Tuesday, June 30, 2015

FBI: Public Service Announcement about Defraud and Extorsion Schemes


June 23, 2015


Alert Number

I-062315-PSA


Monday, June 29, 2015

Business Development Trade Mission to Panama City, September 27-30, 2015

Panama. September 27th - 30th, 2015

The Latin Chamber of Commerce of USA - CAMACOL will be conducting a Business Development Trade Mission to Panama,City, Panama departing from Miami, on September 27th, and returning on the 30th, 2015. CAMACOL representatives will fly onboard Copa Airlines. This is a cost effective business trip thanks to the sponsorship support of CAMACOL, Copa Airlines and the Panamanian Chamber of Commerce.

Panama Trade Mission Activities Include:

Networking Breakfasts
Informative Seminars / on "How to do Business with Panama"
Business Networking Luncheons
Business Matchmaking Sessions - One on One pre-scheduled meetings
Social Networking Receptions
Formal Networking Dinner
Guided City Tour (optional)



Registration deadline: September 10th, 2015.

Participation Costs 

Airfare: Copa Airlines roundtrip fee: $456.50.
Note: To receive this rate, you must book your ticket by August 25th, after this date, the rate will vary. 


Participants are welcomed to travel to Panama onboard an airline carrier of their choice, as well as depart from the airport destination of their choice.


Hotel: El Panama - Via España, Eusebio A. Morales 111, Panamá, Panamá
Single rooms $100 / Double rooms $105 - U.S. per night, plus taxes (includes breakfast and internet).


For more information: Betty Gradera at (305) 642-3870 ext. 202 ( bettyg@camacol.org )


Proud Sponsors:

COPA AIRLINES
CAMACOL
CAMARA DE COMERCIO, INDUSTRIAS Y AGRICULTURA DE PANAMA
STATE OF FLORIDA
FLORIDA DEPARTMENT OF ECONOMIC OPPORTUNITY
ENTERPRISE FLORIDA
MIAMI-DADE COUNTY

THE CITY OF MIAMI. 

Friday, June 26, 2015

CAMACOL's Domino Tournament @ the Marlin Stadium: Saturday, August 1st., 2015 @ 3pm


Reserve your tickets!!!

Our Domino Tournament will be held
Saturday, August 1st, 2015 at 3PM  at 

the Marlin Stadium located at:
501 Marlins Way, Miami, FL 33125


Ticket price are as follows:

Individual tickets - $75.00 
Includes: Domino event, Bacardi bar from 3pm - 5:30pm, appetizers, all you can eat from the Marlins concession stands from 5:30pm to the 7th inning; nachos, hot dogs, peanuts, popcorn, sodas, bottled water, and the Marlins game.

Domino Tables - $300.00
(4 players, first come, first serve) 
Includes: Domino event, Bacardi bar from 3pm - 5:30pm, appetizers, all you can eat from the Marlins concession stands from 5:30pm to the 7th inning; nachos, hot dogs, peanuts, popcorn, sodas, bottled water, and the Marlins game.

Sponsorships - $1,000.00
(Sponsorship benefits: one domino table, sponsor recognition in the following; program, invitational flyer, banners, signage, Marlins announcement board, email blasts, magazine, etc.)


For more information and to purchase your tickets,

Please contact Betty Gradera at: (305) 642-3870 ext. 202
Email: bettyg@camacol.org


See you at the game!!!



Thursday, June 25, 2015

Mentalidad de Liderazgo Mundial (Edwin Conrado Rivera, MPH)

Edwin Conrado Rivera es un colaborador asiduo de CAMACOL, dónde ha brindado varios Seminarios especializados sobre estos temas. Hoy continua el tema que comenzó en el mes anterior:

Siguiendo con la serie de Desarrollo de Liderazgo Mundial, hoy corresponde  al 
Tema: La responsabilidad del lider para  “Liderar el Cambio”.

“Liderar el Cambio”El lider es aquel que aunque tenga miedo al cambio es el que se enfrenta a sus miedos y camina hacia la implementación de dichos cambios.  Alguien tiene que hacerlo, y es el lider el que esta llamado a realizarlo.

Solo quisiera que tengan en consideracion que el liderazgo mundial comienza en casa.  Si en su casa no tiene liderazgo, como pretende liderar a los de afuera.

