Edward Snowden and The Wire creator David Simon had a …

Listen up, internet: This is how to respectfully debate someone you disagree with.

On Sunday (March 20), the NSA contractor-turned-whistleblower Edward Snowden and David Simon, the creator of the acclaimed HBO show The Wire, engaged in a thoughtful, polite debate about government surveillance. It started when Snowden, prompted by a New York Times article (paywall) about the arrest of a suspect in Novembers Paris attacks, jokingly suggested that The Wire had helped the terrorists.

The Times article revealed that the attackers had frequently used disposable burner cell phones to avoid detectionjust as the street-level drug dealers in Simons acclaimed show used such phones to thwart police (video) who were trying to listen in.

(The joke was probably partly self-referential: Authorities in the aftermath of the Paris attacks directly and indirectly blamed Snowdens revelations for teaching the terrorists how to avoid phone surveillance.)

Before making The Wire, Simon was a police reporter for the Baltimore Sun for 13 years. Many of the investigative techniques prominent in the show, including wiretapping and tracking public pay phones, were based on Simons experience observing how Baltimore police surveilled the drug kingpins and their low-level corner boys.

Snowden now lives in Russia, where he has asylum from US attempts to charge him with various crimes. He signed up for Twitter in September.

After catching wind of Snowdens tweet, Simon responded:

(The Greek refers to a character in The Wire who leads a crime syndicate that supplies heroin to drug dealers and deals in human trafficking.)

The discussion eventually evolved into a broader look at the United States National Security Agencys surveillance program, and Snowdens decision to blow the whistle on it.

(August 1914 likely refers to the beginning of World War I.)

Smith v. Maryland was a 1979 US Supreme Court case that determined that pen registers were not protected by the Fourth Amendment against illegal searches and seizures, and thus could be obtained without a warrantan argument that has been applied to phone metadata in 2016 (to the dismay of Snowden and others who say the government has overstepped).

While the conversationbetween two men from very different worlds, both well-versed in the jargon of and arguments around surveillanceis not always easy to follow, it offers a powerful illustration of how Twitter can enable interesting and important public discourse between high-profile people.

The exchange coincidentally happened just a day before Twitters 10th anniversary. The platform has come a long way since its first tweet.

Read the original here:
Edward Snowden and The Wire creator David Simon had a ...

WikiLeaks publishes searchable archive of Clinton emails …

The secret-sharing website WikiLeaks has published a searchable archive of more than 30,000 Hillary Clinton emails that have been released by the State Department.

Unveiled on Wednesday, the archive allows users to browse through 30,322 emails and attachments sent to or from Clinton's private email server while she was secretary of state. In all, the archive comprises 50,547 pages spanning from June 30, 2010, to Aug. 12, 2014. According to the site, Clinton authored 7,570 of those documents.

More from the Washington Examiner

The petition's author claims the Islamic State could launch a terrorist attack during the convention.

03/27/16 5:17 PM

The State Department began releasing the emails in May of last year pursuant to a Freedom of Information Act request, but it is the first time that the messages have been made easily available in a searchable format. The final PDFs of all the emails were just made available by the State Department last month.

Though the department has completed its publication of Clinton emails, it is now set to review 29,000 pages of emails sent or received by Huma Abedin, who served as Clinton's deputy chief of staff from 2009-13. The department has said it plans to review at least 400 pages of Abedin's emails every month. Completion is expected by April 2017.

While Wikileaks' Wednesday release involved publicly available documents, the site has gained a reputation for illegally leaking classified information, including from the State Department. Army Pvt. Bradley Manning, now known as Chelsea Manning, is serving a 35-year prison sentence for leaking documents to the site both from the State and Defense Departments.

Also from the Washington Examiner

"We need to have a more robust effort and we need to assemble that coalition," the Wisconsin Republican said.

03/27/16 4:08 PM

The site has also published files stolen from defense firm Stratfor, the Saudi Foreign Ministry and the National Security Agency, among others.

Top Story

55 dead and more than 100 wounded include many women and children.

03/27/16 1:34 PM

The rest is here:
WikiLeaks publishes searchable archive of Clinton emails ...

U.S. Intelligence Analyst Arrested in Wikileaks Video …

Skip Article Header. Skip to: Start of Article.

Federal officials have arrested an Army intelligence analyst who boasted of giving classified U.S. combat video and hundreds of thousands of classified State Department records to whistleblower site Wikileaks, Wired.com has learned.

PFC Bradley Manning, 22, of Potomac, Maryland, was stationed at Forward Operating Base Hammer, 40 miles east of Baghdad, where he was arrested nearly two weeks ago by the Armys Criminal Investigation Division. A family member says hes being held in custody in Kuwait, and has not been formally charged.

Manning was turned in late last month by a former computer hacker with whom he spoke online. In the course of their chats, Manning took credit forleaking a headline-makingvideo of a helicopter attack thatWikileaks posted online in April. The video showed a deadly 2007 U.S.helicopter air strike in Baghdad that claimed the lives of several innocentcivilians.

He said he also leaked three other items to Wikileaks: a separate videoshowing the notorious 2009 Garani air strike in Afghanistan that Wikileakshas previously acknowledged is in its possession; a classified Army document evaluatingWikileaks as a security threat, which the site posted in March; and apreviously unreported breach consisting of 260,000 classified U.S.diplomatic cables that Manning described as exposing almost criminal political back dealings.

Hillary Clinton, and several thousand diplomats around the world are going to have a heart attack when they wake up one morning, and find an entire repository of classified foreign policy is available, in searchable format, to the public, Manning wrote.

Wired.com could not confirm whether Wikileaks received the supposed 260,000 classified embassy dispatches. To date, a single classified diplomatic cable has appeared on the site: Released last February, it describes a U.S. embassy meeting with the government of Iceland. E-mail and a voicemail message left for Wikileaks founder Julian Assange on Sunday were not answered by the time this article was published.

The State Department said it was not aware of the arrest or the allegedly leaked cables. The FBI was not prepared to comment when asked about Manning.

Army spokesman Gary Tallman was unaware of the investigation but said, If you have a security clearance and wittingly or unwittingly provide classified info to anyone who doesnt have security clearance or a need to know, you have violated security regulations and potentially the law.

