Encryption Software Market | Industry Analysis and Forecast (2018-2026) – Montana Ledger

TheEncryption Software Market intelligence report from Verified Market Research is a valuable tool that enables vendors to identify growth avenues, and strategize for launch of products and services. These findings help businesses pave way in a crowded business landscape, and make way into the future with confidence. The Encryption Software Market report depicts the current & future growth trends of this business and outlines geographies that are a part of the regional landscape of the market.

Global Encryption Software Market was valued at USD 3.32 billion in 2016 and is projected to reach USD 30.54 billion by 2025, growing at a CAGR of 27.96% from 2017 to 2025.

The report comes out as an intelligent and thorough assessment tool as well as a great resource that will help you to secure a position of strength in the global Encryption Software Market . It includes Porters Five Forces and PESTLE analysis to equip your business with critical information and comparative data about the Global Encryption Software Market . We have provided deep analysis of the vendor landscape to give you a complete picture of current and future competitive scenarios of the global Encryption Software Market . Our research team use the latest primary and secondary research techniques and tools to prepare comprehensive and accurate market research reports.

Report Enquiry For Download Sample

Dell, Thales E-Security, Eset, Symantec, IBM Corporation, Sophos, Ciphercloud, Pkware, Mcafee, Gemalto, Trend Micro, Microsoft Corporation

For making the research report exhaustive, the analysts have included Porters five forces analysis and SWOT analysis. Both these assess the path the market is likely to take by factoring strengths, weaknesses, opportunities, and threats. The Porters five forces analysis elucidates the intensity of the competitive rivalry and the bargaining power of suppliers and buyers. Furthermore, the research report also presents an in-depth explanation of the emerging trends in the global Encryption Software Market and the disruptive technologies that could be key areas for investment.

Segment Analysis of theEncryption Software Market :

The research report includes segmentation of the global Encryption Software Market on the basis of application, technology, end users, and region. Each segment gives a microscopic view of the market. It delves deeper into the changing political scenario and the environmental concerns that are likely to shape the future of the market. Furthermore, the segment includes graphs to give the readers a birds eye view.

Last but not the least, the research report on global Encryption Software Market profiles some of the leading companies. It mentions their strategic initiatives and provides a brief about their structure. Analysts have also mentioned the research and development statuses of these companies and their provided complete information about their existing products and the ones in the pipeline

Report Enquiry For Ask For Discount

Comprehensive pricing analysis on the basis of product, application, and regional segments

The detailed assessment of the vendor landscape and leading companies to help understand the level of competition in the global Encryption Software Market

Deep insights about regulatory and investment scenarios of the global Encryption Software Market

Analysis of market effect factors and their impact on the forecast and outlook of the global Encryption Software Market

A roadmap of growth opportunities available in the global Encryption Software Market with the identification of key factors

The exhaustive analysis of various trends of the global Encryption Software Market to help identify market developments

9.1.1 Overview9.1.2 Financial Performance9.1.3 Product Outlook9.1.4 Key Developments

Verified Market Research has been providing Research Reports, with up to date information, and in-depth analysis, for several years now, to individuals and companies alike that are looking for accurate Research Data. Our aim is to save your Time and Resources, providing you with the required Research Data, so you can only concentrate on Progress and Growth. Our Data includes research from various industries, along with all necessary statistics like Market Trends, or Forecasts from reliable sources.

Mr. Edwyne FernandesCall: +1 (650) 781 4080Email: [emailprotected]

See the article here:
Encryption Software Market | Industry Analysis and Forecast (2018-2026) - Montana Ledger

John McMaster Explains Crypto Ignition Phone Keys And How To Reproduce Them – Hackaday

When youre a nation state, secure communications are key to protecting your sovereignty and keeping your best laid plans under wraps. For the USA, this requirement led to the development of a series of secure telephony networks over the years. John McMaster found himself interested in investigating the workings of the STU-III secure telephone, and set out to replicate the secure keys used with this system.

[John] had a particular affinity for the STU-III for its method of encrypting phone calls. A physical device known as a Crypto Ignition Key had to be inserted into the telephone, and turned with a satisfying clunk to enable encryption. This physical key contains digital encryption keys that, in combination with those in the telephone, are used to encrypt the call. The tactile interface gives very clear feedback to the user about securing the communication channel. Wishing to learn more, John began to research the system further and attempted to source some hardware to tinker with.

As John explains in his Hackaday Superconference talk embeded below, he was able to source a civilian-model STU-III handset but the keys proved difficult to find. As carriers of encryption keys, its likely that most were destroyed as per security protocol when reaching their expiry date. However, after laying his hands on a broken key, he was able to create a CAD model and produce a mechanically compatible prototype that would fit in the slot and turn correctly.

Due to the rarity of keys, destructive reverse engineering wasnt practical, so other methods were used. Thanks to the use of the STU-III in military contexts, the keys have a National Stock Number that pointed towards parallel EEPROMs from AMD. Armed with the datasheet and X-rays of encryption keys from the Crypto Museum, it was possible to figure out a rough pinout for the key. With this information in hand, a circuit board was produced and combined with an EEPROM and a 3D print to produce a key that could replicate the functionality of the original.