Cambiar es una de las tareas más difíciles que existen pero, no es algo nuevo.           En 1513, Nicolás Maquiavelo escribía estos párrafos sobre este mismo tema:
”…Y a este respecto se debe tener en cuenta hasta qué punto no hay cosa más difícil de tratar, ni más dudosa de conseguir, ni más peligrosa de conducir, que hacerse promotor de la implantación de nuevas instituciones.
La causa de tamaña dificultad reside en que el promotor tiene por enemigos a todos aquellos que sacaban provecho del viejo orden y encuentra unos defensores tímidos en todos los que se verían beneficiados por el nuevo.
Esta timidez nace en parte al temor de los adversarios, que tienen la ley de su lado, y en parte también la incredulidad de los hombres, quienes -en realidad- nunca creen en lo nuevo hasta que adquieren una firme experiencia en ello.
De ahí nace que, siempre que los enemigos encuentran la ocasión de atacar, lo hacen con ánimo rebelde, mientras los demás sólo proceden a la defensa con tibieza, de lo cual resulta un serio peligro para el príncipe y para ellos.” El Principe, Nicolás Maquiavelo, 1513.
Hoy día hay 4 postulados principales para vencer la resistencia a los cambios:

1.     Preparación

a.  Establecer un sentido de urgencia – La gente tiene que entender que los cambios son constantes. Que los mercados estan cambiando diariamente y que si nos mantenemos haciendo lo mismo, otros presentaran cosas novedosas y diferentes a nuestros clientes y prospectos.
  
Diariamente vemos en los medios de información como las empresas se estan afectando negativamente por estos cambios, que incluyen,                la política y sus luchas de poder, el valor del dólar y las necesidades de los mercados.

Aún, cuando todo aparenta estar bien, debemos estar al tanto de todo lo que pasa en nuestros mercados para que no nos coja desprevenidos y podamos reducir cualquier impacto negativo que pueda surjir.
  
b. Desarrollar una poderosa coalición para el cambioLos lideres deben enfatizar a su  equipo de directivos a salir de la zona de comodidad y asumir mayor riezgo en el proceso de dirección, haciendo que la estrategia de cambio de la empresa vaya mas allá del departamento que tienen a su cargo.

En un momento de cambio, los líderes deben identificar que directivos son capaces de trabajar en equipo, y quizas pedir a los que no estan dispuesto al esfuerzo del cambio, que consideren nuevas oportunidades en otro puesto o en otra empresa.

Es responsabilidad del lider no darse el lujo de que sus colaboradores transmitan resistencia y negativismo sobre los cambios.
  
2.     Liderar

a.  Desarrollar una visión y una estrategia para lograrla. Toda empresa debe reafirmar anualmente su misión, sus valores y validar la visión de un objetivo ambicioso y retador, que incluya fechas concretas, y una meta que actualmente no se consiga con los sistemas y procesos actuales.

Una de las herramientas que sirve para transmitir el sentido y la intensidad del cambio es “El Plan de Negocios Actualizado”, que indica como sería dicho cambio para los diferentes departamentos de la empresa.

b. Comunicar la visión y la estrategia. El proceso de comunicación es contínuo. Siendo la finalidad de la comunicación el que todas las personas de la empresa puedan responder a dos preguntas básicas:

1.     ¿Tiene mi empresa una estrategia para el éxito?

2.     ¿Cómo aporta mi trabajo para lograr esa estrategia?

3.     Involucrar

a.  Motivar a las personas a actuar. Los directivos y todos los empleados deben sentir que su labor es importante para contribuir al éxito de la estrategia.  Una de la herramientas para este proceso es el “Cuadro de Mando Integral” (Scorecard), y su despliegue en cascada en toda la organización.          Esto permite la desentralización de la toma de decisiones de una manera coherente y muy poderosa.

Otra de la herramientas es el diseño de procesos, que traduce los objetivos internos en mejoras concretas en las distintas faces del proceso.  Los sistemas de medicion en los procesos operativos por medio de “scorecard” y “dashboards”, permiten que los empleados tengan las referencias concretas para mejorar su trabajo diario.

b.  Generar y celebrar beneficios a corto plazo. Uno de los principales retos del cambio, es como se sostiene después de la fase del entusiasmo inicial, cuando la visión del cambio que queda por recorrer es descorazonadora.

En este punto debe tenerse en cuenta que dependiendo de la tipología de los objetivos, los plazos son diferentes.  Los objetivos que tienen que ver con las mejoras operativas, tienen plazos menores de 1 año.           

