House Adopts Amendment to Bar NSA From Meddling With Encryption Standards

69 Twitter Facebook Email

The measure was inserted into a defense appropriations bill and approved on a voice vote.

The measure was inserted into a defense appropriations bill and approved on a voice vote.

by Justin Elliott ProPublica, June 20, 2014, 12:17 p.m.

ProPublica investigates the threats to privacy in an era of cellphones, data mining and cyberwar.

Enable Social Reading

An amendment designed to bar the National Security Agency from undermining encryption standards was approved by the House last night.

The move follows reporting last year by ProPublica, the Guardian, and the New York Times on the NSA's efforts to weaken encryption, including by influencing the development of standards by the National Institute of Standards and Technology. The stories were based on documents provided by Edward Snowden.

The amendment, sponsored by Rep. Alan Grayson (D-Fla.) and similar to one he advanced last month, bars the NSA from using appropriation funds to consult with NIST in a way that undermines security standards.

It still has a way to go before becoming law: While the House is expected today to approve the full appropriations bill that the amendment is a part of, the Senate would have to pass the same text, and ultimately President Obama would have to approve.

Excerpt from:
House Adopts Amendment to Bar NSA From Meddling With Encryption Standards

Granular or Cell Level Encryption in SQL Server

Introduction

Encryption brings data into a state that cannot be interpreted by anyone who does not have access to the decryption key, password, or certificates. Though encryption does not restrict the access to the data, it ensures in case of data loss, then that data is useless for the person that does not have access to the decryption keypasswordcertificates. When you use encryption, there should be a maintenance strategy for passwords, keys, and certificates.

To meet the demands of regulatory compliance and corporate data security standards, SQL Server allows you to enable encryption at the columncell level or on the entire database level. You can even use file level encryption, provided by Windows for database files.

In my last article, Transparent Data Encryption (TDE) in SQL Server I talked about enabling encryption at the entire database level and in this article I am going to further discuss and demonstrate a more granular level or each individual cell level encryption in detail and how it differs from Transparent Data Encryption (TDE).

Transparent Data Encryption is applicable at the entire database level unlike granular or cell level encryption, which applies to a specific column of a table.

Transparent Data Encryption encrypts data in pages before it is written to the disk and decrypts when reading from disk at the I/O level. This means, data in the buffer pool remains there in clear text format whereas in the case of granular or cell level encryption you have more granular control data is encrypted when you use the EncryptByKey inbuilt function while writing and decrypts the data only when you use the DecryptByKey inbuilt function so that even if a page is loaded into memory, sensitive data is not in clear text. This means unlike Transparent Data Encryption in which the data in the buffer pool remains in clear text format, with cell level encryption even in the buffer pool data remains encrypted.

Transparent Data Encryption, as its name implies, is completely transparent to your application. This means literally no application code changes (only an administrative change to enable it for a database) are required and hence there is no impact on the application codefunctionalities when enabling TDE on a database being referenced by that application whereas in the case of Granular or Cell level encryption a code change is required. In the case of Granular or Cell level encryption, first you need to change the data type to VARBINARY data type from their original data type (re-cast it back to the appropriate data type when read) and then you need to manually use inbuilt functions to encrypt or decrypt the data.

Transparent Data Encryption performs the encryption in bulk at the entire database level whereas in the case of Granular or Cell-level encryption the performance impact will vary based on the number of columns you are encrypting or the amount of datarows each column contains, i.e. the more columns you encrypt the more overhead and performance penalties you will have.

Granular level encryption has higher performance penalties and administration costs as the encryption is always salted so the same data will have a different value after encryption. As a result, foreign key constraints and primary key constraints do not provide any benefit on these encrypted columns. Query optimization also gets impacted as indexes on these encrypted columns offer no benefits and as a result range and equality searches turn into full table scans whereas with TDE your query can fully utilize indexes and avoid table scans.

Transparent Data Encryption was introduced in SQL Server 2008 and available in later versions for bulk encryption at the database file level whereas Granular or cell-level encryption was introduced in Microsoft SQL Server 2005 and available in later versions for encrypted data at column level.

Read more from the original source:
Granular or Cell Level Encryption in SQL Server

Amazon AWS continues to use TrueCrypt despite project’s demise

TrueCrypt remains the only option for securely importing and exporting data to and from the Amazon Simple Storage Service (S3) two weeks after the popular encryption software was abruptly discontinued by its creators, supposedly for security reasons.

