Lemn Sissay’s THE REPORT Gets Reading at Royal Court Downstairs This Month – Broadway World

Lemn Sissay MBE is a poet, playwright, broadcaster and actor.

Lemn was brought up in care and he is taking the social services to court for stealing his life. As part of the legal proceedings Lemn has had to undergo a 5-hour psychological assessment.

When a person claims abuse by the system a report is written. The Report unveils everything.

Just before Lemn turns 50, he will hear a reading of The Report for the first time live on the Royal Court stage. He invites the public to join him.

The Report will be read by Julie Hesmondhalgh (God Bless The Child/Royal Court, Coronation Street / ITV) and is directed by John E McGrath (Artistic Director of Manchester International Festival) and produced by Sarah Sansom (Time Won't Wait). It will be performed as a one-off performance in The Royal Court Theatre Jerwood Theatre Downstairs at 6pm on Sunday 30 April 2017.

Excerpt from Lemn Sissay's Blog March 20th 2017: "A few weeks ago I sat down in a beige interview room in the legal district of Leeds City Centre. I thought it was going to be easy. The man sat behind the table opposite me had been appointed by my lawyer. He was neither friendly 'we're going to be five hours at least' or unfriendly 'There's a lot to get through.' He clicked his ballpoint pen and the psychological interrogation of my life began. Mid way through the interview I broke down. This week I received The Report via my lawyer. He said it brought him to tears. I've decided to listen to it for the first time on stage, supported by an audience."

Commenting on the project director John E McGrath states: "Having worked with Lemn on his theatre pieces since 2002, and in particular having explored his personal journey of discovery in Something Dark, it is an honour to support him through this uniquely brave artistic and personal project"

Any profits from the performance will go towards the set up of the Lemn Sissay Foundation.

IF YOU GO:

The Report

Directed by John E McGrath

At Jerwood Theatre Downstairs, Royal Court Theatre, Sloane Square, SW1W 8AS

Sunday 30 April, 6pm 2017

Standard Tickets 25 /16 /12

ABOUT THE ARTISTS:

Lemn Sissay is author of a series of books of poetry alongside articles, records, broadcasts, public art, commissions and plays. He was the first poet commissioned to write for the London Olympics. His Landmark Poems are installed throughout Manchester and London. They can be seen in The Royal Festival Hall and The Olympic Park. His Landmark Poem, Guilt of Cain, was unveiled by Bishop Desmond Tutu in Fen Court near Fenchurch St Station, London.

Lemn is associate artist at Southbank Centre, patron of The Letterbox Club and The Reader Organisation, ambassador for The Children's Reading Fund, trustee of Forward Arts Foundation and inaugural trustee of World Book Night and an Honorary Doctor of Letters from the University of Huddersfield. His book Gold From the Stone, an anthology of new and selected poems, was published in 2016 . His 2015 interview on Radio 4's Desert Island Discs was made pick of the year for 2015.

Lemn's installation poem what if was exhibited at The Royal Academy alongside work by Tracey Emin and Antony Gormley. It came from his Disko Bay Expedition to the Arctic alongside Jarvis Cocker, Laurie Anderson, Ryuichi Sakamoto, Leslie Feist and KT Tunstall. His 21st century poem was released on multi-million award winning album Leftism by Leftfield. A violin concerto performed at The BBC by Viktoria Mullova was inspired by his poem Advice For The Living.

Lemn's award winning play Something Dark directed by John McGrath has been performed throughout the world and his stage adaptation of Benjamin Zephaniah's Novel Refugee Boy at West Yorkshire Playhouse toured Britain in 2014. A BBC TV documentary, Internal Flight, and a radio documentary, Child of the State, were both broadcast about his life and his Ted Talk has close to a million views. His documentary on the late Gil Scott Heron was the first pubic announcement of Scott-Heron's comeback.

On social media Lemn describes dawn in one tweet every day. One Morning Tweet became an award winning building MVMNT Caf commissioned by Cathedral group designed and built by Supergroup's Morag Myerscough. It is the only building in the world built from a tweet. Cathedral also commissioned Lemn's Landmark Poem, Shipping Good, which is laid into the streets of Greenwich.

Lemn was the first Black Writers Development Worker outside of London. He created and established Cultureword (part of Commonword) where he developed supported and published many new writers who've gone on to a life of creativity. Lemn received an MBE from The Queen for services to literature and an honorary doctorate from University of Huddersfield and University of Manchester. University of Huddersfield run The Sissay PhD Scholarship for care leavers: the first of its kind in the UK.

The Guardian newspaper heralded the arrival of his first book Tender Fingers In A Clenched Fist. "Lemn Sissay has Success written all over his forehead". He was 21. But he had other matters in mind. Between the ages of 18 and 32 he tracked his family down across the world. Although many people know his story...his career as a writer happened in spite of his incredible life story not because of it.

In June 2015 Lemn was elected Chancellor of The University of Manchester. He stated "my role is to inspire and be inspired".

Lemn is a prolific public speaker, speaking engagements (2016) include The Moth, Letters Live, World Health Organisation International Conference, StAnza International Poetry Festival, Ennis Book Club Festival, World Book Day Launch, TEDX Manchester and Future Everything. Lemn appeared at WOMAD, Greenbelt Festival, Edinburgh Book Festival and Going Global, Cape Town and St Clementun Literature Festival, France i 2016.

Lemn has made various BBC radio documentaries on writers such as Gil Scott Heron, The last Poets, JB Priestley, Edgar Allan Poe and poetry films. Lemn presented two Ten Pieces Proms for the BBC at the Albert Hall in July 2016 and a BBC radio series called Origin Stories. Lemn's head is in London where he's based, his heart is in Manchester where he is not, his soul is in Addis and his vibe is in New York where his mother lives. He blogs openly for personal reasons. Visit lemnsissay.com/biography for more.