Los que tiene que ver con la gestión de los clientes pueden tener plazos incluso de 2 años y, los que tienen que ver con los procesos de innovación y generacion de nuevos servicios y productos pueden necesitar plazos mayores.
  
c. Mantener el esfuerzo. Generar todavía más cambios. Más allá de la motivación intrínseca, los empleados deben recibir parte de los beneficios del cambio vía remuneración variable ligada al desempeño personal y los objetivos alcanzados relacionados con el proceso de cambio.

Para mantener ese esfuerzo es necesario realizar reuniones de revisión estratégicas, separadas de las reuniones operacionales, en las cuales se maximice el aprendisaje y la mejora. 

4.     Proceso de Innovación Constante

a.  Institucionalizar la nueva cultura. El cambio en las organizaciones es algo que siempre ha sido complejo porque esta ligado a la naturaleza humana. 

Las empresas que tienen bien aliniados sus procesos con la gente son la que mejores resultados tendran en las ejecutorias de sus metas y objetivos.


* Edwin Conrado Rivera. El autor de este artículo es Contador, posee una Maestría en Salud Pública, y cuenta con más de 25 años de experiencia como “International Trainer and Coach”. Es el autor del libro: La Diabetes: El Árbol de las Enfermedades. Puede ser contactado en  edwinconradorivera@gmail.com

Wednesday, June 24, 2015

Defending the last missing pixels: Phil Zimmermann speaks out on encryption, privacy, and avoiding a surveillance state

