Rep. Dana Rohrabacher meets with WikiLeaks founder Julian Assange: Report – Washington Examiner

Rep. Dana Rohrabacher, R-Calif., had a meeting Wednesday with WikiLeaks founder Julian Assange in London at the Ecuadorian Embassy, according to a report on Wednesday.

Charles Johnson, a conservative journalist who joined Rohrabacher and Assange, said the meeting was originally arranged because Assange wants to find an agreement with the U.S. and not live in asylum anymore. Assange has lived in asylum in the Ecuadorian Embassy since August 2012.

Rohrabacher's spokesman Ken Grubbs confirmed to the Daily Caller he was present on the meeting as well.

The Justice Department has expressed interest in pressing charges against Assange for assisting Edward Snowden, a former NSA analyst, to release classified documents, the Washington Post reported in April. Snowden was granted asylum by Russia.

Last month, Rohrabacher admitted he had previously met with a prosecutor from Moscow to discuss information regarding a Russian fraud case that precluded Congress passing the Magnitsky Act, which imposed U.S. sanctions on Russia regarding human rights abuses.

"I had a meeting with some people, government officials, and they were saying, Would you be willing to accept material on the Magnitsky case from the prosecutors in Moscow? And I said, Sure, I'd be willing to look at it,'" Rohrabacher told The Hill.

Rohrbacher said he disclosed the information he received from the prosecutor with members of the House Foreign Affairs Committee and the U.S. Treasury Department.

Read more:
Rep. Dana Rohrabacher meets with WikiLeaks founder Julian Assange: Report - Washington Examiner

Martin Shkreli thinks he’ll be president someday – Salon

Do you think Martin Shkreli, aka the Pharma Bro, is destined to become an American president?

If you dont, he certainly does.

Well, at some point Ill be POTUS, Shkreli wroteon his Facebook page ina post published Tuesday. He addedthat conservative commentator Ben Shapiro wouldbe his vice president and alt-right pundit Milo Yiannopoulos wouldbe his press secretary, before going on to list some more unorthodox choices:

Kanye West will be head of the CIA. Stefan Molyneux will be Secretary of State. Kodak Black will be Attorney General. Edward Snowden would be the head of the NSA. Julian Assange: FBI. Kim Kardashian is Fed Chairwoman. Trashy is Surgeon General.

From there, Shkreli predicted defeating a ticket with President Mark Zuckerberg and Vice President Bernie Sanders no earlier than 2024, since he also predicted theyd have to abolish Zuckerbergs Universal Basic Income which passed in 2024.

Shkreli addedthat Young Turks host Cenk Uygar will be sent back to wherever he came from and that Lauren Duca will tragically fall ill from subtweeting too hard if she isnt the First Lady.

Somewhat more ominously, Shkreli also boasted that he would put nuclear weapons in enemies cities, force members of the media to go through training programs and completely slash almost all entitlement programs.

An account purportedly belonging to Yiannopoulos has already liked the status update and said that Im down, while Shkreli added in the comments that OKAY FINE KIM KARDASHIAN WILL BE HEAD OF THE FEDERAL RESERVE.

Whereas President Donald Trump at least had a core of support prior to his career as a politician, Shkreli may now bebest known for raising the price of a life-saving drug by 5000 percent and being convicted of three counts of securities fraud.

Visit link:
Martin Shkreli thinks he'll be president someday - Salon

The Laws of Mathematics and the Laws of Nations: The Encryption Debate Revisited – Lawfare (blog)

Australia is weighing in on the encryption debate regarding exceptional access by law enforcement. As George Brandis, the Australian Attorney-General, described last month, the Prime Ministers office advocates requiring internet companies and device makers [to follow] essentially the same obligations that apply under the existing law to enable provision of assistance to law enforcement and to the intelligence agencies, where it is necessary to deal with issues: with terrorism, with serious organized crime, with paedophile networks and so on. He further asserted that the chief cryptographer at GCHQ, the Government Communication Headquarters in the United Kingdom had assured him that this was feasible.