Like most projects, it didnt work first time. The printed key had issues with the quality of the teeth and flushing of the support material, which was solved by simply removing them entirely and relying on the circuit board to index to the relevant pins. Testing was performed using a PKS-703 key reader, which itself was an incredibly rare piece of hardware. In combination with a logic analyzer, it revealed that a couple of the write pins were lined up backwards. Once this was fixed, the key worked and could be programmed with a set of encryption keys. Once inserted into the STU-III and turned, the telephone sprung to life!

Despite this success, theres still a long way to go before John can start making secured phone calls with the STU-III. Only having one phone, hes limited to how much he can do ideally, a pair is needed in order to experiment further. He is also trying to make it easier for others to tinker with this hardware which involves the development of a circuit board to allow keys to be read and reprogrammed with a standard EEPROM writer. Hes also begun reverse engineering of the STU-IIIs internals. As a bit of fun, John went as far as to reproduce some promotional swag from the project that spawned the STU-III, showing off his Future Secure Voice System mug and T-shirt.

Reverse engineering national security devices certainly comes with its own unique set of challenges, but John has proven hes more than up to the task. We look forward to seeing the crypto community hack deeper into this hardware, and cant wait to see hackers making calls over the venerable STU-III!

See original here:
John McMaster Explains Crypto Ignition Phone Keys And How To Reproduce Them - Hackaday

Best NordVPN deal in the Cyber Week Sale (UK deal) – Mashable

Just to let you know, if you buy something featured here, Mashable might earn an affiliate commission.NordVPN is on sale for Cyber Week.

Image: pexels

TL;DR: A three-year subscription to NordVPN is on sale for 2.82 per month, and includes three months and a file encryption app for free.

Cyber Monday might be over but don't think for a second that the deals stop there. We're still being treated to a wide range of deals on everything from kitchen appliances to smart speakers, but it's the VPNs that are stealing the show.

There are absolutely loads of VPN providers that are competing for your attention, and NordVPN is making a big effort to secure your business.

You can now sign up to three years of protection with NordVPN for just 2.82 per month. This is a great deal on its own, but you also get three extra months and a file encryption app thrown in for free. The app itself is worth over 250.

This deal saves you 83% on list price and comes with a 30-day money-back guarantee to cover you in case things don't work out. You have nothing to lose.

See original here:
Best NordVPN deal in the Cyber Week Sale (UK deal) - Mashable

Growing Demand for Cloud Encryption Software Market to Bolster the Growth during the Forecast Period 20192027 | Hytrust, International Business…

Cloud encryption is a service offered by cloud security firms that use different algorithms to transform data or text into an encrypted code, known as ciphertext. The encrypted code is then passed on to the cloud. The data is kept safe because the cloud data encryption code can only be translated with a data encryption key, which never leaves the enterprise.

The cloud encryption software market is expected to register a CAGR of 40% over the forecast period 2019 2027.

The Global Cloud Encryption Software Market research report offers deep prudence of the global Cloud Encryption Software industrys attractiveness, profitability, revenue, and growth momentum to market players which helps them to foresight the market performance during the forecast period of up to 2019-2027. The report studies historical and present market status and offers reliable market forecasts considering market trends, sales volume, demand, market size, and share.

Request for a sample report on Cloud Encryption Software Market @ https://www.reportconsultant.com/request_sample.php?id=3006

Top players of Cloud Encryption Software Market:-

Ciphercloud, Gemalto N.V., Hytrust, Inc, International Business Machines Corporation, Netskope, Inc, Secomba GmbH, Skyhigh Networks, Sophos Group PLC, Symantec Corporation, Thales E-Security, Trend Micro Incorporated, Vaultive, Inc., TWD Industries AG, Parablu Inc., Hewlett Packard Enterprise, Google LLC, Voltage Security Inc., CyberArk, Safenet, Hitachi Vantara, Boxcryptor

Cloud Encryption Software Market Segment By the Product Types, it primarily split into:

Cloud Encryption Software Market segment By End-Users/Application, this report covers:

The report also casts light on significant facets such as competitive landscape, significant Cloud Encryption Software manufacturers/companies, segments, sub-segments, industry environment, market overview, upstream and downstream, technological advancements, and overall market operations. The report consists of Cloud Encryption Software market insights which have been extracted through reliable information sources and analyzed by the expert analysts team who ensure complete authenticity for intact data.

Buyers Get Discount on this Report @ https://www.reportconsultant.com/ask_for_discount.php?id=3006

The report further explains how leading market players are operating in the market and what their prospects are towards market growth. Players organizational structure, Cloud Encryption Software production methodologies, plant locations, raw material sources, distribution network, global presence, value chain, pricing structure, product specifications, capacity utilization, corporate alliance, brands, patents, industry supply chain, and import-export activities are analyzed in the report to offer a comprehensive delineation of leading players.

Additionally, the report underscores regional analysis as it holds huge importance in the market segment study. The regional analysis offers a thorough concept over Cloud Encryption Software business performance considering market places in North America, Europe, the Middle East, South America, Asia Pacific, and Oceania. It offers valuable predictions for futuristic market growth in each region and explores regional industry environments at a minute level.