Since writing the PGP encryption software in the 1990s, Phil Zimmermann has been a key figure in the internet privacy debate. With that argument heating up again, his perspective is more relevant than ever.
The ruined MacBook was owned by the Guardian newspaper and held a copy of the files leaked to the paper by by NSA whistleblower Edward Snowden, or at least it did until it was destroyed with axle grinders and drills following pressure from the UK government (all of this was pure theatre of course; duplicate copies of the files on the machine existed elsewhere).Walk into London's Victoria and Albert museum design, pass the queues admiring the fashionable frocks and rooms full of classical statues, and you'll come to a glass case. Look inside and you'll see the remains of a thoroughly trashed MacBook, and, a little down and to the left, a small, black, unblemished smartphone.
The smartphone is better known as the Blackphone, the handset developed by a company called Silent Circle with the purpose of keeping its customers' conversations as private as possible.
The hard drive and smartphone tell different parts of the same story: how technology is at the heart of the battle over what privacy should, and does, mean in the twenty-first century. The smashed MacBook embodies how governments try (and fail) to contain their secrets (particularly ironic when the secret they want to protect is that they are spying on us) while the smartphone reflects the attempts of individuals to keep their communications private.
Phil Zimmermann
The Blackphone is the latest project from Phil Zimmermann. Over the last three decades, Zimmermann has been building encryption technology has ensured the security of countless messages. If you've ever had any secrets held about you on a computer—and everybody has secrets, even things as simple as tax records and credit card numbers—there's a good chance that Zimmermann's technology has helped keep them secret.
At a recent private viewing of the exhibition that features the Blackphone, Zimmermann pondered what the emergence of whistleblowers like Snowden says about the current state of privacy.
"The moral problems with the behaviour of our intel agencies should give us pause, should get us to step back and question, 'What are we getting our intel agencies to do?' We should take another look at this. We should try to restrain them more," he told the audience.
"This has been my motivation for my entire career in cryptography," he says. "The driving force is the human rights aspect of privacy and cryptography and ubiquitous surveillance, pervasive surveillance... We live in a pervasive surveillance society."
As he spoke, the radio of one of the watching museum guards squaked briefly and loudly into life, neatly illustrating Zimmermann's point.
Miss the mortgage, code the crypto
Encryption is the process by which data—be it an email, phonecall, or indeed any digital communication—can be scrambled so that it can only be accessed by the intended recipient.
The debate over online privacy had been going on since the emergence of the internet itself, often centred around the use of encryption, since the technology remains the best way to ensure privacy. After all, modern encryption systems mean it would take a supercomputer thousands of years to break encrypted messages without the key.
Zimmermann has been a central figure in the debate since the start. His work on encryption has always gone hand-in-hand with his privacy activism, as he explained over tea the day before the museum's private showing.
"I can apply my crypto expertise to making a living and that fits nicely with the activism about privacy," he said. It's certainly the discussion of privacy that makes him most animated, although, as he notes, "at different times my activism has run in different directions," adding as an aside: "If I had more time, I'd work on climate change."
In the 1980s in Boulder, Colorado, he worked as a military policy analyst with the Nuclear Weapons Freeze Campaign while juggling a day job as a software engineer.
During this period he was arrested along with Carl Sagan, Martin Sheen, and Daniel Ellsberg —quite a line-up for a geek dinner party—and 400 others for protesting at a Nevada nuclear weapons test site. It turned out the test they were trying to stop had taken place a couple of days earlier.
As the Cold War began to draw to its close, Zimmermann's interest in encryption grew as he realised the need for technology to protect private communications both across the world and at home. When the internet was just a hangout for a bunch of early adopters, security and privacy wasn't that big a deal. As it began to grow, that changed.
"The internet became a more hostile place. In the early days of the internet, it was kind of a nice neighbourhood with well manicured lawns and then it became a blighted neighbourhood so people were more aware they had to be more careful. If you're going to do communications on the internet, you pretty much have to do crypto to have any expectation of privacy," he said.
Computer used to write about Snowden.
 © The Guardian/ Victoria & Albert Museum, 2015
Zimmermann began working on a project, which eventually became Pretty Good Privacy—PGP for short—an email encryption software package. It was published for free on the internet in 1991, and became the most widely used encryption software in the world. Its development wasn't an easy job, however.
"It was a hard road to get to the release of PGP. I missed five mortgage payments developing the software in the first half of 1991," Zimmermann wrote on the ten-year anniversary of its debut.
It got worse. When PGP spread worldwide, Zimmermann became the target of a three-year criminal investigation, because the government argued that US export restrictions on cryptographic software had been violated. The government finally dropped the case in 1996.
"It was shortly after PGP 2.0's release that US Customs took an interest in the case. Little did they realize that they would help propel PGP's popularity, helping to ignite a controversy that would eventually lead to the demise of the US export restrictions on strong cryptography," Zimmermann wrote.
That's because his case, along with a number of other events at the time, created a very public debate about how privacy technologies should be used. The conclusion was that, despite the potential risks that encryption might pose, governments ought not place controls on the technology.
"At the end of the 90s we saw many elements of society were reaching a consensus: that strong crypto was an important technology for ecommerce and civil liberties and privacy and a free society," Zimmermann said.
Since then, encryption has taken on the same level of importance to the internet as the Force in the Star Wars universe: a mysterious power that surrounds us and binds the internet galaxy together.
When we shop online, it's encryption that makes sure that your credit card details aren't being snooped on. When you log into your bank account, it's encryption that means you can be sure it's really your bank's website you are visiting, not a glossy fake. Encrypted databases keep your medical records safe from prying eyes, while encrypted email protects your business proposals, declarations of love, or nude selfies.
PGP is now owned by Symantec, and for the last dozen years Zimmermann has been working on encrypted voice communications protocols, and most recently the creation of a company called Silent Circle. One of the voice encryption standards used by Silent Circle is called ZRTP and as the company's website puts it bluntly: 'The Z in ZRTP stands for Zimmermann."

Silent Circle

Silent Circle launched in October 2012, jointly founded by Zimmerman and Mike Janke, a former Navy SEAL. The company counts 30 of the Global Fortune 50 among its customers, along with journalists, government agencies, and the military. The company recently raised $50m to fuel further growth.

