Edward Snowden will appear at the Free Library of Philadelphia … – PhillyVoice.com

Its already been four years since the events surrounding Edward Snowden, the former CIA employee who disclosed classified government information and rose to global prominence, unfolded,leading him to spend40 days living in the Russian airport after he was charged with espionage.

Though Snowden is still living in Russia, now at an undisclosed location, he will be here in Philly sort of for a conversation at the Free Library of Philadelphia.

Appearing via live closed-circuit video link, he will speak with Jeremy Scahill, an investigative journalist and editor of the online publication The Intercept.The two will converse about Snowden's disclosures and the surveillance state in thenation under President Donald Trump.

Though Snowden will appear through the video link, Scahill will be at the Free Library in person.

The event will be held on Monday, Sept. 11, at 7:30 p.m. at the Free Librarys Parkway Central location, near Logan Circle.

Tickets go on sale Tuesday at 10 a.m. for $35 and are available here.

As the Free Library expects the event to sell out, additional $15 tickets will be sold so that people can watch a live broadcast of the event in a separate room at the Parkway Central branch.

Excerpt from:
Edward Snowden will appear at the Free Library of Philadelphia ... - PhillyVoice.com

Trump, former top spy trade verbal barbs – Honolulu Star-Advertiser

Top News

Associated Press

Posted August 24, 2017

August 24, 2017

Updated August 24, 2017 9:45am

ASSOCIATED PRESS

Ten-National Intelligence Director James Clapper testifies on Capitol Hill in Washington. President Donald Trump and Clapper, the former national intelligence chief, are trading verbal barbs that started after Clapper questioned Trumps fitness to be in the Oval Office.

WASHINGTON >> President Donald Trump and James Clapper, the former national intelligence chief, are trading verbal barbs that started after Clapper questioned Trumps fitness to be in the Oval Office.

Trump tweeted Thursday that Clapper was caught lying to Congress.

Clapper says he simply misspoke a few years ago when he said the U.S. was not collecting Americans data. Documents leaked by Edward Snowden later indicated widespread domestic surveillance.

Trump also said Clapper sent him a beautiful letter.

Clapper tells CNN that he wrote Trump the night before the election saying he hoped the president would support the intelligence agencies practice of speaking truth to power.

Clapper says Trump thanked him for the note, then later depicted the intelligence community as Nazis for delivering information about Russian interference in the election.

Visit link:
Trump, former top spy trade verbal barbs - Honolulu Star-Advertiser

This fellowship program brings tech knowledge to Congress – Technical.ly

When Edward Snowden released thousands of classified NSA documents,Travis Moore was tasked with learning about the information fast. Asthe former legislative director for U.S. Rep.Henry Waxman, Moore scrambled to find technical expertise on bulk metadata, the NSAs programs, and the implications of the breach. Ultimately, he had to look outside the halls of Congress.

With tech-related issues continuing to gain importance, the experience left him looking to bring more expertise to the Capitol Hill. Moore created TechCongress, a 13-month fellowship that places technologists either in congressional offices or committees to provide knowledge on various legislation, emerging technologies, and concerns.

From now until September 28, TechCongress will accept applications for next years cohort.

According to Moore, successful candidates possess three traits:

TechCongress is a young program, having only started in 2015, but theyve already stumbled upon interesting takeaways. One was the level of veteran interest. In their first year, three of their top five candidates included veterans. Two of them later became inaugural fellows. For 2017, Moore and his team plan to focus on bringing in more veterans and diversifying their program with more female fellows.

Sunmin Kim (left), TechCongress first female fellow, with U.S. Sen. Brian Schatz of Hawaii (Courtesy photo).

Fellows receive first-hand experience on the Hill as a staffer. JC Cannon, former TechCongress fellow from the inaugural class, told Technical.ly that the most important thing the fellows gain is an understanding of how Congress works. He came to quickly understand the need for his expertise.

Legislative issues such as communication encryption, drones and bulk collection require input from those familiar with the technology. I soon became the go-to person for [congressional] staffers with technical questions, Cannon said.