To Get Full Information Related to TOC, Tables, Figures Market Dynamics, Types, Application and More, Please Visit @https://www.reportconsultant.com/enquiry_before_buying.php?id=3006

The final report will be sent with an upgraded version and you can ask for customized information for the above-market at sales@reportconsultant.com

About Us:

Report Consultant is a destination of choice for your organizations aptitude and analytics solutions, as we provide qualitative and quantitative information sources that provide unique solutions. We skillfully link qualitative and quantitative research in exact proportions to get the best report, which not only provides the latest information but also helps you move forward.

Contact us:

Rebecca Parker

(Report Consultant)

13284 Bluejacket Street Overland Park,

KS 66213 United States

sales@reportconsultant.com

http://www.reportconsultant.com

View post:
Growing Demand for Cloud Encryption Software Market to Bolster the Growth during the Forecast Period 20192027 | Hytrust, International Business...

Global Endpoint Encryption Market Report 2019, Industry Overview by Comprehensive Insights and Capacity Growth Analysis to 2024 – Eastlake Times

In the Global Endpoint Encryption Market Report released by Orbis Research, all elements are mentioned in a quarterly format such as geography, application, end user, product type, product subtype, and so on. Strikes in the global Endpoint Encryption Market are mentioned in some of those areas and show various segments.

An effective encryption solution is a must for every enterprise. Encryption refers to the mathematical process of changing information into incomprehensible characters using algorithms.

Access the PDF sample of the report @https://www.orbisresearch.com/contacts/request-sample/3212054

According to this study, over the next five years the Endpoint Encryption market will register a xx% CAGR in terms of revenue, the global market size will reach US$ xx million by 2024, from US$ xx million in 2019. In particular, this report presents the global revenue market share of key companies in Endpoint Encryption business, shared in Chapter 3.

This report presents a comprehensive overview, market shares and growth opportunities of Endpoint Encryption market by product type, application, key companies and key regions.

This study considers the Endpoint Encryption value generated from the sales of the following segments:

Segmentation by product type: breakdown data from 2014 to 2019 in Section 2.3; and forecast to 2024 in section 10.7.

Cloud-based

On-premise

Segmentation by application: breakdown data from 2014 to 2019, in Section 2.4; and forecast to 2024 in section 10.8.

Large Enterprises

SMEs

This report also splits the market by region: Breakdown data in Chapter 4, 5, 6, 7 and 8.

Americas

United States

Canada

Mexico

Brazil

APAC

China

Japan

Korea

Southeast Asia

India

Australia

Europe

Germany

France

UK

Italy

Russia

Spain

Middle East & Africa

Egypt

South Africa

Israel

Turkey

GCC Countries

The report also presents the market competition landscape and a corresponding detailed analysis of the major vendor/manufacturers in the market. The key manufacturers covered in this report: Breakdown data in in Chapter 3.

IBM

Dell

Symantec

McAfee

Check Point

Trend Micro

Micro Focus

ESET

Thales eSecurity

BitDefender

Sophos

In addition, this report discusses the key drivers influencing market growth, opportunities, the challenges and the risks faced by key players and the market as a whole. It also analyzes key emerging trends and their impact on present and future development.

Research objectives

To study and analyze the global Endpoint Encryption market size by key regions/countries, product type and application, history data from 2014 to 2018, and forecast to 2024.

To understand the structure of Endpoint Encryption market by identifying its various subsegments.

Focuses on the key global Endpoint Encryption players, to define, describe and analyze the value, market share, market competition landscape, SWOT analysis and development plans in next few years.

To analyze the Endpoint Encryption with respect to individual growth trends, future prospects, and their contribution to the total market.

To share detailed information about the key factors influencing the growth of the market (growth potential, opportunities, drivers, industry-specific challenges and risks).

To project the size of Endpoint Encryption submarkets, with respect to key regions (along with their respective key countries).

To analyze competitive developments such as expansions, agreements, new product launches and acquisitions in the market.

To strategically profile the key players and comprehensively analyze their growth strategies.

Browse the full report @https://www.orbisresearch.com/reports/index/global-endpoint-encryption-market-growth-status-and-outlook-2019-2024

Table of Contents

2019-2024 Global Endpoint Encryption Market Report (Status and Outlook)