Mannings arrest comes as Wikileaks has ratcheted up pressure against various governments over the years with embarrassing documents acquired through a global whistleblower network that is seemingly impervious to threats from adversaries. Its operations are hosted on servers in several countries, and it uses high-level encryption for its document-submission process, providing secure anonymity for its sources and a safe haven from legal repercussions for itself. Since its launch in 2006, it has never outed a source through its own actions, either voluntarily or involuntarily.

Manning came to the attention of the FBI and Army investigators after he contacted former hacker Adrian Lamo late last month over instant messenger and e-mail. Lamo had just been the subject of a Wired.com article. Veryquickly in his exchange with the ex-hacker, Manning claimed to be the Wikileaks videoleaker.

If you had unprecedented access to classified networks 14 hours a day 7 days a week for 8+ months, what would you do? Manning asked.

From the chat logs provided by Lamo, and examined by Wired.com, it appears Manning senseda kindred spirit in the ex-hacker. He discussed personal issues that got himinto trouble with his superiors and left him socially isolated, and said hehad been demoted and was headed for an early discharge from the Army.

When Manning told Lamo that he leaked a quarter-million classified embassy cables, Lamo contacted the Army, and then met with Army CID investigators and the FBI at a Starbucks near his house in Carmichael, California, where he passed the agents a copy of the chat logs. At their second meeting with Lamo on May 27, FBI agents from the Oakland Field Office told the hacker that Manning had been arrested the day before in Iraq by Army CID investigators.

Lamo has contributed funds to Wikileaks in the past, and says he agonized over the decision to expose Manning he says hes frequently contacted by hackers who want to talk about their adventures, and he has never considered reporting anyone before. The supposed diplomatic cable leak, however, made him believe Mannings actions were genuinely dangerous to U.S. national security.

I wouldnt have done this if lives werent in danger, says Lamo, whodiscussed the details with Wired.com following Mannings arrest. He was in a war zone and basically trying to vacuum up as much classified information as he could, and just throwing it up into the air.

Manning told Lamo that he enlisted in the Army in 2007 and held a TopSecret/SCI clearance, details confirmed by his friends and family members. He claimed to have been rummaging through classified military and government networks for more than a year and said that the networks contained incredible things, awful things that belonged in the public domain, and not on some server stored in a dark room in Washington DC.

He first contacted Wikileaks Julian Assange sometime around late November last year, he claimed, after Wikileaks posted 500,000 pager messagescovering a 24-hour period surrounding the September 11, 2001 terror attacks.I immediately recognized that they were from an NSA database, and I feltcomfortable enough to come forward, he wrote toLamo. He said his role with Wikileaks was a source, not quite a volunteer.

Manning had already been sifting through the classified networks for monthswhen he discovered the Iraq video in late 2009, he said. The video, laterreleased by Wikileaks under the title Collateral Murder, shows a 2007Army helicopter attack on a group of men, someof whom were armed, that the soldiers believed were insurgents. The attackkilled two Reuters employees and an unarmed Baghdad man who stumbled on thescene afterward and tried to rescue one of the wounded by pulling him intohis van. The mans two children were in the van and suffered seriousinjuries in the hail of gunfire.

At first glance it was just a bunch of guys getting shot up by ahelicopter, Manning wrote of the video. No big deal about two dozenmore where that came from, right? But something struck me as odd with thevan thing, and also the fact it was being stored in a JAG officersdirectory. So I looked into it.

In January, while on leave in the United States, Manning visited a close friend inBoston and confessed hed gotten his hands on unspecified sensitiveinformation, and was weighing leaking it, according to the friend. Hewanted to do the right thing, says 20-year-old Tyler Watkins. That wassomething I think he was struggling with.

Manning passed the video to Wikileaks in February, he told Lamo. After April 5 when the video was released and made headlines Manning contacted Watkins from Iraq asking him about the reaction in the United States.

He would message me, Are people talking about it? Are the media saying anything? Watkins said. That was one of his major concerns, that once he had done this, was it really going to make a difference? He didnt want to do this just to cause a stir. He wanted people held accountable and wanted to see this didnt happen again.

Watkins doesnt know what else Manning might have sent to Wikileaks. But in his chats with Lamo, Manning took credit for a number of other disclosures.

The second video he claimed to have leaked shows a May 2009 air strike near Garani village in Afghanistan that the local government says killed nearly 100 civilians, most of them children. The Pentagon released a report about the incident last year, but backed down froma plan to show video of the attack to reporters.

As described by Manning in his chats with Lamo, his purported leaking was made possible by lax security online and off.

Manning had access to two classified networks from two separate securedlaptops: SIPRNET, the Secret-level network used by the Department of Defenseand the State Department, and the Joint Worldwide IntelligenceCommunications System which serves both agencies at the Top Secret/SCIlevel.

The networks, he said, were both air gapped from unclassified networks, but the environment at the base made it easy to smuggle data out.

I would come in with music on a CD-RW labeled with something like Lady Gaga, erase the music then write a compressed split file, he wrote. No one suspected a thing and, odds are, they never will.

[I] listened and lip-synced to Lady Gagas Telephone while exfiltratingpossibly the largest data spillage in American history, he added later.Weak servers, weak logging, weak physical security, weakcounter-intelligence, inattentive signal analysis a perfectstorm.

Manning told Lamo that the Garani video was leftaccessiblein a directoryon a U.S. Central Command server, centcom.smil.mil, by officers whoinvestigated the incident. The video, he said, was an encrypted AES-256 ZIPfile.

Mannings aunt, with whom he lived in the United States, had heard nothing about hisarrest when first contacted by Wired.com last week; Debra Van Alstyne said she last saw Manning during his leave in January and they had discussed his plans to enroll in college when his four-year stint in the Army was set to end in October 2011. She described him as smart and seemingly untroubled, with a natural talent for computers and a keen interest in global politics.

She said she became worried about her nephew recently after he disappeared from contact. Then Manning finally called Van Alstyne collect on Saturday. He told her that he was okay, but that he couldnt discuss what was going on, Van Alstyne said. He then gave her his Facebook password and asked her to post a message on his behalf.

The message reads: Some of you may have heard that I have been arrested for disclosure of classified information to unauthorized persons. SeeCollateralMurder.com.

An Army defense attorney then phoned Van Alstyne on Sunday and said Manningis being held in protective custody in Kuwait. He hasnt seen the case file, but he does understand that it does have to do with that CollateralMurder video, Van Alstyne said.

Mannings father said Sunday that hes shocked by his sons arrest.

