Cryptocurrencies: It’s Not Like Buying a Lottery Ticket – WealthManagement.com

Prices for units of cryptocurrencies have been soaring, prompting some folks to ask if we are nearing a cryptocurrency bubble? In a recent piece on Advisor Perspectives, economist and mathematician Michael Edesess says we probably wont see a true bubble and bust of valuations, as there are aspects of the asset that would prevent such a fate. Edesess, adjunct associate professor and visiting faculty at the Hong Kong University of Science and Technology and chief investment strategist of Compendium Finance, warns advisors that cryptocurrencies can be volatile, but it'snot like betting in a casino or buying a lottery ticket, he argues. In some ways, investing in cryptocurrencies is like investing in art or collectibles, or even gold. Its scarcity may propel increases in value, at least for those cryptocurrencies that continue to have value at all. But cryptocurrency has the advantage of being much more easily used as a medium of exchange than art, collectibles, or gold, he writes.

Boomers Falling Short Of Retirement Goals

According to data released by Legg Mason, Baby Boomers have less than half of the savings they think they will need for retirement. The generation has an average of $263,000 saved in defined contribution plans, while reporting they will need $658,000. Even older boomers, aged 65 to 74, only have an average of $300,000 saved. Thomas Hoop, the executive vice president and head of product and business development at Legg Mason, said advisors could maybe help close the gap by helping them save more and educating them how to invest DC assets properly. Hoop said older investors should consider a larger, diversified allocation to equities that includes emerging markets and European markets that have lower valuations and higher dividend yields. An overly conservative approach to D.C. investing can almost defeat the purpose of the plans benefits for investors who want to achieve their long-term goals.

SEI Steps into the Family Office Arena

SEI, a provider of back office operations for financial services firms, has acquired Archway Technology Partners, LLC, which sells technology and services to family offices. Archways specialized technologies and deep knowledge of the private wealth services industry give us a more powerful, differentiated solution to a $7 trillion global family-office market that has been underserved by legacy service providers, said Steve Meyer, executive vice president of SEI and head of its Investment Manager Services division. The acquisition positions SEI as a market leader in the single and multi-family office services arena.

Excerpt from:
Cryptocurrencies: It's Not Like Buying a Lottery Ticket - WealthManagement.com

WikiLeaks: CNN extorted apology from creator of Trump wrestling gif – News965

A bold claim of blackmail and extortion by CNN lit up social media Wednesday.

The Reddit user, HanA**holeSolo, who created the image of President Donald Trump wrestling CNN has apologized for his actions, but a handful of conservative media outlets are accusing the network of blackmailing the user.

A web article, posted on CNNs website, details the efforts used to track down the Reddit user and dig into his posting history. In a thorough Reddit post, the user apologized for creating the image and for previously posting racist, bigoted, and anti-semitic content. The article explains the contents of his apology.

CNN is not publishing "HanA**holeSolo's" name because he is a private citizen who has issued an extensive statement of apology, showed his remorse by saying he has taken down all his offending posts, and because he said he is not going to repeat this ugly behavior on social media again. The article reads, In addition, he said his statement could serve as an example to others not to do the same.

WikiLeaks, Eric Trump, conservative outlets and other Twitter users are taking issue with the next line in the article that reads CNN reserves the right to publish his identity should any of that change.

Some called it extortion, unethical and possibly illegal.

As of the time this article was posted, CNN has not identified the Reddit user in question.

Continued here:
WikiLeaks: CNN extorted apology from creator of Trump wrestling gif - News965

FDP Legislative Committeeman: I Would ‘Pull the Trigger’ on Julian Assange and Edward Snowden – Sunshine State News

A once little-known Democratic operative and member of the Miami Democratic Executive Committee has found himself in hot water after threatening on Twitter to kill WikiLeaks founder Julian Assange and whistleblower Edward Snowden.