1 Scope of the Report

1.1 Market Introduction

1.2 Research Objectives

1.3 Years Considered

1.4 Market Research Methodology

1.5 Economic Indicators

1.6 Currency Considered

2 Executive Summary

2.1 World Market Overview

2.1.1 Global Endpoint Encryption Market Size 2014-2024

2.1.2 Endpoint Encryption Market Size CAGR by Region

2.2 Endpoint Encryption Segment by Type

2.2.1 Cloud-based

2.2.2 On-premise

2.3 Endpoint Encryption Market Size by Type

2.3.1 Global Endpoint Encryption Market Size Market Share by Type (2014-2019)

2.3.2 Global Endpoint Encryption Market Size Growth Rate by Type (2014-2019)

2.4 Endpoint Encryption Segment by Application

2.4.1 Large Enterprises

2.4.2 SMEs

2.5 Endpoint Encryption Market Size by Application

2.5.1 Global Endpoint Encryption Market Size Market Share by Application (2014-2019)

2.5.2 Global Endpoint Encryption Market Size Growth Rate by Application (2014-2019)

3 Global Endpoint Encryption by Players

3.1 Global Endpoint Encryption Market Size Market Share by Players

3.1.1 Global Endpoint Encryption Market Size by Players (2017-2019)

3.1.2 Global Endpoint Encryption Market Size Market Share by Players (2017-2019)

3.2 Global Endpoint Encryption Key Players Head office and Products Offered

3.3 Market Concentration Rate Analysis

3.3.1 Competition Landscape Analysis

3.3.2 Concentration Ratio (CR3, CR5 and CR10) (2017-2019)

3.4 New Products and Potential Entrants

3.5 Mergers & Acquisitions, Expansion

4 Endpoint Encryption by Regions

4.1 Endpoint Encryption Market Size by Regions

4.2 Americas Endpoint Encryption Market Size Growth

4.3 APAC Endpoint Encryption Market Size Growth

See the original post here:
Global Endpoint Encryption Market Report 2019, Industry Overview by Comprehensive Insights and Capacity Growth Analysis to 2024 - Eastlake Times

Should There Be a War Crime Pardon Exception? – Lawfare

In May 2019, President Trump pardoned former 1st Lt. Michael Behenna for crimes committed while deployed in Iraq. Behenna, who had served less than five years in prison by that point, had executed an unarmed Iraqi he believed was responsible for an attack that killed two of his troops. In November, the president followed up his historic act of executive clemency with two more. He pardoned former 1st Lt. Clint Lorance (also convicted of murder in combat, this time in Afghanistan). Andafter much public commentaryhe pardoned former Special Forces Maj. Mathew Golsteyn, who had been charged with killing a detainee and associated offenses, but who had not yet faced trial by court-martial.

Contemporaneously, Trump reversed a Navy admirals decision to grant convicted Navy SEAL Edward Gallagher limited clemency: what had been a reduction in only one pay grade became a full restoration of his rank as a chief petty officer. Further sparking outrage was Trumps order to foreclose the Navy Special Warfare Commands administrative review process that could have stripped Gallagher of his SEAL status before his retirement. Defense Secretary Mark Esper fired Secretary of the Navy Richard Spencer for his behind-the-scenes attempt to block the president from interfering in this process.

The Behenna, Lorance and Golsteyn pardons and the Gallagher relief were the first instances of a president pardoning or granting extraordinary clemency to a soldier for an offense constituting a war crime. But Trump is not the first president to grant clemency to service members who have violated norms, codes of conduct and criminal law through their actions in combat. President Lincoln famously interjected his vision of justice in cases of Union soldiers accused or convicted of the grave wartime offense of desertion, stopping scheduled executions to the chagrin of commanding generals. President Andrew Johnson granted general amnesty and pardoned the vast majority of ex-Confederates during the Reconstruction era. President Nixon did not pardon Lt. William Calley after Calleys conviction for the My Lai Massacre, butwith significant public supportNixon moved Calley out of prison and into house arrest during his appeals, eventually resulting in an early release after a handful of years for the person chiefly responsible for the deadliest war crime in American history. President Obama controversially commuted the sentence of former Army private Chelsea Manning, who had been sentenced to 35 years in prison for a massive leak of classified and sensitive documents related to the global war on terror to Wikileaks.

Though Trumps acts of judicial mercy on service members may not be wholly original, they have made him the first president to pardon soldiersin this case, officersalready convicted of having committed offenses that violate the international law of war. Like most presidential pardons, his acts have garnered both applause and substantial criticism.

One notable source of criticism has been from within the current and former ranks, or those who know something of the traditional military ethos. Naval War College and Naval Postgraduate School ethics professors recently wrote: "The pardons of our war criminals by Trump, and his interference in and disrespect of our own military justice system is unprecedented and should trouble all Americans. We will not pull punchesthey are shameful and a national disgrace."

Another representative example is retired Lt. Gen. David Barno, who argues that President Trump did not give sufficient consideration to the views of his advisers, the unambiguous results of due process under military law, the collateral consequences for our soldiers on the battlefield or obligations under the law of war. This argument is not overstating the facts. When the presidents defense amounts to sanctifying brutal acts of soldiers he thinks are trained as, and expected to be, killing machines, it is difficult to believe the president has given that due consideration. Rather, it seems to many as if he is pushing the buttons of government indiscriminately, a real-world illustration of his claims that Article II of the Constitution allows him to do whatever he wants.

The nature of these combat-incidental crime pardons should give caution to presidents claiming their moral duty or constitutional prerogative to grant clemency at will and without judicial or congressional review. First, war crimes (at the very least those of which Behenna, Lorance and Golsteyn were accused) implicate the well-known and universally accepted expectations, duties and rights of international law. Rules founded on basic principles of humanity, chivalry and honor regulate who may use force, against whom such force may be used, what places or things may be attacked, and what weapons may or shall not be used in those attacks and use of force. How Americansas a nation through public discourse and as a military on the battlefieldaddress violations of these rules will signal something to the larger international community of current and potential allies, partners, competitors and enemies. It signals the tactical and political valuation by the United States of humanitarian practices and standards in conflict.

Second, war crimes implicate not just actions deemed criminal by customs, treaties and domestic military law. They also violate core customs, traditions, and standards of conduct and ethics that (when obeyed) further positive goals of self-regulation within the profession of arms.

