Wikileaks reveals CIA’s ‘Dumbo’ USB stick that mutes microphones … – The Sun


The Sun
Wikileaks reveals CIA's 'Dumbo' USB stick that mutes microphones ...
The Sun
US spies have designed software which switches off microphones and webcams in a room during a physical raid destroying evidence that they ever entered a ...
News in brief: Wikileaks' Dumbo flies; off-script chatbots; Google down-votes duff appsNaked Security
Wikileaks reveals CIA tools used to hijack webcams and microphonesThe INQUIRER
Dark Matter - WikiLeaks - Vault 7: ProjectsWikiLeaks - Vault 7: Projects

all 11 news articles »

Continued here:
Wikileaks reveals CIA's 'Dumbo' USB stick that mutes microphones ... - The Sun

Chelsea Manning Tried To Pick A Fight With Ben ShapiroThings Did Not Turn Out Well – Townhall

Recently released Chelsea Manning, who worked in Army intelligence, tried to pick a fight with the Daily Wires Ben Shapiro and it did not turn out well. In 2010, Manning leaked hundreds of thousands of classified documents about the Iraq and Afghanistan Wars, along with 250,000 cables from the State Department, to Wikileaks. That same year, Manning was sentenced to thirty-five years in prison for leaking classified material. President Barack Obama commuted the sentence after Manning served seven years (via WaPo):

Manning, 29, was an intelligence analyst for the Army at the time of her arrest in 2010. The trove of material she provided to anti-secrecy website WikiLeaks documents known as the Iraq and Afghanistan War Logs included video of a U.S. Apache helicopter opening fire on a group of suspected insurgents in Baghdad. Among the dead were two journalists who worked for the Reuters news agency.

She also leaked documents related to detainees at the military prison at Guantanamo Bay, Cuba, and about 250,000 State Department cables.

Manning tweeted imagine a world without prisons, to which Shapiro responded by saying weve all seen Mad Max. The deathblow was delivered shortly thereafter. Independent Journal Reviews Benny Johnson wrote about the exchange.

Ouch.

Editor's Note: Manning was mistakenly referred to as an Army officer. That wasn't the case. Apologies for the error, folks.

Go here to see the original:
Chelsea Manning Tried To Pick A Fight With Ben ShapiroThings Did Not Turn Out Well - Townhall

Chelsea Manning’s attorney blasts ACLU’s decision to defend Milo Yiannopoulos – Washington Examiner

An ACLU attorney who represented Chelsea Manning is blasting the organization's decision to defend conservative provocateur Milo Yiannopoulous in a lawsuit against Washington D.C.'s public transit agency.

The American Civil Liberties Union on Wednesday announced they were suing the Washington Metro Area Transit Authority over its refusal to display ads promoting Milo Yiannopoulos' book.

"I don't believe in protecting principle for the sake of protecting principle in all cases," Chase Strangio said in a statement.

Strangio argues Yiannopoulos' behavior may not necessarily fall under the legal definition of incitement but his actions do "exacerbate harm" to the black and transgender communities.

"The ACLU has a long history of representing despicable people in the service of protecting valuable First Amendment principles and in some cases I support decisions that have been made and in other cases I do not. Here I do not," Strangio said.

The ACLU's lawsuit argues parts of WMATA's ad policies violate the First Amendment by discriminating against particular ads and advertisers deemed controversial by WMATA officials.

Metro's policies first came into place in 2015 after a set of anti-Muslim advertisements sparked controversy. Current guidelines ban ads "intended to influence members of the public regarding an issue on which there are varying opinions," ads that "support or oppose an industry position or industry goal without any direct commercial benefit to the advertiser," and ads "intended to influence public policy," among others.

"This case highlights the consequences of the government's attempt to suppress all controversial speech on public transit property," Arthur Spitzer, legal director of the ACLU-DC and lead counsel in the case, said in a statement Wednesday. "The First Amendment protects the speech of everyone from discriminatory government censorship, whether you agree with the message or not."