I was in the military for five years, said Brian Manning, of Oklahoma. I had a Secret clearance, and I never divulged any information in 30 years since I got out about what I did. And Brad has always been very, very tight at adhering to the rules. Even talking to him after boot camp and stuff, he kept everything so close that he didnt open up to anything.

His son, he added, is a good kid. Never been in trouble. Never been on drugs, alcohol, nothing.

Lamo says he felt he had no choice but to turn in Manning, but that hes now concerned about the soldiers status and well-being. The FBI hasnt told Lamo what charges Manning may face, if any.

The agents did tell Lamo that he may be asked to testify against Manning. The Bureau was particularly interested in information that Manning gave Lamo about an apparently-sensitive military cybersecurity matter, Lamo said.

That seemed to be the least interesting information to Manning, however. What seemed to excite him most in his chats was his supposed leaking of the embassy cables. He anticipated returning to the states after his early discharge, and watching from the sidelines as his action bared the secret history of U.S. diplomacy around the world.

Everywhere theres a U.S. post, theres a diplomatic scandal that will be revealed, Manning wrote. Its open diplomacy. World-wide anarchy in CSV format. Its Climategate witha global scope, and breathtaking depth. Its beautiful, and horrifying.

Update: The Defense Department issued a statement Monday morning confirming Mannings arrest and his detention in Kuwait for allegedly leaking classified information.

United States Division-Center is currently conducting a joint investigation says the statement, which notes that Manning is deployed with 2nd Brigade 10th Mountain Division in Baghdad. The results of the investigation will be released upon completion of the investigation.

View post:
U.S. Intelligence Analyst Arrested in Wikileaks Video ...

Encryption FAQs – Bureau of Industry and Security

1. What is an encryption registration? How long does it take to receive a response from BIS for my encryption registration?

2. Who is required to submit an Encryption Registration, classification request or self-classification report?

3. What are my responsibilities for exporting or re-exporting encryption products where I am not the producer?

4. What should I do if I cannot obtain the encryption registration Number (ERN) or the Export Control Classification Number (ECCN) for the item from the producer or manufacturer?

5. Can a third-party applicant submit an encryption registration and self-classification report on my behalf?

6. How do I report exports and reexports of items with encryption?

7. Can I export encryption technology under License Exception ENC?

8. What is non-standard cryptography?

9. How do I complete Supplement No. 5 if I am a law firm or consultant filing on behalf of a producer of encryption items?

10. What if you are not the producer of the item or filing directly on behalf of the producer (e.g., law firm/consultant)?

11. What do I need to submit with an encryption commodity classification request in SNAP-R?

12. Is Supplement No. 6 to Part 742 required for obtaining paragraph 740.17(b)(1) authorization?

13. How do I submit a Supplement No. 8 Self-Classification Report for Encryption Items?

14. When do I file Supplement No. 8 Self-Classification Report for Encryption Items?

15. What is Note 4?

16. I have an item that was reviewed and classified by BIS and made eligible for export under paragraph (b)(3) of License Exception ENC in 2009. The encryption functionality of the item has not changed. This item is now eligible for self-classification under paragraph (b)(1) of License Exception ENC. What are my responsibilities under the new rule?

17. When do I need a deemed export license for encryption technology and source code?

18. Does the EAR definition of "OAM" include using encryption in performing network security monitoring functions?

1. What is an Encryption Registration? How long does it take to receive a response from BIS for my Encryption Registration?

Encryption registration is a prescribed set of information about a manufacturer and/or exporter of certain encryption items that must be submitted to the Bureau of Industry and Security as a condition of the authorization to export such items under License Exception ENC or as mass market items.

Advance encryption registration is required for exports and reexports of items described in paragraphs 740.17(b)(1), (b)(2), and (b)(3) and paragraphs 742.15(b)(1), and (b)(3) of the Export Administration Regulations (EAR). Registration is made through SNAP-R by submitting the questionnaire set forth in Supplement No. 5 to part 742 of the EAR (point of contact/company overview/types of products/ etc.). Registration of a manufacturer authorizes the manufacturer as well as other parties to export and reexport the manufacturers encryption products that the manufacturer has either self-classified or has had the items classified by BIS, pursuant to the provisions referenced above. A condition of the authorization is that the manufacturer must submit an annual self-classification report for relevant encryption items.

How long does it take to receive a response from BIS for my encryption registration?

Once you have properly registered with BIS, the SNAP-R system will automatically issue an Encryption Registration Number (ERN), e.g., R123456, upon submission of a request. BIS estimates that the entire registration procedure should take no more than 30 minutes.

2. Who is required to submit an encryption registration, classification request or self-classification report?

Any party who exports certain U.S.-origin encryption products may be required to submit an encryption registration, classification request and/or self-classification report; however, if a manufacturer has registered and has self-classified relevant items and/or had items classified by BIS, and has made the classifications available to other parties such as resellers and other exporters/reexporters, such other parties are not required to register, to submit a classification request, or to submit an annual self-classification report.

3. What are my responsibilities for exporting or re-exporting encryption products where I am not the product manufacturer?

Exporters or reexporters that are not producers of the encryption item can rely on the Encryption Registration Number (ERN), self-classification report or CCATS that is published by the producer when exporting or reexporting the registered and/or classified encryption item. Separate encryption registration, commodity classification request or self-classification report to BIS is NOT required.

Please continue to the next question if the information is not available from the producer or manufacturer.

4. What should I do if I cannot obtain the Encryption Registration Number (ERN) or the Export Control Classification Number (ECCN) for the item from the producer or manufacturer?

If you are not the producer and are unable to obtain the producers information or if the producer has not submitted an encryption registration, self-classification report or commodity classification for his/her products to BIS, then you must register with BIS. The registration process will require you to submit a properly completed Supplement No. 5 to part 742 and subsequent Supplement No. 8 Self Classification Report for the products. You will receive an ERN for the registered products or CCATSs as appropriate. BIS recognizes that non-producers who need to submit for encryption registration may not have all of the information necessary to complete Supplement No. 5 to part 742. Therefore, special instructions have been included in Supplement No. 5 to account for this situation.

For items described in Part 740.17(b)(2) and (b)(3) or Part 742.15(b)(3) that require the classification by BIS, the non-producer is required to submit as much of the technical information required in Supplement No. 6 to part 742 - Technical Questionnaire for Encryption Items as possible.

