Army Must Call Chelsea Manning A Woman: Court

Patrick Semansky / AP, file

Army Pfc. Chelsea Manning is escorted out of a courthouse in Fort Meade, Maryland, after the third day of her court martial on June 5, 2013.

Chelsea Manning, a transgender woman convicted of leaking national security secrets to Wikileaks, must be referred to with feminine pronouns or in a gender neutral way in legal papers filed in her appeal, an Army Court ruled.

In the order, dated Wednesday, the U.S. Army Court of Criminal Appeals said: "Reference to appellant in all future formal papers filed before this court and all future orders and decisions issued by this court shall either be neutral, e.g., Private First Class Manning or appellant, or employ a feminine pronoun." The order, signed by a court clerk, did not make the military change the name of the case in which Manning is referred to as Bradley and Chelsea.

Manning had sought the court order to force the military to use pronouns that conform to her gender identity; the military had opposed such requests, her supporters said in a statement. The Army and Pentagon didn't immediately respond to requests seeking comment.

In a legal filing dated Feb. 9, the Army opposed the request, citing a lack of legal basis and saying Manning didn't show how it was serve the interest of justice. The Army said it would use standard practice when an appellant's name changed during the course of legal proceedings including both to "avoid confusion" and would refer to Manning with masculine pronouns.

Manning revealed her gender identity as a transgender female after being convicted and sentenced to 35 years in the military prison at Leavenworth in July 2013. In February, the U.S. Army approved hormone therapy for Manning, saying since she'd been clinically diagnosed and as transgender and was confined to a military prison, it was obligated to provide and pay for her treatments.

"This is an important development in Chelsea's fight for adequate medical care for her gender dysphoria," Chase Strangio, an ACLU attorney representing Manning in her lawsuit seeking medical care for gender dysphoria. "That fight continues but at least the government can no longer attempt to erase Chelsea's identity by referring to her as male in every legal filing."

First published March 5 2015, 4:23 PM

Miranda Leitsinger is a reporter at NBC News. She started this role in February 2011. Leitsinger is responsible for long-term enterprise and breaking news coverage. Her beats include recovery from natural disasters and mass shootings, the LGBT community, income inequality, immigration and the Boy Scouts.

See the rest here:
Army Must Call Chelsea Manning A Woman: Court

Court rules for Manning in gender pronoun fight

The United States Army Court of Appeals has ruled that Private First Class Chelsea Manning formerly known as Bradley Manning will be referred to using a neutral or feminine pronoun in all future court proceedings.

Nancy Hollander, Mannings attorney, praised the Wednesday court order in a statement, saying she and her co-counsels are thrilled that Chelsea will be respected as the woman she is in all legal filings.

Story Continued Below

Manning is serving a 35-year sentence for her conviction under the Espionage Act for releasing hundreds of thousands of classified documents to the organization WikiLeaks.

Soon after being sentenced in mid-2013, Mannings attorneys released a statement requesting that she be referred to using feminine pronouns and called by the name Chelsea Manning.

The ACLU filed a suit on behalf of Manning in September 2014, demanding that she receive treatment for gender dysphoria, including psychological treatment, hormone therapy and gender reassignment surgery.

The case is still pending before the United States District Court for the District of Columbia.

In February, USA Today reported that the U.S. Army approved providing Manning with hormone therapy.

Read the original:
Court rules for Manning in gender pronoun fight

Address Chelsea Manning in female, gender-neutral terms

WASHINGTON - Chelsea Manning, the US soldier serving a 35-year prison sentence for a massive document leak, should be addressed in gender-neutral or feminine terms in court documents as she transitions into a woman, judges said.

The move comes a month after the US Army approved hormone therapy for Manning's gender "reassignment" -- in a first for the American military.

"All future formal papers filed before this court and all future orders and decisions issued by this court shall either be neutral, eg Private First Class Manning or appellant, or employ a feminine pronoun" said a court order Wednesday.

However "in respect to historic fact," the court will retain masculine wordage used in previous decisions, including Manning's conviction.

Chelsea Manning, formerly known as Bradley Manning, is incarcerated in Fort Leavenworth in Kansas.

"The court rightly recognised that dignifying Chelsea's womanhood is not the trivial matter that the government attempted to frame it as," said Chase Strangio, a lawyer with the American Civil Liberties Union, which was involved in Manning's defence.

Manning, 27, had already secured permission last year to be known under the name "Chelsea" instead of "Bradley."

The former intelligence analyst also had been allowed to wear women's underwear following a decision last year, and to undergo psychotherapy.

Manning was convicted in August 2013 of espionage and other offences after admitting to handing over more than 700,000 classified documents to the WikiLeaks website while stationed in Iraq.

Continued here:
Address Chelsea Manning in female, gender-neutral terms

Edward Snowden’s Girlfriend Appears on Stage for ‘Citizenfour’ Win at the Oscars – Video


Edward Snowden #39;s Girlfriend Appears on Stage for #39;Citizenfour #39; Win at the Oscars
When the journalists behind the documentary Citizenfour took to the stage to the accept the Oscar for Best Documentary Feature on Sunday, they stood alongsid...

By: Kraft Hollywood

Read this article:
Edward Snowden's Girlfriend Appears on Stage for 'Citizenfour' Win at the Oscars - Video

What Did Edward Snowden Discover? NSA, Disclosures, Facts, Education (2014) – Video


What Did Edward Snowden Discover? NSA, Disclosures, Facts, Education (2014)
Edward Joseph "Ed" Snowden (born June 21, 1983) is an American computer professional who leaked classified information from the National Security Agency (NSA...