"The ACLU could not more strongly disagree with the values that Milo Yiannopoulos espouses, but we can't allow the government to pick and choose which viewpoints are acceptable," said Lee Rowland, senior staff attorney with the ACLU.

The suit asked the court to declare portions of the WMATA advertising guidelines unconstitutional because they violate free speech rights and are unconstitutionally vague. A motion has also been filed on behalf of Milo Worldwide LLC, seeking immediate financial restitution for the ongoing loss of revenue from book sales caused by what they deem the wrongful removal of advertisements for his book.

See the article here:
Chelsea Manning's attorney blasts ACLU's decision to defend Milo Yiannopoulos - Washington Examiner

Traitor And Genetic Male Bradley Manning To Appear On Cover Of Vogue – The Daily Caller

First Bradley Manning betrayed his country. Then he betrayed his own gender. By all means, lets celebrate his achievements, and enable his delusions about himself and the world he lives in.

Amber Athey reports:

Vogue recently photographed Chelsea Bradley Manning, who has been released from prison after being convicted of espionage and theft

Manning has now been photographed by famed photographer Annie Leibovitz for Vogue, a womens fashion magazine. In the headline for a story about Manning, Vogue says, Manning changed the course of history. Now shes hes focusing on herself himself.

Bask in the glory of it:

To which I can only reply:

Dont let anybody shame you out of telling the truth about this man. Hes not a woman, hes not a patriot, and hes not sane. Pretending otherwise doesnt help anybody, least of all him.

And saying so isnt hate. Its reality. Trying to coerce people into telling a lie is wrong, even if you think youre sparing somebodys feelings.

Plus, that color is all wrong for him. Good lord, Leibovitz, youre supposed to be a professional.

Read more from the original source:
Traitor And Genetic Male Bradley Manning To Appear On Cover Of Vogue - The Daily Caller

Transgenderism Doesn’t Excuse Treason – National Review

If Bradley Manning had stayed Bradley Manning, would he still be in prison? If Bradley Manning had stayed Bradley Manning, would he be basking in celebrity, enjoying fawning photo shoots? Given the magnitude of his crimes, I dare say that hed be in prison today if he still identified as a man. Then hed be nothing but what he actually is, a garden-variety traitor a faithless soldier who should count himself fortunate not to face capital punishment.

Its worth remembering what he did. He disclosed, in a gigantic document dump, more than a million pages of classified information, including information about American military operations, American diplomacy, and American allies. The Obama administration was forced to rush to safety foreign friends whom Manning had outed as helping Americans. He broke faith with every relevant provision of the Armys warrior ethos he abandoned his mission, he actively aided the enemy, and he acted with stunning disregard for the lives of his comrades. He did so because, acting on his own authority, he decided he wanted to stimulate worldwide discussion, debate, and reforms.

To be clear, this wasnt whistleblowing. He didnt identify a specific wrong and expose it responsibly while taking care to minimize the harm of disclosure. He just disclosed documents without regard for their contents. He didnt know if anyone would die because of his actions. He didnt know to what extent vital missions or programs would be compromised. He just did what he wanted to do. There was no honor in his action. None.

And now look at him. Hes the subject of a fawning Vogue profile and photo shoot:

In fact, hes an LGBT celebrity now, swarmed at public events and even featured at New Yorks Pride March, where he waved from a drop-top Nissan alongside Gavin Grimm. When Trump issued a series of tweets declaring a ban on transgender soldiers in the military, media outlets flocked to cover Mannings response. But one wonders, do the transgender soldiers actually serving look at Chelsea Manning as a poster child for trans service?

But no matter. For many leftists, Manning offers the irresistible combination radical criminal acts combined with revolutionary identity. Its Radical Chic all over again, this time through the lens of latest civil-rights fashion, transgender rights

The radical quarters of the Left have a long history of excusing and celebrating even the most vile of criminals so long as they have the right revolutionary politics. Disturbingly, that celebration leaks even into organizations that are billed as meanstream. Recall, it was just last month the Womens March tweeted its appreciation for convicted cop-killer and FBI most-wanted terrorist Assata Shakur:

Earlier this summer, New Yorks Puerto Rican Day Parade sought to honor convicted terrorist Oscar Lopez Rivera as a National Freedom Hero. Under pressure, he decided to forgo that honor, but he was featured in a float anyway and parts of the crowd gave him a heros welcome.