But it's not your standard tech startup, many of which make their money from slicing, dicing, and reselling information about their customers' web habits. In contrast, last year Silent Circle moved its headquarters to Geneva—Zimmermann is also based in the Swiss city now—from Canada in search of stronger privacy laws to protect its customers' information, even from itself.
Originally when they started the company, the intention was just to pursue markets where there were people with a particular need for privacy—like journalists working in war zone—but after the Snowden revelations, "there were a lot more people that could see that there's a need for this in all kinds of situations," Zimmermann said.
zimmermannjanke.jpg
Mike Janke (left) and Phil Zimmermann
 Patrick McDermott, Getty Images
Talking of Snowden, Zimmermann notes with a certain amount of pride: "Snowden got his hands on some documents that showed some products that [the NSA] had broken the crypto [on]—and none of my stuff was on the list."
Silent Circle's Blackphone device runs a security-toughened version of Android it calls PrivatOS. Calls are encrypted end-to-end which means even the company itself can't hand over the details to anyone. "We have no access to it. None. We can't disclose what we don't have access to," the company says.
Since the V&A exhibition opened, the Blackphone has been added to the collection of a second museum—the International Spy Museum in Washington DC. Its 'Weapons of Mass Disruption' gallery explores the challenges facing the intelligence community in the twenty first century.
The idea behind the Blackphone smartphone, and the tablet that followed it, is to provide an even greater level of security than is available with current hardware. The decision to move from software to hardware was in direct response to questions like 'Is your stuff NSA-proof?' which make cryptographers uncomfortable, said Zimmermann. That's because, while their software might work fine on 'clean' hardware, when running on a computer infected with malware, the software—no matter how good in theory—could prove useless. "For many years that was our caveat, but it's better to try to do something about it, [to] see if we can improve the hardware platform," he said.
The second version of the Blackphone is due out later this year, as is the Blackphone+ tablet. They arrive at a time when the old debates about privacy and surveillance and cryptography are being rerun once more.
The coming debate
Providing secure communications might seem relatively uncontroversial but the consensus built in the 1990s—that encryption is a good thing—is now on the verge of collapsing, with the Snowden documents representing the unexpected catalyst.
Governments are warning again about the dark side of encryption, claiming that it allows criminals to plot in secret because police and intelligence agencies can no longer crack their communications.
Recently, Admiral Mike Rogers, director of the NSA, said: "I certainly have great respect for those that would argue that the most important thing is to ensure the privacy of our citizens and we shouldn't allow any means for the government to access information. I would argue that's not in the nation's best long-term interest."
Lining up on the other side are the privacy campaigners and even the United Nations which argues that access to encryption is essential to protect basic human rights.
All of this is an issue again because, as a consequence of the revelations from Snowden about the extensive surveillance programmes of the US intelligence agency, more and more companies (Apple, Whatsapp, Silent Circle, and others) are making encrypted communications the standard for their billions of customers.
As a result, politicians and law enforcement agencies have been making louder and louder noises that something must be done about the use of encryption—although they are vague on exactly what actions should be taken. They also generally sidestep the irony that many companies have only turned on encryption because of the massive data collection by the NSA and others.
The NSA is demanding access to encrypted communications and the UK is considering passing a law to enable the same. In contrast, Germany, with a different historical perspective on the dangers of government surveillance, not only allows encryption but positively encourages it.
Considering that Zimmermann has been through the whole encryption debate once and thought it settled, only to see it emerge again like some kind of digital Groundhog Day, he seems surprisingly relaxed and upbeat—at least about this element of the privacy battle.
"Back in the days when I was getting arrested for trying to stop the arms race, that seemed pretty hopeless. The entrenched interests in that were huge. Look around: we managed to get through it. The Cold War is over, the nuclear arsenals have been dramatically reduced—still enough to blow up the world a few times, but we're much better off now than we were. If we can change that, why can't we change this?"
For Zimmermann that means a public debate, like the one that the privacy activists won back in the 90s. "I used to debate NSA and FBI officials; I'd like to do that again. Strong crypto is pervasive now: in every web browser when you do ecommerce or online banking, the web browser has strong crypto. There's no rolling that back. That's why I'm not getting all worried about it."
But does the average member of the public care? Despite the Snowden revelations, has there been any real impact on public opinion? If so, it's difficult to perceive. The issue of privacy would mean little to an average citizen - say my dad - for example. Therefore, the wider the public debate, the better.
When bringing up my dad, Zimmermann's response is sharp and to the point: "You bring it up with him I assume? Then he might have quite a lot of opinions on it. Ask him what he thinks." His point: the danger is letting such issues pass undiscussed and unchallenged.
He might not be worried about the ongoing anti-encryption rhetoric, but he remains a vocal supporter of the right to use it. Zimmermann was one of a number of technologists who signed a letter to the US—along with tech giants like Apple, Google, Microsoft, and Facebook, and the American Civil Liberties Union—warning the White House to step back from attempts to bring encryption under government control.