5. Can a third-party applicant submit an encryption registration and self-classification report on my behalf?

Yes, special instructions for this purpose are provided in paragraph (r) of Supplement No. 2 to part 748 of the EAR for this purpose. The information in block 14 (applicant) of the encryption registration screen and the information in Supplement No. 5 to part 742 must pertain to the company that seeks authorization to export and reexport encryption items that are within the scope of this rule. An agent for the exporter, such as a law firm, should not list his/her name in block 14. The agent however may submit the encryption registration and list himself/herself in block 15 (other party authorized to receive license) of the encryption registration screen in SNAP-R.

6. How do I report exports and reexports of items with encryption?

All reports (i.e., the semi-annual sales report and the annual self-classification report) must be submitted to both BIS and the ENC Encryption Request Coordinator.

An annual self-classification report is required for producers of encryption items described by paragraphs 740.17(b)(1) and 742.15(b)(1) of the EAR. The information required and instruction for this report is provided in Supplement No. 8 to Part 742-Self-Classification Report for Encryption Items. Reports are submitted to BIS and the Encryption Request Coordinator in February of each year for items exported or reexported during the previous calendar year (i.e., January 1 through December 31) pursuant to the encryption registration and applicable sections740.17(b)(1) or 742.15(b)(1) of the EAR. Annual self-classification reports are to be submitted to This email address is being protected from spambots. You need JavaScript enabled to view it. and This email address is being protected from spambots. You need JavaScript enabled to view it..

Semi-annual sales reporting is required for exports to all destinations other than Canada, and for reexports from Canada for items described under paragraphs (b)(2) and (b)(3)(iii) of section 740.17. Paragraph 740.17(e)(1(iii) contains certain exclusions from this reporting requirement. Paragraphs 740.17(e)(1)(i) and (e)(1)(ii) contains the information required and instructions for submitted the semi-annual sales reports. The first report is due no later than August 1 for sales occurring between January 1 and June 30 of the year, and the second report is due no later than February of the following year for sales occurring between July 1 and December 31 of the year. Semi-annual sales reports continue to be submitted to: This email address is being protected from spambots. You need JavaScript enabled to view it. and This email address is being protected from spambots. You need JavaScript enabled to view it..

7. Can I export encryption technology under License Exception ENC?

Yes, License Exception ENC is available for transfer of encryption technology. Specifically, paragraph 740.17(b)(2)(iv) has been amended to permit exports and reexports of encryption technology as follows:

(A) Technology for "non-standard cryptography". Encryption technology classified under ECCN 5E002 for "non-standard cryptography", to any end-user located or headquartered in a country listed in Supplement No. 3 to this part;

(B) Other technology. Encryption technology classified under ECCN 5E002 except technology for "cryptanalytic items", "non-standard cryptography" or any "open cryptographic interface," to any non-"government end-user" located in a country not listed in Country Group D:1 or E:1 of Supplement No. 1 to part 740 of the EAR.

8. What is non-standard cryptography?

Non-standard cryptography, defined in Part 772 Definition of Terms, means any implementation of cryptography involving the incorporation or use of proprietary or unpublished cryptographic functionality, including encryption algorithms or protocols that have not been adopted or approved by a duly recognized international standards body (e.g., IEEE, IETF, ISO, ITU, ETSI, 3GPP, TIA, and GSMA) and have not otherwise been published.

9. How do I complete Supplement No. 5 if I am a law firm or consultant filing on behalf of a producer or exporter of encryption items?

The information in Supplement No. 5 to Part 742must pertain to the registered company, not to the submitter. Specifically, the point of contact information must be for the registered company, not a law firm or consultant filing on behalf of the registered company.

10. What if you are not the producer of the item or filing directly on behalf of the producer (e.g., law firm/consultant)?

You may answer questions 4 and 7 in Supplement No. 5 to part 742as not applicable if your company is not the producer of the encryption item. An answer must be give for all other questions. An explanation is required when you are unsure.

11. What do I need to submit with an encryption commodity classification request in SNAP-R?

Encryption commodity classification determinations should be submitted through SNAP-R. Before entering SNAP-R, you should prepare the following supporting documents:

After accessing SNAP-R, fill-in a commodity classification determination request and upload the supporting documents into SNAP-R.

12. Is Supplement No. 6 to part 742 required for paragraph 740.17(b)(1) authorization?

If you are requesting a classification of an item is described in paragraph 740.17(b)(1) (in other words, the item is not described in either Section 740.17(b)(2) or (b)(3)), a Supplement No. 6questionnaire is not required as a supporting document. Provide sufficient information about the item (e.g., technical data sheet and/or other explanation in a separate letter of explanation) for BIS to determine that the item is described in paragraph 740.17(b)(1). If you are not sure that your product is authorized as 740.17(b)(1) and you want BIS to confirm that it is authorized under 740.17(b)(1), providing answers to the questions set forth in Supplement No. 6 to part 742 with your request should provide BIS with sufficient information to make this determination.

13. How do I submit a Supplement No. 8 Self Classification Report for Encryption Items?

The annual self-classification report must be submitted as an attachment to an e-mail to BIS and the ENC Encryption Request Coordinator. Reports to BIS must be submitted to a newly created e-mail address for these reports (This email address is being protected from spambots. You need JavaScript enabled to view it.). Reports to the ENC Encryption Request Coordinator must be submitted to its existing e-mail address (This email address is being protected from spambots. You need JavaScript enabled to view it.). The information in the report must be provided in tabular or spreadsheet form, as an electronic file in comma separated values format (CSV), only. In lieu of email, submissions of disks and CDs may be mailed to BIS and the ENC Encryption Request Coordinator.

14. When do I file Supplement No. 8 Self-Classification Report for Encryption Items?

An annual self-classification report for applicable encryption commodities, software and components exported or reexported during a calendar year (January 1 through December 31) must be received by BIS and the ENC Encryption Request Coordinator no later than February 1 the following year. If no information has changed since the previous report, an email must be sent stating that nothing has changed since the previous report or a copy of the previously submitted report must be submitted.

15. What is Note 4?

Note 4 to Category 5, Part 2 in the Commerce Control List (Supplement No. 1 to part 774) excludes an item that incorporates or uses cryptography from Category 5, Part 2 controls if the items primary function or set of functions is not information security, computing, communications, storing information, or networking, andif the cryptographic functionality is limited to supporting such primary function or set of functions. The primary function is the obvious, or main, purpose of the item. It is the function which is not there to support other functions. The communications and information storage primary function does not include items that support entertainment, mass commercial broadcasts, digital rights management or medical records management.

