Glenn Greenwald NSA Imminent Leaks | Edward Snowden New Reports | Shock and Awe – Video


Glenn Greenwald NSA Imminent Leaks | Edward Snowden New Reports | Shock and Awe
Glenn Greenwald Devulgues Snowden NSA Imminent Leaks | No Place To Hide . Journalist Glenn Greenwald says he #39;s about to drop the biggest bombshell yet from leaked NSA documents. Today marks...

By: newsbrakes

Go here to see the original:
Glenn Greenwald NSA Imminent Leaks | Edward Snowden New Reports | Shock and Awe - Video

Snowden defends mega spy blab: ‘Public affairs have to be …

Gartner critical capabilities for enterprise endpoint backup

Master spy blabbermouth Edward Snowden defended his NSA whistleblowing actions to the Council of Europe today.

He told the human rights' parliamentary assembly in Strasbourg, via video link from Moscow, that he had a "personal duty to country, government and family" to reveal details about snooping methods employed by the US and British governments.

"Public affairs have to be known by the public," Snowden said, in justifying his decision to blow the whistle on the National Security Agency. "When citizens are reduced to the status of subjects, where we're not active participants ... that diminishes us as a free people, as a society and as a culture."

The one-time NSA sysadmin added that he was "willing to pay the price" for leaking that information even if it did damage national security interests.

"I was aware and I did my best to ensure that balance would be enforced," he told the CoE. He claimed that no specific damage and in fact occurred as a result of his actions. It "may have caused some good," he argued.

Snowden explained to the committee during his testimony that he had worked with journalists to help ensure that the information would be responsibly reported.

"That was why I didn't publish it myself. I chose not to, instead I worked with the press," he said.

Snowden added that he had been in the best position, having worked in signals intelligence and electronic spying at the NSA, to understand the material that was leaked to the Guardian and the Washington Post.

"I left behind notes, put them in context, organised them and categorised them [for journalists]," said Snowden.

Continued here:
Snowden defends mega spy blab: 'Public affairs have to be ...

Snowden defends mega spy blab: ‘Public affairs have to be known by the public’

Gartner critical capabilities for enterprise endpoint backup

Master spy blabbermouth Edward Snowden defended his NSA whistleblowing actions to the Council of Europe today.

He told the human rights' parliamentary assembly in Strasbourg, via video link from Moscow, that he had a "personal duty to country, government and family" to reveal details about snooping methods employed by the US and British governments.

"Public affairs have to be known by the public," Snowden said, in justifying his decision to blow the whistle on the National Security Agency. "When citizens are reduced to the status of subjects, where we're not active participants ... that diminishes us as a free people, as a society and as a culture."

The one-time NSA sysadmin added that he was "willing to pay the price" for leaking that information even if it did damage national security interests.

"I was aware and I did my best to ensure that balance would be enforced," he told the CoE. He claimed that no specific damage and in fact occurred as a result of his actions. It "may have caused some good," he argued.

Snowden explained to the committee during his testimony that he had worked with journalists to help ensure that the information would be responsibly reported.

"That was why I didn't publish it myself. I chose not to, instead I worked with the press," he said.

Snowden added that he had been in the best position, having worked in signals intelligence and electronic spying at the NSA, to understand the material that was leaked to the Guardian and the Washington Post.

"I left behind notes, put them in context, organised them and categorised them [for journalists]," said Snowden.

Read the original post:
Snowden defends mega spy blab: 'Public affairs have to be known by the public'

Robot Edward Snowden Rescued a Reporter When She Had a Seizure

Hero/traitor/cyberman Edward Snowden is physically still stuck in Russia, but he gives talks and interviews in the U.S. via a telepresence robot that shows his face in real time and allows him to see his interviewers. And help rescue them during seizures.

As part of a longer piece on Snowdenbot and his human handlers, Tagesspiegel reporter Julia Prosinger recounted an incident at the ACLU offices in New York City when her epilepsy triggered and Snowden, Skyping in from Russia, knew exactly what to do.

When he saw Prosinger about to faint, he quickly told his ACLU lawyer, Ben Wizner, to catch her before she could hit her head on the metal filing cabinets.

"The first fits are always the worst," he said when she came to.

Prosinger writes:

I am lucky: Snowden is not only a patriot or traitor, he is also an epileptic. He instantly recognised what was happening to me. He tells me that he was only diagnosed when he was 28 years old. When he fled the US a little more than a year ago, he told his employer that he had to go away for a few weeks for treatment for his epilepsy. Then Snowden apologises for making me look at the flickering screen, it had triggered the fit, he says.

Snowden also made sure that Wizner put the reporter in the recovery position and brought her a glass of juice.

"For a moment," Prosinger wrote, "Edward Snowden became three-dimensional."

[H/T Daily Dot, Photo: TED]

Read the original:
Robot Edward Snowden Rescued a Reporter When She Had a Seizure

Hackers Reverse-Engineer NSA Spying Tools Using Snowden Leaks

Besides exposing all of the not-so-good things the NSA and other clandestine agencies around the world were up to, the documents leaked by Edward Snowden have allowed hackers to reverse-engineer some of the tools the NSA has used to spy on us.

