Convert KDL

This commit is contained in:
Samuel Shifterovich
2018-12-23 20:28:01 +01:00
parent 31feb82c42
commit 7ef61a1757
10 changed files with 123 additions and 99 deletions

View File

@ -0,0 +1,8 @@
---
title: Global Mass Surveillance - The Fourteen Eyes
description: >
The UKUSA Agreement is an agreement between the United Kingdom, United States, Australia, Canada, and New Zealand to cooperatively collect, analyze, and share intelligence. Members of this group, known as the [Five Eyes](https://www.giswatch.org/en/communications-surveillance/unmasking-five-eyes-global-surveillance-practices), focus on gathering and analyzing intelligence from different parts of the world. While Five Eyes countries have agreed to [not spy on each other](https://www.pbs.org/newshour/world/an-exclusive-club-the-five-countries-that-dont-spy-on-each-other) as adversaries, leaks by Snowden have revealed that some Five Eyes members monitor each others citizens and [share intelligence](https://www.theguardian.com/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa) to [avoid breaking domestic laws](https://www.theguardian.com/politics/2013/jun/10/nsa-offers-intelligence-british-counterparts-blunkett) that prohibit them from spying on their own citizens. The Five Eyes alliance also cooperates with groups of third-party countries to share intelligence (forming the Nine Eyes and Fourteen Eyes), however Five Eyes and third-party countries can and do spy on each other.
five_eyes: Five Eyes
nine_eyes: Nine Eyes
fourteen_eyes: Fourteen Eyes
---

View File

@ -5,4 +5,5 @@ subheading: >
against global mass surveillance.
translations_disclaimer: Translations of privacytools.io were done by volunteers. They might be not up to date.
Read also: Read also
Related Information: Related Information
---

View File

@ -0,0 +1,11 @@
---
title: Key Disclosure Law
subheading: Who is required to hand over the encryption keys to authorities?
description: >
Mandatory [key disclosure laws](https://en.wikipedia.org/wiki/Key_disclosure_law) require individuals to turn over encryption keys to law enforcement conducting a criminal investigation. How these laws are implemented (who may be legally compelled to assist) vary from nation to nation, but a warrant is generally required. Defenses against key disclosure laws include steganography and encrypting data in a way that provides plausible deniability.
[Steganography](https://en.wikipedia.org/wiki/Steganography) involves hiding sensitive information (which may be encrypted) inside of ordinary data (for example, encrypting an image file and then hiding it in an audio file). With plausible deniability, data is encrypted in a way that prevents an adversary from being able to prove that the information they are after exists (for example, one password may decrypt benign data and another password, used on the same file, could decrypt sensitive data).
apply: Key disclosure laws apply
may_apply: Key disclosure laws may apply
dont_apply: Key disclosure laws don't apply
note: people who know how to access a system may be ordered to share their knowledge, <strong>however, this doesn't apply to the suspect itself or family members.</strong>