Examples of items that are excluded from Category 5, Part 2 by Note 4 include, but are not limited to, the following:

16. I have an item that was reviewed and classified by BIS and made eligible for export under paragraph (b)(3) of License Exception ENC in 2009. The encryption functionality of the item has not changed. This item is now eligible for self-classification under paragraph (b)(1) of License Exception ENC. What are my responsibilities under the new rule?

Your item meets the grandfathering provisions set forth in section 740.17(f)(1) of the EAR. You do not need to submit an encryption registration (Supplement No. 5), an annual self-classification report (Supplement No. 8), or semi-annual sales reports for the item.

17. When do I need a deemed export license for encryption technology and source code?

A license may be required in certain circumstances for both deemed exports and deemed reexports. For encryption items, the deemed export rules apply only to deemed exports of technology and to deemed reexports of technology and source code. There are no deemed export rules for transfers of encryption source code to foreign nationals in the United States. This is because of the way that section 734.2 defines exports and reexports for encryption items.

For transfers of encryption technology within the United States, section 740.17(a)(2) of license exception ENC authorizes the export and reexport of encryption technology by a U.S. company and its subsidiaries to foreign nationals who are employees, contractors, or interns of a U.S. company . . . There is no definition of U.S. company in the EAR, however, BIS has interpreted this to apply to any company operating in the United States. This means that deemed export licenses are generally not required for the transfer of encryption technology by a company in the U.S. to its foreign national employees. A deemed export license may be required if, for example, a company operating in the U.S. were to transfer encryption technology to a foreign national who is not an employee, contractor, or intern of a company in the United States. License exception ENC does not authorize deemed exports or reexports to any national of a country listed in Country Group E:1.

For deemed reexports, the end-user would have to be an employee, contractor, or intern of a U.S. Subsidiary for 740.17(a)(2) to apply, or a private sector end-user headquartered in a Supplement 3 country for 740.17(a)(1) to apply. The term contractor in this context means a contract employee (i.e., a human person). License exception ENC does not authorize deemed exports or reexports to any national of a country listed in Country Group E:1.

Also note that as of June 25, 2010, encryption technology (except technology for cryptanalytic items, Open Cryptographic Interface items, and non-standard cryptography) that has been reviewed is eligible for license exception ENC to any non-government end user located outside of Country Group D:1. Also, encryption source code that has been reviewed by BIS and made eligible for license exception ENC under 740.17(b)(2) is eligible for export and reexport to any non-government end-user. Thus encryption technology and source code that have been reviewed are eligible for export and reexport to a broader range of end-users than 740.17(a) allows. Again, section 740.17 does not authorize deemed exports or reexports to any national of a country listed in Country Group E:1.

18. Does the EAR definition of "OAM" include using encryption in performing network security monitoring functions?

No. The definition of "OAM" includes "monitoring or managing the operating condition or performance of an item." BIS does not consider network security monitoring or network forensics functions to be part of monitoring or managing operating condition or performance.

The phrase "monitoring or managing the operating condition or performance of an item" is meant to include all the activities associated with keeping a computer or network-capable device in proper operating condition, including: configuring the item; checking or updating its software; monitoring device error or fault indicators; testing, diagnosing or troubleshooting the item; measuring bandwidth, speed, available storage (e.g. free disk space) and processor / memory / power utilization; logging uptime / downtime; and capturing or measuring quality of service (QoS) indicators and Service Level Agreement-related data.

However, the "OAM" definition does not apply to cryptographic functions performed on the forwarding or data plane, such as: decrypting network traffic to reveal or analyze content (e.g., packet inspection and IP proxy services); encrypting cybersecurity-relevant data (e.g., activity signatures, indicators or event data extracted from monitored network traffic) over the forwarding plane; or securing the re-transmission of captured network activity.

Thus, products that use encryption for such network security monitoring or forensics operations, or to provision these cryptographic services, would not be released by the OAM decontrol notes (l) or (m), or the Note to 5D002.c.

Similarly, the "OAM" decontrol does not apply to security operations directed against data traversing the network, such as capturing, profiling, tracking or mapping potentially malicious network activity, or "hacking back" against such activity.

Back to top

See the original post:
Encryption FAQs - Bureau of Industry and Security

Bradley Manning Trial FAQ – WikiLeaks

Who is Bradley Manning?

When is the trial?

How long is the trial?

What is Bradley Manning accused of?

What is the potential sentence?

What is the status of the federal investigation against Julian Assange and six other founders, owners or administrators of WikiLeaks?

What is the scope of the WikiLeaks/Manning investigation, which US officials have described as unprecedented both in its scale and nature

How does secrecy in the Manning trial compare to secret trials in Guantanamo Bay?

What legal actions has WikiLeaks taken in relation to BM?

How can Manning be charged with Aiding the Enemy?

What does the Manning trial mean for press freedoms?

Where can I find Bradley Mannings plea statement?

Twenty-five-year-old Bradley Manning is alleged to be the source of a trove of written and audiovisual material detailing, inter alia, war crimes, corruption, torture and human rights violations published by WikiLeaks. Manning is a Nobel Peace Prize nominee. He has won numerous prizes, including The Guardian "Person of the Year" award in 2012. The material concerned every country in the world. It detailed the deaths of hundreds of thousands of people (the majority civilians) in occupied Iraq and Afghanistan. Details of the execution of an Iraqi family and its cover-up ultimately precipitated the end of the Iraq War, after the Iraqi government refused to renew US immunity from prosecution. The material also revealed the existence of US death squads in Afghanistan. More

Manning was deployed as an army intelligence analyst in Iraq. He was arrested in May 2010 at the age of 23. For the first nine months the US army placed Manning in conditions of pre-trial punishment which the UN Rapporteur on Torture found to be inhuman and degrading, in violation of the UN Convention Against Torture. The military judge ruled in January 2013 that Manning had been subjected to unlawful pretrial punishment for 112 days at the Quantico marine brig.

The trial commenced on 3 June 2013. Pre-trial hearings began on 16 December 2011. http://www.bradleymanning.org/learn-more/bradley-manning

The trial is scheduled to last twelve weeks.

View the infographic comparing prosecutions charged dates versus the timeline set out by the Manning plea. Read the charge sheet here

The most serious charge against Bradley Manning is Aiding the Enemy, a capital offence. Although the prosecution has stated that they will seek a life sentence and not the death penalty, it is within the discretion of the court to pursue it nonetheless.