John E McGrath is the Artistic Director of Manchester International Festival. Appointed to the role in 2015, John was previously Artistic Director of National Theatre Wales, which he launched in 2009, achieving a reputation for large-scale site-specific work, digital innovation, international collaboration and community involvement. Productions directed for NTW included The Radicalisation of Bradley Manning by Tim Price, in Water I'm Weightless by Kaite O'Reilly, Love Steals Us from Loneliness by Gary Owen, and The Opportunity of Efficiency by Alan Harris. John trained as a theatre director in New York, where he also worked as Associate Director of Mabou Mines, and was Artistic Director of Contact Theatre in Manchester from 1999 to 2008. Awards include the National Endowment for Science Technology and the Arts (NESTA) Cultural Leadership Award (2005) and an Honorary Doctorate from the Open University (2015).

Julie Hesmondhalgh was born and grew up in Accrington, Lancashire. She trained at LAMDA and set up Arts Threshold Theatre in the early 90s. She co-runs Take Back Theatre Collective in Manchester.

Theatre includes: Wit (winner of Best Female Performer 2017 MTAs); Black Roses: The Killing of Sophie Lancaster (winner Best Studio Performance 2012, MTAs); Blindsided: all at Manchester Royal Exchange; God Bless the Child, Royal Court Jerwood Theatre Upstairs.

TV includes: Broadchurch (ITV); Happy Valley (BBC1); Black Roses (BBC4) (Royal Television Society Best Actress 2014); Moving On: Taxi for Linda (ITV); Inside No 9: La Couchette (BBC2); Cucumber/Banana/Tofu/Screwdriver (Channel 4); Hayley Cropper in Coronation Street 1998-2014 (National TV Award 2014, Royal Television Society Award 2013).

Julie is also a regular voice on BBC Radio 4 in various dramas and as an occasional presenter of Pick of the Week.

Photo Credit: Hamish Brown

Continue reading here:
Lemn Sissay's THE REPORT Gets Reading at Royal Court Downstairs This Month - Broadway World

Edward Snowden thinks we should look outside politics for hope – Fusion

On Tuesday at Fusion'sReal Future Fair, Edward Snowden took the stage via Snowbot to discuss the future of the surveillance state under Trump, the political power ofsocial networks, and how technology has changed what it means to be in exile.

He also discussed his controversial tweet from mid-October, where he wrote that there"may never be a safer election in which to vote for a third option," citing a New York Times poll.

https://twitter.com/snowden/status/789574275518828544

As we now know, these polls were off-base by afairly significant degree. Some have criticized Snowden for encouraging folks to vote third-party when they could haveswung key states away from Donald Trump.

Snowden didn't directly apologize for his stance, telling Real Future Senior Editor Kashmir Hill that votingfor someone you don't believe inis "fundamentally un-American."

"It's inappropriate to say people should vote for someone who doesn't represent their interests, because then we're getting into a politics that are against choice," Snowden said.

At the start of the program, Snowden recommended welook outside the traditional political structure for hope, sayingthathe doesn't have much faith in any president to affect significant change.

"You can't sit around when you see a problem, and hope for a hero to come by and make things better," Snowden said. "Technology works differently than law. Technology knows no jurisdiction."Snowden also said that because of technology he is still able to have a voice:"We are witnessing the end of exile as an effective tool for political repression."(He admits, however, that he hasn't been able to play with manyaugmented reality tools like Pokemon Go.)

There are inherent issues with political speech on technology platforms, of course, as companies like Facebook and Twitter settheir own internal standards. Snowden warned about the dangers of corporationsmonopolizing technology platforms, and what that could mean for our politicalclimate.

"They trample not just customers, but paradigms," he said.

Closing, Snowden saidfolks who want topersonally to fight back against surveillance do more than just rely on encryption tools. He urges them todonate to organizations that are dedicated to ensuring the privacy of the population, like the ACLU, EFF, and Freedom Of The Press, where he is the chairman.

"They can't do this without your support," he said.

Michael Rosen is a reporter for Fusion based out of Oakland.

More here:
Edward Snowden thinks we should look outside politics for hope - Fusion

Susan Rice: Edward Snowden may hold key in ‘unmasking’ scandal – Washington Times

ANALYSIS/OPINION:

The question of what kinds of communications got Donald Trump aides caught up in incidental U.S. wiretaps may be answered by the ultra-leaker on such matters: Edward Snowden.

Mr. Snowden, a former National Security Agency contractor, provided The Guardian in 2013 with top secret documents that showed the U.S. wiretaps a wide array of embassies in Washington, friend and foe.

The bugging would be done under the Foreign Intelligence Surveillance Act, which allows the NSA to tap electronic communications of virtually any foreign operative. Targets do not have to be suspected spies or terrorists to fetch surveillance. They can simply be foreign agents conducting diplomacy.

Mr. Trump, as the Republican presidential nominee and then as president elect, would have attracted a number of phone calls and emails from Washington diplomats seeking any information they could then relay to their respective capitals about the unpredictable incoming president.

It is likely that these types of communications become part of intelligence reports.

Susan Rice, President Barack Obamas National Security Adviser, asked for dozens of such reports from intelligence agencies, Bloomberg View reported. She requested that the names of Mr. Trumps aides be unmasked, in other words mentioned by name in the reports instead of being redacted. FISA was written to protect the privacy by masking innocent U.S. citizens incidentally caught up in a wiretap.

The Snowden-provided documents show that in 2010 the U.S. bugged the European Union mission in New York and its embassy in Washington. Other targeted embassies in Washington included, France, Italy, Greece, Japan, Mexico, South Korea, India and Middle East countries.

Today, it is known that the U.S. bugged the Russian embassy. It intercepted calls between retired Army Lt. Gen. Michael Flynn, then Mr. Trumps incoming National Security adviser, and Ambassador Sergey Kislyak during the transition.

Mr. Flynns name was unmasked by the Obama administration, and the contents of the calls were leaked to the news media. Legal experts say the leaking amounts to a felony.

The Guardian said one of the spy operations was dubbed Dropmire. It involved placing a bug in the EUs fax machine in Washington.

Other code names for such intercepts were Perdido, Blackfoot, Wabash, and Powell.

Blackfoot and Wabash were operations against the French mission at the United Nations and its embassy in Washington.

Mr. Snowden lives in exile in Moscow.

Presidents change and lawmakers come and go, but The Washington Times is always here, and FREE online. Please support our efforts.