Evan Ross is a budding young Democratic lobbyist heavily involved in the South Florida Democratic scene. Ross works as a lobbyist, served as president of the Miami-Dade Young Democrats and was the Miami Democratic Partys district chairman from 2011-2012. Ross star has continued to climb. At one point he was even named Young Democrat of the Year. FDP chair Stephen Bittel hand-picked Ross to serve on the partys legislative committee, working hand-in-hand with state lawmakers to push the partys agenda through the halls of the Florida Capitol. Ross has kept a relatively low profile -- until now. It all started when hetook to Twitter Friday evening in a rant centered around WikiLeaks founder Julian Assange and whistleblower Edward Snowden. "He exposed classified American secrets that endangered lives. Ross wrote at the time. "He and his buddy Edward Snowden both deserve to meet their maker. I'd be happy to pull the trigger on both of those too." It didnt take long for Assange to catch wind of the threats and the Australian computer programmer quickly tweeted out a response, screenshotting the tweets and trashing Ross as a #tolerantliberal. Assanges Twitter account has nearly 250,000 followers, some of whom went after Ross for making the comments. Twitter users flooded Ross mentions, criticizing him for making the comments. Some users even sent him death threats. Yet, in spite of the backlash, Ross refused to back down from the statements, saying he had no regrets about expressing his thoughts. "I believe strongly in the right to free speech, but I won't be bullied into trading my patriotism for political correctness by Julian Assange or his army of Twitter trolls," Ross wrote in an email to the Miami New Times.

Ross later locked his Twitter account and accused Assange of leading a bullying campaign against him, which some users were quick to criticize.

You cant threaten someones life and then pull the theyre bullying me excuse, wrote one user. According to various sources, not everyone in the Democratic Party is happy about Ross comments. Two sources within the Miami Democratic Party told the New Times they would be filing a complaint in the party over the issue, which has only seemed to intensify as the days go on. Assange and Snowden have made headlines in recent years for blowing the lid off of national security secrets. Snowden made headlines in 2013 after leaking and exposing the National Security Agencys plans to spy on average Americans, which ultimately led to criminal charges of theft of government property, and two counts of violating the Espionage Act. Snowden later fled the country and sought asylum in Russia. Assange heads up WikiLeaks, which routinely publishes secret information and news leaks. In 2016, WikiLeaks made national headlines after releasing thousands of emails from the Democratic National Committee which suggested DNC chair Debbie Wasserman Schultz, longtime South Florida congresswoman,and other top Democratic officials unfairly favored Hillary Clinton over U.S. Sen. Bernie Sanders during the Democratic primary. Sunshine State News attempted to contact the Florida Democratic Party for a statement but had not received a response at the time of this articles release.

Reach reporter Allison Nielsen by email atallison@sunshinestatenews.comor follow her on Twitter:@AllisonNielsen.

Read more:
FDP Legislative Committeeman: I Would 'Pull the Trigger' on Julian Assange and Edward Snowden - Sunshine State News

Tribune Editorial: Lawsuit should get to the truth about NSA spying in Utah – Salt Lake Tribune

Drake continued, "The new mantra to intercepting intelligence was 'just get it' regardless of the law."

Shameful.

It is becoming clear that such a lack of candor from our government officials has become a feature of our post-9/11 surveillance state, and not a bug. Perhaps the infringements of our freedoms necessitate an end to the entire post-9/11 project. But with the billion dollar Utah Data Center sitting right-smack in Salt Lake County, it's doubtful we could successfully kill the beast that is the surveillance industry.

Perhaps we, too, like Jonathan Swift, need "A Modest Proposal." It would be a shame to let the texts, emails, phone records and Google searches of Utah's most popular citizens go to waste. We paid for these records, let's make them public.

Just think, no one would need private investigators to catch husbands texting old girlfriends. You could easily recover your mom's old meatloaf recipe she emailed years ago.

And all those public officials who, when under investigation, manage to lose thousands of emails, as one-time IRS official Lois Lerner did. And former Utah Attorney General John Swallow, who just happened to leave his tablets on airplanes. Call up the NSA. Problem solved!

Think of the money newspapers and community watchdogs would save in GRAMA / FOIA requests. And how would life be different if police, prosecutors, legislators and other government officials knew their communications would be discoverable?

Deception begets deception, poison begets poison. The Fourth Amendment means what it says, and the government should not have power to spy on Americans without a warrant. In this current case, U.S. Department of Justice officials have until March to disclose relevant documents. Let's hope they can do so honestly.

Continue reading here:
Tribune Editorial: Lawsuit should get to the truth about NSA spying in Utah - Salt Lake Tribune

Malcolm Turnbull faces Silicon Valley fight on encryption – The Australian Financial Review

Turnbull has been at pains to emphasise the government does not want a "so called" backdoor to access devices and messages. But that is not how the technologists frame this debate.