The Prime Minister of Australia, Malcolm Turnbull, subsequently entered into an interesting interchange with a reporter. When asked by Mark DiStefano, a reporter from ZDNET, Wont the laws of mathematics trump the laws of Australia? And then arent you also forcing people onto decentralized systems as a result? The Prime Minister of Australia said the laws of Australia prevail in Australia, I can assure you of that. The laws of mathematics are very commendable, but the only law that applies in Australia is the law of Australia."

This interchange provides a good opportunity to explore where the laws of mathematics and the laws of nations hold sway. DiStefanos comment about the laws of mathematics is a reference to the conclusion offered by many technically informed parties that including a capability for exceptional access into any encryption scheme invariably reduces the security afforded by that scheme.

But this conclusion is not what the Attorney-General was referring to; he spoke only of an obligation of vendors to provide assistance to law enforcement and intelligence agencies (presumably to provide clear text when required by law). It is certainly possible to develop a system that enables vendors to meet this requirement, and a system with this capability must be that which the chief cryptographer at GCHQ asserts is feasible. This system will not be as secure as it would be without this requirement, though it will enable certain law enforcement and intelligence activities to take place that would not otherwise be possible.

So once again, we see that participants in this debate are not arguing about the same thing. The anti-exceptional access community is talking about the impossibility of developing a system with exceptional access capability that affords the same security as one without such a capability. The pro-exceptional access community is talking about the feasibility of a system with exceptional access capabilities that provides the best security possible given that requirement. And both communities are correct.

Whether the tradeoff is worthwhilelesser security for all in exchange for better ability to pursue certain law enforcement and intelligence activitiesis clearly a policy and legal decision for the Australian government. Of course, to have a reasonable debate about this question, the Australian government would have to acknowledge the first part of this tradeofflesser security for alland whether or not it is willing to do so is not yet clear.

Turnbulls statement is absurd on its face. A more astute response would have been to acknowledge that human laws must be consistent with the laws of mathematics but then to say that the laws of mathematics do not prevent compliance with a requirement such as the one proposed by the Attorney-General. But the Prime Minister would also have had to acknowledge the above-mentioned trade-off explicitlyand maybe such an acknowledgment would have been politically inconvenient.

As I have writtenbefore, these comments also apply precisely to the corresponding debate in the United States. To make progress on either side of the Pacific Ocean, it would help if both sides were talking about the same thing.

More:
The Laws of Mathematics and the Laws of Nations: The Encryption Debate Revisited - Lawfare (blog)

eperi Presents Secure Cloud Data Encryption at it-sa 2017 – BW Businessworld

eperi , a provider of cloud data protection solutions, will be presenting its eperi Gateway at this year's it-sa (10-12 October 2017 in Nuremberg, stand 10.1-430).

At the stand, Elmar Eperiesi-Beck, founder and CEO of eperi, Holger Mnius, Sales director DACH and System Engineer, Stefan Mark, will inform the audience about data encryption and what it means for the General Data Protection Regulation (GDPR), which will come into force in May 2018.

They will also demonstrate the eperi Gateway and show how it can be used to reduce the scope of GDPR to effectively meet compliance requirements.

By October 2017, companies will only have eight months to prepare their business for the GDPR requirements, said Elmar Eperiesi-Beck. The clock is ticking and organisations that continue to process personal data on EU citizens without the necessary security could face six to seven-digit penalties in the next year. They have to be able to prove at all times that they comply with the data protection requirements.

The eperi Gateway provides transparent, fast and effective encryption of data at rest, in use and in transit, without affecting the functionalities of the protected applications, databases or file storages. It helps solve the data protection problem by ensuring only authorised users have access to the data in plain text.

Outside the secure environment of the company, the information is encrypted. This reduces the impact GDPR has on a company and minimises the scope of the regulation since the information is unreadable to unauthorised outsiders; for example, if the data is processed in the cloud.

The GDPR requirements for centralised control and Security by Design are also met because the eperi Gateway enables enterprises to manage their cryptographic keys completely internally and maintain full control of their data - even in decentralised cloud environments.

Organisations that encrypt personal data reduce the risk of data theft, continued Eperiesi-Beck. Attackers cannot use the encrypted data without the cryptographic keys.

Moreover, Article 32 of the GDPR also mandates that safety solutions should be regularly checked. The eperi Gateway fulfils this requirement by using transparent, Open- Source encryption that can be checked at any time for weaknesses. Importantly, the eperi Gateway was jointly developed with the German Federal Office for Security in Information Technology (BSI).