These kinds of celebrations are not just morally abhorrent; theyre deeply polarizing. They represent the idea that the rule of law even when the subject is murder or treason is contingent upon the politics and racial or gender identity of the lawbreaker. Americans on opposing sides of the ideological divide are given a signal that when it comes to advancing the radical cause, not even human life or national security can stand in the way. There are no lines that cant be crossed.

This is what radical identity politics does. It twists and distorts normal moral analysis. It declares that the ends justify the means, and then goes even farther to say, By any means necessary. This is an unacceptable ethic not just for a constitutional republic but for any form of civil society. Allegedly mainstream media outlets, politicians, or organizations that honor or respect the likes of Manning, Rivera, or Shakur cover themselves in shame.

READ MORE: NR Editorial: The Injustice of Communting Mannings Sentence Chelsea Manning Is Not a Whistleblower Chelsea Manning and the Problem with Pronouns

David French is a senior writer for National Review, a senior fellow at the National Review Institute, and an attorney.

Go here to see the original:
Transgenderism Doesn't Excuse Treason - National Review

Avoid getting lost in encryption with these easy steps – We Live Security (blog)

Encryption can be the answer to many data security issues faced by small and medium businesses.Not onlycan it protect sensitive information from unauthorized use and minimize the risks arising from data breaches, implementing this technology can also represent another step towards compliance with legislation, especially with respect to the General data protection regulation (GDPR).

But in cybersecurity, there isno silver bullet meaning that no single product or service can handle all the potential threats out there. This applies to encryption also, as even this technology despite its many advantages still has limitations that you need to take into consideration. So before opting for a specific product, be sure you know the one that best fits your needs.

According to a recent study on data breaches carried out by the Ponemon Institute, human error is second only to malicious actors when it comes to the most commonly cited root cause of data leaks. However, these can be avoided by deploying a solution that is easy to use.

There will always be the need for some encryption to be carried out by the user, based on policy and training. If these actions require expert knowledge and the product are not user-friendly, employees might try to find the easy way out and companyrules could be broken. With a simple user-friendly solution, this can be avoided.

A recent IDC survey on ESETs behalf has also shown that ease of management and ability to recover a lost access key are among the most important criteria when a business is in the process of choosing an encryption solution.

To avoid cases where employees are unable to decrypt their data because they have forgotten their keys, search for solutions that use a system of shared encryption keys, managed by on-site system administrators.

This is similar to the use of actual keys, something we all understand before starting elementary school. On top of that, it also makes sharing encrypted data within a predefined group quick, easy and in many cases, transparent for the user.

The solution you choose should be scalable and flexible, so that you can easily add advanced features if necessary, enabling you to vary enforced policies and keys remotely helping you to keep a strong default configuration

Select a product that doesnt require reinstallation for upgrades or renewals. In addition, dont forget that if an encryption solution is available as a perpetual license, including annual maintenance and support, or as a subscription license, it can enable you to manage costsand improve your financial flexibility.

Select a solution that employs industry-standard encryption algorithms that you can trust, and a sophisticated key-sharing system for secure data exchange among all users.

Check if the encryption solution you are considering meets the rigorous FIPS-140-2 standard in the US and is validated by the National Institute of Standards and Technology (NIST). Also verify if it has been certified by key players on the market (i.e. OPSWAT) and has performed well in independent tests.

Set your data protection strategy carefully and choose the encryption solution that helps you fulfill it in a way that suits you best. To make the right decision, dont shy away from any questions you might have about usability and features of the product, even if they sound obvious to you. You might be surprised how many encryption solutions on the market dont cover the basics.