According to Amazon Web Services (AWS) online documentation, TrueCrypt is the only device encryption supported by AWS Import/Export. On a separate page about AWS security, Amazon says that: AWS only ships devices out of AWS facilities if the device is completely erased or the device only contains data encrypted by AWS. For import jobs, we erase devices after job completion. For export jobs, we will always encrypt the data being exported onto the device. We use TrueCrypt software for encryption.

The authors of TrueCrypt, whose identities remain unknown, ended the project on May 28 with a sudden message warning users that using TrueCrypt is not secure as it may contain unfixed security issues. The projects homepage advised users to switch to encryption technologies integrated directly into modern operating systems like BitLocker Drive Encryption in recent versions of Windows or FileVault in Mac OS X.

TrueCrypt version 7.2, which can only be used to decrypt data, was released at the same time as the announcement about the end of the project, and all previous versions that included encryption functionality were removed from the projects repository.

The authenticity of the announcement has been questioned by some users and several possibilities were advanced, including that it was fake and posted by hackers or that the authors were identified by a government and forced to shut the project down.

The Open Crypto Audit Project (OCAP), a community initiative that was in the process of analyzing the security of TrueCrypt when its development was discontinued, set up a repository this week with verified builds and source code for TrueCrypt 7.1a, the last version of the software to include encryption.

OCAP plans to complete its TrueCrypt audit, which is now in phase two and involves analyzing the softwares cryptographic functions. The first phase, which involved searching for vulnerabilities in the programs critical components like its Windows kernel code, the bootloader and the filesystem driver was completed in April with no critical issues being identified.

Amazon.com did not immediately respond to an inquiry seeking information on whether it plans to support other data encryption technologies for the AWS import/export feature aside from TrueCrypt in the future.

Lucian Constantin writes about information security, privacy and data protection. More by Lucian Constantin

More here:
Amazon AWS continues to use TrueCrypt despite project's demise

Kenya: Al Qaeda Using New Encryption Software to Defy U.S. Intelligence Tracking

A new report shows that Al Qaeda and associate firms are using new encryption software in a bid to defy US intelligence tracking.

The report from an intelligence firm called Recorded Future states that since 2007, Al-Qaeda's use of encryption technology has been based on the Mujahideen Secrets platform which has developed to include support for mobile, instant messaging, and Macs.

Following the June 2013 Edward Snowden leaks about the National Security Agency's intelligence programme, the study also reveals an increased pace of innovation, specifically on new competing jihadist platforms and three major new encryption tools from three different organizations - GIMF, Al-Fajr Technical Committee, and ISIS - within a three to five-month time frame of the leaks.

Al-Qaeda (AQ) has been using encryption technology in various forms for a long time. The original Mujahideen Secrets is the most common one, but recently there have been multiple new encryption products as well as adaptations to new platforms like mobile, instant messaging, and Mac.

"The nature of these new crypto products indicates strategy to overlay stronger and broader encryption on Western (mainly US) consumer communication services. We do not find evidence of abandonment of US-based consumer communication services. Likely risks are still greater to hide outside the consumer crowd, and non-US-based services may be exposed to even stronger lawful intercept," stated the study

The Recorded Future timeline also laid out key developments from 2007 to date and according to them, the original Mujahideen Secrets (Asrar al-Mujahideen) encryption software launched in 2007 was primarily for use with email. Asrar has had multiple releases over time and is distributed by the Global Islamic Media Front (GIMF).

The second crypto Development was Asrar al-Dardashah, released by GIMF in February 2013, which is an encryption plugin for instant messaging based on the Pidgin platform - which connects to major US-based platforms. Later on, GIMF released Tashfeer al-Jawwal in September 2013 based on Symbian and Android and is a mobile encryption program.

Asrar al-Ghurabaa is yet another alternative encryption program, however importantly, released in November 2013 by Islamic State Of Iraq And Al-Sham (ISIS), which coincides with ISIS breaking off from main AQ after a power struggle and Amn al-Mujahid is an alternative encryption program released in December 2013. In this case from Al-Fajr Technical Committee (FTC) which is also a mainstream AQ outfit.

Visit link:
Kenya: Al Qaeda Using New Encryption Software to Defy U.S. Intelligence Tracking

Google unveils independent “fork” of OpenSSL called “BoringSSL”

Google is releasing its own independently developed "fork" of OpenSSL, the widely used cryptography library that came to international attention following the Heartbleed vulnerability that threatened hundreds of thousands of websites with catastrophic attacks.

OpenBSD developers "removed half of the OpenSSL source tree in a week."