See original here:
eperi Presents Secure Cloud Data Encryption at it-sa 2017 - BW Businessworld

End-to-end encryption isn’t enough security for ‘real people’ – The Conversation US

The weak spots are at the ends.

Government officials continue to seek technology companies help fighting terrorism and crime. But the most commonly proposed solution would severely limit regular peoples ability to communicate securely online. And it ignores the fact that governments have other ways to keep an electronic eye on targets of investigations.

In June, government intelligence officials from the Five Eyes Alliance nations held a meeting in Ottawa, Canada, to talk about how to convince tech companies to thwart the encryption of terrorist messaging. In July, Australian Prime Minister Malcolm Turnbull called on technology companies to voluntarily ban all systems that totally encrypt messages in transit from sender to recipient, an approach known as end-to-end encryption. British Home Secretary Amber Rudd made global headlines with her July 31 newspaper opinion piece arguing that real people dont need end-to-end encryption.

These claims completely ignore the one billion real people who already use secure messaging apps like Signal and WhatsApp. And it leaves no room for people who may decide they want that security in the future. Yet some technology companies look like they might be considering removing end-to-end encryption and others installed backdoors for government access years ago. Its been two decades since the Clipper chip was in the news, but now a revival of the government-business-consumer crypto-wars of the 1990s threatens.

One thing is very clear to computer scientists like me: We real people should work on improving security where we are most vulnerable on our own devices.

For the moment at least, we do have good, easy-to-use solutions for secure communication between computers, including end-to-end encryption of our messages. End-to-end encryption means that a message is encrypted by the sender, and decrypted by the recipient, and no third party is able to decrypt the message.

End-to-end is important, but security experts have warned for years that the most vulnerable place for your data is not during transit from place to place, but rather when its stored or displayed at one end or the other on a screen, on a disk, in memory or on some device in the cloud.

As the WikiLeaks release of CIA hacking tools highlighted, if someone can gain control of a device, they can read the messages without needing to decrypt them. And compromising endpoints both smartphones and personal computers is getting easier all the time.

Why are we most vulnerable at the endpoint? Because we dont like to be inconvenienced, and because adding more protection makes our devices harder to use, the same way putting multiple locks on a door makes it harder to get in, for both the homeowner and the burglar. Inventing new ways to protect our digital endpoints without reducing their usefulness is very challenging, but some new technologies just over the horizon might help.

Suppose a criminal organization or bad government, EvilRegime, wants to spy on you and everyone you communicate with. To protect yourself, youve installed an end-to-end encryption tool, such as Signal, for messaging. This makes eavesdropping even with a courts permission that much more difficult for EvilRegime.

But what if EvilRegime tricks you into installing spyware on your device? For example, they could swap out a legitimate upgrade of your favorite game, ClashBirds, with a compromised version. Or, EvilRegime could use a malware network investigative technique as a backdoor into your machine. With control of your endpoint, EvilRegime can read your messages as you type them, even before they are encrypted.

To guard against either type of EvilRegimes trickery, we need to improve our endpoint security game in a few key ways, making sure that:

In addition, it would be ideal if users could control their apps security themselves, rather than having to rely on app store security provided by yet another vulnerable corporation.

Computer security experts are excited about the idea that blockchain technology might be able to help us secure our own endpoints. Blockchain, the technology that underpins Bitcoin and other cryptocurrencies, creates a verifiable, unchangeable public record of information.

What this means for endpoint security is that computer scientists might be able to create blockchain-based tools to help us verify the origin of our apps. We could also use blockchains to confirm our data havent been tampered with, and to ensure our privacy. And as long as the source code for these programs is also free for us to inspect as Signal is today the security community will be able to verify that there are no secret backdoors.

As with any new technology, there is an enormous amount of hype and misinformation around blockchain and what it can do. It will take time to sift through all these ideas and develop secure tools that are easy to use. In the meantime, we all need to continue to use end-to-end encryption apps whenever possible. We should also stay vigilant about password hygiene and about what apps we install on our machines. Finally, we must demand that real people always have access to the best security mechanisms available, so we can decide for ourselves how and when to resist surveillance.