He wasnt only weighing in on the hot-button issues about the future of technology. During his time on the Hill, Cannon worked on a health subcommittee. For his part, Moore figured that the fellowship program would focus on more traditional tech policy like IT or cybersecurity in their first few years before branching out to other committees. It was another sign of the need for the expertise that the fellows can offer.

Decent government decision making and policymaking in the 21st century requires having an understanding of technology infrastructure that underlies all of these issues, Moore said.

Nia Dickens is a writer and recent transplant to Philadelphia. She received a Fulbright grant in 2015 and spent two years teaching English in Europe. When she's not busy acclimating back to the fact that everything is open on Sundays, she's catching up on endless hours of TV, especially Jane the Virgin.

View original post here:
This fellowship program brings tech knowledge to Congress - Technical.ly

FACT CHECK: Did Clapper Get ‘Caught Lying To Congress’? – The Daily Caller

FACT CHECK: Did Clapper Get 'Caught Lying To Congress'?
The Daily Caller
Snowden then disclosed thousands of classified and confidential NSA documents to journalists and in doing so revealed a vast NSA spying apparatus on millions of Americans by the NSA. The exact size of the leak or number of documents leaked by ...

and more »

More here:
FACT CHECK: Did Clapper Get 'Caught Lying To Congress'? - The Daily Caller

How to use EFS encryption to encrypt individual files and folders on Windows 10 – Windows Central


Windows Central
How to use EFS encryption to encrypt individual files and folders on Windows 10
Windows Central
Encrypting File System (EFS) is an encryption service found in Windows 10 Pro, Enterprise, and Education. A cousin to BitLocker, which can encrypt entire drives at once, EFS lets you encrypt individual files and folders. Encryption is tied to the PC ...

View post:
How to use EFS encryption to encrypt individual files and folders on Windows 10 - Windows Central

Sophos, Trend Micro, Symantec Lauded for Cloud Encryption – Channel Partners

The global cloud encryption market is expected to quadruple from $645.4 million this year to $2.4 billion by 2022. Thats a compound annual growth rate of 30 percent.

Thats according to a new report by MarketsandMarkets, which IDs Sophos, Trend Micro and Symantec among the major vendors. Others includeThales e-Security, Gemalto, Skyhigh Networks, Netskope, CipherCloud, HyTrust, Vaultivand TWD Industries.

The demand for cloud encryption mostlyis driven by stringent government regulations and the need to protect mission-critical data residing in the cloud, the report says. With the rising demand for cloud and virtualization across numerousverticals, the adoption rate of cloud encryption among enterprises is expected to gain major tractionover the next five years.

The infrastructure-as-a-service (IaaS) model is expected to hold the largest market share. Itsused to run applications on the public cloud and it allowsorganizations to reduce the total cost of ownership since its being provided by third-party vendors in the form of cloud-based data centers. However, virtualization introduces new security challenges, so enterprises are adopting cloud encryption to run business-critical functions securely.

The telecom and IT vertical is expected to grow the fastest.Thats due to heavy useof cloud-based applications for business operations, frequent targets forcybercriminals.

North Americais expected to have the largest market share and to dominate themarketfrom 2017 to 2022, dueto the early adoption of new and emerging technologies and the presence of a large number of players in this region. Asia Pacific offers extensive growth opportunitiesdueto the largenumber of SMEs that are extensively adopting cloud technology.

Here is the original post:
Sophos, Trend Micro, Symantec Lauded for Cloud Encryption - Channel Partners

Hedvig storage upgrade adds flash tier, encryption options – TechTarget

Hedvig today launched the third version of its software-defined storage product featuring support for flash tiering, built-in encryption technology, and new plugins for third-party backup and container technologies.

NVMes no longer just a protocol for fast flash drive connections to a PC via the PCI Express bus. Discover the future of NVMe usage here, including exclusive details on how the M.2 SSD form factor is approaching server-ready capacity and speed.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Hedvig storage software runs on commodity hardware. Hedvig doesn't sell the hardware, but supports moving data between fast flash-based solid-state drives(SSDs) and a tier of slower, less expensive hard disk drives (HDDs). Hedvig's new FlashFabric enables two storage tiers in all-SSD server clusters that can span on-premises and public cloud environments.

