Edward Snowden Damage Apparently Less than Feared: Report

Kuala Lumpur: Edward Snowden does not appear to have taken as much as originally thought from NSA files, The Washington Post reported late Thursday.

The damage is still "profound" from the former NSA contractor who blew the cover on vast US surveillance programs of everything from everyday people's phone calls to intrusions into high-tech companies' servers, Director of National Intelligence James Clapper said, according to the Post.

Still, "it doesn't look like he took as much" as first thought, Clapper was quoted as saying in what the Post called a rare interview Tuesday.

"We're still investigating, but we think that a lot of what he looked at, he couldn't pull down," Clapper said.

"Some things we thought he got he apparently didn't," the director was quoted as saying.

The Post said this view contrasts with the initial worse-case scenario in which the US intelligence community assumed that Snowden, who faces espionage charges, "compromised the communications networks that make up the military's command and control system."

Link:
Edward Snowden Damage Apparently Less than Feared: Report

June Fifth: “Edward Snowden Day” Except Not. Yet.

By Lambert Strether of Corrente.

Paul Jay of The Real News Network interviews Michael Ratner on the revelations of Edward Snowden; the first Guardian story ran on June 5. Ratner is President Emeritus of the Center for Constitutional Rights (CCR) in New York and Chair of the European Center for Constitutional and Human Rights in Berlin. Ratner is currently a legal adviser to Wikileaks and Julian Assange. Heres the video:

More at The Real News

June 5. Has it really been such a short time? Or so long a time? Ratner explains:

[W]ere recording this on June 5, which is Thursday, which is the day the first article based on Snowden documents appeared in The Guardian. .. And its also the second anniversary or coming on the second anniversary of two years of Julian Assange in the Ecuadorian embassy. Thatll be June 19. So the anniversaries in June are quite important.

Lets go back to the first story, the first story of June 5, the work of Glenn Greenwald, Laura Poitras. They had gotten to Hong Kong a few days before that. They met Edward Snowden. They met with him on June 3. And they do the first story, which I said is a FISA (Foreign Intelligence Surveillance Act) court order, secret court order, concerning Verizon in particular, but saying that Verizon had to turn over all of the metadata on our phone calls in the United States and elsewherebasically, how long, what cell towers theyre from, all kinds of information. And from that, of course, they make a tree of everybody, whos in contact with who, and they get a huge range of information about it. That was the first story, a big story, because it was a misinterpretation, in many of our views, by the secret court of the FISA powers, of the Foreign Intelligence Act powers. And it also showed just how pervasive the surveillance is.

Second day, June 6, which will be an anniversary of, on this Friday, the day after tomorrow, they expose the PRISM story. Thats the NSA has direct access, through our computers, through Google, Facebook, Apple, and other U.S. internet giants, to data held by those internet giants, our actual content of our datamy emails, etc., another huge story.

This year, Edward Snowden Day, June 5, was also #ResetTheNet Day, of which Edward Snowden wrote:

Today, we can begin the work of effectively shutting down the collection of our online communications, even if the US Congress fails to do the same. Thats why Im asking you to join me on June 5th for Reset the Net, when people and companies all over the world will come together to implement the technological solutions that can put an end to the mass surveillance programs of any government.

We have the technology, and adopting encryption is the first effective step that everyone can take to end mass surveillance. Thats why I am excited for Reset the Net it will mark the moment when we turn political expression into practical action, and protect ourselves on a large scale.

Read more here:
June Fifth: “Edward Snowden Day” Except Not. Yet.

House Votes To Cut Key Pursestrings For NSA Surveillance …

The House of Representatives may have only passed a puny attempt to reform the NSAs surveillance activities last month. But on Thursday evening it swung back with a surprising attack on a key element of the agencys spying programs: their funding.

In a late night session, the House of Representatives voted 293 to 123 to pass an amendment to a Department of Defense appropriations bill that would cut off all funds for two of the agencys most embattled activities: First, using the 702 provision of the Foreign Intelligence Surveillance Act to perform searches of collected surveillance data that target Americans, and second, asking hardware markers and software developers to build backdoors into their tools designed to give the agency access to users communications. On that second count, the amendment specifically forbids funding for any agency attempt to mandate or request that a person redesign its product or service to facilitateelectronic surveillance.