The rest is here:
Susan Rice: Edward Snowden may hold key in 'unmasking' scandal - Washington Times

Edward Snowden’s guardian angels in Hong Kong have been … – Quartz

They had never imagined that a knock at their door one late summer night in 2013 would trigger a dramatic chain of events that would rewrite the course of their lives.

Four years on, facing daily threats and the imminent fear of deportation, Sri Lankan national Supun Kellapatha and his partner Nadeeka Nonis say they have no regrets about opening the door. They were glad they welcomed a tall, nervous-looking American man into their tiny apartment.

The stranger at the door that night was the whistleblower Edward Snowdena former US intelligence contractor who leaked thousands of classified government files to journalists from a hotel room in Hong Kong. For two weeks after that leak in June 2013, Snowden was untraceable. As American intelligence agencies launched a global manhunt, the most wanted dissident in the world quietly shunted between the homes of three refugee families in the most impoverished, cramped, filthy, neglected ghettos of Hong Kong before he boarded a plane for Moscow.

Now, the people who sheltered Snowden are themselves looking for protection. As their home countries allegedly try to get them extradited back and remaining in Hong Kong becomes unfeasible, the families are seeking asylum in Canada with the help of Robert Tibbo, the Hong Kong-based human rights lawyer who brought Snowden to Supuns door that night. Tibbo also represents the refugees.

We put Ed where no one would lookin a netherworld with people who have an instinct to protect, said Tibbo. He was confident that this group of people, who had so much to lose if Snowden was caught in their midst, would not betray him or his high-profile client.

They did not.

The refugeesKellapatha, Nonis and their two children; Ajith Puspakumara, a former soldier also from Sri Lanka; and Vanessa Rodel and her daughter, who are from the Philippineskept their word and their silence, until the 2016 Oliver Stone movie Snowden revealed where the fugitive hid when he went underground in Hong Kong. It was impossible to keep their names a secret anymore.

Unwitting public figures now, they remain guarded when they speak about Snowden, insisting that they had no idea who he was when they took him in. What they did know was that like them, he too was a refugeean anxious man outside his home country, looking for shelter.

Early the next morning, so early that it was still dark, he asked me to go and buy the newspaper, recalled Kellapatha I didnt even look at it till I came back and gave it to him. Then when I saw it, I was shocked. He looked at the photograph on the front page of The South China Morning Post and asked his houseguest, Edward, is this you? To which the stranger replied, Yes, its me.

I told him, dont worry, you are safe, Kellapatha said.

Kellapatha gave him the only mattress in his two-room apartment thats no bigger than 125 square feet, while his family slept on the floor. Concerned about what to feed a westerner, Kellapatha bought him spaghetti and burgers from McDonalds with money provided by Tibbo. He neednt have worriedwhat Snowden enjoyed most was Noniss homemade chicken curry and daal. And cake, Nonis said, as a rare smile breaks out on her face at the memory. He loves sweets very much.

Kellapatha and Nonis are both refugees who fled persecution and torture in Sri Lanka. Kellapatha, 32, came to Hong Kong in 2005 to escape political harassmenthe says he was ill-treated and tortured by people connected to the political opposition. Nadeeka, who is 33, came in 2007. She is a former seamstress who fled Sri Lanka after years of repeated rape at the hands of a politically powerful man. The couple did not know each other in their homeland. They met in Hong Kong and now have two children together. Their five-year-old daughter and infant sonplus Rodels daughterare stateless because all three children were born in Hong Kong while their parents case for asylum is pending.

It could take several years for the Hong Kong government to take a call on their asylum applications. A successful outcome is unlikely, though. Out of the nearly 9,000 refugee claims made since 2009, Hong Kong has approved just 52. Thats an acceptance rate of less than one per cent.

While Hong Kong is not a signatory to the United Nations Refugee Convention, it is still bound by a court of final appeal rulingit must screen asylum seekers to determine if they risk persecution. If they are at risk, they are referred to the United Nations high commissioner for refugees for resettlement to a third country.

According to Tibbo, the refugees who sheltered Snowden are running out of time. Since their names were made public, life hasnt been the same for any of them. He says they are being targeted by both Sri Lankan officials and the Hong Kong government because of their role in Snowdens great escape. Sri Lankan officials, he claims, have even harassed the relatives of the asylum-seeking families at home, demanding to know their whereabouts in Hong Kong.

Its a matter of life and death, said Tibbo. He claims he has evidence that Sri Lankan police officials came to Hong Kong to try and track down the refugeesan allegation Sri Lanka denies. If the refugees are forced to return home, they say they fear they will face a violent future.

Here in Hong Kong, they keep a low profile. We dont go anywhere, we dont talk to anyone, Kellapatha said. I tell my daughter, you have no friends, we have no friends.

Neither their daughter, nor Rodels little girl, has gone to school since November because the refugees say the International Social Services, the government agency responsible for the welfare of asylum seekers, has withdrawn financial assistance, leaving the refugees with barely enough money for tuition fees or for basic food, clothes and transport in one of the most expensive cities in the world.

They cannot fend for themselves because Hong Kong does not allow asylum seekers to work, study, volunteer or even beg while they wait for the government to determine their statusa process that could take over a decade.

We have to take our children everywhere we go, Nonis said. Its like having a pet. They just sit, eat and sleep. What kind of childhood is this? She looks at her five-year-old who has fallen asleep curled up on an office chair in Tibbos office.

All three families currently live in safe houses organised by their lawyers. They are desperate to get out.

Tibbo is collaborating with three Canadian lawyers who formed a non-profit organisation called For the Refugees to support these families. On March 10, they announced they have officially petitioned Canada to accept these asylum seekers.

On the same day, the families got a big show of support from their grateful houseguest. Snowden tweeted: The families that sheltered me have formally filed for asylum in Canada. Let us pray Canada protects them in kind.

Meanwhile, they are living off fundsapproximately $100,000 collected by various crowd-funding efforts online.

None of Snowdens angels, as they have come to be known, say they regret risking their lives to shelter him.

When he left, he hugged us, said Nonis. We wanted him to stay forever.

I dont have regrets for helping him, Kellapatha said. He told me whatever he did, he did it for the right thing.