If Malcolm Turnbull presses forward on threats to force technology companies to better cooperate on countering terrorism by unlocking secret encrypted messages and data belonging to suspected violent plottersthe Prime Minister can expect a heated tussle with America's powerful Silicon Valley.

Turnbull intends to nudge world leaders at the Group of 20 in Germany this week to pressurepredominantly US-based tech giants toshare more readily with authorities the secret digital behaviour of criminal suspects using smartphones and messaging apps.

The world's most valuable companies such as Apple and Facebook are in the crosshairs of like-minded political leaders from Australia, Germany and the United Kingdom.

Criminals are using encrypted devices such as the iPhone and messaging apps likeWhatsApp,Wickr, Telegram Messenger, Signal,SilentCircle,ChatSecureand even the Sony Play Station 4 to covertly plot their crimes.

Even though Donald Trump has presented himself as a tough law and order leader and has often been at loggerheads with progressive Silicon Valley, it appears unlikely that the US President will readily embrace Turnbull's offensive against American tech firms.

Zachary Goldman, co-founder of the Center for Cyber Security at New York University, says: "These are American companies, so in terms of economic competitiveness you are potentially putting at risk the darlings of the American economy."

"The European and Australian governments may not have the same concerns."

Encryption is effectively mathematical algorithms designed to stop hackers accessing information on phones and messaging app communications.

More than 1 billion transactions globally a day are encrypted, including online banking and internet shopping.

Silicon Valley is paying close attention to Australia's posturing.

While Australia is more than a year behind the US in the so-calledprivacy versus securitydebate between tech firms and national security personnel,the battle lines are already well defined.

Apple chief executive Tim Cook wrote an open letter to customers last year after the world's most valuable company refused to build a system to help the FBI unlock the iPhone of a San Bernardino terrorism culprit who jointly killed 14 people.

The FBI wanted to see who else the husband and wife killers had been communicating with and their recent places of movement, to help identity possible accomplices and stop any future attack.

Cook stood firm, arguing that Apple had a duty to protect personal information from conversations, photos, calendars, contacts, financial information and health data.

"The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers including tens of millions of American citizens from sophisticated hackers and cybercriminals," he wrote."The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe."

Trump, then the Republican presidential frontrunner, said at the time that Apple should comply with the California judge's order to help the FBI break into the phone.

"But to think that Apple won't allow us to get into her cell phone.

"Who do they think they are?"

Since the heat of the election, President Trump and US lawmakers have sat pat, in effect siding with technologists, privacy advocates and libertarians suspicious of government intrusion.

These groups have argued that weakening encryption will make people and businesses more vulnerable to cyber hacking criminals.

Turnbull, a former internet entrepreneur, has been at pains to emphasise the government does not want a"backdoor" to access devices and messages.

But that is not how the technologists frame this debate and they view the Prime Minister's argument as semantics.

The tech sector argues that any weakening of encryption is in effect a backdoor for the good guys and the bad guys.

Once a decoding keyis built or a vulnerability is exposed, hackers will do their best to hunt down the decryption method.

AmieStepanovich, US policy manager at Access Now, which is funded by tech firms such as including Facebook, Google, Microsoft, Yahooand human rights groups, says Australia is in a difficult position but risks weakening digital security for individuals and business.

"Weakening encryption won't work because the criminals will beincentivisedto get access to the tools," she says.

"Across the board it will lower the security of the rest of the world."

The government sees it differently.

As the Prime Minister hinted at in interviews with Fairfax Media and the ABC this week, the government believes the tech companies are already aware of flaws and weaknesses in their systems.

With this knowledge, one policy under consideration is to legally compel the companies to give their best effort to access the correspondence and data, without threatening the intellectual property of the tech firms.

The government believes this is more akin to exploiting a vulnerability, not creating a backdoor.

The government may also argue that digital companies already spend billions of dollars protecting their most precious and sensitive IP such as source code, sothe firms could alsodo the same for any information about how to get around their encrypted systems.

Chris Swecker, a retired head of the FBI criminal investigative division, says tech advocates have created an "artificial distinction" between lawful intercept of old tech like cell phone calls and pager messages, compared to new encrypted communications.

"Technology moved way ahead of the legal structure," he says.

"We can't put ourselves in a position where the only guys we catch are the dumb criminals who don't use cutting edge modern technology."

"I believe this technology communications material should be available via a valid court order."

In echoes of that, Turnbull saidthis week that the rule of law must extend to cyber with the appropriate legal authority, such as a court order or warrant.

