your undoing.

Anonymous Coward says:

Given the lying and evasion in government today, along with it’s willingness to dispose of treaty agreements and respected international protocols, I can not believe what this government nor what this president says.

It was quite willing to push other countries to deny the Bolivian President and his plane air space to fly through. Those that allow turned out to be a trap of you stay until you are searched. I have to ask were that the Russian President, if you believe the same would have happened?

Yet here it is again, this willingness to basically deny the right of freedom merely because ‘we think we should’ and will find a way to justify it.

Rekrul says:

Flash Drive?

Why would someone carrying information that governments would like to get their hands on, have it on a flash drive?

Use a micro-SD card. They’re the size of a Chiclet and can easily be concealed. If you have an electric razor, pop open the case (on the razor, not the carrying case) and slip the card inside. The top edge of most pants forms a hollow tube around the top (my mother used to put elastic in there to avoid using a belt), so a small slit would allow the card to be slipped in there and should be undetectable to anything less than a strip search. Sneakers with thick rubber soles could probably be slit on the side to allow the card to be slipped in, and should be just about invisible to the naked eye. You could even wrap it in plastic and hide it in your cheek. No, your mouth cheek, although I suppose the other would work too.

True, no hiding place is truly safe if they’re determined to find something on you, but it’s better than just having a flash drive in your pocket.

aldestrawk says:

Re: Flash Drive?

With just encryption, one could always say you wanted the information kept confidential if it was stolen or lost. When you are physically hiding information, this gives law enforcement reasonable suspicion that you are hiding it from them in particular. It’s a flimsy excuse, but using such spy tactics could justify a strip search at every opportunity, in addition to being held for 9 hours.
I think it is a reasonable tactic, in this context, to carry an encrypted flash drive. The information being transferred between Poitras and Greenwald could have been sent over the Internet with the same encryption. They would have to assume a government could have copied it without being able to show evidence of that. Using a courier, they force the government to show it’s hand. If the information was not taken then they don’t have to worry about possible cryptographic weaknesses. Poitras can still send Greenwald the information, but now the world knows that the UK/U.S. is harassing journalists.
If you want to keep, not only your information confidential, but the fact that your communicating at all confidential, then use steganography. This is a bit harder when the spies already know the parties at both ends of a potential conversation.

Anonymous Coward says:

Cant be decrypted ??

I doubt it will take them very long at all to decrypt a single thumb drive, especially if they already have some of the files as reference.

Called ‘cribs’, which they will already have, is this Miranda person a ‘reporter’ ?? or a ‘normal citizen’ just ‘friends’ of a reporter ?

Plus, UK press is actually quite unpopular with citizens of the UK and not really looked up too or trusted.

There simply wont be too many tears about this, it’s simply paybacks for the spying, cheating and lying the UK press is so well known for.

FM Hilton (profile) says:

Simple questions

How did the UK authorities know he was on the plane? How did they know who he was, or what he was doing?

Simple: someone told them. Someone tracked his movements, and then when he hit UK airspace, they were waiting.

They knew who he was, where he was headed, where he visited, and who he was a partner of.

Guess someone or some agency was watching his every move.

Want to bet that the ‘someone’ or agency was American?

Too easy a bet to win-sorry-but just as scary.

Because he isn’t a public figure, or wasn’t. He was a private person, flying a public airline, for personal reasons. I’d never heard of him, and I’m sure that most people hadn’t.

That’s what the UK authorities were hoping-and that the matter would just fade out.

Unfortunately they underestimated their opponent. You don’t do that to the partner of one of the world’s most prominent journalists and expect them to just take it in the chin.

Anonymous Coward says:

I would say we have to learn from past experiences. In this I mean what is said and what is meant are two very different things from the same words.

We’ve already learned that meanings of words aren’t what most of us know in the English language. This has come up several times in public addresses and congressional testimony. The old, ‘This program doesn’t do that’ but no word of the other program that does.

The US says it didn’t order David’s arrest. It doesn’t say they were tracking him, or any mention of knowing what he was doing was brought up. Still someone had to know, this didn’t just happen out of the blue.

Add this happenstance to the grounding of the Bolivian President’s plane until it was searched. That is a diplomatic no no. Heads of state have diplomatic immunity.

Add to it, that the Guardian was forced to destroy hard drives. It sure doesn’t sound like the US has no involvement in this on the surface.

Anonymous Coward says:

Investigative Journalism

Doing investigative journalism is not a terrorist activity unless you’re an authoritarian police state.

**Or how about the passing on of data obtained illegally of state secrets without authority or clearance?

**And to whom that information can be recklessly passed on to unknowns, would be a potential flag if I were just curious, let alone trying to keep the free world safe.

Add Your Comment

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...