Hedvig Distributed Storage Platform 3.0 detects performance differences in SSDs, according to Rob Whiteley, Hedvig vice president of marketing. He said those SSDs can be traditional SAS or SATA, newer latency-lowering NVMe-based PCI Express, or emerging 3D XPoint technology from Intel and Micron.

"There are configurations where the customer will have some amount of higher performance, higher cost NVMe flash plus some amount of more traditional enterprise-grade flash," Whiteley said. "And what they actually want is the ability to automatically tier in and out of different flavors of flash."

Howard Marks, founder and chief scientist at storage test lab DeepStorage LLC, said Hedvig's 3.0 release is major from a technological standpoint, but the company is early with its support for "all-flash hybrids" with more than one type of SSD.

"The majority of the all-flash systems we see today have one pool of flash. But between NVMe and upcoming post-flash memories like 3D XPoint, we are going to have at least two tiers of solid state," Marks said. "That means folks like Hedvig, who have the logic for dealing with multiple tiers built into their system, have an advantage."

Whitely said the Hedvig storage software tracks data reads and writes at a granular level to ensure the hottest data lands on the highest performing storage media. To enable the SSD tiering, Hedvig engineers created write-through read caches that could take advantage of different flash tiers, he said.

"Our system has always been very flash friendly from a write perspective," Whitely said. "There were just some additional things we wanted to do from a read perspective."

New Hedvig storage security features include software-based encryption for data in use, in flight and at rest; advanced audit logging designed to enhance the product's monitoring and analytics engines; and improved multitenant role-based access control tying into Lightweight Directory Access Protocol (LDAP) and Microsoft Active Directory.

Hedvig's 256-bit Encrypt360 technology secures data through proxy software deployed on host compute servers to minimize the performance hit. The software supports the Advanced Encryption Standard New Instructions from Intel to accelerate host encryption.

Hedvig software deduplicates data before encryption. As with deduplication and replication, Hedvig enables customers to turn encryption on and off on a per-volume, or virtual disk (vDisk), basis, Whiteley said.

In the past, Hedvig advised customers to use self-encrypting drives or third-party products for in-flight encryption, Whiteley said.

"What we've found in the software-defined storage world is self-encrypting drives are often a generation or two behind in hardware technology, and they're a lot more expensive," Whiteley said. "Plus, how you then do the key management becomes a very difficult proposition for a lot of large enterprises."

Hedvig does not supply a key management system. The company tested and validated Amazon Web Services' Key Management Service option, and depending on the API, could plug into other third-party key management systems, according to Whiteley.

When setting up a cluster, the Hedvig storage proxy reaches out to the key management system for a unique encryption key for each vDisk. The vDisk keys are cached at the proxy and stored in Hedvig's metadata engine, according to Eric Carter, the company's senior director of product management.

The third feature set in Hedvig's new 3.0 storage software is CloudScale Plugins for Veritas, VMware and Red Hat products, to add to the company's existing support for Docker and OpenStack.

The new Veritas OpenStorage Technology plugin will enable NetBackup customers to connect to Hedvig for deduplicated backup storage. Whiteley said the Veritas NetBackup plugin is "probably the most requested customer feature besides encryption."

Hedvig already had a VMware vSphere Web Client plugin, but it is now certified, with new backup and security capabilities. In addition, Hedvig Storage Proxy containers are now Red Hat-certified and published in the Red Hat Container Catalog. The containers support Red Hat Enterprise Linux and Red Hat's OpenShift container application development platform.

Pricing remains unchanged for the Hedvig Distributed Storage Platform, which becomes generally available Friday. Hedvig partners with Cisco, Dell, Hewlett Packard Enterprise (HPE), Lenovo, Quanta and Super Micro on hardware.

Hedvig and HPE in June launched a validated bundled option combining Hedvig's software-defined storage with HPE Apollo 4200 servers. Whiteley said the bundled product, for which HPE provides first-line support, has already grown to about half the opportunities in the company's sales pipeline.