"We cannot allow these systems to be used as they are at the moment to enable terrorists and other criminals to basically conceal themselves to operate in the dark, a dark that we cannot illuminate and the law must be able to reach into those dark crevices and so that our agencies are able to keep us secure."

Still, any such move by Turnbull would also undermine the commercial interests of tech firms.

Since the 2013 revelations from rogue National Security Agency contractor Edward Snowdenabout the extent of US government spying, sometimes assisted by US telco and technology companies, Silicon Valley has become more circumspect about being seen tocooperate with law enforcement.

Turnbull knows from his time as communications minister that US tech firms like IBM and Cisco Systems suffered commercially in China because the Snowden affair raised perceptions that American hardware vendors were leaving backdoors open for NSA spooks.

If customers believe Silicon Valley is in cahoots with US spies, sales are likely to suffer, especially in large consumer markets such as China and Russia that are suspicious of the US government.

Furthermore, a related argument by technologists is that is that if Western governments like Australia force tech firms to decrypt private data and messages, less trusted foreign regimes such as in China and Russia will do the same against citizens from overseas.

The government has considered this problem too, but is also aware that presently nothing stopssuch regimes already doing this.

Indeed, Russia has tried to compel digital companies to share their source code, while China is forcing tech firms to retain locally their source code and intellectual property.

Encryption was discussed by Attorney General GeorgeBrandisand "Five Eyes"intelligence counterparts from Canada, New Zealand, the United Kingdom and US last week.

NYU's Goldman says there is no costless solution for governments and societies.

"The question is what costs are you willing to bear to accept risk?"

Critics of government-mandated decryption suggest other compromise options such as better training law enforcement to tap into digital data and for government agencies to improve their hacking techniques.

In the San Bernardino Apple iPhone case, the FBIultimately paid a third-party firm to successfully break the device's pass code.

Go here to read the rest:
Malcolm Turnbull faces Silicon Valley fight on encryption - The Australian Financial Review

Shielding data from the "five eyes": we need to stand up for encryption – Open Democracy

Street art by Banksy near Hyde Park, London. Credit: David Maddison/Flickr. Some rights reserved.The Five Eyes is a surveillance partnership of intelligence agencies consisting of Australia, Canada, New Zealand, the United Kingdom, and the United States. According to a joint communique issued after the meeting, officials discussed encryption and access to data. The communique states that encryption can severely undermine public safety efforts by impeding lawful access to the content of communications during investigations into serious crimes, including terrorism.

In the letter organized by Access Now, CIPPIC, and researchers from Citizen Lab, 83 groups and security experts wrote, we call on you to respect the right to use and develop strong encryption. Signatories also urged the members of the ministerial meeting to commit to allowing public participation in any future discussions.

Read the full letter here.

Security experts and cryptographers are as united in their views on encryption as scientists are on climate change.

Massive surveillance operations conducted by the Five Eyes partnership inherently put the human rights of people around the world at risk. The joint communique commits to human rights and the rule of law, but provides no detail as to how these powerful, secretive spy agencies plan to live up to those commitments. We call for public participation and meaningful accountability now; otherwise, those commitments are empty. Amie Stepanovich, U.S. Policy Manager at Access Now

Our political leaders are putting people around the world at greater risk of crime when they call for greater powers to weaken our digital security. Security experts and cryptographers are as united in their views on encryption as scientists are on climate change. Politicians need to listen to them before they make decisions that could put us all at risk. Jim Killock, ORG

Attempting to undermine the free use and development of strong encryption technology is not only technologically misguided, it is politically irresponsible. Both law enforcement and intelligence agencies have access to more dataand more powerful analytical toolsthan ever before in human history. Measures that undermine the efficacy or public availability of encryption will never be proportionate when weighed against their profound threat to global human rights: encryption is essential to the preservation of freedom of opinion, expression, dissent, and democratic engagement. Without it, meaningful privacy, trust, and safety in the digital sphere would not be possible. Lex Gill, Research Fellow, Citizen Lab, Munk School of Global Affairs

Encryption protects billions of ordinary people worldwide from criminals and authoritarian regimes. Agencies charged with protecting national security shouldnt be trying to undermine a cornerstone of security in the digital age. Cynthia Wong, Senior Internet Researcher, Human Rights Watch

Encryption is used by governments, businesses, and citizens alike to secure communications, safeguard personal information, and conduct business online. Deliberately weakening encryption threatens the integrity of governance, the safety of online commerce, and the interpersonal relationships that compose our daily lives. We must not sacrifice our core values to the threat of terrorism: the solution to such threats must entail better protecting our basic rights and the technologies that advance them. Christopher Parsons, Research Associate and Managing Director of the Telecom Transparency Project at the Citizen Lab, Munk School of Global Affairs

Encryption is a necessary and critical tool enabling individual privacy, a free media, online commerce and the operations of organisations of all types.