Third, the president as the militarys commander-in-chief has a different moral, legal and practical standing in relation to both the military offender and the war crime offense itself. The president is the ultimate superior in the chain of command. The service member convicted of war crimes could not have acted when and where he did but for the presidents express order or tacit acceptance of the military operation within which the service member dutifully executes a mission. While the president is clearly not legally complicit in the wrongful act, his constitutional duties imply a moral responsibility for the enabling context of the wrongful act. In that sense, pardoning a war criminal of ones own military appears to be a conflict of interest, broadly understood. President George H.W. Bush was condemned roundly for pardoning his former White House colleagues for their role in the Iran-contra affairactions that likely happened with Bushs situational awareness while he was serving as vice president, and which he defended as being motivated by their patriotism.

A possible consequence of failing to properly balance these legal and practical realities and authorities is a strong disagreement between the military agent and the civilian political principal who pardons. When this disagreement reflects fundamental differences over what is morally-permissible conduct on the battlefield, the civilian political leaders right to be wrongif exercised over the objections of four-star service chiefs of staff and the civilian service secretariesrisks at least four considerable penalties and costs. First, it risks alienating those in uniform or who have been in uniform who believe such conduct was immoral or illegal and therefore beneath them, damaging the institution and its professional reputation. Second, it risks undermining the confidence the military agent has in the civilian principals knowledge, intentions and good faith. Third, it risks signaling civilian disregard for the very military due process for which the commander-in-chief is responsible for managing as a specialized criminal justice system. And fourth, it risks signaling preapproved permission to engage in similar acts with similar intentions to those in uniform who are facing or who may face circumstances risking moral injurywhat a recent New York Times editorial called the signature defining injury of the global war on terrorism. This combination of risks is too strong for a civilian principal to ignore.

For all these reasons, presidents ought to restrain their impulses when certain conditions are present. Call it the combat-incidental crime pardon exception.

But how to deny a president the power to pardon service members accused or convicted of war crimes by courts-martial? The most obvious route would be to amend the Constitutionbut this is, of course, highly improbable. Instead, the method most respectful to the principle of separation of powers is to amend not the Constitution, but the Uniform Code of Military Justice (UCMJ), which could be done by Congress. This course of action recognizes that criminal activity by service members and their combat actions (especially when they arise from the same facts) raise the interests of both Congress and the commander-in-chief, both of whom have constitutionally prescribed responsibilities for the regulation and use of those service members. The Supreme Court has repeatedly acknowledged that military justices unique elementsprimarily the role of the commander, exercising both prosecutorial and judicial functionsjustify different applications of civil liberties and generally do not violate constitutional protections. With this in mind, it is not impossible to imagine a UCMJ amendment that imposes a limited restraint on presidential discretion and passes the Supreme Courts muster.

Nevertheless, the probability of amending the UCMJ over a likely presidential objection is near zero. With a formal legal mechanism implausible, the better way to understand this restraint is as a presidential self-denial of otherwise unilateral discretion.

But this denial is conditional and triggered by various presumptions. As Immanuel Kant wrote, the right to pardon is certainly the most slippery of all rights of the sovereign .... [It] can demonstrate the splendor of his majesty and yet thereby wreak injustice to a high degree. Presumptions in favor of granting a pardon (or not to) should depend on the timing of the possible pardon decision relative to where it would occur in the military justice process. This conditional framework accounts for the fact that pardons for individuals actions during combat implicate not only the presidents Article II pardon power but also a presidents Article II role as commander-in-chief, the presidents role in executing the congressionally enacted and regulated military justice system under Article I, the principal-agent character of the civil-military fiduciary relationship, andcriticallythe duties and rights the United States has subscribed to under the international law of war. Pardoning a civilian for something like obstruction of justice, tax evasion, illegal campaign contributions or even murder is categorically and normatively different from pardoning a war criminal. Assuming there is a rational, nonarbitrary calculus, this decision ought not to be colored predominantly by the moral judgment of the president as chief magistrate of the lawsmuch less by the judgment of how such a pardon might be politically advantageous.

Under normal conditions, pardons may be used by a president to provide clemency to a person who might yet be tried for, or has already been convicted of, a federal offense. It is a plenary and totally discretionary act, shielded from any external review other than the opinion of the electorate. A pardon deletes the conviction from the record or prevents the possibility of conviction, but the facts of the crime do not disappear; there is simply no longer a legal consequence for them. It is an act of official forgiveness from the senior representative of the entire U.S. population. That absolution or legal forgiveness is not meant to, nor does it in practice, reverse the general deterrence purpose behind that criminal prohibition or its specific prosecution in that pardon petitioners case. Rather, according to the seminal 1866 Supreme Court decision Ex parte Garland, the pardon releases the punishment and blots out of existence the guilt, so that, in the eye of the law, the offender is as innocent as if he had never committed the offense.

Military crimes and their sanctions, established by Congress in the UCMJ and managed by the president down through individual judicial and prosecutorial discretion of subordinate commanders, are fundamentally different from other crimes and sanctions. They apply to a specific and narrow community employed for specific purposes. These criminal proscriptions are only constitutionally lawful, even when they seemingly breach constitutional norms or otherwise sacrosanct civil liberties, to the extent that they ensure that this specialized community is able to accomplish its mission on behalf of the nation.