This post first appeared on Scroll.in. We welcome your comments at ideas.india@qz.com.

Originally posted here:
Edward Snowden's guardian angels in Hong Kong have been ... - Quartz

Hail to the Thief: The Case Against Edward Snowden – Signature Reads

Former National Security Agency contractor Edward Snowden is a polarizing figure.

Some consider him a whistleblower who sacrificed his career and freedom to inform the American people of government intrusion into their private lives. Edward Jay Epstein, author of How America Lost Its Secrets: Edward Snowden, the Man and the Theft, suspects that Snowdens motives were less than noble, and that, intentionally or not, his actions benefited the intelligence apparatus of an adversary nation.

In this interview, Epstein shares some of the lesser known facts behind the headlines, and opines on whether or not Snowdens flight to Russia helped the country to hack our most recent presidential election.

SIGNATURE: Youve been digging into the skullduggery behind some of our biggest headlines for a long time. Why did you choose Snowden for your next project?

EDWARD JAY EPSTEIN: To answer your question in some depth, I began as an undergraduate in college where I got access to all the members of the Warren Commission, which no one had ever done before or after, as well as their records, so before I had even graduated college, I found that some narratives that are accepted as unquestionable facts can be questioned. In the case of the Warren Commission, the unquestioned assertion was that it had done a totally exhaustive job. I found that while they had done an honest and good job, it wasnt exhaustive and they hadnt answered certain questions.

Ive found, at least in my case, that an author keeps writing his first successful book over and over again. I kept looking for areas in which a narrative could be questioned, even if it turned out that the narrative was true, like in the case of the 9/11 Commission. I had planned to do a book about it, but when I found that the 9/11 Commission had actually done the job that it was supposed to do, I dropped that project and moved on to another one.

My search pattern has always been to look for something that comes from a single source and is maybe questionable. I realized that the entire narrative about Snowden that he was a whistleblower, that he was a patriot who had only accidentally ended up in Russia and who had only helped America came from a single, self-interested source who was actually in Moscow: Snowden himself. That interested me. If the world was depending on this one guy who was the perpetrator of a crime and was under the control of the Russian government, then I was going to look at the case de novo blank slate myself.

SR: If I had paid only a little bit of attention to the Snowden affair, I would be left with the following idea: Snowden had slipped away with a file indicating that the NSA had an illegal surveillance apparatus in the United States, and that Moscow had given him sanctuary from American persecution. That would be the narrative I would follow. The one you explore in your book is a good bit different.

EJE: If you, or anyone else, who simply read the accounts coming from the very small group of people Glenn Greenwald, Barton Gellman, Laura Poitras, and Snowdens lawyers, Ben Wizner, and Robert Tibbo, maybe another person or two after theyd gone through the echo chamber of the media, youd get the exact narrative you suggested: that Snowden only stole documents that exposed an illegal NSA program, and that because the US government had tricked and demonized him, his winding up in Moscow was the work of the Obama administration and that he was really trying to get to South America. You can see it all in the Oliver Stone movie; thats the narrative.

The problem with that narrative, and its very simple, is that he didnt take two, or three, or a thousand documents bearing on his whistleblowing. He stole, or as the House Intelligence Committee says, removed, 1.5 million files, some of which had as many as 32,000 pages. He took a massive amount of communication and signal intelligence: more than anyone in history has ever taken before. These included 900,000 military documents involving submarines, drones, planes, cyberwarfare that had nothing to do with whistleblowing. Just imagine if someone robbing a bank found a few pages in the bank that showed it wasnt giving the proper rebates to the customers and he took those to the media, and took the rest of the haul away: You wouldnt call the guy a whistleblower, youd call him a bank robber. Thats what Snowden did.

Snowden stopped in Hong Kong and had a disclosure operation there where he disclosed to reporters all of whom were honest reporters, I would have done the same thing they did and so would have any other reporter that he was with the NSA and then presented them with documents that showed that the NSA was involved with an illegal program. Whether they were illegal or just questionable is an argument, but lets give him credit and say they were illegal. What he didnt tell the reporters, these reporters who almost became like the prophets of a religion, was that he had met with officials of the Russian government. How do we know that? Its because Vladimir Putin, of all people, decided to disclose that Snowden had met with Russian officials in Hong Kong before he was granted asylum. We know that he was in contact with the Russians, and he didnt disclose that.

He also didnt disclose that he removed 1.5 million documents. How do we know that he removed that large number? Were talking about digital copies, its not like he took books and theyre missing from the library. In this digital world, you make a copy of something and the original remains where it is. The way we know is that he transferred them between computers and left a trail that he tried to erase but the NSA and Department of Defense was able to reconstruct. We know that because the House Intelligence Committee, the oversight committee for the NSA, did a report which was released in September 2016 that stated that the house committee had been given a damage assessment by the Department of Defense. Thats how we know that, but he didnt tell the reporters this. He denied it. So the narrative begins that this is a whistleblower who made headlines by exposing some very unsavory programs that the NSA was involved in.

Everyone wants privacy I dont blame them and to them, Snowden was a hero because he was standing up for his privacy. What they didnt know was about his meeting with the Russians, and how many documents he took. At the time he took them and for many months after, the NSA didnt know the total size of the damage because they didnt know how he transferred them. It was the Department of Defense that actually had a team of between 200 and 250 intelligence officers reading through every document that pieced together the trail which led to a server in the cryptocenter where he was working and they were able to reconstruct the number of files he transferred to it. Snowdens narrative was a false narrative in every respect. Like all false narratives, it had a number of true statements in it, and these can convince people that all of it cant be lies. Some of what he said was truthful.

SR: How is it that someone like Snowden, who had very little formal background in what he did, get the clearance that he had? How did he manage to get these documents out of what I would have to assume is a very secure facility?

EJE: Snowden had very little formal education. He dropped out of high school in his first year. Thats not to say that he wasnt smart, but he had no formal education. He loved to play games and loved computers, apparently. I was able to reconstruct that from his posts, tweets, and other social media.

His entire family worked for the government. His grandfather, Edward Barrett, was an admiral in the Coast Guard, and then worked for a CIA joint task force. Then he had a high position in the FBI. His father was a member of the Coast Guard. His mother worked for a court in Maryland. His sister worked for the Federal Judicial Center. Everyone in his family worked for the government, so it wasnt surprising that he would look for a government job.