Calls to undermine encryption in the name of national security are fundamentally misguided and dangerous. Encryption is a necessary and critical tool enabling individual privacy, a free media, online commerce and the operations of organisations of all types, including of course government agencies. Undermining encryption therefore represents a serious threat to national security in its own right, as well as threatening basic human rights and the enormous economic and social benefits that the digital revolution has brought for people across the globe. Jon Lawrence, EFA

Assurances of strong encryption not only benefit civil liberties and privacy, but the economy as well. A vibrant and dynamic internet economy is only possible if consumers and users trust the environment in which theyre conducting business. While law enforcement and intelligence services have legitimate concerns over their ability to access data, those concerns need to be balanced with the benefits encryption provides to average users transacting in cyberspace. A strong Internet economy, buttressed by the trust that encryption produces, is vital to national interests around the globe. National policies should support and defend, not weaken and abridge, access to encryption. Ryan Hagemann, Niskanen Center

The strength of the tools and techniques that our government and members of the public have and use to secure our nation and protect our privacy is of significant public interest. Transparency and accountability around a nations policy regarding the use of encryption is a bedrock importance in a democracy, particularly given the potential of backdoors to put billions of online users at greater risk for intrusion, compromise of personal data, and breaches of massive consumer or electoral databases. The democracies in the Five Eyes should be open and accountable to their publics about not only the existence of these discussions but their content, removing any gap between what is being proposed and the consent of those governed by those policies. Alex Howard, Sunlight Foundation

Encryption is a vital tool for journalists, activists, and everyone whose lives and work depend on using the internet securely. It allows reporters to protect their confidential sources from reprisal, and to fearlessly pursue stories that powerful actors dont want told. It offers protection from mortal danger for dissidents trying the communicate under repressive regimes. Undermining the integrity of encryption puts lives at risk, and runs directly counter to the mandate of the Five Eyes Signals Intelligence agencies to keep their citizens safe. Tom Henheffer, Executive Director, Canadian Journalists for Free Expression

The answer to concerns on going dark is to help bring our law enforcement and counterterrorism officials into the future, not send encryption to the past. We hope to hear back from the Five Eyes that they were looking for how to adapt to digital security measures, not break them to the detriment of everyday Americans and our national security. As Five Eyes leaders work on a strategy to protect against cyberattacks, it is important to have a transparent process and cooperation between governments and civil society without stifling innovation or weakening other parts of security. Austin Carson, Executive Director, TechFreedom

Strong encryption is essential for modern society. Broken technologies undermine commerce, security, and human rights. Jeramie Scott, EPIC

Any attempt by the U.K. government to attack encrypted messengers would be nothing less than an attack on the right to a private conversation.

Any attempt by the U.K. government to attack encrypted messengers would be nothing less than an attack on the right to a private conversation. Far from making the internet safer, by undermining the technology that protects everything from our bank accounts to our private conversations, governments around the world are putting us all at risk. Transparency is vital around any coordinated plans that could jeopardize both our security and our rights. Silkie Carlo, Policy Officer, Liberty

We increasingly rely on a secure internet for work, personal relationships, commerce, and politics. While we support justifiable lawful intercept with appropriate oversight, we dont think we should be seriously weakening the security of the internet to achieve it. Attempts to weaken encryption will do more damage to our society and our freedom than the possible threats its meant to be protecting us from. Thomas Beagle, Chairperson, NZ Council for Civil Liberties

All sensitive personal data must be encrypted as a matter of human rights to privacy, especially health data, i.e., all information about our minds and bodies, wherever it exists. Today health data is the most valuable personal data of all, the most attractive to hackers, and the most sold and traded by the massive, hidden global health data broker industry. Dr. Deborah Peel, Patient Privacy Rights

We lock our devices for good reason. Introducing backdoors weakens security and violates our right to privacy. The very existence of backdoors means unwelcome guests will come knocking. Linda Sherry, Director of National Priorities, Consumer Action

Originally posted here:
Shielding data from the "five eyes": we need to stand up for encryption - Open Democracy

Weakening encryption is an attack on our freedom – Red Flag

In the wake of the recent terrorist attacks in London, there is a renewed attempt by global governments to increase surveillance of the internet.

