Chelsea Manning Archives – Ideas Guy

Chelsea Manning, the US army soldier serving 35 years in prison for leaking a huge stash of state secrets, has won a small but significant victory in her bid to transition to living as a woman.

Manning has taken on the might of the US military, challenging its ongoing refusal to refer to her as a woman, and won. A court order from the US army court of criminal appeals instructs the military to refer to the soldier in all future official correspondence either using the gender neutral Private First Class Manning or employing the feminine pronoun.

As a result, the military is henceforth forbidden from referring to Manning as a man.

The court order marks another advance towards Mannings goal of gender transition which she has had to fight every step of the way in the face of an intransigent army hierarchy. Last month, Manning, who has been diagnosed with gender dysphoria, was allowed to start hormone treatment, having struggled for years to convince her jailers to grant her the medical care that had been indicated.

The treatment marked a breakthrough for the US military, which continues to ban transgender individuals from service.

Manning was allowed to change her name legally from her male designation at birth Bradley in April last year. Even so, army lawyers continue to contest her new identity. Last month the US government filed a formal objection to Mannings request to be referred to as a woman in all future filings.

In its submission to the court, government lawyers pointedly referred to the soldier as Bradley, and said that unless directed otherwise by this honourable court, the government intends to refer to [Manning] using masculine pronouns.

Mannings legal advisers were jubilant about the outcome of the challenge. Nancy Hollander, who is leading the soldiers appeal against conviction, said it was an important victory for Chelsea, who has been mistreated by the government for years.

Chase Strangio, a staff attorney with the ACLU who pressed a lawsuit against the army to force it to allow her hormone treatment, said that the court had court rightly recognized that dignifying Chelseas womanhood is not the trivial matter that the government attempted to frame it as. This is an important development in Chelseas fight for adequate medical care for her gender dysphoria.

Manning, who writes for the Guardian from her confinement in Fort Leavenworth, Kansas, has written that a doctor, a judge or a piece of paper shouldnt have the power to tell someone who he or she is We should all be able to live as human beings and to be recognized as such by the societies we live in.

Read more from the original source:
Chelsea Manning Archives – Ideas Guy

US pressures Russia on Snowden slams China

(MENAFN - Arab Times) WASHINGTON June 24 2013 (AFP) -The White House pressured Russia to expel fugitive US intelligence leaker Edward Snowden and warned China it had harmed efforts to rebuild trust by allowing him to leave Hong Kong.

As intrigue in the case mounted Snowden vanished in Moscow not taking a flight to Cuba on which he was booked -- possibly on a journey scheduled to end up in Ecuador.

He was said by Russian officials to have spent Sunday night in a "capsule hotel" at Moscow''s Sheremetyevo airport awaiting his onward connection.

Russia''s Interfax news agency known for its strong security contacts confirmed that he was not on the Havana flight and quoted an informed source as saying he was likely already out of the country.

Snowden had arrived in Moscow on Sunday from Hong Kong from where he leaked to the media details of secret cyber-espionage programs by both US and British intelligence agencies.

WikiLeaks founder Julian Assange himself holed up in Ecuador''s embassy in London to avoid claims of sexual assault in Sweden said Snowden was "safe" after leaving Hong Kong with a refugee document supplied by Quito after the United States revoked his passport.

And Snowden made another revelation sure to irk the US government.

He told the South China Morning Post in a story that appeared Tuesday that he joined the NSA contractor Booz Allen Hamilton from which he stole secrets on the surveillance programs specially to gain access to information on such activities and spill it to the press.

"My position with Booz Allen Hamilton granted me access to lists of machines all over the world the NSA hacked" he told the Post. "That is why I accepted that position about three months ago." The interview was conducted June 12.

President Barack Obama said Washington was using every legal channel to apprehend Snowden.

Go here to see the original:
US pressures Russia on Snowden slams China

NSA spying law set to expire

The current law, due to expire on June 1, allows the NSA to collect bulk data on numbers called and the time and length of calls, but not their content.