He tried to be in the military but was administratively discharged after a few months. He then worked as a security guard for a facility at the University of Maryland that was related to the NSA, so he got a security clearance. Then he joined the CIA as a TCO: a Technical Communications Officer. After he got fired, or forced to resign, he sought out private contractors.

Private contractors look for one thing besides a person who knows how to work a computer: They look for someone who already has a security clearance. When you leave the CIA, you keep your SCI (sensitive compartmentalized information) security clearance for two years, even if you leave under a cloud, like Snowden did. He had an SCI security clearance, so he was very valuable. A contractor wouldnt have to go through the trouble of getting him a security clearance.

He went to Japan, where he worked for Dell SecureWorks: a private contractor. He did okay, and a few months later, he took the most valuable of information and went to work for Booz Allen. He offered to take a pay cut, and again, he was very valuable because he had an SCI clearance, so they snapped him up. He went to work at the center for five or six weeks, maybe less, and stole all the information there and left.

It started at the CIA: He got the security clearance there and kept it. The real scandal is not so much Snowden, but how American intelligence has privatized intelligence by having outside contractors run the computers. Hes part of the scandal.

SR: I assume that I wouldnt be able to walk out with a flash drive very easily were I an employee of one of these agencies, and the information is compartmentalized, too. How was he able to get access to this and get it out? I would have thought that it was impossible until I read the book.

EJE: It was close to impossible. Snowden organized it very cleverly. He started work in the second week of April 2013 at Booz Allen, which had a contract at the cryptology center in Hawaii. Its a tall, modern building at Wheeler Air Force Base. He went to work there, and because the information and methods they worked with were so secret, independent contractors like Snowden werent allowed to have what they called fat computers: portable computers with ports and storage capability. Everyone worked with the NSA equivalent of an iPad: a thin computer. Its a security measure so no one can steal information.

What Snowden managed to do was to use his thin computer to transfer the data to a server at the center. He had the passwords to that, and according to the House Select Committee on Intelligence, he drove the twenty minute drive to the place he formerly worked, a place called the Kunia Tunnel, where he had left his old computer a fat computer and used it to download the information from the server into that computer. From there, he put it on thumb drives and took it.

The whole operation was extremely complicated for someone who had been working at the cryptological center for two weeks or something like that. Had he planned it in advance? Did he have someone working with him at his old job at the Kunia Tunnel that had his old computer? None of it is very clear to me. He didnt have passwords for any of the compartments he entered. One way or the other, and I dont know the way, I only know now that the FBI is willing to assume he did it alone and Im reporting that, he managed to get the information downloaded to his old computer.

Leaving the NSA is not a big deal: Hundreds of people work at the center and they leave every night to go home. Theres a big parking lot and they walk out. I sort of went to the center and was only allowed in a few feet, but I could see the parking lot and the people leaving and they just stream out. They randomly check people, supposedly, but if theres a random check I would say its one in a thousand, just observing it. Snowden walked out with the external drives, got on an airplane, and went to Hong Kong. Thats how he stole the information.

SR: Id like to fast forward to a point in the story that I think is particularly salient right now. He took all of this information to Russia and disappeared for a while. We had nothing more from him than basically a promise that he wouldnt turn over documents to them that were dangerous to our national security.

EJE: He didnt promise anyone anything. The important thing here is that he met with what Putin called diplomats. Russian diplomats often have a second job, intelligence, especially in a place like Hong Kong. Putin used the plural, diplomats, not a diplomat. He might have met with them before he met with the journalists, but they knew, suddenly everyone in the world knew after he met with the journalists that he had a large number of documents. Maybe just 15,000, not 1.5 million, but they knew he had a large number. The Russians knew that and he was put on a Russian airplane and was flown to Russia.

Snowdens passport was suspended in Hong Kong, so why the Russians put him on the plane is speculation. My guess is that they knew he was going to give them a lot of information, or they had already gotten it before he got on the plane. In any case, he flew to Russia and was taken off the plane in what they called a special operation. Then he disappeared from June 23 to July 14. During that time, no one in the outside world no journalists saw him. They didnt see him getting off the plane, so the last time they saw him was in Hong Kong.

In that period, as the various American intelligence services I spoke with said, he was their man: He was in the palm of their hands. They didnt have to threaten him with torture, they could just threaten him by sending him back to America. America was trying to get him back. He said he gave nothing to the Russians, but almost every spy who goes to Russia, or China, or everywhere else, says they gave nothing to them. That, simply, is another part of his narrative: that he gave nothing to Russia.

Since Putin jeopardized a summit conference that was scheduled with Obama for September, and Obamas participation in, or attendance at, the Winter Olympic games that were scheduled in Sochi, he knew he was going to pay a high price. One has to assume that he also knew he would get something back for it.

SR: How bad has this hurt the United States? The topic of Russian hacking is top news right now. Can we see a connection between anything Snowden provided, our current political climate, and how the intelligence community was affected?

EJE: Its hard to deny or neglect the connection between the damage that Snowden did and the presence of Russian intrusions in cyberspace. The moment the NSA determined Snowden had taken those 1.5 million files and the Pentagon had gone through each and every one of those files which took four months around the clock it didnt matter whether he had given the files to Russia, or China, or journalists, or thrown them into the ocean, or burned them. The moment those files were taken out of the secure environment of the NSA in Hawaii, they had to be considered compromised. When a source, or the sources in these documents, are compromised, theres only one thing to do: shut them down. You dont know if the Russians got them, but if they did, theyll arrest anyone connected with them, or use the channels to feed disinformation through.

What happened after Snowden removed those files was a massive case of self-destruction. The NSA had to close down every source in those files. That meant that, basically, the NSA and CIA suddenly went dark, and anyone who depended on them for intelligence on Russian and China, couldnt anymore.

Deputy Director of the NSA Richard Ledgett described one of those files as the keys to the kingdom: It contained every gap in American coverage of Russia. That file gave whomever obtained it a road map to everything the United States, Britain, and Israeli intelligence was doing. All of the sources had to be closed down. The NSA was shut down in a large part of its coverage of adversary nations, which included North Korea, China, and Russia.