Along with the nefarious details of our constant surveillance, the NSA's Advanced Network Technology cataloga list of some of the gadgets NSA personnel can use to spy on computers and phoneswas also included in the leaked documents.

A team of security researchers led by Michael Ossmann have used the information to reconstruct two surveillance devices used by the NSA. These devices, called "retro reflectors," are tiny radio-based wireless data transmitters, which, when placed on a computer or keyboard, allow information to be gathered (like keystrokes and on-screen images) even when that device is not connected to the internet.

Ossmann says he will present his findings at Defcon, and show others how to protect themselves from future NSA hacksif that's even possible. [New Scientist via Engadget]

Read this article:
Hackers Reverse-Engineer NSA Spying Tools Using Snowden Leaks

HP Atalla Delivers Cloud Encryption Tech

The HP Atalla Cloud Encryption technology does not allow an attacker that takes a snapshot of a user session to be able to capture the user's encryption key, he said.

Managing data encryption as it moves across an enterprise and throughout the lifecycle is also a challenge that HP is aiming to tackle. The new HP Atalla Information Protection and Control (IPC) applies and manages protection for data as it moves around an organization, Biketi said.

The Atalla business unit, one of HP's oldest security businesses, got its start in 1973 as a security vendor for financial institutions. It was acquired in 1987 by Tandem Computers, which was acquired in 1997 by Compaq, which HP bought in 2002. Atalla technology is still widely used in financial services.

Sean Michael Kerner is a senior editor at InternetNews.com. Follow him on Twitter @TechJournalist.

View original post here:
HP Atalla Delivers Cloud Encryption Tech

Cisco open-sources experimental small message encryption for cloud, IoT

Networking giant Cisco is open-sourcing an experimental cipher that could help preserve privacy in the cloud and the Internet of Things.

Cisco software engineer Sashank Dara describes the cipher as FNR (Flexible Naor and Reingold) and says that its a variant on the work of Naor and Reingold from a paper published in the Journal of Cryptology. That permits the encryption of small messages without a great amount of bloat.

Common ciphers used in todays encryption tend to generate fixed width messages. For example, AES has a fixed block lengthfrom 128, 192, or 256 bitsand any length of data smaller than that automatically gets padded to fit the full width.

For most situations where encryption is usedsuch as person-to-person communications or the exchange of large amounts of datathis isnt that big of a problem since these examples send a lot of data with a low number of messages. However, in a cloud or Internet of Things situation a lot of small messages might be exchanged rapidly in order to keep real-time data flowing.

Dara adds that the system would be useful for exchanging small chunks of data such as IPv4 addresses, MAC addresses, arbitrary strings, etc. while preserving their input lengths. This way FNR could also be extremely useful for adapting encryption to legacy databases that require a set column length to store data.

As for Daras example for the cloud: Usethe FNR cipher in whats called ECB (electronic codebook) mode, which does not give strong security to the underlying data but does deliver a level of anonymity to ingested messages. He suggests that such an application would be good for cloud-based monitoring of a system that also needs to preserve the data anonymity of the monitored subject. Its not always necessary to know what a system is doing to gauge its overall health and, given that a logging service could also be hacked, anonymizing data would resist further intrusion.

The code has been open-sourced under the LPGLv2 license and is available at github. Alongside the code Cisco provides a demonstration application that encrypts IPv4 addresses as an example. The specifications also caution that this code is experimental and is not ready for production systems.

This sort of cipher could have implications for any system that needs to exchange lots of messages over thin bandwidth that have a high chance of being intercepted. Dara suggests that cloud is a potential use, but another space that could use such a cipher is Internet of Things applications.

Low-power wireless sensors, common to IoT solutions, need to make the best of their power and bandwidth when sending information back to receivers and at the same time open up clients to potential privacy breaches. Being able to encrypt smaller bursts of data would open up new avenues for developing private messaging for a large number of industries.

The USPS recently started seeking solutions from IoT vendors and one of the primary concerns about any solution included keeping customer data private. To maintain privacy for customers of any IoT endeavor would need to include everything from databases and cloud (the datacenter where a lot of encryption is already used) as well as from parcels and trucks (the IoT side that would benefit from FNR.)

More here:
Cisco open-sources experimental small message encryption for cloud, IoT

W3C Open Source Software – World Wide Web Consortium

About W3C Software

The natural complement to W3C specifications is running code. Implementation and testing is an essential part of specification development and releasing the code promotes exchange of ideas in the developer community.

All W3C software is certified Open Source/Free Software. (see the license)

12 March 2014: A bug fix release: version6.6 of the HTML/XML utilities was distributed with an empty header file, which meant it couldn't compile on platforms that needed that file. See the ChangeLog for details. (News Archive)

12 August 2013: Version0.9 of xmptool fixes a bug that made the program crash (reporting a failed assertion) if there were two properties in a row without a value. A property without a value is, e.g.:

(News Archive)

29 February 2012: Version1.1 fixes a segmentation fault in eotinfo when it is presented with a file that cannot be opened. (News Archive)

18 January 2012: This release fixes some bugs and particularly the PUT SSL bug for some large files on Windows and Linux. See the changelog for more details. Donwload Amaya. (News Archive)

News Archives: 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003.

Excerpt from:
W3C Open Source Software - World Wide Web Consortium