Efforts by Congress to extend the law so far have proved fruitless, and Congressional aides said that little work on the issue was being done on Capitol Hill.

Read More Want to be invisible online? There's an app for that

There are deeply divergent views among the Republicans who control Congress. Some object to bulk data collection as violating individual freedoms, while others consider it a vital tool for preventing terrorist attacks against America.

Ned Price, a national security council spokesman, told Reuters the administration had decided to stop bulk collection of domestic telephone call metadata unless Congress explicitly re-authorizes it.

Some legal experts have suggested that even if Congress does not extend the law the administration might be able to convince the secretive Foreign Intelligence Surveillance Court to authorize collection under other legal authorities.

But Price made clear the administration now has no intention of doing so, and that the future of metadata collection after June 1 was up to Congress.

Read MoreiPhone encryption 'petrified' NSA: Greenwald

Price said the administration was encouraging Congress to enact legislation in the coming weeks that would allow the collection to continue.

But Price said: "If Section 215 (of the law which covers the collection) sunsets, we will not continue the bulk telephony metadata program."

Follow this link:
NSA spying law set to expire

WorldViews: Allies spy on allies all the time. Did Israel do something worse?

On some level, the reports that Israel spied on Iran-U.S. nuclear talks don't come as a shock. Just last year, German newsmagazine Der Spiegel reported that Israel had eavesdropped on Secretary of State John Kerry during Middle East peace talks. Jonathan Pollard,who was arrested in November 1985 after passing secret documents to Israel while working as a civilian analyst for the U.S. Navy,has become a cause celebreamong some Israelis.

In fact, as we learned after the2013 revelation that the NSA was tracking German Chancellor Angela Merkel's phone, allies spy on one another all the time. "I have a word of advice for American allies outraged by alleged NSA spying on their leaders," conservative analyst Max Boot wrote in the New York Postafter that scandal broke. "Grow up."

Germany was angered by the NSA revelations, but it was soonembarrassed by reports that it wasitself spying on anally in this case, Turkey and had eveninadvertently intercepted calls made by Kerry and Hillary Clinton. AsBernard Kouchner, a formerFrench foreign minister, put it, the problem wasn't so much that nations spied on their allies it was that the United States was better at it.Lets be honest, we eavesdrop, too," Kouchner told a French radio station. "But we dont have the same means as the United States, which makes us jealous.

As such,it is tempting to look at these new reports and come back with simple schadenfreude: It seems as if theUnited States is just getting a taste of its own medicine. But there is something distinctabout the new allegations.It's not just that Israel wasallegedly spying on the U.S. talks with Iran. According to reports, it was then using the information gleamed from it to undermine U.S. foreign policy.

According to Adam Entous of the Wall Street Journal, Israel's surveillance of closed-door talks between Washington and Tehran was used to gather information that was then passed on toU.S. lawmakers. This detail is apparently what is causing the most anger within the White House.It is one thing for the U.S. and Israel to spy on each other," one unnamed U.S. official told the Journal. "It is another thing for Israel to steal U.S. secrets and play them back to U.S. legislators to undermine U.S. diplomacy."

Israel has denied the reports, though few people buy it. "I'd be more surprised if Israel did NOT spy on the Iran nuclear negotiations,"Steven A. Cook, a senior fellow at theCouncil on Foreign Relations, tweeted on Tuesday. And given the state of relations between the White House and Israeli Prime Minister Benjamin Netanyahu, the idea that they passed on details to lawmakers seems distinctly plausible.

[Read: Obama says Netanyahu statements leave little room for serious peace talks]

Netanyahu, who was reelected as Israel's leader last week, caused a furor when heacceptedSpeaker John A. Boehners invitation to addressCongress this month. Although the Israeli prime minister denied reports that he would risk bipartisan U.S. support for Israel, many observers saw the speech as a direct appeal to President Obama's Republican rivals and an attempt to undermine a sittingU.S. president."The planned speech,"Chuck Freilich, a former deputy head of Israel's National Security Council, wrote, is "essentially an attempt to mobilize Congress against the administration."