"But well also be more able to import changes from LibreSSL and they are welcome to take changes from us," Adam Langley, a widely respected cryptography engineer and Google employee, wrote in a blog post introducing BoringSSL. "We have already relicensed some of our prior contributions to OpenSSL under an ISC license at their request and completely new code that we write will also be so licensed."

While it wasn't immediately clear how the forks will functionor when it makes sense to use one over anotherthe following exchange from this Hackernews forum may provide some clues.

matteotom So from what I understand, Google has a bunch of OpenSSL patches they use. They used to re-apply those patches to each new OpenSSL release, but now they're going to keep their own branch (BoringSSL) and pull and merge changes from OpenSSL?

What are the costs/benifits of one method over the other?

agl I think the costs and benefits are pretty much what you would expect. If your diff from upstream is small, then the tradeoff strongly favours rebasing against upstream and tracking it.

However, as the diff becomes larger, the tradeoff shifts. I think we passed that point a while back but, since we were going to switch models anyway, I took some time to clean up some bits of the code too.

tedunangst Fewer surprises. You don't wake up one day and discover that TLS heartbeats have appeared in your library as a result of previous upgrades. Every upstream change has to be reviewed because that's the only way it gets in. Also, local changes are much less likely to be lost as a result of merge conflicts.

The downside is that you may miss some upstream changes that you do care about.

Go here to see the original:
Google unveils independent “fork” of OpenSSL called “BoringSSL”

WikiLeaks-Gründer Julian Assange im ARD Interview , Frank Jahn, ARD London – Video


WikiLeaks-Grnder Julian Assange im ARD Interview , Frank Jahn, ARD London
WikiLeaks-Grnder Julian Assange im Interview 19.06.2014, Frank Jahn, ARD London Lesen Sie dazu auch "WikiLeaks-Grnder Assange im ARD-Interview "Wir sind er...

By: Helmut Zermin

Read more from the original source:
WikiLeaks-Gründer Julian Assange im ARD Interview , Frank Jahn, ARD London - Video

Assange to release new leaks despite self-imposed incarceration 6/19/14 A MUST WATCH – Video


Assange to release new leaks despite self-imposed incarceration 6/19/14 A MUST WATCH
PROVIDED BY http://CNNNEXT.COM Wikileaks chief Julian Assange is marking his second anniversary holed up inside the Ecuadorian embassy in London. Despite his self-imposed incarceration.

By: giovanni betances

Read more here:
Assange to release new leaks despite self-imposed incarceration 6/19/14 A MUST WATCH - Video

2 Years After Seeking Refuge In Embassy, Julian Assange …

On the two-year anniversary of Julian Assanges stay in the Ecuadorian Embassy in London, he spoke out about his complicated diplomatic and legal saga. | ANDREW COWIE via Getty Images

With British police still surrounding the Ecuadorian Embassy in London where he is holed up, WikiLeaks founder Julian Assange joined an international conference call Wednesday to speak out about his complicated and seemingly intractable diplomatic and legal saga.

The call came one day ahead of the two-year anniversary of Assange taking refuge in the embassy to avoid extradition to Sweden for questioning in an investigation about alleged sexual offenses. Assange argued his embassy stay is also necessary to avoid extradition to the U.S. for publishing files leaked to him by former U.S. Army Pvt. Chelsea Manning.

Although the call addressed his relationship with former NSA contractor Edward Snowden, Assange refused to reveal whether the two have been in any direct contact.

"The security situation in relation to myself here at the embassy, where the British government admits to spending more than $10 million so far on police encircling the embassy, and Edward Snowden's situation in Russia and in relation to the National Security Agency, means that I cannot discuss what types of communication we use or do not use," said Assange.

Assange and WikiLeaks lawyers engineered temporary asylum in Russia for Snowden, who fled to Hong Kong last year before revealing he was the source of leaked NSA reports. The organization's most high-profile success in the last year was getting Snowden the proper travel document for his flight from Hong Kong to Russia.

Assange has also signed up as a trustee for the Courage Foundation, which is raising money for Snowden's legal defense. But beyond his role in that group, it's not clear to what extent -- if any -- the WikiLeaks leader has an ongoing relationship with the NSA leaker.

Assange declined to answer a question about whether he has any access to Snowden's files. But after a media organization with access to Snowden's files recently published an article on NSA surveillance in two countries, WikiLeaks claimed to identify one country whose name had been redacted. WikiLeaks was vague about its sourcing.

"In relation to an issue revolving around sourcing, as a matter of longstanding policy to protect our sources, we cannot comment," he said.