More:
End-to-end encryption isn't enough security for 'real people' - The Conversation US

Here’s Why We Need More Open Source Software For Buttplugs – Motherboard


Motherboard
Here's Why We Need More Open Source Software For Buttplugs
Motherboard
Internet-connected sex toys have been on the market for a while now, but the software that operates these very personal devices remains mostly closed, meaning it's not shared with users in a way that allows them to tinker with it. In practice this ...

and more »

Read the rest here:
Here's Why We Need More Open Source Software For Buttplugs - Motherboard

Safety, Security & Open Source in the Automotive Industry – TechSpective

Todays cars are as much defined by the power of their software as the power of their engines. Almost any car feature you can name is now digitized to provide drivers with easier operation and better information. Technological innovation is accelerating, enabling automobiles to monitor and adjust their position on the highway, alerting drivers if theyre drifting out of their lane, even automatically slowing down when they get too close to another car.

More and more vehicles are connected, equipped with Internet access, often combined with a wireless local area network to share that access with other devices inside as well as outside the vehicle. And whether were ready or not, well soon be sharing the roads with autonomous vehicles.

Driving the technology revolution in the automotive industry is software, and that software is built on a core of open source. Open source use is pervasive across every industry vertical, including the automotive industry. When it comes to software, every auto manufacturer wants to spend less time on what are becoming commodities such as the core operating system and components connecting the various pieces together and focus on features that will differentiate their brand. The open source model supports that objective by expediting every aspect of agile product development.

But just as lean manufacturing and ISO-9000 practices brought greater agility and quality to the automotive industry, visibility and control over open source will be essential to maintaining the security of automotive software applications.

When you put new technology into cars, you ran run into security challenges. For example:

Vehicle manufacturers need to adopt a cybersecurity approach that addresses not only obvious exposures in their cars software, but also the hidden vulnerabilities that could be introduced by open source components in that software.

As auto OEMs work with software providers, a growing set of open source components is making its way into automobile systems. Open source code is being channeled through countless supply chains in almost every part of the automotive ecosystem.

When a supplier or auto OEM is not aware all the open source in use in its products software, it cant defend against attacks targeting vulnerabilities in those open source components. Any organization leveraging connected car technology will need to examine the software eco-system it is using to deliver those features, and account for open source identification and management in its security program.

To make progress in defending against open source security threats and compliance risks, both auto OEMS and their suppliers must adopt open source management practices that:

FULLY INVENTORY OPEN SOURCE SOFTWARE: Organizations cannot defend against threats that they do not know exist. A full and accurate inventory (bill of materials) of the open source used in their applications is essential.

MAP OPEN SOURCE TO KNOWN SECURITY VULNERABILITIES: Public sources, such as the National Vulnerability Database provide information on publicly disclosed vulnerabilities in open source software. Organizations need to reference these sources to identify which of the open source components they use are vulnerable.

IDENTIFY LICENSE AND QUALITY RISKS: Failure to comply with open source licenses can put organizations at significant risk of litigation and compromise of IP. Likewise, use of out-of-date or poor quality components degrades the quality of applications that use them. These risks also need to be tracked and managed.

ENFORCE OPEN SOURCE RISK POLICIES: Many organizations lack even basic documentation and enforcement of open source policies that would help them mitigate risks. Manual policy reviews are a minimum requirement, but as software development becomes more automated so too must management of open source policies.

ALERT ON NEW SECURITY THREATS: With more than 3,500 new open source vulnerabilities discovered every year, the job of tracking and monitoring vulnerabilities does not end when applications leave development. Organizations need to continuously monitor for new threats as long as their applications remain in service.

As open source use continues to increase in the auto industry, effective management of open source security and license compliance risk is becoming increasingly important. By integrating risk management processes and automated solutions into their software supply chain, automakers, suppliers, and technology companies servicing the automotive industry can maximize the benefits of open source while effectively managing their risks.

View original post here:
Safety, Security & Open Source in the Automotive Industry - TechSpective

The Power of Pervasive Encryption – Security Intelligence (blog)

The new z14 mainframe computer offers a chance to re-evaluate what a mainframe can do for an organization. Gone are the days when the mainframe was the only way to do computing. Today, there are new and different choices, and the z14 can make those choices practical.