Taking aim at encryption, Malcolm Turnbull stated that, despite it being a vital piece of security for every user of the Internet encrypted messaging applications are also used by criminals and terrorists at the moment much of this traffic is difficult for our security agencies to decrypt, and indeed for our Five Eyes partners as well.

In June, attorney-general George Darth Brandis, along with his Five Eyes counterparts from the UK, US, Canada and NZ, met in Ottawa to discuss ways to weaken encryption and pressure the tech industry to build back doors through which they can spy on global communications.

In response, a joint statement by 83 organisations and individuals from these five countries opposed these plans. The executive officer of Electronic Frontiers Australia, Jon Lawrence, said, Calls to undermine encryption in the name of national security are fundamentally misguided and dangerous. Jim Killock, executive director at the UKs Open Rights Group, said, Security experts and cryptographers are as united in their views on encryption as scientists are on climate change.

At the time of writing, we dont know what decisions were made at the Five Eyes ministerial meeting, but new attempts to circumvent encryption reflect the ways that state surveillance has changed since revelations from US whistleblower Edward Snowden.

In 2013, Snowden shocked the world when he revealed that the US and its allies had created the largest and most complex system of state surveillance that has ever existed. One of the US National Security Agencys most invasive programs was XKeyscore, a searchable database with millions of peoples emails, web browsing histories and more. This also allowed for real-time monitoring of almost any individual around the world while they used the internet.

Just four years later, the state of computer security has changed immensely, making this surveillance more difficult. According to a report published in February by the Electronic Frontiers Federation, more than half of all internet traffic is now encrypted. The expansion of Virtual Private Network services and use of the Onion Router (TOR) has made it easier for everyone to remain anonymous online. However, the development that is of most concern to the likes of the NSA is the widespread use of encrypted mobile devices and messaging applications such as Signal and WhatsApp.

These applications use a method called end-to-end encryption in which messages are encrypted, and the tools to decrypt those messages exist only on the device of the sender and receiver. Therefore, a company like WhatsApp cannot read the messages sent through its servers. As a WhatsApp spokesperson said in 2016 as part of an ongoing court case brought by the Brazilian government, We cannot share information we dont have access to.

Years before James Comey began presenting himself as the supposed good guy of the US establishment, the then FBI director railed against the use of domestic encryption tools. In 2015 he stated, If the challenges of real-time interception threaten to leave us in the dark, encryption threatens to lead all of us to a very dark place.

He pressured companies such as Apple to build back doors to bypass encryption. While the intelligence agencies recognise that they cannot currently break modern encryption algorithms, they have focused their resources on trying to get around them by hacking directly into mobile devices.

This strategy was demonstrated in March when whistleblower website WikiLeaks released Vault 7, the largest ever publication of confidential documents leaked from the CIA. Additional leaks this year by hacking group Shadow Brokers have further revealed the extent of the intelligence agencies hacking capabilities. These documents show that the US has been developing, purchasing and stockpiling security vulnerabilities in Apple and Android mobile devices. Exploiting these vulnerabilities has allowed them to read WhatsApp or Signal messages as they are being typed or read.

One of the most damning leaks in Vault 7 revealed that the CIA had discovered how to turn Samsung Smart TVs into covert listening devices, even when they are turned off.

The recent WannaCry and Petya ransomware attacks, which caused immense damage across the world, both used security holes codenamed EternalBlue that had been stockpiled by the CIA and deliberately left open. While the CIA did not intend these vulnerabilities to be used in this way, it is the inevitable result of keeping software insecure and creating back doors.

With leaks from the CIA and the NSA exposed, these security flaws are now being fixed, making it more difficult for the agencies to continue their spying activities. This explains the increased push from Five Eyes countries to force tech companies to install back doors so they can bypass encryption.

However, the argument that states should have the right to bypass encryption to stop terrorism simply doesnt hold up. It would be ludicrous to suggest that turning Smart TVs into listening devices is about stopping ISIS. It has always been about developing tools for mass surveillance, and now increasingly for espionage and cyberwar. This has been seen before. For example, the worm Stuxnet was written by the US and Israel and used to target Iranian nuclear facilities.