"More than undermining every American's cybersecurity and the nation's economic security, introducing new vulnerabilities to weaken encrypted products in the US would also undermine human rights and information security around the globe," the letter said.
However, the very same governments, even the same agencies, that worry about the use of encryption by the public are themselves enthusiastic users of encryption products, including those from Silent Circle.
The irony is not lost on Zimmermann: "Everybody wants this protection for themselves, they don't want others to have it," he says.
"We had US Customs come into the office. It so happens that US Customs was the agency investigating me in the 90s. I sat in on the meeting and I said, 'How many people here actually worked at US Customs back in the 90s?' Nobody's hands went up—so none of the people in the room were aware that US Customs was the investigating agency in my case."
But what of the idea that only governments should be allowed to use encryption technologies? While Zimmermann was addressing a security conference in one hall of London's Olympia exhibition centre, in another hall at a completely different event, the UK's top anti-terrorism police chief made a speech complaining about how tech companies—he didn't say which ones—were making life harder for cops.
Zimmermann deploys an analogy to dismiss such arguments: "We're in the business of making body armour—there's a need for body armour, Navy Seals need body armour. What are we going to do? We can't just sell to them, there's not enough Navy Seals. If we sold only to them, the cost would just be crazy."
He points out that there are plenty of other technologies beyond cryptography that have been used by both consumers and the military.
"There's lots of technologies that are widely used: GPS receivers were developed by the military to guide missiles to their targets. It's only later that people started using them for other things. Crypto historically has been used more by the military than anybody, but now everybody uses it for ordinary things, just like they use GPS for ordinary things," Zimmermann said.
The question of pervasive surveillance
But while Zimmermann is relaxed about the prospect of refighting the crypto wars of the 1990s, he's far more worried by what he sees as a larger threat to privacy that is looming right now.
"The debate now is about the question of pervasive surveillance. We have to push back against the intercepting [of] everything that flows over the internet and fusing it with surveillance data that comes from other sources—cameras everywhere, face recognition algorithms behind the cameras—total information awareness," he warned.
Part of this is down to technology—as we carry more gadgets, snoopers will find it easier to track us and learn about us. But it's also to do with a change in emphasis for the intelligence agencies, from focusing on a few individuals to collecting as much data about everyone as they can.
Zimmermann argues that one of the key things that has come out of the Snowden leaks is how the NSA has changed its definition of the 'collection' of data, which allows it to collect and store vast amounts of data—as long as it doesn't look at it.
"The new definition of collection is that 'it doesn't really count if all I do is collect it and store it somewhere, but if I want to look at it in storage, then I go to a court.' Well, that's a pretty loosey-goosey definition of collection. That's collection that should count as collection," he said.
Zimmermann speaks with the air of someone who has had these debates many times before, but is still willing to go back into battle. What of the standard argument often deployed here: that if I have nothing to hide I have nothing to worry about?
His response is succinct. "If you really felt that you had nothing to hide, then I would never want to tell you any of my secrets as you're not going to protect them. If you're a doctor, I don't want to see you because you're not going to protect any of my patient records."
Also, to take such a narrow view is to miss the bigger point. For example, political opposition in China is impossible because the country has built a surveillance society, he argues. "Here we have a democracy in Britain, but sometimes in a democracy bad people can come into power and if you have a system that allows another election cycle, you can get rid of the bad people.
blackphone.jpg
The Blackphone 2 smartphone
 Image: Silent Circle
"But if they inherit a surveillance infrastructure like what we are seeing, they can use the power of incumbency to remain in power. They can neutralise opposition with scandals or blackmail, or whatever can be exposed about their private life."
Even George Orwell's Big Brother had the decency to limit its surveillance to one all-seeing 'telescreen' per house. Now, thanks to smartphone selfie cameras and webcams on pretty much every device, we've all but built our own panopticon. All that is required is for the NSA or GCHQ to start gathering up the streams.
Technology can both protect the individual or create an environment where privacy is impossible, he warns.
"All dystopian societies are surveillance societies, so we have to get people to recognise that it's bad to give up everything," he said. "In any complex society, people do have secrets."
Even those people who see little to fear might ponder the scenario that Zimmermann sketches out of the future of pervasive surveillance.
"Imagine if the police installed surveillance cameras in your house, in every room of every house, in your bathroom, in your bedroom, and they collected all the video and put it on massive disc farms in the basement of the police station and they promise not to look at the files unless a court orders it."
He also has little time for the politicians and police who worry about losing track of criminals who use encryption.
"They are in a golden age of surveillance now. They've got this big picture with a few missing pixels and they're complaining. You go back twenty years, and they didn't have this big picture, they didn't have all these incredibly pervasive surveillance capabilities. So would they take that trade? I don't think so," he said.
"They have near total information awareness so they shouldn't be trying to take away our last few remaining black pixels on the big picture."
According to Zimmermann, we are witnessing the emergence of pervasive, retroactive surveillance, and the response is obvious. "We have to do something about this," he said.