Now the question comes is what damage is done when the NSA goes dark. The answer is the old adage: When the cat is away, the mice will play. Russia, realizing that we had to shut down all of our sources, now had a tremendous amount of room to establish its own activities, which included not only hacking and a lot of attention has been paid to hacking and false news but that cant be successful unless theres a feedback loop: a way in which theyre able to assess where its going right and where its going wrong, and where it is achieving their purposes and where it is counterproductive. They needed to establish their own penetrations and everything that goes with them.

In the black period that started as soon as the NSA realized these documents were taken in the Spring of 2013, the agency had to find new sources. Whether they did or didnt I dont know, but the vice chairman of Booz Allen, and the former director of the NSA and former Director of National Intelligence, Michael McConnell, said that generations of intelligence was lost by Snowdens act. If I understand that properly, generations means intelligence that has been gathered over twentyyears is one generation and it goes on. Huge amounts of sources were compromised, which left huge opportunities for Russia to become more aggressive, especially in cyberspace. I dont think we can ignore the possible connection between the loss of our own ability to defend ourselves in cyberspace and the intrusion of other countries, including Russia.

Continued here:
Hail to the Thief: The Case Against Edward Snowden - Signature Reads

Edward Snowden: An argument for treachery – UVU Review

Edward Snowdens illegal release of classified information will rank among the most widely debated issues of the millennial generation. One side of the argument depicts Snowdens actions as honorable, if not patriotic. Others cry foul.

David Menzies brought the conversation to UVU in the Jan. 9, 2017 edition of The Review. I encourage you to read his artful summation of the situation and his call for Snowdens safe returnand heros welcometo the United States. Many will welcome Snowden home, but as a hero, I sincerely doubt.

Snowden claimed the National Security Agency, or NSA, was violating the Fourth Amendment to the Constitution. As an employee of both the Central Intelligence Agency and the NSA subcontractor, Booz Allen Hamilton, Snowden was trained in the proper use and handling of classified information and materiel. We can be certain he received this training as it is both regular and mandatory.

Subsection 798 (a) of Title 18, US code states it is against federal law if a person knowingly and willfully communicates, furnishes, transmits, or otherwise makes available to an unauthorized person, or publishes, or uses in any manner prejudicial to the safety or interest of the United States or for the benefit of any foreign government to the detriment of the United States any classified information. Suffice it to say, by leaking classified material, Snowden broke the law.

Regardless of rhetoric, Snowden knew the rules and he chose to violate them. He claimed he took his concerns to multiple superiors and reported being ignored. He then decided his only option was treason and espionage. Subsection 2302 (b) (8) of Title 5, US code protects intelligence whistleblowers from punitive action. His failure to pursue this institutionalized last resort indicates either contempt for the US government or a preconceived radicalization.

Laws especially those in Title 18, US code should apply to everyone charged with the care of classified material. But do they?

Menzies aptly described the US government as a snake eating its tail. US Attorney General Loretta Lynch, the nations lead prosecutor concerning violations of federal law, was unable to define the very laws Snowden was condemned for breaking, during her July 12, 2016 testimony before the House Judiciary Committee.

When Hillary Clinton was accused of mishandling classified material, the same debate erupted. Congressman Jason Chaffetz of Utah asked Lynch whether mishandling of classified material was against the law. Lynch replied with, It depends.

How are contractors supposed to know and respect the law when Attorney General Lynch refuses to acknowledge them?

When I asked Congressman Chaffetz about Lynchs responses to his questions he said, Its ridiculous. [People] should be in prison.

Snowden

Visit link:
Edward Snowden: An argument for treachery - UVU Review

Encryption | California State University, Northridge

Bluetooth itself as a technology isn't secure, it's not only about the implementation, there are some serious flaws in the design itself. Bluetooth isn't a short range communication method - just because you're a bit far doesn't mean you're safe.Class I Bluetooth deviceshave a range up to 100 meters. Bluetooth isn't a mature communicate method (security-wise). With smart phones, it has turned into something totally different from what it was meant to be. It was created as a way to connect phones to peripherals. Please don't use Bluetooth for accessing Level 1 data.

If you do need to use Bluetooth devices please do the following

Here is theWindows documentation.

Here is theMacintosh documentation

Disk encryption safely protects all the data stored on a hard drive. When the entire hard disk is encrypted, everything on that disk is protected if the computer is lost or stolen. CSUN recommends the following drive encryption programs for non-portable storage devices. Select the appropriate link for more information on how to use each program:

E-mails may be encrypted and/or authenticated to prevent the contents from being read by unintended recipients. Please ask your local tech if you believe you need to encrypt e-mail messages.

The following encryption methods are available for protecting files and folders stored on portable storage devices such as, USB sticks, external hard drives and other mobile devices. Select the appropriate link below for more information on how to use each program:

There are storage devices that use hardware based encryption.

File encryption is designed to protect stored (at rest) files or folders.

Additional information is available by clicking on each product name.

Caution: Data in encrypted files are not retrievable if the encryption key is lost.

Following are examples of file encryption software to use when encrypting your data:

The following productivity tools let you password-protect and/or encrypt individual files:

It is possible to encrypt entire networks, which may be desirable in certain situations. If you think this may be relevant to you, please contact your local tech for assistance.

Visit link:
Encryption | California State University, Northridge

How have ARM TrustZone flaws affected Android encryption? – TechTarget

Google received a lot of praise for the security improvements in Android N, but some security experts have taken...

Enjoy this article as well as all of our content, including E-Guides, news, tips and more.

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Google to task over what they claim are shortcomings with Android N encryption. What are the issues with Android N's encryption scheme?

Encryption is the cornerstone of information security, yet it is notoriously difficult to implement well, particularly on desktops and mobile devices used by non-tech-savvy users. Ease of use, speed and data recovery all need to be balanced against robust encryption.