Both of those funding bans represent a clear reaction against behavior revealed from the leaks of Edward Snowden, which have shown over the past year that the NSA subverted cryptography standards, diverted hardware shipments to plant bugs in products, and found other ways to gather raw communication data from Silicon Valley firms like Google, Facebook, Microsoft, Apple, and others.

Though the amendments bans still havent been mirrored in the Senate, the House vote nonetheless sends an unambiguous statement that theres political will to do something about the issue of unchecked NSA spying, says Parker Higgins, an activist at the Electronic Frontier Foundation, which supported a campaign to persuade citizens to call their congressman in support of the amendment. This is not a trivial thing. These surveillance programs need money to survive. Without it there are hard questions ahead for the NSA.

The bill also represents a striking shift from the USA Freedom bill, intended to reform NSA mass surveillance, that passed the house last month in a watered-down form that disappointed privacy advocates. In part, the contrast is a result of political procedure: Much of the Freedom bills weakening took place in the Judiciary and Intelligence committees, says Julian Sanchez, a fellow at the Cato Institute who follows surveillance policy. As an amendment to an appropriations bill, he says, the defunding legislation instead escaped thatdouble gauntlet of lobbying. In particular, it didnt have to go through the Intelligence Committee, which is basically a proxy for the intelligence community, says Sanchez.

In fact, the toothless surveillance reform bill may have directly inspired Thursday nights landslide vote by not going far enough to satisfy legislators seeking to curtail the NSAs most controversial activities. Due to the weakening of that bills anti-spying provisions in committee, many House members never had a chance to show their intention to more drastically limit the NSAs spying.

Even if the amendment becomes law, it still wouldnt necessarily end all federally-mandated backdoors in hardware and software, cautions Matt Blaze, a computer science professor and cryptographer at the University of Pennsylvania. According to his reading of the amendment, it wouldnt cover the FBI, for instance. The goal is clearly important. I worry that the scopeis limited, he says. Even when the NSA and CIA dont request or put pressure on vendors to incorporate backdoors, other agencies, like FBI, may be in the same business.

Still, the passage of the amendment marks a serious shift in the political landscape following a year of Snowdens spying disclosures. A similar amendment put to a vote last year came up seven votes short of passing. The lopsided tally this year shows that reining in the NSA has become a popular political cause that crosses party lines, says the EFFs Higgins. Last year, legislators who voted in favor of this amendment were sticking their necks out, he says. Now the status quo has changed. Theres a sense that if youre not doing something about this problem, its going to be a black mark on your record.

View post:
House Votes To Cut Key Pursestrings For NSA Surveillance ...

Another US Spying Problem in Latin America: The US Drug …

Relations between the U.S. and Brazil have been in the doghouse since documents leaked by former NSA contractor Edward Snowden showed that Brazil was one of the biggest targets of NSA spying. The abuses included mass collection of millions of Brazilians' email and phone records, spying on President Dilma Rousseff's personal communications, and targeting the computer systems of Brazil's Petrobras -- the latter with obvious commercial benefits for U.S. corporations.

Dilma summed it all up rather succinctly in a blunt speech at the United Nations last September, denouncing "a situation of grave violation of human rights and of civil liberties; of invasion and capture of confidential information concerning corporate activities, and especially of disrespect to national sovereignty."

But now, thanks to additional leaked documents described by Ryan Devereaux, Glenn Greenwald, and Laura Poitras in The Intercept, we find there is another U.S. agency working with the NSA that poses similar threats: the U.S. Drug Enforcement Agency (DEA). According to the documents, there is a "two-way information sharing relationship" between the DEA and NSA: it's not just the NSA helping the DEA catch drug traffickers, but also the DEA helping NSA with its non-drug-related spying programs.

From the Intercept: "DEA is actually one of the biggest spy operations there is," says Finn Selander, a former DEA special agent, "Our mandate is not just drugs. We collect intelligence."

Selander added that "countries let us in because they don't view us, really, as a spy organization."

This is potentially an even bigger breach of diplomatic trust than the NSA spying that Dilma denounced at the U.N. Governments allow the DEA access to military, police and intelligence resources -- sometimes including phone-tapping -- as part of a collaborative effort with the United States to fight organized crime. They do not expect that by doing so they are unwittingly assisting the NSA and the enormous U.S. intelligence apparatus with unauthorized spying for political or commercial purposes.