"Just having the HPE sales force boots on the ground is going to be a big driver for both their growth and their market acceptance," Marks said. "If an HPE sales guy sells Hedvig, it counts against their storage quota. Sales guys sell what you incent them to sell."

Hedvig CEO sees public, private clouds blurring

Scale-out software-defined storage on the rise

Guide to software-defined market and products

Read the original post:
Hedvig storage upgrade adds flash tier, encryption options - TechTarget

Open-Source Software Won’t Ensure Election Security – Lawfare (blog)

The technology behind elections is hard to get right. Elections require security. They also require transparency: anyone should be able to observe enough of the election process, from distribution of ballots, to the counting and canvassing of votes, to verify that the reported winners really won. But if people vote on computers or votes are tallied by computers, key steps of the election are not transparent and additional measures are needed to confirm the results.

In a New York Times op-ed a couple weeks ago, James Woolsey and Brian Fox proposed using "open-source systems that can guard our votes against manipulation." Their hypothesis is that "open-source software is less vulnerable to hacking" than proprietary voting software because "anyone can see how open-source systems operate. Bugs can be spotted and remedied, deterring those who would attempt attacks. This makes them much more secure than closed-source models." This sounds reasonable, but in fact, open-source systems are only one step towards guarding our votes against manipulationand the hypothesis that using open source software willby itselfimprove security is questionable at best.

First, with the systems in use today, there is no guarantee that the software running on any machine is in fact the software it is supposed to be running, open source or not. And even if we could know with certainty that the installed software matches the software source, the quality of the software is critical. Poorly written software, whether open source or not, creates vulnerabilities, and is thus vulnerable to hacking. Open source software allows anyone to detect vulnerabilities. We do not believe in "security through obscurity"that is, relying on secrecy as a primary security strategybut making source code available to everyone for inspection makes it available to the attackers for inspection. And the attackers are often highly motivated to find vulnerabilities.

Complicating this is the relative ease of identifying one vulnerability and the difficulty of finding them all. Attackers need to find just a single flaw in order to exploit a system. On the other hand, it is very easy for reviewers to miss somethingthe Heartbleed bug that affected millions of websites and devices in 2014 occurred in open source softwareor to make assumptions about the environment in which the source code is executed that turn out to be wrong. Software authors, maintainers, election officials, and other defenders must find every flaw, fix them all, and then distribute the fixed system (or patches) to everyone using the system.

Patch distribution creates its own set of potential problems, as it informs attackers that there was a vulnerability (and where in the code it is), leaving anyone who does not immediately install the patch especially vulnerable. For example, many years ago, a response group announced a patch to a well-known, widely used piece of software. Within thirty minutes, that vulnerability was being exploited around the world. Many sites did not have the time or resources to install the fix. The patch was announced at 5 p.m. East Coast time on a Friday, making things worse.

Open source software is a good thing. Published source, a lower bar, is a useful if less optimal alternative. But visibility of the source is not enough. Security analysts need access to everything that is used to create the system, including operating system source, driver source, compiler source, hardware, and hardware fabrication information, and then directions on how to create the systems used in the voting (such as the voting system, the tally system, and any systems and software used to display the results). Even that isn't enough, as (for example) the fabrication facilities may not follow the directions the analysts are given. The supply chain matters, toomanufacturers or their employees may even be malicious! So the analysts need to monitor the actual system construction to verify everything. Even then, they must be aware that what is done today may not be what is done tomorrow, or what was done yesterday.

Finally, even perfect software does not guarantee trustworthy elections. Trustworthiness is also a product of the way the system, and software, are used. For example, consider a system that uses a difficult-to-guess password, but that password can be found on a website. No amount of scrutiny of the system will reveal this flaw.

So assuming that open source systems are more secure than other systems is a dangerous fallacy, just as assuming closed source systems are more secure than other systems. Properly evaluating security requires more than simply considering the openness of the source.