The two main technologies for meeting these requirements are full disk encryption (FDE) and file-based encryption (FBE). FBE only encrypts selected folders or files, which remain encrypted until the user chooses to access them by providing the correct credentials. FDE encrypts the entire contents of a device's hard drive, so if the device is lost or stolen, or the drive is placed into another device, all the data remains protected. However, once a user unlocks their device, none of the data is protected, as the entire contents of the drive will have been decrypted. While desktop computers are regularly turned off, most mobile devices are left on indefinitely, leaving sensitive data decrypted and potentially accessible to unauthorized users.

Since Android version 5.0, Android devices have had FDE enabled by default. This is based on the Linux kernel subsystem dm-crypt, a widely used and robust encryption scheme. But, like every encryption scheme, it is only as strong as the key used to encrypt the data.

An independent researcher, Gal Beniamini, posted an exploit code that breaks Android's FDE on devices running on Qualcomm chips by leveraging weaknesses in the chips' design.

ARM TrustZone is a system-on-a-chip and CPU system-wide approach to security that supports a Trusted Execution Environment, backed by hardware-based access control, which cannot be interfered with by less trusted applications or the operating system.

Android's Keystore Keymaster module is intended to assure the protection of cryptographic keys generated by applications, and it runs in the ARM TrustZone. It contains the device encryption key (DEK) used for FDE, which is further protected through encryption with a key derived from the user's unlock credentials. This key is bound to the device's hardware through the intermediate Keymaster signature. This means all cryptographic operations have to be performed directly on the device itself by the Keymaster module, thus preventing off-device brute force attacks.

However, as the key derivation process is not truly hardware-bound, the Keymaster signature is stored in software instead of hardware, and is directly available to the TrustZone. This makes Android's FDE only as robust as the ARM TrustZone kernel or Keymaster module.

Beniamini's previous blog posts have shown that applications that run in the TrustZone in Android devices using Qualcomm chips can be reverse-engineered. By reverse-engineering the Keymaster module and leveraging two ARM TrustZone kernel vulnerabilities he discovered, Beniamini developed an off-device exploit to decrypt the DEK. No longer restricted to a limited number of password attempts, the user's credentials can be brute forced by passing them through the key derivation function until the resulting key decrypts the stored DEK. Once the DEK is decrypted, it can be used to decrypt the entire drive, breaking Android's FDE scheme. The attacker can also downgrade a patched device to a vulnerable version to extract the key.

This flaw makes Android's FDE implementation far weaker than Apple's, which has encryption keys that are properly bound to the device's hardware, and which are never divulged to software or firmware. This means an attacker must brute force an iOS user's password on the device. This requires overcoming the on-device protections, like delays between decryption attempts and wiping user data after so many failed attempts. Android devices, on the other hand, perform encryption using keys which are directly available to the ARM TrustZone software.

Poor implementation is usually the weak point in any encryption technology. While the two ARM TrustZone vulnerabilities used by Beniamini, CVE-2015-6639 and CVE-2016-2431, have been patched, many devices remain susceptible to the attack because they have yet to receive the patches. This is a constant problem that plagues Android devices due to restrictions and delays created by manufacturers or carriers that prevent end users from receiving or installing the updates they release.

Read about the new memory protection features in the Linux kernel on Android OS

Learn about the security features in the Samsung Knox platform

Find out the differences between symmetric and asymmetric encryption types

Go here to read the rest:
How have ARM TrustZone flaws affected Android encryption? - TechTarget

Why isn’t US military email protected by standard encryption tech? – Naked Security

One of the United States Senates most tech-savvy members is asking why much of the US militarys email still isnt protected by standard STARTTLS encryption technology.

Last month, Sen. Ron Wyden (D-Oregon) shared his concerns with DISA, the federal organization that runs mail.mil for the US army, navy, marines and the Coast Guard:

The technology industry created STARTTLS fifteen years ago to allow email servers to communicate securely and protect email messages from surveillance as they are transmitted over the internet. STARTTLS is widely supported by email server software but, critically, it is often not enabled by default, meaning email server administrators must turn it on.

Wyden noted that major tech companies including Google, Yahoo, Microsoft, Facebook, Twitter, and Apple use STARTTLS, as do the White House, Congress, NSA, CIA, FBI, Director of National Intelligence, and Department of Homeland Security but not DISA.

A 2015 Motherboard investigation originally uncovered the limited use of STARTTLS by U.S. government security agencies. Since then, Motherboard reports, many of the aforementioned agencies have started using STARTTLS but not DISA.

Wyden observed that until DISA enables STARTTLS, unclassified email messages sent between the military and other organizations will be needlessly exposed to surveillance and potentially compromised by third parties.

Even if all the military messages sent through DISAs servers are unclassified, if Wyden is correct, this might conceivably give adversaries additional insights into the US militarys structure, decision-makers, and decision-making processes.

Early reports on Wydens letter quoted DISA as saying that it would respond formally to him. DISA told Naked Security:

We are not at liberty to discuss specific tactics, techniques, and procedures by which DISA guards DOD email traffic. Email is one of the largest threat vectors in cyberspace. We can tell you that DISA protects all DOD entities with its Enterprise Email Security Gateway Solution (EEMSG) as a first line of defense for email security.

DISAs DOD Enterprise Email (DEE) utilizes the EEMSG for internet email traffic and currently rejects more than 85% of daily email traffic due to malicious behavior. DISA inspects the remaining 15% of email traffic to detect advanced, persistent cybersecurity threats. The Agency always makes deliberate risk-based decisions in the tools it uses for cybersecurity, to include email protocols for the DoD.

In the news you can use spirit, this might be a good time for a brief primer on STARTTLS. This SMTP extension aims to partially remedy a fundamental shortcoming of the original SMTP email protocol: it didnt provide a way to signal that email communication should be secured as messages hop across servers towards their destinations.

Using STARTTLS, an SMTP client can connect over a secure TLS-enabled port; the server can then advertise that a secure connection is available, and the client can request to use it.

STARTTLS isnt perfect. It can be vulnerable to downgrade attacks, where an illicit man-in-the-middle deletes a servers response that STARTTLS is available. Seeing no response, the client sends its message via an insecure connection, just as it would have if STARTTLS never existed. But, as the Internet Engineering Task Force (IETF) puts it, this opportunistic security approach offers some protection most of the time.