Meanwhile in Brazil, although both Dilma and former President Lula have called for apologies from President Obama for the abuses, U.S. officials have made it clear that this will not happen (in the words of former U.S. Ambassador to Brazil Thomas Shannon, "you should not expect an unexpected gesture"). Nor has Washington given reasonable assurances that such abuses won't occur in the future.

It seems that better relations will have to wait until after Brazil's presidential elections in October. While Dilma's detractors say that this is because she is playing to the electorate, it's more likely that the electoral calculations are on the other side: Washington is hoping to see a president who is more subservient to U.S. foreign policy. After all, the problem of U.S. disrespect for Latin American sovereignty is much deeper than just the spying scandals. Although it was George W. Bush who expressed it most plainly -- countries are either "with us" or against us -- this remains Washington's guiding principle in the hemisphere.

This was published by The Hill on June 20, 2014.

Link:
Another US Spying Problem in Latin America: The US Drug ...

House backs limits on NSA spying

WASHINGTON House libertarians and liberals banded together for a surprise win in their fight against the secretive National Security Agency, securing support for new curbs on government spying a year after leaker Edward Snowden's disclosures about the bulk collection of millions of Americans' phone records.

The Republican-led House voted 293-123 late Thursday to add the limits to a $570 billion defense spending bill. The provision, which faces an uncertain fate in the Senate, would bar warrantless collection of personal online information and prohibit access for the NSA and CIA into commercial tech products.

Proponents of the measure described them as government "backdoors" that give intelligence agencies an opening to Americans' private data.

"The American people are sick of being spied on," said Rep. Thomas Massie, R-Ky., who joined with libertarian Republicans and liberal Democrats to push the measure.

Rep. Tulsi Gabbard, D-Hawaii, railed against "this dragnet spying on millions of Americans."

The House was expected to pass the defense bill Friday. It still must be reconciled with a still-to-be written Senate version.

In the showdown between privacy and security, the House earlier this year overwhelmingly passed the USA Freedom Act that would codify a proposal made in January by President Barack Obama, who said he wanted to end the NSA's practice of collecting and storing the "to and from" records of nearly every American landline telephone call under a program that searched the data for connections to terrorist plots abroad.

Massie, Gabbard and other lawmakers complained that the legislation didn't go far enough, necessitating their amendment to the defense bill. The chairman of the House Judiciary Committee, Rep. Bob Goodlatte, R-Va., and other Republican and Democratic leaders pushed back, arguing that the amendment undercut their reform package that was a year in the making.

During hours of debate and votes Thursday, the House also endorsed several new roadblocks to Obama's long-sought effort to close the U.S. prison at Guantanamo Bay, Cuba.

Republicans and some Democrats repeatedly have blocked any effort to shutter the post-Sept. 11 prison to house terror suspects, and congressional furor over Obama's trade last month of five Taliban leaders for Army Sgt. Bowe Bergdahl prompted a bipartisan effort to add fresh obstacles.

More here:
House backs limits on NSA spying

US federal court approves NSA spying

The Obama administration has received approval from a federal court to continue the National Security Agencys collection of telephone metadata for another three months.

US officials said on Friday that the government's application to renew the existing program was approved by the Foreign Intelligence Surveillance Court.

The US House of Representatives has passed a bill to restrict the spy agencys electronic surveillance powers.

If passed by the Senate, the bill will bar the agency from using personal electronic information from citizens without a prior court order.

According to a statement from the Justice Department and the Office of the Director of National Intelligence, the government will continue the current NSA program.

"Given that legislation has not yet been enacted, and given the importance of maintaining the capabilities of the Section 215 telephony metadata program, the government has sought a 90-day reauthorization of the existing program, as modified by the changes the president announced earlier this year," it said.

The government's application to renew the program expires Sept. 12.

The NSA has been eavesdropping on millions of American and European phone records and internet data.

AGB/AGB

See the article here:
US federal court approves NSA spying

Data Protecto: Ground-breaking Data Protection Software

(PRWEB) June 20, 2014

In light of grave threats confronting data security in the information age, a revolutionary data encryption tool has been released which is constantly changing the face of data protection. As a response to ongoing bugs and malware, including Heartbleed bug, Gameover Zeus and Cryptolocker, Data Protecto has developed this purpose built encryption software. Sara James, a software developer at Data Protecto said this novel encryption software is built keeping in mind the dynamic and evolving threats which IT users confront. As such, it has a reactive as well as preventive robust systems integrated into its code, which recognizes any threats as they emerge and prevent data compromise accordingly.