The question we should be asking is "how can we ensure that election results are accurate when we cannot trust the computers used to run elections?" rather than "how do we make electronic voting secure?" Nothing is ever absolutely secure. But we can often make computers, systems, and processes "secure enough" for their tasks, provided we have an independent way to check the results. One technique is to produce a voter-verified paper trail, ensure that the paper trail is trustworthy, and manually audit the electronically tabulated results against the paper audit trail. Another technique called "end-to-end verifiability" allows individual voters to verify that their vote was recorded and counted correctly. Simply enabling everyone to examine the source is not sufficient, and could even give voters and election officials a belief that the system is secure when it is not.

We believe there are excellent reasons to move to open-source voting systems. For instance, there are good arguments that the public should own the voting system. Open-source systems allow vendor claims about software to be verified. Open-source systems running on commercial, off-the-shelf (COTS) hardware could be far cheaper to acquire and maintain than proprietary voting systems. Adopting open-source systems could promote a competitive market for technical support for local election officials, also decreasing costs. Open-source systems could be designed to facilitate auditing against the paper trail more efficiently than commercial systems permit. And using open-source systems would make it possible for jurisdictions to customize the software to their needs.

All this needs to be considered as we work to improve the security and transparency of our election systems. But adopting open-source systems would not by itself provide any assurance that computers used in voting are doing what they are supposed to do. Nor would it obviate the need to audit the results.

This piece reflects the contributions of the following individuals:

Matt Bishop, University of California, Davis Philip Stark, University of California, Berkeley Josh Benaloh, Microsoft Research Joseph Kiniry, Free and Fair Ron Rivest, MIT Sean Peisert, University of California, Davis Joseph Hall, Center for Democracy and Technology Vanessa Teague, University of Melbourne (Australia)

Read more:
Open-Source Software Won't Ensure Election Security - Lawfare (blog)

Demand for Open Source Skills Continues to Grow – Windows IT Pro

On a scale of one to five, how are your open source skills? If you picked a number below four, you might want to do something about it. According to the Linux Foundation's annual Open Source Jobs Report released on Wednesday, employment prospects for open source workers continues to rise.

Consider this: 86 percent of open source professionals believe that just knowing open source has advanced their careers, with 52 percent saying it would be easy to find another job. If that doesn't wet your whistle -- only 27 percent report not receiving a recruiting call in the past six months.

Open source skills have been in high demand for a number of years, as open source continues to displace proprietary software in both data centers and in development houses. Salaries for those with open source skills tend to be higher as well. Career website Dice's annual salary survey -- a separate survey from this -- indicates that Linux professionals command an annual salary of over $100,000 while other tech professionals take in an average of $92,000.

For the jobs report, the Linux Foundation and Dice partnered and in July surveyed more than 280 hiring managers from corporations, SMBs, government organizations and staffing agencies, the vast majority representing companies headquartered in North America. In addition, more than 1,800 open source professionals were surveyed, 77 percent of whom indicated three or more years spent working in open source.

According to the report, the positions employers are most seeking to fill are developer (73 percent), DevOps engineer (60 percent), and systems administrator (53 percent). The most in-demand skills are open source cloud (47 percent), application development (44 percent), big data (43 percent), DevOps (42 percent) and security (42 percent). Sixty percent of the companies surveyed said they're looking to take people on full time -- up from 53 percent last year -- and 67 percent of managers say the hiring of open source professionals will increase more than other areas of the business in the next six months.

Three major factors are pushing most companies' IT hiring plans, with company growth heading the list at 60 percent. After that, it's more open source specific, with 42 percent citing an increasing use of open source, followed by 30 percent who said that open source is becoming core to their IT needs. Interestingly, only 43 percent of hiring managers say the economy is encouraging them to take on more help, down from 57 percent in 2016. The report opines the later is potentially being caused by "rising global uncertainty."

The migration to the cloud, along with the rise of cloud-based architectures such as containers and microservices -- all areas dominated by open source -- are also a big part of the current tech job market. "Most enterprises are still in transition, making pros with skills in hybrid environments all the more valuable," the report's authors note. "Meanwhile, container technology is growing exponentially, indicating likely future shortages."