The Framers gave the power to regulate conduct by its military members to Congress but provided the power to use the military members as an armed force to accomplish security and defense objectives to the president. The resulting justice system reflects Congresss judgment about what conduct is criminal, and Congress by law delegates to the president the authority to control the court-martial procedure and prescribe punishments for violations, and even act as a court-martial convening authority as if he were a senior uniformed commander. (This is not a role the president plays in any other criminal justice system.) Congress has provided the military chain-of-command discretion in individual cases to determine whether some conduct is service-discrediting or prejudicial to good order and discipline to the extent that it should be criminally prosecuted, even if it could never have been in an ordinary criminal court. The Supreme Court has validated (with some exceptions) the militarys determination about what sort of conduct might be so proscribed. Congress and the president have given military commanders a role in investigating potential crime, in deciding when to prosecute certain crimes and how, and in approving some sentences.

This criminal law system also deliberately and self-consciously incorporates international humanitarian law (also known as the law of war, or the law of armed conflict). Under the combatants privilege, international humanitarian law permits nations and individuals to engage in some conduct that would be impermissible and criminalized even under the UCMJ. But this body of law imposes additional layers of duties and prohibitions that apply only in the context of armed conflict.

For this reason, what constitutes a war crime under military justice is highly contextual. Because of the general default presumption of combatant immunity, that context is even more relevant than the context associated with typical issues of excuse and justification that shape criminal prosecutions. The actions that could be labeled as criminal are often taken under extraordinary pressures of time, responsibility for the lives of others, a mission dictated by a superior chain-of-command, and possibly being engaged by a hostile force at the time the decision in question is made or in the immediate aftermath of such decisions. Moreover, the action (or failure to act) that could constitute a crime could not have been committed but for the fact that the service member was in a particular place, doing a particular job, under the lawful authority, responsibility and direction of the president.

If law holds individual agency to be a key factor in determining a persons criminal culpability, behavior in combat reflects a kind of shared agency. This shared agency does not diminish the soldiers culpability. Rather, it accentuates the political leaders role for the express purpose of diminishing that leaders unilateral discretion to forgive and remove the stain of that culpability.

As a nation, the United States has by law and policy subscribed to these duties and prohibitions under international law, and the U.S. holds its military to those standards and rules. They are cemented in doctrine and reinforced through training. One of those duties is to investigate and hold accountable those responsible for violations of international humanitarian law. The process and substance of the criminal law system in the military is fundamentally distinct from any other criminal justice system.

All this means that the decisions for pardoning war crimes should be distinct from those that guide pardons of any other crime in a civilian justice system, or even pardons for another non-war crime offense under the UCMJ. One of the main purposes of pardons is to erase or preclude punishment when the criminalization of behavior is unjustand in the modern context, this has proved especially true when that behavior carries mandatory minimum punishment. But in the context of a war crime, virtually nobody can say that it is unjust to criminalize the killing of unarmed detainees without due process, and most military crimes carry no mandatory minimum sentence. Such a categorical distinction is reasonable because the pardons consequence signals that the president as commander-in-chief has validated, excused or justified the particular conduct that was so highly contextualized in the military combat domain. And that conduct was possible only because the president ordered the service members participation in that context.

The risk of such a pardon is that other service members facing similar contextual facts, operating under similar pressures and constraints, may view that validation as permissive precedent. The community may not view it as a singularly unique instance in which a president, as chief law enforcement official, decides in the interest of justice to undo a civilian conviction or preclude a civilian trial. Rather, the pardon communicates an unexpected endorsement of behavior that is expected to be deemed morally and criminally wrong. Not only that, but such pardons go beyond merely disrespecting the law of war. They actively undermine well-known customary practice and treaty law-imposed duties to investigate and hold responsible parties accountable for violations.

The following set of additional factors ought to guide presidents in exercising their Article II power to pardon when the beneficiary of that clemency is a service member accused or convicted under the UCMJ for crimes proscribed by the law of war:

If the service member has been convicted by court-martial and the appellate process through the Court of Appeals for the Armed Forces (CAAF) is complete (any remedy for the soldier has been granted or denied by the judicial process), do not pardon.

If the service member has been convicted, but the appellate process is not yet complete, presume no pardon. Grant only if an objective and prudent person, knowing the relevant facts, would likely not think that the United States tolerates conduct that constitutes a war crime under international humanitarian law; and the rationale for clemency outweighs the recommendations of the relevant civilian and military chain-of-command; and if an objective and prudent military commander would agree that an enemy belligerent, under similar circumstances, would deserve a pardon from his or her own government for conduct committed against a U.S. civilian or service member.

If the service member has been charged, but court-martial adjudication at trial is not yet complete, presume no pardon. Grant only if doing so satisfies any of the three conditions above.

If not yet charged, do not grant a pardon, and do not engage in or seek to influence the UCMJ disposition decision. Doing so raises the specter of undue influence, if not unlawful command influence that unjustifiably taints the publics perception of the systems fairness and due process.