The criminal US investigation against WikiLeaks was most recently confirmed to be ongoing by the Department of Justice spokesman for the Eastern District of Virginia, Peter Carr, on the 26th March 2013. The federal investigation into the WikiLeaks publication and its Australian publisher Julian Assange in connection with Mannnings prosecution will establish a precedent. If successful these efforts will criminalise national security journalism.

The various limbs of the Manning/WikiLeaks investigation progress in parallel and inform one another. Prior to the recent confirmation, the US Attorney General, Eric Holder, spoke about the WikiLeaks investigation to the press here and here), as did the Department of Justice spokesman Dean Boyd.

More: http://justice4assange.com/extraditing-assange.html#WHATLAWS

WikiLeaks Grand Jury 10-GJ-3-793

The WikiLeaks Grand Jury empaneled in Alexandria, Virginia since 2010 is the mechanism through which the Obama administration is determining how to shape its criminal prosecution against Julian Assange and WikiLeaks in connection with the material allegedly leaked by Bradley Manning. The WikiLeaks grand jury has the number 10-GJ-3-793. "10" is the year it began, "GJ" stands for grand jury, "3" refers to a conspiracy statute, and "793" to the Espionage Act as encoded in US law.

The military prosecutors in the Manning case are using transcripts from 10-GJ-3-793 WikiLeaks grand jury testimony against Bradley Manning in the military trial. Bradley Mannings lawyer requested to view this evidence but was denied access to it.

Australian embassy cables describe the WikiLeaks grand jury thus: "active and vigorous inquiry into whether Julian Assange can be charged under US law, most likely the 1917 Espionage Act". US officials told the Australian embassy ["the WikiLeaks case is unprecedented both in its scale and nature". According to these diplomatic communications, the WikiLeaks grand jury casts the net beyond Assange to see if any intermediaries had been involved in communications between Assange and Manning".

Grand juries confer special powers on prosecutors and the rules of evidence are not as strict as in a trial. Witnesses to the grand jury can be compelled to testify because they cannot refuse to do so on grounds of self-incrimination. Australian diplomatic communications stated that Grand juries can issue indictments under seal, and that theoretically one could already have been issued for Assange. In this particular case, it would be more likely that an indictment would become known at the point of extradition proceedings, should these take place, in the UK or Sweden.

FBI Criminal investigation against WikiLeaks

As of a year ago, approximately 20% of the FBI classified investigation file into WikiLeaks pertained to Bradley Manning. 8,741 pages (636 documents) related to Bradley Manning out of 42,135 pages (3,475 documents) relating to WikiLeaks. The remaining FBI file involved at least eight civilians related to the WikiLeaks disclosures, including the founders, owners, or managers of WikiLeaks. The FBI investigation includes damage assessments.

The FBI conducted illegal operations as part of the WikiLeaks investigation. One unlawful FBI WikiLeaks operation became known to the public after WikiLeaks spokesman Kristinn Hrafnsson revealed the incident in a live interview on national television. The information was subsequently confirmed by Icelands Minister of Interior, Ogmundur Jonasson. A parliamentary inquiry took place in February 2013 in relation to the FBIs WikiLeaks activities in Iceland. The FBI agents and prosecutors were expelled from the country and Icelandic authorities formally suspended their collaboration with the FBI. The FBI had allegedly attempted to entrap WikiLeaks and its founder, Julian Assange. The operation in Iceland was conducted in secret. It involved six FBI officers and two US prosecutors, one of which was a prosecutor at 10-GJ-3-793, the WikiLeaks grand jury in Alexandria, Virginia. The unlawful methods of the FBI investigation should not come as a surprise given that they are led by Neil MacBride, whose prosecutorial tactics involves claiming that US criminal law applies in foreign jurisdictions.

On July 28, 2010, one month after Pfc. Bradley Manning was arrested in Iraq, the FBI opened an official criminal investigation into the editor and chief of WikiLeaks, Julian Assange, partnering with the joint investigation of the US Defense Department and the US Department of States Diplomatic Security Service. The investigation then grew into a whole of government investigation, involving interagency coordination between the Department of Defense (DOD) including: CENTCOM; SOUTHCOM; the Defense Intelligence Agency (DIA); Defense Information Systems Agency (DISA); Headquarters Department of the Army (HQDA); US Army Criminal Investigation Division (CID) for USFI (US Forces Iraq) and 1st Armored Division (AD); US Army Computer Crimes Investigative Unit (CCIU); 2nd Army (US Army Cyber Command); Within that or in addition, three military intelligence investigations were conducted. Department of Justice (DOJ) Grand Jury and the Federal Bureau of Investigation (FBI), Department of State (DOS) and Diplomatic Security Service (DSS). In addition, Wikileaks has been investigated by the Office of the Director of National Intelligence (ODNI), Office of the National CounterIntelligence Executive (ONCIX), the Central Intelligence Agency (CIA); the House Oversight Committee; the National Security Staff Interagency Committee, and the PIAB (Presidents Intelligence Advisory Board).

Source: Bradley Manning pre-trial hearing

Trials of accused terrorists in Guantanamo Bay are more transparent than the Manning trial. In the case of offshore trials in Guantanamo Bay, the military court committed to providing journalists with contemporaneous access to the material filed in court. Where information has been withheld at Guantanamo Bay proceedings, journalists can challenge the decision to keep the information secret. By contrast, the overwhelming majority of court records filed in the Manning case have been kept secret by the court and attempts to make them public have been dismissed. Although journalists have been been able to access portions of his pre-trial proceedings, the government refuses to provide its existing official court transcript of these public portions to the public. Instead, independent journalists have had to collect, piece together and report the trial in the absence of the governments compliance with the right of public access to criminal proceedings. These efforts are not funded by the US tax payer, but paid instead by donations. The most exhaustive record of Mannings court proceedings and the investigation against WikiLeaks is independent journalist Alexa OBriens site.

The Freedom of the Press Foundation is crowd-funding donations so that a court stenographer can be hired to take transcripts of the trial. Donations are tax-deductable in the US. https://pressfreedomfoundation.org/

The right of public access to the Manning hearings is protected by the First Amendment. Bradley Mannings lawyer was denied access to documents used by the prosecution. Journalists have not been allowed to view the documents filed in the proceedings.

WikiLeaks and Julian Assange have filed several petitions and complaints to the military court in relation to access in the Manning trial.