If you want to know which questions you should ask and what answers to seek, we will help you in our next blogpost, so stay tuned and read more on WeLiveSecurity.com.

Author Ondrej Kubovi, ESET

Continued here:
Avoid getting lost in encryption with these easy steps - We Live Security (blog)

China uses a quantum satellite to transmit potentially unhackable data – CNBC

China has demonstrated a world first by sending data over long distances using satellites which is potentially unhackable, laying the basis for next generation encryption based on so-called "quantum cryptography.

Last August, China launched a quantum satellite into space, a move which was called a "notable advance" by the Pentagon.

Using this satellite, Chinese researchers at the Quantum Experiments at Space Scale (QUESS) project, were able to transmit secret messages from space to Earth at a further distance than ever before.

The technology is called quantum key distribution (QKD). Typical encryption relies on traditional mathematics and while for now it is more or less adequate and safe from hacking, the development of quantum computing threatens that. Quantum computing refers to a new era of faster and more powerful computers, and the theory goes that they would be able to break current levels of encryption.

That's why China is looking to use quantum cryptography for encryption. QKD works by using photons the particles which transmit light to transfer data.

"QKD allows two distant users, who do not share a long secret key initially, to produce a common, random string of secret bits, called a secret key," the researchers explained in a paper published in the journal Nature on Wednesday.

"Using the one-time pad encryption this key is proven to be secure to encrypt (and decrypt) a message, which can then be transmitted over a standard communication channel."

State news agency Xinhua called the encryption "unbreakable" and that's mainly because of the way data is carried via the photon. A photon cannot be perfectly copied and any attempt to measure it will disturb it. This means that a person trying to intercept the data will leave a trace.

"Any eavesdropper on the quantum channel attempting to gain information of the key will inevitably introduce disturbance to the system, and can be detected by the communicating users," the researchers said.

The implications could be huge for cybersecurity, making businesses safer, but also making it more difficult for governments to hack into communication.

China successfully sent the data over a distance of 1,200 kilometers from space to Earth, which is up to 20 orders of magnitudes more efficient than that expected using an optical fiber of the same length, the researchers claimed. It's also further than the current limits of a few hundred kilometers.

"That, for instance, can meet the demand of making an absolute safe phone call or transmitting a large amount of bank data," Pan Jianwei, lead scientist of QUESS, told Xinhua.

The Chinese government has made the development of the space sector a key priority. For example, it has laid out plans to get to Mars by 2020 and become a major space power by 2030.

And China has global ambitions for its QKD. It sees its satellite system interacting with ground-based QKD networks to create a global secure network.

"We can thus envision a space-ground integrated quantum network, enabling quantum cryptography most likely the first commercial application of quantum information useful at a global scale," the researchers said.

Original post:
China uses a quantum satellite to transmit potentially unhackable data - CNBC

Fornetix Awarded Patent for Breakthroughs in Encryption Key Management – PR Newswire (press release)

"The issuance of this patent, the first of many to come, highlights the disruptive role Key Orchestration will play in the encryption key management market," said Steve Philson, Chief Operating Officer of Fornetix. "It's a great way to protect our Intellectual Property and identify how truly groundbreaking this solution can be for an organization's data security efforts."

The Key Orchestration ecosystem gives organizations a new level of control over their encryption by combining a powerful policy engine, scalability for hundreds of millions of keys, automation of the key lifecycle, and a commitment to interoperability, extensibility, and industry standards.

Instead of relying on outdated perimeter defenses that are ripe for data breaches, Key Orchestration has the critical combination of speed, capacity, and management tools that allow an enterprise to encrypt vastly more data than previously possible. When the entire network is encrypted, it leaves nothing of value for hackers to steal in the event of a breach.

"The award of this patent validates the hard work, innovation, and vision of the Fornetix Team," said Charles White, Chief Technology Officer of Fornetix and one of the creators of Key Orchestration. "As the first of many patents, this sets the stage for driving encryption key management to encompass everything from the data center to the individual. Ultimately, this patent helps validate the broader Orchestration ecosystem and its impact in delivering interoperability, agility, and resilience to our partners and our customers."