The z14 features standard improvements that users have come to expect, such as faster, more efficient hardware chips. It also includes a pervasive encryption scheme that may prove to be as important as anything that was done to the computing hardware.

Transitioning away from selective encryption toward end-to-end protection will help organizations secure enterprise data while reducing the cost and complexity of meeting emerging compliance mandates. It is a far more general approach that applies to data in transit and at rest. This routine and pervasive use of cryptography is performed all the time to all data, except that which is immediately processed inside the mainframe.

The details of the new cryptography system start with the z14s new coprocessor, the Central Processor Assist for Cryptographic Function (CPACF). This high-performance, low-latency coprocessor performs symmetric key encoding and calculates message digests (hashes) in hardware. It is standard on every core, directly supports cryptography and offers hardware acceleration for all encryption operations that occur on the core processor.

According to IBM Systems Magazine, a Solitaire Interglobal report found that this cryptographic acceleration provides six times more performance than the previous z13 model. Additionally, z14 is more than 18 times faster than competing platforms.

The CPACF also has extended key and hash sizes used in the Advanced Encryption Standard (AES) and Secure Hash Algorithm (SHA), as well as support for UTF8-to-UTF16 conversion. The cryptography hardware is available to all processor types used in the z14.

Bulk file and dataset cryptographic operations were specifically placed within the mainframes operating system software to maximize transparency to the running files and optimize performance. This is a critical point: All the potential benefits of pervasive encryption are lost if a required intermediary step interferes with getting the work done. With the z14, users can transition DB2 and information management system (IMS) high-availability databases from unencrypted to encrypted without stopping the database or the application.

The ability to seamlessly encrypt is a big deal to users. The data used by an application or database is protected, but no user changes are required. Additionally, this means service-level agreements can be maintained.

Both the financial and data processing businesses need this kind of encryption in all places due to the rush of new regulatory compliance mandates that will soon affect them. Additionally, cloud-based data stored in x86 boxes are encrypted at the source and protected at rest. A business using a z14 platform does not have to depend on the low-throughput encryption of such cloud solutions. Data stored in these boxes will already be in an acceptable state without the need for further processing.

No other platform can do this. And it took both advanced hardware and software to pull this off, not just one or the other.

Even with the mainframe doing all it can to keep things secure, bad policy decisions by the user can undercut everything. Users need to maintain security policies and enforce them not count on the machine alone to wave a magic encryption wand to keep data safe.

The z14 is a unique and effective tool to help organizations achieve their security goals. However, the mainframe cannot do this alone: It needs informed and committed users to maximize its effectiveness.

Read the white paper: Pervasive Encryption, The New Paradigm for Protection

The rest is here:
The Power of Pervasive Encryption - Security Intelligence (blog)

Julian Assange: software developer, whistleblower … and ‘edgewalker’? – The Guardian

Man on the edge ... Julian Assange at the Ecuadorian embassy. Photograph: Kirsty Wigglesworth/AP

Name: Edgewalkers.

Age: 11.

Appearance: In this case, blond, translucent skin, in need of fresh air.

Sounds like someone we know well. Yes, its Knightsbridge embassy cleaning staff bete noire Julian Assange.

What has he done now? The WikiLeaks founder is the subject of an epic 22,000-word New Yorker profile entitled A Man Without a Country.

No country? Way to insult your Ecuadorian hosts, Jules. I suspect they will live. The article describes a 2015 conversation between Assange and the artist George Gittoes, in which Assange talks about being an edgewalker.

I presume that means someone who takes huge risks. Such as, say, leaking emails believed widely to have been stolen by Russian intelligence services, which may have helped elect Donald Trump. Er yes. Gittoes explains: Its a Julian thing he reckons that many people think they walk on the edge, living a risky life, but an edgewalker really walks on the edge, and that he is a real edgewalker.

So, is the term an Assangism? Nope. It comes from the title of a 2006 book by Judi Neal, a management expert with a focus on spirituality in the workplace.

Is her definition the same as Assanges? Neals website says edgewalkers are those who are on the cutting edge of human evolution and who are committed to making a positive difference in the world. They use all of their human potential and integrate their intellectual, emotional, physical and spiritual energy in service to something greater than themselves.