Beyond the daring Snowden caper, WikiLeaks has made few of the global splashes it did when relying on the files of Manning, who is now serving the beginning of a 35-year sentence for leaking to the organization. But Assange pointed to files WikiLeaks published in January detailing negotiations for the Trans-Pacifc Partnership, a planned global trade agreement, as one success.

Read the original:
2 Years After Seeking Refuge In Embassy, Julian Assange ...

Wikileaks’ Julian Assange: I’m still here – CNET

Wikileaks founder Julian Assange appeared via Skype at the SXSW Interactive festival earlier this year. Daniel Terdiman/CNET

Wikileaks founder Julian Assange marked the second year to the day on Thursday as an occupant of the Ecuadorian embassy at 3 Hans Crescent in Knightsbridge, London.

Assange, whose Wikileaks site has published more than 8 million anonymously leaked documents since 2006, took the opportunity with his US- and UK-based lawyers to speak to the press on a conference call from the embassy about his legal struggles with the US, UK, and Swedish governments.

The 42-year-old Australian native railed against the four-year-long US criminal investigation of Wikileaks, claiming that it's the largest Department of Justice investigation of a publisher since the passage of the Espionage Act of 1917.

"It is against the stated principles of the United States and the values supported by its people to have a four-year pre-law investigation against a publisher," Assange said. "It is not correct for [US Attorney General] Eric Holder and the DOJ to use weasel words for stating that they will not prosecute a reporter for reporting."

Assange said that by investigating Wikileaks, the US government wants to create a schism between national security reporters and "those reporters who report the details of a press conference."

"I call on Eric Holder today to immediately drop the national security investigation against Wikileaks," he said.

The Justice Department did not immediately return a request for comment. Despite allegations, Assange has not been charged with a crime by authorities in the US or UK related to espionage, or by the Swedish authorities seeking his extradition over rape allegations.

Assange entered the Ecuadorian embassy on June 19, 2012, seeking political asylum from a British court order to extradite him to Sweden over allegations that he sexually assaulted two women there. Assange's attorneys stressed that since then they have been willing to have Assange interviewed over the phone or by video conference, but that Swedish officials refuse to meet with him except on Swedish soil.

"If he goes to Sweden it will likely be a one-way ticket to the United States," said Michael Ratner, the US-based attorney for Assange and Wikileaks. Assange receives support from and is a trustee of the Courage Foundation, which also provides legal and financial support to Edward Snowden, the NSA whistle-blower. Assange says he assisted Snowden when communicating from Hong Kong.

Original post:
Wikileaks' Julian Assange: I'm still here - CNET

Julian Assange to release files on 50 countries

Julian Assange speaking from the Ecuadorian embassy in London in 2012. The WikiLeaks founder has been in the embassy for two years. Photo: AFP/Leon Neal

Julian Assange is promising another massive leak of information affecting 50 countries on Thursday to mark his two years holed up in the Ecuadorian embassy in London.

On the eve of that anniversary, the Australian editor-in-chief of WikiLeaks invited the worlds media to dial in to the embassy so he could download.

In his conference call late on Wednesday night, Australian time, Assange called former Australian foreign minister Bob Carr a liar; he chastised US President Barack Obama; he revealed he had done more kilometres than he could count on his cross-trainer; and he spoke of his pride in WikiLeaks state-of-the-art technical clout which had allowed him while confined in his diplomatic refuge to manage the evacuation of American intelligence whistleblower Edward Snowden from Hong Kong during the largest ever intelligence manhunt the world has ever seen.

US whistleblower Edward Snowden. Julian Assange claimed to be assisting him from the Ecuador embassy in London Photo: Reuters/NBC News

But Assange is making time to watch the World Cup after 729 days of asylum in the embassy. "Of course, Ecuador undoubtedly deserves to win, he said, although he added Brazil probably would triumph. In any case, the reception in this building is quite difficult, which may have its advantages. Perhaps it makes it a bit harder for the bugs to transmit through the walls as well.

Advertisement

Assange said police gather intelligence on visitors and that the British government has spent almost $10 million on 24-hour surveillance of the embassy lest he ever dare to leave the small building, close to Harrods in Knightsbridge.

If he does leave, he faces immediate extradition to Sweden, where he is wanted for questioning over alleged sexual misconduct involving two women for which he is yet to be charged after four years. He dismisses it as a trumped-up, politically driven distraction from the main game: the United States, where Vice-President Joe Biden has called him a high-tech terrorist.

Julian Assange said former foreign affairs minister Bob Carr lied about the level of consular assistance offered to the WikiLeaks founder. Photo: Peter Rae

Visit link:
Julian Assange to release files on 50 countries