About Fornetix

Fornetix is helping organizations unleash the full potential of encryption by conquering the key management bottleneck. Our Key Orchestration ecosystem automates the key lifecycle across the entire enterprise with groundbreaking precision and speed. Policy-driven automation of the key rotation lifecycle reduces human error and empowers your organization to remain secure and avoid costly data breaches. As global use of encryption rapidly expands, you can be prepared for the future with unparalleled scalability. Please call 1-844-KEY-ORCH or visit http://www.fornetix.comfor more information.

View original content with multimedia:http://www.prnewswire.com/news-releases/fornetix-awarded-patent-for-breakthroughs-in-encryption-key-management-300502661.html

SOURCE Fornetix

Home

View original post here:
Fornetix Awarded Patent for Breakthroughs in Encryption Key Management - PR Newswire (press release)

Symantec Announces Plesk Will Integrate Symantec Encryption Everywhere Security Into Its Website Management … – Business Wire (press release)

MOUNTAIN VIEW, Calif.--(BUSINESS WIRE)--Symantec Corp. (NASDAQ:SYMC), one of the worlds leading cyber security companies, today announced that Plesk, a leading WebOps platform, will now incorporate Symantecs Encryption Everywhere security offerings into its website management platform and control panel, giving web professionals, small businesses, and cloud service providers one-click access to website encryption and customized security offerings. Symantec Encryption Everywhere is a website security solution that enables web hosting providers to seamlessly integrate security into every website. The newest version of Symantec Encryption Everywhere includes secure email and award-winning anti-virus and spyware removal from Norton.

Small businesses, web professionals and cloud service providers want better security for their websites, but are often intimidated by the complexities of online security and encryption, said Roxane Divol, executive vice president and general manager for Website Security at Symantec. Yet, browsers have begun flagging unencrypted websites as unsafe, causing businesses to lose brand trust, increase abandoned cart rates and find themselves open to hacking. Symantec and partners like Plesk are natively integrating basic encryption into websites and applications for easy compliance with browser security requirements, and options to expand beyond encryption as security needs grow.

Plesk will make it easy to manage and activate Symantec security packages within their website management platform and control panel. Plesk services over 11 million websites and 19 million mail boxes in 140 countries. Plesk enables all features deeply integrated and offering all available security offerings from Symantec at your fingertips. Hosting partners of Plesk will be able to resell these as well.

Encryption is no longer a nice-to-have for websites, but a must-have, said Nils Hueneke, CEO at Plesk. Our goal with all our WebOps solutions is to simplify the life of small businesses, web professionals and cloud service providers. By partnering with Symantec, we can offer the worlds most trusted security solutions to our customers seamlessly within our platform. In addition, the Symantec Encryption Everywhere program gives our partners a range of upsell opportunities that not only add value and brand differentiation, but also additional revenue streams.

For more information, visit https://www.symantec.com/theme/encryption-everywhere.

About Symantec Website Security

Symantec Website Security provides industry-leading security for websites, data, and applications with SSL/TLS, certificate management, vulnerability assessment, WAF/DDoS, malware scanning, etc. The Norton Secured Seal and Symantec Seal-in-Search assure customers they are safe to search, browse, interact, and buy. Symantec Website Securitys sophisticated solutions offer the promise of a safe and trusted internet experience across all websites and applications.

About Symantec

Symantec Corporation (NASDAQ: SYMC), a world leading cyber security company, helps organizations, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Likewise, a global communityofmore than 50 million people and familiesrely on Symantecs NortonandLifeLockproduct suitesto protect their digital lives at home and acrosstheirdevices. Symantec operates one of the worlds largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visitwww.symantec.comor connect with us on Facebook, Twitter, and LinkedIn.

Symantec, the Symantec Logo and the Checkmark logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.

Read more:
Symantec Announces Plesk Will Integrate Symantec Encryption Everywhere Security Into Its Website Management ... - Business Wire (press release)