If Manning is convicted of the aiding the enemy offence, it would set a precedent that disclosing classified information to a publication is akin to communicating with Al Qaeda. The prosecution will call several operatives involved in the summary execution of Osama bin Laden to testify in secret. The prosecution has stated to the court that they would be pursuing this charge even if Manning was alleged to have submitted the information to The New York Times instead. Numerous prominent lawyers and journalists have opposed the pursual of this charge, including the spokesman for the US State Department under Hillary Clinton, PJ Crowley.

The charges against Manning and the potential or existing sealed indictment against Julian Assange carries with it the criminalisation of the news-gathering process and a calculated crippling of the First Amendment. The aiding the enemy charge implies that any press organisation, and any editor, anywhere in the world can be prosecuted for espionage, that is for divulging information that may be read by a person that the US has designated as an "enemy". In practice, this means that any information that is made available by a publisher on the Internet which the US government deems to be harmful to its national security can trigger the criminal prosecution of the publisher, even if it is a foreign publisher.

The US governments attempts to establish that the alleged WikiLeaks source and its publisher engaged in a conspiracy has been re-employed in the case of the US governments espionage subpoena of FOX news reporter James Rosen. The Manning trial and the WikiLeaks investigation marked the beginning of the sharp decline of press freedoms under Obama.

It can be found here.

View original post here:
Bradley Manning Trial FAQ - WikiLeaks

CryptoJunction: Cryptocurrency News, Prices, Charts …

News

Andrey Zamovskiy from Ambisafe has raised his concern on the Ethereum forums about the rising gas price. Ambisafe is a company that created the first live Ehtereum currency, Elcoin and is currently building the next government voting system for Ukraine using the Ethereum blockchain. According to Andrey large-scale decentralized applications need fast confirmation times and

Read More

In the Bitcoin space ASIC miners has dominated the scene since early 2013. ASIC chips vastly improves hash-rate generation and thus becomes more competitive than its counterparts , and . Until now we have only seen ASICs being produced for SHA256d and Scrypt mining algorithms. When it comes to DASH mining the ASIC chips has

Read More

So you have installed your mobile bitcoin wallet from blockchain.info and now you want to learn how to use it. Blockchain.info is an extremely simple application to use. In this tutorials we will go over how it all works and what all buttons and features are for. Type in the 4 digit pin code that

Read More

So you have decided that you want to start use Bitcoin, what a better way to start using bitcoin than on your mobile phone. You can carry it around, pay for day to day stuff and show your friends what this magic internet money really is. Blockchain.info provides a online mobile wallet where you control

Read More

Lisk is a decentralized application and sidechain platform, providing a full stack solution for the most widespread programming language in the world JavaScript. Lisk aims to provide one of the best cryptocurrency user experience with its easily manageable user interface and its integrated Dapp Store. Lisk is prepared to become the de facto standard

Read More

NeuCoin is a decentralized cryptocurrency designed for online microtransactions. NeuCoin aims to reach mainstream adoption by strategically distribute and reward participants in the ecosystem. The cryptocurrency has 2.25 million of initial funding from its founders and strategic angels that will help NeuCoin forge strategic partnerships and drive consumer adoption further. In-App Tipping NeuCoin Value Cykle

Read More

SimpleFX is a robust online trading provider, offering trading with Forex CFDs on Bitcoins, Litecoins, indices, precious metals and energy. With their mission and motto keep it simple! SimpleFX has set out to change the way people trade Forex and cryptocurrency. SimpleFX currently provides over 60 currency pairs with no minimum depostist to be traded

Read More

Poloniex is a cryptocurrency exchange, founded in 2014 and based in Montana, United States. The service is very similar to other cryptocurrency exchanges like Bittrex & Cryptsy as it focuses on altcoins and only offers cryptocurrency exchange options. Currently Poloniex covers more than 170 trading pairs with Bitcoin (BTC) as a base and another 15

Read More

Mining pools are a common tool used by cryptocurrency miners to stabalize and maximize their payouts. What is it like to run one? How much can you make? What are the capital requirements? Co-founder of ProHashing Steve Sokolowski tells all. This video is brought to us by Amanda B. Johnson and TheDailyDecrypt, a Monday to

Read More

It is only in the real world meatspace that we currently work and trade for lifes necessities of food, shelter, clothing, etc. Because in-game currencies and basic virtual reality software/hardware already exist, would sufficient blockchain-based advances enable the transfer of scarce digital property within virtual reality? The video was brought to us by

Read More

If you are into cryptocurrency you probably have heard about Ethereum by now. Ethereum is a decentralized platform that runs smart contracts: applications that run exactly as programmed without any possibility of downtime, censorship, fraud or third party interference. In many ways Ethereum is how the Internet was supposed to work. Free, open and uncensored.

Read More

While many people have some thing to say about Bitcoin, one can simply not portrait or foresee the full picture of what it will become. This can be said about all open source software. Open source code is not a one mind creation. Its ideas and code that is added, subtracted and iterated to be

Read More

MyEtherWallet.com is a Ethereum web wallet developed by kvhnuke and tayvano. The wallet is currently in beta mode and the use of small amounts of Ether is advised. Security Measures & Application Behavior Control Over Your Money The MyEtherWallet.com wallet gives you full control over your Ether. This means no third party can freeze or

Read More

EthereumWallet.com is a Ethereum web wallet developed by kryptokit. The wallet is currently in beta mode and the use of small amounts of Ether is advised. Security Measures & Application Behavior Control Over Your Money The EthereumWallet.com wallet gives you full control over your Ether. This means no third party can freeze or lose your

Read More

BitNation is a decentralized governance platform that provides individuals with common government services ranging from identity (proof-of-existence), voting, business registration, insurance, and dispute resolution. BitNation is built on top of the Bitcoin and uses Bitcoin as the currency for paying for these services. An example where BitNation could be used is in land and ownership

Read More

A decentralized social networking app built on Counterparty.

See more here:
CryptoJunction: Cryptocurrency News, Prices, Charts ...

Edward Snowden – facebook.com

+++ Alle, die fr ihre Freiheit eintreten wollen, bitte einen Moment innehalten und diesen Post lesen! +++

Danke. Leider ist das Interesse fr die Whistleblower, Edward Snowden, Manning und Assenge so gut wie nicht mehr vorhanden. Wir organisieren in Berlin und auch im Rest der Welt eine Kunstaktion, die auf eure tatkrftige Mithilfe angewiesen ist.