By: Remember This

Read more from the original source:
What Did Edward Snowden Discover? NSA, Disclosures, Facts, Education (2014) - Video

ANX Announces Industry’s First PCI QSA Validated Point-to-Point Encryption Solution

ANX Partners with Bluefin to add Validated Point-to-Point Encryption to its Industry-Leading PCI Compliance Solution

SOUTHFIELD, Mich. - ANXeBusiness Corp. (ANX), a trusted provider of managed payment solutions, has formed a strategic partnership with Bluefin Payment Systems, the leading provider of secure payment technology worldwide. The partnership establishes ANX as the first PCI Qualified Security Assessor (QSA) to offer merchants a PCI-validated Point-to-Point Encryption (P2PE) solution that also delivers a comprehensive suite of layered security and tools to simplify PCI compliance.

ANX's solution, SecurePCI Validated P2PE, combines the benefits of encryption with all the other services that a merchant needs to be secure and compliant. SecurePCI Validated P2PE is fully managed and delivers: validated P2PE; POS terminals required to meet the October 2015 EMV mandate; $100,000 of retroactive data breach protection; portal tools to simplify PCI compliance; and enterprise-grade managed security technology for layered security.

"We are excited about partnering with ANX," said Jeffrey Schroeder, Bluefin's Chief of Marketing Strategy. "They have added our Validated P2PE capabilities to their industry-leading SecurePCI package. ANX is known for their operational excellence and ability to help merchants become PCI compliant."

"Bluefin is the worldwide market leader for Validated P2PE," added Mark Wayne, ANX Executive Vice President, Governance, Risk and Compliance. "The Bluefin partnership is great news for ANX stakeholders. Adding validated P2PE to the portfolio positions ANX to deliver the best-in-class layered security and compliance solution while minimizing the merchant effort to achieve and maintain PCI compliance."

The storage and movement of unencrypted credit card data make US merchants a primary target for organized cybercrime. This vulnerability is exploited with documented success resulting in millions of dollars in damages. P2PE represents a major step forward in the battle to secure credit card information. With P2PE, payment card information is encrypted at the merchant Point-of-Sale (POS) and remains encrypted as it is exchanged with the acquiring bank. Encryption actually devalues the data, which lessens the incentive for theft. Hence, validated P2PE reduces the risk of a data breach, positions merchants to meet the October EMV requirements, and makes it easier to become PCI compliant by reducing the scope.

ANX will be accepting orders for SecurePCI Validated P2PE at the Transact 15 event in San Francisco on March 31, 2015. Learn more at http://www.anx.com.

About ANX ANXeBusiness Corp., headquartered in Southfield, Michigan, is a global provider of managed payment, compliance, security and connectivity solutions. ANX is certified by the PCI Security Standards Council as a Qualified Security Assessor (QSA) and an Approved Scanning Vendor (ASV). For more information, visit http://www.anx.com.

About Bluefin Bluefin Payment Systems is the leading provider of secure, integrated, cloud-based payment solutions for Independent Software Vendors and SaaS providers. Bluefin is one of only three companies worldwide to achieve PCI-validation for point-to-point encryption (P2PE). For more information, visit http://www.bluefin.com.

Source ANXeBusiness Corp.

Link:
ANX Announces Industry's First PCI QSA Validated Point-to-Point Encryption Solution

Microsoft Windows vulnerable to ‘FREAK’ encryption flaw too

Previously thought limited to Apple and Google browsers, the flaw leaves communications between affected users and websites open to interception.

Windows machines are also vulnerable to a decade-old encryption flaw.

Computers running all supported releases of Microsoft Windows are vulnerable to "FREAK," a decade-old encryption flaw that leaves device users vulnerable to having their electronic communications intercepted when visiting any of hundreds of thousands of websites, including Whitehouse.gov, NSA.gov and FBI.gov.

The flaw was previously thought to be limited to Apple's Safari and Google's Android browsers. But Microsoft warned that the encryption protocols used in Windows -- Secure Sockets Layer and its successor Transport Layer Security -- were also vulnerable to the flaw.

"Our investigation has verified that the vulnerability could allow an attacker to force the downgrading of the cipher suites used in an SSL/TLS connection on a Windows client system," Microsoft said in its advisory. "The vulnerability facilitates exploitation of the publicly disclosed FREAK technique, which is an industrywide issue that is not specific to Windows operating systems."

Microsoft said it will likely address the flaw in its regularly scheduled Patch Tuesday update or with an out-of-cycle patch. In the meantime, Microsoft suggested disabling the RSA export ciphers.

The FREAK (Factoring RSA Export Keys) flaw surfaced a few weeks ago when a group of researchers discovered they could force websites to use intentionally weakened encryption, which they were able to break within a few hours. Once a site's encryption was cracked, hackers could then steal data such as passwords, and hijack elements on the page.

Researchers said there was no evidence hackers had exploited the vulnerability, which they blamed on a former US policy that banned US companies from exporting the strongest encryption standards available. The restrictions were lifted in the late 1990s, but the weaker standards were already part of software used widely around the world, including Windows and the web browsers.

"The export-grade RSA ciphers are the remains of a 1980s-vintage effort to weaken cryptography so that intelligence agencies would be able to monitor," Matthew Green, a Johns Hopkins cryptographer who helped investigate the encryption flaw, wrote in a blog post explaining the flaw's origins and effects. "This was done badly. So badly, that while the policies were ultimately scrapped, they're still hurting us today."

Follow this link:
Microsoft Windows vulnerable to 'FREAK' encryption flaw too