Per Congresss direction in Article 33 of the UCMJ, the president and the secretary of defense have published disposition guidance to military commanders exercising their prosecutorial discretion under the UCMJ, which includes a handful of inappropriate considerations not to be taken into account when weighing a potential prosecution. Likewise, there are inappropriate pardon considerations: rank of the service member; character of the service members combat experience; previous professional awards or recognition for performance of duties; results of the combat incident that served as context for the offense; collateral misconduct by the service member unconnected with the conduct constituting a war crime; the range of potential punishments available to the court if convicted; the actual punishment adjudged by the trial court or affirmed by the appellate court; and probability or promise of partisan political support from the military at large or specific individuals. The presumptions against granting combat-incidental crime pardons, unless certain conditions exist, recognize but also balance the presidents plenary power to pardon, his duty to faithfully execute the laws, his role as a civilian commander-in-chief for the military, and the nations ever-present duty under international law of armed conflict.

Ultimately, the difficulty of pardoning war crimes lies in that most people do not consider it a difficult question at allthe president clearly has plenary, unilateral discretion to grant a pardon. Alexander Hamilton, writing in Federalist #74, called clemency a benign prerogative and argued a wise president would wield this authority as a matter of case-by-case compassion to mitigate unfortunate guilt, or as a means to put the cork back in a potentially explosive public passion. The irony is that President Trumps most recent pardons were not meant to provide compassionate relief for unjust prosecutions or to douse the fires of public outcry. The pardoned conduct has long been criminalized under the law of war because it lacked the necessary humanitarian compassion international law requires as a constraint on the means and methods of war. And the pardons actually inflamed public passion.

In light of implications raised by international law of war, norms of professionalism and health of stable civil-military relations, and the standing of the president relative to the offense and the offender, the presidents use of his Article II power to pardon war crimes raises fundamental issues of the rule of law. The exercise of power should be limited by laws, not enabled by the whims of individuals. These laws require citizens and those in power to obey certain rules, but they also create mechanisms for deliberate, transparent rule- and decision-making; they ought to account for a diversity of interests, not just opinions. If there is no possibility of a constitutional amendment or a restraint imposed via the UCMJ, then presidents ought to engage in deliberate self-restraint when it comes to pardoning American war criminals in a way that acknowledges the plurality of interests involved.

War crimes are faulty mirrors of normal crimes. Just as images are distorted by physical gravity, we see and understand war crimes as shaped by their severity and their weighty implications for professionalism, civil-military relations and obligations under international law. Following the rule of law means acknowledging the distinction between typical criminal offenses and war crimes: Their differences also demand that the decision to pardon those crimes be justified or denied in a different way.

Read the original post:
Should There Be a War Crime Pardon Exception? - Lawfare

US efforts to extradite Julian Assange akin to rendition, WikiLeaks editor says – The Guardian

The planned extradition and prosecution of Julian Assange by the United States is a new form of forced rendition and a dangerous precedent for press freedom, according to the WikiLeaks editor-in-chief, Kristinn Hrafnsson.

Ahead of a private briefing for Australian parliamentarians on Tuesday afternoon, Harfnsson, an Icelandic-based investigative journalist, told the National Press Club in Canberra the forced rendition of Assange was not occurring with a sack over the head and an orange jumpsuit but with the enabling of the UK legal system and with the apparent support of the Australian government.

I strongly believe that resolving this issue has important international implications, Hrafnsson said. Prolonging it creates an enabling environment for the deterioration of press freedom standards globally.

Political support for stopping the extradition of Assange has been growing in recent months and Australian MPs from across the political divide have formed the Parliamentary Friends of the Bring Julian Assange Home group. The group has membership from the LNP, National party, ALP and crossbench and is co-chaired by George Christensen and Tasmanian independent Andrew Wilkie.

Hrafnsson acknowledged the work of the friendship group during his press club address. Thank you for getting it, Barnaby Joyce, Rebekha Sharkie, Rex Patrick, Julian Hill, Steve Georganas, Richard Di Natale, Adam Bandt, Peter Whish-Wilson and Zali Steggal.

He also thanked a group of more than 60 doctors who have written an open letter saying they fear Assanges health is currently so bad the WikiLeaks founder could die inside a top-security British jail.

Hrafnsson challenged Australian journalists to press the Morrison government to advocate on Assanges behalf. Your government did take steps to secure the freedom of James Ricketson, also of Melinda Taylor, also of Peter Greste.

Please be direct. Please be insistent. Ask for details, not platitudes. Please be unrelenting and prepared to back each other when evasions occur, he said. You, above all people, are able to distinguish between publishing and espionage, a distinction the US government and its allies seem intent on erasing, and you know as well as I that if they are successful in this, then Julian Assange wont be the last of our colleagues to have his life destroyed in this line of work.

Assange faced allegations of sexual assault in Sweden, which he denied, when he entered the Ecuadorian embassy in London in 2012 and sought asylum because he feared being extradited to America. He spent nearly seven years in the embassy until police removed him in April after Ecuador revoked his political asylum. The Swedish investigation was dropped in November.

The British home secretary, Sajid Javid, has signed a request for Assange to be extradited to the US, where he faces charges of computer hacking. Assange faces an 18-count indictment, issued by the US Department of Justice, that includes charges under the Espionage Act. He is accused of soliciting and publishing classified information and conspiring to hack into a government computer.