Despite objections,Netanyahu went ahead with the speech. And then, to the surprise of many analysts, he was reelected last week. The Obama administration offered him a lukewarm note of congratulation at best, noting that Netanyahu's Likud Party had won a "plurality" of seats. Later, Obama said that the United States was reassessing its relationship with Israel after controversial comments made by the Israeli incumbent in the last few days before the election.

Theimpression given by all this is of a uniquelyduplicitous Israeli administration. And if the latest reports are true, they seem remarkable: It's hard to think of another instance when a nation spied on an ally and then shared information with the ally's domestic rivals. But then again, espionage is by its nature secret. And it's worth remembering that the only way these new reports came to light wasby an allyspying on its ally Entous reports thatofficials told him that "U.S. intelligence agencies spying on Israel intercepted communications among Israeli officials" featuring details that could have come only from confidential talks.

Read the original here:
WorldViews: Allies spy on allies all the time. Did Israel do something worse?

Q&A: IBM’s Adam Jollans talks Linux & Open Source strategy

CBR asks Adam Jollans, the firms director for Linux and open source strategy, for his views on several topics including security, and where IBM is heading with open source in 2015.

CBR: Why are emerging workload requirements - cloud, big data - suited to open source development culture?

Many of the new cloud, analytics, mobile and social (CAMS) workloads are being implemented on top of open source software. There appear to be three main reasons for this:

1) Open source communities are now hubs of innovation, where the cool kids hang out. This is fuelled by the collaborative nature of open source, enabling faster development iterations and the ability to 'stand on the shoulders of giants' when developing software. So as new workloads emerge, the technologies to support them are prototyped first on open source platforms.

2) Open source removes the barriers to entry for new start-ups and individual programmers. The software is easy to get hold of, and open source versions are available to download and test for free.

3) Born-on-the-web companies are built using open source software, for the reasons above, and the open source approach then becomes embedded in their culture. This then feeds back into the first reason, encouraging more innovation for the next wave of new workloads, and creating a virtuous circle of open source development.

CBR: Given the furore over Heartbleed, how will IBM address security concerns about open source?

Recent security concerns such as Heartbleed and ShellShock aren't about open source per se; rather, they are concerns about largely forgotten or under-resourced open source projects that are fundamental to the internet and other key components of enterprise IT.

To address these concerns, IBM and other key vendors have established the multi-million dollar Core Infrastructure Initiative (CII), hosted by the Linux Foundation. This aims to support and fund key open source elements of the global information infrastructure, such as OpenSSL, Network Time Protocol and OpenSSH. A key part of the CII's work is to identify all the key open source projects the Internet depends on to ensure they all have the resources they need to be secure.

Other, properly resourced open source projects are already regarded as highly secure; for example, Security Enhanced Linux (SELinux) providing mandatory access control (MAC) in the Linux kernel, and the EAL4+ security certifications obtained by Linux distributions such as Red Hat Enterprise Linux and SUSE Linux Enterprise Server.

Link:
Q&A: IBM's Adam Jollans talks Linux & Open Source strategy

Improving Quantum Cryptography with Twisted Light

Category: Science & Technology Posted: March 23, 2015 06:33AM Author: Guest_Jim_*

Securing communications is of great importance to many, so a system that is protected from intrusion by the laws of physics is highly desirable. Quantum cryptography is such a system and many are working on various ways to improve the methods of using it. Researchers at the University of Rochester have recently found that using twisted light can improve security even more.

So-called twisted light uses orbital angular momentum (OAM) to encode information, instead of polarization, a more common option. The researchers were able to show that by using OAM and angular position they could encode a seven dimensional, or letter alphabet with the photons. This alphabet is important for quantum key distribution (QKD), which is the start of quantum cryptography. To use QKD the users will encode the key with this alphabet onto the photons. Only if both the sender and receiver are measuring along the same dimension will they get the same key, and by comparing what was original sent and received, both parties can determine the key without publicly transmitting what it is. An eavesdropper would disrupt the transmission in a detectable way, thereby allowing the users to avoid interception.