IETF says protocols like STARTTLS are:

not intended as a substitute for authenticated, encrypted communication when such communication is already mandated by policy (that is, by configuration or direct request of the application) or is otherwise required to access a particular resource. In essence, [they are] employed when one might otherwise settle for cleartext.

For context, Google reports that 88% of the Gmail messages it sends to other providers are now encrypted via TLS (in other words, both Google and the other provider supports TLS/STARTTLS encryption); 85% of messages inboundto Gmail are encrypted.

Would STARTTLS offer value in securing the military communications DISA manages through mail.mil? From the outside, its easy to say Yes. But it sure would be fascinating to hear the technical conversation between DISAs security experts and Senator Wydens.

Email service providers are caught on the horns of a dilemma, it seems. Naked Securitys Paul Ducklin says:

STARTTLS only deals with server-to-server encryption of the SMTP part, so it isnt a replacement for end-to-end encrypted email in environments where thats appropriate.In other words, there are situations in which you may be able to make a strong case for not needing STARTTLS. But my opinion is that its easier just to turn on STARTTLS anyway just think of all the time youll save not having to keep explaining that strong case of yours.

As for you: if you arent using STARTTLS wherever its available to you, why not?

Read the rest here:
Why isn't US military email protected by standard encryption tech? - Naked Security

Keeping the enterprise secure in the age of mass encryption – Information Age

By automatically discovering every key and certificate generated by your organisation as they are created, and integrating this data into security tools, you can finally shine a light on encrypted tunnels

Organisations have always been told that strong encryption is their friend. When applied to internet traffic, encryption secures the connection between user and website, locking the bad guys out and foiling the hijackers attempting to spoof legitimate sites or eavesdrop on communications.

So when Mozilla recently revealed that the majority of web pages loaded by Firefox used the secure HTTPS protocol, it seemed like a good news day for information security. Naturally, the story is far more complex than that.

The truth is that the hackers are getting increasingly adept at hiding in these encrypted tunnels which disguises their attacks from even the best defences. For example, roughly 90% of CIOs have already been attacked, or expect to be, by hackers hiding in encrypted traffic.

>See also:Enterprises using IoT arent securing sensitive data Thales

Businessesurgently need to improve their management of encrypted tunnels, or they risk compromising the effectiveness of our cyber security defences. But for that to happen, organisations must first gain visibility and control over their expansive estates of digital keys and certificates.

These keys and certificates are the cryptographic assets that form the foundation of encryption, allowing machines to identify each other in the same way usernames and passwords work for human users.

CISOs do not accept having limited visibility over identity and access management for all their users the same rigorous oversight needs to be extended to keys and certificates.

The growth of HTTPS is both a positive and negative thing. Encryption is the primary tool used to keep internet transactions out of the reach of prying eyes, and weve seen increased adoption over the past few years, partly driven by revelations of mass state surveillance exposed by NSA whistleblower Edward Snowden.

HTTPS protects the sensitive data of hundreds of millions of users around the world, offering protection against man-in-the-middle attacks and attackers looking to spoof trusted sites.

Encrypted traffic is beginning to become the norm, rather than the exception, and a survey from this years RSA Conference showed that this trend will continue: two-thirds (66%) of attendees said that their organisation is planning to increase encryption usage.

>See also:Who owns your companys encryption keys?

But what happens when a hacker manages to get into encrypted traffic? This is not a hypothetical problem a third (32%) of security professionals at RSA said that they are either not confident or have only 50% confidence in their organisations ability to protect and secure encrypted communications.

And once a hacker does get into encrypted traffic it will offer the same protections, but this time against the organisations security tools. Intrusion detection and prevention systems, firewalls and similar tools are rendered useless, unable to inspect the traffic going in and out of the organisation.

A hacker could hide malware or web exploits from these tools to launch an attack and then use the encrypted tunnel to ferry stolen data out again.

The problem ultimately boils down to the digital keys and certificates that form the Internets base of cyber security and trust. Today, this system is used to secure everything from online banking to mobile apps and the Internet of Things (IoT). Theres just one problem: our foundation is built on sand.

The volume of keys and certificates has exploded over recent years, thanks to virtualisation and the growth in mobile devices, cloud servers and now the IoT. Everything with an IP address depends on a key and certificate to create a secure connection.

>See also:Network security doesnt just begin and end with encryption

But organisations simply cant keep track of this explosive growth, often leaving them unsecured and managed manually. This has allowed cyber criminals to sneak in and use unprotected keys and certificates for their own ends.

The problem will only get worse as the number of IoT devices grows. Gartner recently claimed 8.4 billion connected devices will be in use globally by the end of 2017, up 31% from 2016, and reach a staggering 20.4 billion by 2020.

Additionally, half of the organisations Venafi polled last year said they saw key and certificate usage grow by over 25%. And one in five claimed it had increased by more than 50%.

As keys and certificates grow, so do the opportunities for the hackers. But there is hope. If were able to provide our security tools with the all-important keys, then they can open up and inspect encrypted traffic to ensure it doesnt contain anything malicious.

This is easier said than done; especially given the hundreds of thousands of keys and certificates a typical organisation must manage. New keys and certificates are retired and created every day.

What organisations need is centralised intelligence and automation system. This will ensure that all security tools are provided with a continuously updated list of all the relevant keys and certificates they need in order to inspect encrypted traffic.

>See also:Keys to the castle: Encryption in the cloud

By automatically discovering every key and certificate generated by your organisation as they are created, and integrating this data into security tools, you can finally shine a light on encrypted tunnels.

The result? IT leaders will not only benefit from improved resilience from cyber attacks, data breaches and the like, but also finally gain full value from their technology investments.

With encrypted traffic growing all the time and 85% of CIOs expecting criminal misuse of keys and certificates to get worse, businessescant afford to hang around.

Sourced byKevin Bocek, chief cyber-security strategist atVenafi

Nominations are now open for theTech Leaders Awards 2017, the UKs flagship celebration of the business, IT and digital leaders driving disruptive innovation and demonstrating value from the application of technology in businesses and organisations. Nominating is free and simply: just click here to enter. Good luck!

Go here to see the original:
Keeping the enterprise secure in the age of mass encryption - Information Age