Im sure Hillary Clinton would agree that this sounds like Assange. I think he is going by his own definition of the term.

How do I get to be an edgewalker, then? You can get different levels of coaching from Neals organisation all of which cost upwards of 2,000. It also does workshops around the world.

Ah. Maybe frequent Ecuadorian embassy visitor Pamela Anderson is in fact an expensive life coach. Well,starring in Barb Wire was certainly adangerous risk.

Do say: I would like to integrate my physical andspiritual energy in service to this mountain ofdata entry.

Dont say: Julian, play Where the Streets Have No Name!

See the original post here:
Julian Assange: software developer, whistleblower ... and 'edgewalker'? - The Guardian

Behind the Portrait: Julian Assange – The New Yorker

In 2010, Phillip Toledano photographed Julian Assange, the publisher of WikiLeaks, for Raffi Khatchadourians Profile of the man, titled No Secrets . Toledanos closeup portrait shows Assange with his chin lifted slightly, peering expectantly beyond the frame. His hair is white and his skin is pale, but there is a youthful keenness in his eyes. At the time, WikiLeaks, founded in 2006, was just a few years old. Toledano recalls Assange arriving for the picture-taking alone, with a rolling carry-on bag. When Toledano asked Assange about his apparent travel plans, he replied that he hadnt made anyyet; the bag was a precaution, in case he had to take off unexpectedly.

Two years later, Assange took asylum at the Ecuadorean Embassy in London, and he has not left since. Nadav Kander recently photographed him in a small room there, for Khatchadourians second Profile of Assange, Man Without a Country , which appears in this weeks issue of the magazine. Seen side by side, Toledano and Kanders portraits illustrate the particular wear of the life Assange has lived for the past seven years. In 2010, Khatchadourian wrote that Assange can seemwith his spectral white hair, pallid skin, cool eyes, and expansive foreheadlike a rail-thin being who has rocketed to Earth to deliver humanity some hidden truth. Since then, the legal disputes, the unending political battles, and the physical isolation seem to have rounded the edge in his gaze.

Toledano remembers Assange being quiet and amenable in the studio. The man had an air of intrigue that Toledano sought to reproduce in the photograph in post-production. After the session, he pulled the portrait up on his computer screen and started re-photographing it over and over again until the digital moir we see in the final image emerged. In the degraded photograph, streaks of color run down the right side of Assanges face in a patchy pattern; even in print, he appears to be looking through a screen.

Because of Assanges current situation, Nadav Kanders session was much less flexible than Toledanos. For most shoots, Kander prepares three separate lighting scenarios and, whether photographing on Capitol Hill or in a hotel meeting room, will work with as many as three assistants for several hours to assemble each of the setups before his subject arrives. But space and time at the Embassy in London were tight. After unloading equipment into the lobby of the building, he and his assistants presented their passports, entered through an armored door, and set to work preparing in a conference room. A large wooden table that could not be removed made the usual three-stage routine impossible. Instead, they would disassemble one scenario and then build the next over the course of the shoot. They were told they would have thirty minutes.

In Kanders portrait, we see Assange in a gray shirt buttoned to the top. His white hair is tamed save for a few loose strands; stubble is coming in on his lip and chin. In his eyes, which look directly at the camera, there are small marks of light. In the 2010 Profile, Khatchadourian describes the low-grade fever of paranoia that hangs over Assange and his colleagues. That fever has since mixed with the conditions of confinement and an expanded, altered international reputation. The sureness we see in Toledanos portrait seems to have been replaced by something less solid.

The more I pare it down, the more you really see the condition of people, Kander says, when describing his approach. His portraits rarely include environmental contexthe aims to make pictures that focus on a persons corporeal structure, his skin and bones. Hes interested in the physical facts that have been etched on the face, which he describes as the truth about that person. On set at the Embassy, he sensed that Assange, who can be particular about how his likeness is disseminated, felt safe. The allotted thirty minutes turned into two hours. If people are very controlling of their image, Kander said, you get very few frames where they drop it. But when they do, for that second . . . you can really see it.

Read more:
Behind the Portrait: Julian Assange - The New Yorker