Worum geht es? Es geht darum im Zeitraum vom 1. bis zum 2. Mai ein Symbol fr die Freiheit zu schaffen. In Berlin werden drei S...tatuen von den genannten Whistleblowern aus Bronze gegossen auf drei Sthlen stehen, als Zeichen dafr, dass sie aufgestanden sind und sich aus der Masse erhoben haben. Das Motto der Aktion ist ebenso "Mut ist ansteckend"- und das soll es auch sein. Denn der vierte Stuhl ist leer und dient frei fr jeden dazu sich neben die Whistleblower zu stellen und seine Worte zu Freiheit, NSA, Persnlichkeitsrechte, Pressefreiheit etc. loszuwerden oder aber auch nur um kurz die Welt aus einer anderen Perspektive zu sehen. Genauere Informationen werden in den zwei Veranstaltungsgruppen verffentlicht werden. Die eine dient fr alle Orte auer Berlin, die andere fr Berlin, da nur dort die drei Statuen stehen. Wir wollen die Aktion la #WaitingForEd auf andere Lnder und Stdte der Welt ausweiten.

Nun muss ich um eure Hilfe bitten. Ihr knnt mithelfen, indem ihr selber in einer der vielen mglichen Varianten teilnehmt, oder aber mithelfen, die Aktion auf jeder erdenklichen Art und Weise zu verbreiten.

Freiheit ist ein wertvolles Gut und wir mssen zeigen, dass es uns was wert ist. Danke fr deine Zeit.

The rest is here:
Edward Snowden - facebook.com

WikiLeaks – reddit

Follow us on Twitter!

Welcome to r/WikiLeaks. This sub is for all news and questions related to WikiLeaks and their founder, Julian Assange. To the best of our knowledge, none of the posting members or moderators have any connections to WikiLeaks or Assange as this is merely a news and discussion section. Crossposts from other sub-Reddits are more than welcome.

Official and Related Links:

Also, for those who don't know, you can view the most, if not all, of the archives from their original site at the link below.

WikiLeaks Archives

NOTE: Do not post links or how-to tutorials on how to join cyber attacks against those who oppose WikiLeaks. This is counterproductive to the cause, and detours discussion about WikiLeaks and the information they release.

[Custom Blue Slogans] Add a little title or slogan to voice your opinion, show support, or just want a nickname. It will show up after your username on every post in r/WikiLeaks.

Check out These sub-Reddits:

Go here to see the original:
WikiLeaks - reddit

WhatsApp adds end-to-end encryption for all communications …

The Facebook-owned app announced Tuesday that it has added full end-to-end encryption for all communications. That means all text messages, file transfers and voice calls are scrambled en route between users' phones so they can't be intercepted.

The news comes after the bitter public fight between the FBI and Apple over encryption. WhatsApp says its latest move makes it impossible for third parties -- including government agencies, criminals and the company itself -- to peek into users' conversations within the service.

"The desire to protect people's private communication is one of the core beliefs we have at WhatsApp, and for me, it's personal," said Jan Koum, one of the app's founders who was raised in Ukraine under Soviet rule.

"The fact that people couldn't speak freely is one of the reasons my family moved to the United States," he said in a statement.

WhatsApp started introducing end-to-end encryption in 2014, but it's taken until now to extend it to all communications across all devices. Users need to be using the latest version of the app to ensure they benefit from the measure, it said.

Amnesty International called WhatsApp's move a "huge victory" for free speech.

Related: Facebook and WhatsApp might be the next in encryption fight

"Every day we see stories about sensitive records being improperly accessed or stolen. And if nothing is done, more of people's digital information and communication will be vulnerable to attack in the years to come," the WhatsApp statement said. "Fortunately, end-to-end encryption protects us from these vulnerabilities."

By bringing it to the entirety of its vast user base, WhatsApp has made the technology the most widely used cryptographic tool on the planet.

Encryption has become a hot-button issue around the globe. The feud between Apple and the FBI fueled a fierce debate over the tradeoff between individuals' privacy and the demands of law enforcement.

The U.S. Department of Justice asked the tech giant to unlock the iPhone of one of the terrorists involved in the San Bernardino shootings in December.

Apple refused the request and fought a court order ordering it to comply. The company said the demand would force it to create a "backdoor" that could potentially allow the government or hackers break into similar iPhones.

Related: Cellebrite is the FBI's go-to phone hacker

The FBI eventually dropped the case after it managed to get into the iPhone with the help of an unidentified third party. But Apple is opposing similar demands by U.S. federal law enforcement in at least a dozen other active cases.

WhatsApp filed an amicus brief in support of Apple's stance, as did several other major tech firms including Google.

The push to introduce end-to-end encryption has brought the app into conflict with law enforcement.

Brazilian authorities have demanded WhatsApp hand over IP addresses, customer information, geo-location data and messages related to an ongoing drug trafficking case.

WhatsApp says it has been cooperating, but is not able to provide "the full extent of the information law enforcement is looking for" because of the encryption it had already implemented.

A Brazilian judge ordered the service blocked countrywide in December after WhatsApp failed to respond to court orders. The ruling cut off all 100 million Brazilian WhatsApp users for 48 hours before a senior judge overturned it.

CNNMoney (Hong Kong) First published April 5, 2016: 11:59 PM ET

Read this article:
WhatsApp adds end-to-end encryption for all communications ...

A Cryptography Tutorial and Cryptography Introduction

Why Have Cryptography

Encryption is the science of changing data so that it is unrecognisable and useless to an unauthorised person. Decryption is changing it back to its original form.

The most secure techniques use a mathematical algorithm and a variable value known as a 'key'.

The selected key (often any random character string) is input on encryption and is integral to the changing of the data. The EXACT same key MUST be input to enable decryption of the data.

This is the basis of the protection.... if the key (sometimes called a password) is only known by authorized individual(s), the data cannot be exposed to other parties. Only those who know the key can decrypt it. This is known as 'private key' cryptography, which is the most well known form.

OTHER USES OF CRYPTOGRAPHY

Many techniques also provide for detection of any tampering with the encrypted data. A 'message authentication code' (MAC) is created, which is checked when the data is decrypted. If the code fails to match, the data has been altered since it was encrypted. This facility has may practical applications.

OTHER RESOURCES

The Cryptography Management Toolkit is a resource specifically designed to introduce cryptography in detail. It includes presentations, a comprehensive guide book, check lists, source code for common algorithms, and various other items.

More:
A Cryptography Tutorial and Cryptography Introduction