It is not a question of whether governments will one day use these hacking techniques for domestic surveillance they already do. On 30 June, it was revealed that Centrelink has been paying Israeli hacking company Cellebrite to break into mobile phones. The methods used are the same ones Cellebrite developed in 2015, when it helped the FBI break into an iPhone as part of the San Bernardino terrorism case.

It is now known that government departments such as the Australian Tax Office and the Department of Employment have paid around $500,000 to Cellebrite for equipment and training to hack into phones.

In the debate about metadata storage, George Brandis was adamant that the government wasnt after the content of Australians communications, just who we are talking to. These new revelations and the entire debate about encryption show that the content is exactly what they are after. No matter the justification, we should resist any attempt to weaken encryption and our right to privacy.

See the original post here:
Weakening encryption is an attack on our freedom - Red Flag

Virtru Brings End-To-End Encryption To G Suite – Android Headlines

Google has partnered up with Virtru Corporation to bring customizable end-to-end email and messaging encryption, on both server side and client side, to all G Suite users. End users and administrators can choose to encrypt any incoming or outgoing message in order to help protect sensitive data. Administrators can set rules to encrypt any message that meets certain criteria, and can take advantage of advanced access controls that can grant or revoke access to a given message at any time, even after its been delivered. The goal of Virtru is not just to add an extra level of security, but to help especially sensitive data circulated in regulated industries like the medical and law fields to stay as secure as possible, making it easier than ever to keep communications compliant with applicable law.

Administrators on Virtru-enabled servers can not only encrypt or decrypt things that come and go at will, but can control the entire process from origination to endpoint, and even after. Starting at the source, administrators can set custom rules to encrypt messages based on a wide variety of criteria, such as sender and recipient, keywords in the contents, and presence or type of attachments, among other things. Virtru allows total end-to-end encryption of all messages across platforms, and for any messages that dont fall under administrator-set rules, users can encrypt them with nothing more than the push of a button in their mobile email client or browser. Decryption keys can be stored onsite, or in Virtrus cloud, or even both, ensuring maximum security for the keys and making recovery a breeze. As icing on the cake, admins will have a personal dashboard, where they can keep track of all communications within their organization, including those with participants on the outside, and can get customizable notifications of anything happening on the network.

Virtru will integrate tightly with G Suite when it rolls out. For now, only communications such as emails will be encrypted, but support for other file and transmission types could come later. Google has not revealed how much Virtru will cost when it hits G Suite, or how users can go about getting it. Instead, Virtru will be hosting a webinar on July 11, at 10 AM Pacific time. The webinar will go over the basics of getting, implementing, and maintaining a Virtru installation over a given instance of G Suite.

See the original post:
Virtru Brings End-To-End Encryption To G Suite - Android Headlines

Encrypting police transmissions is a blow to transparency and openness in government – LancasterOnline

By Thanksgiving, the public will no longer be able to listen in on police dispatches in Lancaster County, as LNP reported last week. The Lancaster County commissioners on Tuesday directed Lancaster County-Wide Communications to encrypt police transmissions, blocking the public and media from hearing whats going on in the county. West Hempfield Township police Chief Mark Pugliese, who heads the county police chiefs association, says the change will protect police from ambushes and secure personal information about crime victims and witnesses.

Police officers have a dangerous, difficult job more difficult and dangerous than most of us can probably imagine.

And we wouldnt support any measure that would make life more perilous for a police officer.

But some sort of balance between protecting officers and ensuring the publics right to information must be struck.

We understand the other side of the argument.

We live in a changed and changing world, Commissioner Dennis Stuckey told LNP. Gone are the days when you can talk to a 15- or 20-year veteran who says hes only had to pull his gun out twice.

Pugliese also said there have been several incidents in the county where the public or the media interfered with investigations, in some cases by getting to crime scenes more quickly than police.

As Commissioner Josh Parsons, who supports encryption, said, The fake 911 ambush scenario could happen no matter what we do today. However, he said, encryption does provide some percentage of safety.

Pugliese was off-base when he scolded the media for being in such a rush to get the news out. Thats the medias job, especially when it comes to a public safety issue.

The fact of the matter is and this is not a criticism law enforcement relies on the media when its convenient.

When police are hunting a fugitive, they ask the media to post a photo of the suspect. When prosecutors announce a major conviction, they call a news conference.