A spokesperson of Data Protecto, Elizabeth Kelly explained Data Protecto will be equipped with certain grounds breaking features which makes it best encryption software. She claimed that Data Protecto will be equipped with 9 features including:

She further explained that with comprehensive data protection and encryption technologies Protecto is expected to revolutionize the previously ineffective and futile data protection industry. It is a step towards consolidated protection against evolving and dynamic threats which we continually experience.

With such expectations against adverse prospects overlooking the data protection industry, Data Protecto may be our final hope against the endemic of data insecurity.

Go here to see the original:
Data Protecto: Ground-breaking Data Protection Software

Open teaching stacks help us teach at scale

Elliott Hauser is CEO of Trinket, a startup focused on creating open sourced teaching materials. He is also a Python instructor at UNC Chapel Hill.

Well-developed tools for teaching are crucial to the spread of open source software and programming languages. Stacks like those used by the Young Coders Tutorial and Mozilla Software Carpentry are having national and international impact by enabling more people to teach more often.

Software wont replace teachers. But teachers need great software for teaching. The success and growth of technical communities are largely dependent on the availability of teaching stacks appropriate to teaching their technologies. Resources like try git or interactivepython.org not only help students on their own but also equip instructors to teach these topics without also having to discover the best tools for doing so. In that way, they play the same function as open source Web stacks: getting us up and running quickly with time-tested and community-backed tools. Thank goodness I dont need to write a database just to write a website; I can use open source software instead. As an instructor teaching others to code websites, whats the equivalent tool set? Thats what I mean by Teaching Stack: a collection of open tools that help individual instructors teach technology at scale.

Here are some of the major components of a teaching stack for a hands-on technology course:

You can see the key components: Where the instructor got the materials, how the students will access them, and what development environment each will use. All too often, one or more of the components of an instructors teaching stack amounts to Whatever I was able to throw together myself. A homegrown curriculum, student development environment, and course website can be extremely confusing for students. Theyre also an extraordinary amount of work for instructors, which means fewer courses are taught.

Based on my experiences teaching and observing workshops around the country, here are my three simple recommendations for Teaching Stack design:

Below Ill describe two teaching stacks that take these approaches and are working well at scale: the Python Young Coders Tutorial and Mozilla Software Carpentry. My message to instructors is once youve got a teaching stack that works, follow these projects example and make it easy for others to replicate and contribute to!

Before we dive into teaching stacks, Id like to briefly explain where the concept came from: the Web Stack.

Read more:
Open teaching stacks help us teach at scale

Red Hat CTO asserts OpenStack buzz is more than just hype

Summary: Red Hat's CTO presents the open source giant's case for becoming the leading brand of OpenStack for the enterprise market.

Open source has been at the forefront of tech chatter for a long time, but arguably buzz around the movement has reached a fever pitch this year in the enterprise IT world.

OpenStack, a global collaborative effort to deliver open source cloud computing software, is certainly at the heart of all this, pushed prominently by Red Hat.

Speaking at Gigaom Structure 2014 in San Francisco on Thursday, Red Hat CTO Brian Stevens cited that the open source software firm has upwards of 100,000 customers.

He followed up that he hasn't met a customer yet who doesn't want to discuss OpenStack -- if not being the first item on the agenda.

When asked on-stage about how much of that is noise or solid deployment by real customers, Stevens leaned more toward the latter but acknowledged that the ebullient interest might be "unusual."

"It's early technology. The code hasn't been around forever," Stevens remarked. "OpenStack is much more than just the original two projects of Swift and Nova."

Observing the most interest spread across North America, Europe and Asia, Stevens explained that OpenStack has emerged as a better model for building a multi-tenant, sharable infrastructure.

For businesses wanting to tap into both the public cloud but also on-premise schemes, Stevens declared the answer is OpenStack.

"They know what's where they want to get to. The question is how to help them," Stevens said.

Continued here:
Red Hat CTO asserts OpenStack buzz is more than just hype