Cloud migration is also behind cloud technologies like OpenStack and Cloud Foundry being ranked as the "most sought-after area of expertise" according to 70 percent of the employers surveyed -- a number that's up from 66 percent last year. In second place is web technologies, with 67 percent of hiring managers expressing a need for those skills -- up from 62 percent last year. Demand for Linux skills is also high but has dropped a bit since last year -- from 71 percent down to 65 percent.

The report notes that among hiring managers the technologies most influencing hiring decisions are cloud (62 percent), application platforms (56 percent), and big data (53 percent); and the most in-demand open source skills are cloud/virtualization (60 percent), application development (59 percent), and DevOps (57 percent).

Employers are also increasingly seeking employees with open source certifications. Fifty percent of hiring managers said finding people with certifications is a priority, and an equal number indicated that a certified candidate has a better chance of getting a job than someone without certification -- a number that's up from 44 percent in 2016.

"And theres been a big jump in companies willing to pay for employees to become certified," the report states. "Nearly half say theyre willing to pay, up from one-third a year ago. Only 21 percent say they definitely would not pay for certifications, down from 30 percent last year."

With data centers increasing their use of open source technologies, it's not surprising that a 77 percent majority of the tech professionals surveyed said the ability to architect solutions based on open source software topped the list of valuable skills. Also important: experience with open source development tools such as GitHub, and knowledge of new tools. The pros also predict that next year, employment opportunities will grow for those with skills in cloud technologies, big data and analytics, containers, and security.

Read the original post:
Demand for Open Source Skills Continues to Grow - Windows IT Pro

Facebook Refuses to Alter React’s Open Source License – InfoQ.com

The Apache Foundation recently announced that Facebook's BSD+Patents open source license has been disallowed for inclusion with Apache products. The resulting fallout has caused gnashed teeth and much soul searching for React developers and Facebook has so farrefused to reconsider.

According to Facebook, the BSD+Patents license is meant to protect them from patent trolls. Facebook's engineering director Adam Wolff explains that

As our business has become successful, we've become a larger target for meritless patent litigation. We decided to add a clear patent grant when we release software under the 3-clause BSD license, creating what has come to be known as the BSD + Patents license. The patent grant says that if you're going to use the software we've released under it, you lose the patent license from us if you sue us for patent infringement.

Facebook's statement that "if you're going to use the software we've released under it, you lose the patent license from us if you sue us for patent infringement" means that if you sue Facebook for infringement of any patent, you lose the patent grant for React. That said, patent attorney Dennis Walshargues thatthe whole issue is a "paper tiger" because, among other reasons, it's not clear there are any React-related patents or patent applications.

In adding the license to their Category X list, the Apache Foundation says that:

The Facebook BSD+Patents license includes a specification of a PATENTS file that passes along risk to downstream consumers of our software imbalanced in favor of the licensor, not the licensee, thereby violating our Apache legal policy of being a universal donor.

Apache's decision isa problem because Facebook's React library has been widely adopted by projects that also code licensed in ways the foundation approves. Developers are thusfaced with removing React.js from their projectsif they want to stay on the right side of Apache's terms. In a fierce discussion on Hacker News, user kevinflo wrote that developers contributing to React without being paid by Facebook have a "moral obligation to stop", adding that React is a "trojan horse into the open source community" to "deepen their war chest".

Raul Kripalani argues that startups should not use React because the use of React would discourage acquisitions by bigger players who may want to sue Facebook for some unrelated reason. Of course, the world is full of companies and non-profits that exist for myriad reasons and some commenters have pointed out that software patents aren't valid in their countries.

Some developers say the real issue is unethical attitude towards open source software. "This is not how open source should work," says kevinflo. Others, such as Hacker News user chrisco255, think this may all be too much:

Unless you've got millions of dollars to bring a patent suit against Facebook (do you even have any patents to defend?), this should not even be on your radar. You should be focused on building great a product and execution: not patent litigation.

"We recognize that we may lose some React community members because of this decision," Wolff writes.

Originally posted here:
Facebook Refuses to Alter React's Open Source License - InfoQ.com