Thus far the researchers have demonstrated their system working at 4 kHz with 93% accuracy, so the researchers still have some work to do before reaching the long term goal of a GHz rate. Besides the quantum cryptography applications, this new system also allows for each photon to carry 2.05 bits of information, but with more sophisticated equipment, the photons could hold 4.17 bits, and allow for an even more secure 25 letter alphabet.

Source: University of Rochester

Read more:
Improving Quantum Cryptography with Twisted Light

New Approach Uses ‘Twisted Light’ To Increase The Efficiency Of Quantum Cryptography Systems

Researchers demonstrate how to encode 2.05 bits per photon, doubling existing systems that use light polarization

Researchers at the University of Rochester and their collaborators have developed a way to transfer 2.05 bits per photon by using twisted light. This remarkable achievement is possible because the researchers used the orbital angular momentum of the photons to encode information, rather than the more commonly used polarization of light. The new approach doubles the 1 bit per photon that is possible with current systems that rely on light polarization and could help increase the efficiency of quantum cryptography systems.

Quantum cryptography promises more secure communications. The first step in such systems is quantum key distribution (QKD), to ensure that both the sender and receiver usually referred to as Alice and Bob are communicating in such a way that only they know what is being sent. They are the only ones who hold the key to the messages, and the systems are set up in such a way that the presence of any eavesdropper would be identified.

In the paper, published in New Journal of Physics today, Mohammad Mirhosseini and his colleagues describe a proof-of-principle experiment that shows that using OAM to encode information rather than polarization opens up the possibility of high-dimensional QKD. Mirhosseini, a Ph.D. student in Robert W. Boyds group at the University of Rochesters Institute of Optics, explains that they were able to encode a seven dimensional alphabet that is, seven letters or symbols using both the orbital angular momentum (OAM) of the photons and their angular position (ANG). These two properties of the photons form what physicists refer to as mutually unbiased bases, a requirement for QKD. Using mutually unbiased bases, the correct answer is revealed only if Alice encodes the information using a particular basis and Bob measures in that same basis.

In QKD, once they have generated a long, shared key, Alice and Bob publicly announce the basis (or alphabet) they have used for each symbol in the key. They then compare what alphabet was used for sending and which one for receiving. They only keep the part of the key in which they have used the same alphabet. The letters they keep produce a secure key, which they can use to encrypt messages and transmit these with regular encryption without the need for quantum cryptography.

If for any reason their communication is intercepted, because of a fundamental property of quantum mechanics, there will be discrepancies between Alice and Bobs keys. To check for this, Alice and Bob sacrifice a short part of their key. They share this publicly and identify any discrepancies. This lets them know whether their connection is secure and, if not, they will stop the communication.

The researchers showed that using their system they were able to generate and detect information at a rate of 4kHz and with 93% accuracy. A long term goal of the research is to realize secure communications at GHz transmission rates, which is desirable for telecommunication applications.

Our experiment shows that it is possible to use twisted light for QKD and that it doubles the capacity compared to using polarization, said Mirhosseini. Unlike with polarization, where it is impossible to encode more than one bit per photon, twisted light could make it possible to encode several bits, and every extra bit of information encoded in a photon means fewer photons to generate and measure.

In a previous experiment using a strong laser beam instead of single photons, Boyds team were able to measure up to 25 modes of OAM and ANG. This is equivalent to having 25 letters available in your alphabet rather than 7. This shows the potential for a system like the one described in the new paper to have the capacity to transmit and measure 4.17 bits per photon using more sophisticated equipment.

Mirhosseini acknowledges that the real-world challenges are not straightforward to overcome but when it comes to QKD, he is excited about the possibilities their system opens up.

Original post:
New Approach Uses ‘Twisted Light' To Increase The Efficiency Of Quantum Cryptography Systems