When a house exploded outside Millersville on Sunday, people who heard and felt the blast were desperate for information about what had happened. Emergency responders were busy doing what they do best, and supervisors at Lancaster County-Wide Communications had no information. The only way LNP could inform the public about the situation in the moments after the explosion was by monitoring the police scanner.

Come November, when the media wants to hear what police are doing in the community silence.

So, the message seems to be that the media and public are to be kept out of the loop until further notice. We will be informed strictly on a need-to-know basis.

Theres no evidence that radio transmissions have made policing more dangerous or more difficult.

Melissa Melewsky, media law counsel for the Pennsylvania NewsMedia Association, told LNP that media organizations have used emergency radio transmissions for decades without incident to keep the public informed about emergency situations in the community.

As Knapp reported, Commissioner Craig Lehman said hes also concerned about police safety but said officers may become further isolated from their communities if they decrease transparency.

Lehman is correct. Encryption will limit transparency and serve as an obstacle to the media. And, as he pointed out, less transparency breeds mistrust and suspicion. Thats the last thing anyone including police needs.

Lehman suggested a compromise: Encrypt public transmissions, but give news outlets access.

The commissioners and the county police chiefs should give this serious consideration, though we dont believe the public should be shut out either.

From the medias standpoint, radio silence will only make a reporters job more difficult and very well could, in turn, limit the publics access to information.

In an emergency situation, and you can imagine any number of them natural disaster, active shooter, fire the media needs to work with law enforcement to keep the public informed. In such situations, media outlets monitor radio transmissions for information and logistics. Encrypting such transmissions would not be in the best interest of the public.

And Lehman said blocking transmissions might actually make police less safe if public trust is lost.

The decision to encrypt was administrative and did not require a vote.

We urge the commissioners to reconsider this order and, at the very least, seek a compromise.

This is not about getting to the crime scene first.

Were big fans of transparency here because when it begins to erode, were all in trouble.

The rest is here:
Encrypting police transmissions is a blow to transparency and openness in government - LancasterOnline

Ground-Based Signals Measured From Space Could Enable Quantum Encryption Network – Photonics.com

Photonics.com Jul 2017 ERLANGEN, Germany, July 5, 2017 Quantum-limited coherent measurements of optical signals were sent from a satellite in Earths orbit to an optical ground station over a distance of 38,600 kilometers (almost 24,000 miles). Excess noise was bound. The precise Earth-based measurement of optical signals from a satellite demonstrates the potential for a satellite-based quantum encryption network using equipment that is already in space.

Although methods for quantum encryption have been in development for more than a decade, the technology has been unable to work over long distances because residual light losses in the optical fibers used for telecommunications networks on the ground degrade the quantum signals. According to researchers, encryption techniques such as quantum key distribution will be of increasing importance as current encryption codes based on mathematical algorithms become easier to crack.

A team from the Max Planck Institute for the Science of Light worked with satellite telecommunications company Tesat-Spacecom GmbH and the German Space Administration to conduct the experiments.

From our measurements, we could deduce that the light traveling down to Earth is very well suited to be operated as a quantum key distribution network, Max Planck researcher Christoph Marquardt said. We were surprised because the system was not built for this.

A satellite-based quantum encryption network would provide an extremely secure way to encrypt data sent over long distances.

We were quite surprised by how well the quantum states survived traveling through the atmospheric turbulence to a ground station, said Marquardt. The paper demonstrates that technology on satellites, already space-proof against severe environmental tests, can be used to achieve quantum-limited measurements, thus making a satellite quantum communication network possible. This greatly cuts down on development time, meaning it could be possible to have such a system as soon as five years from now.

Developing such a system in just five years is an extremely fast timeline since most satellites require around ten years of development.

The researchers are now working with Tesat-Spacecom and others in the space industry to design an upgraded system based on the hardware already used in space. This will require upgrading the laser communication design, incorporating a quantum-based random number generator to create the random keys, and integrating post processing of the keys.

The results of initial experiments indicate that quantum communication using satellites in space is feasible and could open the possibility of a global quantum key distribution network for secure communication.

There is serious interest from the space industry and other organizations to implement our scientific findings, said Marquardt. We, as fundamental scientists, are now working with engineers to create the best system and ensure no detail is overlooked.

The research was published in Optica, a publication of OSA, The Optical Society of America (doi:10.1364/OPTICA.4.000611).

Read more here:
Ground-Based Signals Measured From Space Could Enable Quantum Encryption Network - Photonics.com