As well as pressing Assanges case, the WikiLeaks editor-in-chief faced questions on Tuesday about the role of the organisation during the US presidential election. In November 2016, Assange issued a statement defending the role of his organisation, saying it published hacked emails from Hillary Clintons presidential campaign because publication was in the public interest, not due to a personal desire to influence the outcome of the election.

WikiLeaks did not publish any material about Donald Trump. Hrafnsson said nothing of consequence was published about Trump because WikiLeaks did not receive anything of importance that it could authenticate and publish about the candidate, who went on to win the presidential election.

Hrafnsson was asked on Tuesday whether in hindsight he felt played by the Trump campaign. The editor-in-chief was unrepentant. He said the primary judgment to be made in cases like the publication of the Clinton emails was whether the disclosure was in the public interest. He said the editorial judgment involved evaluating the information you have in front of you.

If its authentic, you just have to decide whether its in the public interest or not.

Here is the original post:
US efforts to extradite Julian Assange akin to rendition, WikiLeaks editor says - The Guardian

Machine Learning Answers: If Caterpillar Stock Drops 10% A Week, Whats The Chance Itll Recoup Its Losses In A Month? – Forbes

We found that if Caterpillars (NYSE: CAT) stock drops 10% in a week (5 trading days), there is a solid 25% chance that it will rise by 10% over the subsequent month (20 trading days).

Caterpillar stock has seen significant volatility this year. While the company is being impacted by growing headwinds to the global economy, the uncertainty surrounding the trade war between the U.S. and China, relatively mixed quarterly earnings reports, as well as slowing sales, its relatively high capital returns, and strong balance sheet have supported the stock to an extent.

Considering the recent price swings, we started with a simple question that investors could be asking about Caterpillar stock: given a certain drop or rise, say a 10% drop in a week, what should we expect for the next week? Is it very likely that the stock will recover the next week? What about the next month or a quarter? You can test a variety of scenarios on the Trefis Machine Learning Engine to calculate if Caterpillar stock dropped, whats the chance itll rise.

For example, after a 5% drop over a week (5 trading days), the Trefis machine learning engine says chances of an additional 5% drop over the next month, are about 23%. Quite significant, and helpful to know for someone trying to recover from a loss. Knowing what to expect for almost any scenario is powerful. It can help you avoid rash moves. Given the recent volatility in the market, the mix of macroeconomic events (including the trade war with China and interest rate easing by the U.S. Fed), we think investors can prepare better.

Below, we also discuss a few scenarios and answer common investor questions:

Question 1: Does a rise in CAT stock become more likely after a drop?

Answer:

Consider two situations:

Case 1: CAT stock drops by 5% or more in a week

Case 2: CAT stock rises by 5% or more in a week

Is the chance of say a 5% rise in CAT stock over the subsequent month after Case 1 or Case 2 occurs much higher for one versus the other?

The answer is absolutely!

Turns out, chances of a 5% rise over the next month (20 trading days) is meaningfully more for Case 1, where the CAT has just suffered a big loss, versus Case 2.

Specifically, chances of a 5% rise in CAT stock over the next month:

= 40% after Case 1, where CAT stock drops by 5% in a week

versus,

= 32% after Case 2: where CAT stock rises by 5% in a week

Question 2: What about the other way around, does a drop in CAT stock become more likely after a rise?

Answer:

Consider, once again, two cases

Case 1: CAT stock drops by 5% in a week

Case 2: CAT stock rises by 5% in a week

Turns out the chances of a 5% drop after Case 1 or Case 2 has occurred, is actually quite similar, both pretty close to 23%.

Question 3: Does patience pay?

Answer:

According to data and Trefis machine learning engines calculations, absolutely!

Given a drop of 5% in CAT stock over a week (5 trading days), while there is only about 21% chance the CAT stock will gain 5% over the subsequent week, there is more than 50% chance this will happen in 6 months, and 62% chance itll gain 5% over a year (about 250 trading days).

The table below shows the trend:

Trefis

Question 4: What about the possibility of a drop after a rise if you wait for a while?

Answer:

After seeing a rise of 5% over 5 days, the chances of a 5% drop in CAT stock are about 24% over the subsequent quarter of waiting (60 trading days). However, this chance drops slightly to about 23% when the waiting period is a year (250 trading days).

The table below shows the trend:

Whats behind Trefis? See How Its Powering New Collaboration and What-Ifs ForCFOs and Finance Teams|Product, R&D, and Marketing Teams More Trefis Data Like our charts? Exploreexample interactive dashboardsand create your own

See more here:

Machine Learning Answers: If Caterpillar Stock Drops 10% A Week, Whats The Chance Itll Recoup Its Losses In A Month? - Forbes

Onica Showcases Advanced Internet of Things, Artificial Intelligence, and Machine Learning Capabilities at AWS re:Invent 2019 – PR Web

With IoTanium Cloud and the IoTanium Developer Kit, were excited to help developers increase efficiencies and drive actual business value from their applications.

LAS VEGAS (PRWEB) December 02, 2019

Onica, a Premier Consulting Partner in the Amazon Web Services (AWS) Partner Network (APN) and AWS Managed Service Provider (MSP), announced today the launch of IoTanium Cloud, a collection of AWS CloudFormation resources that ease and accelerate the deployment of, and time to insight from Internet of Things (IoT) devices. The cloud native services provider boasts over 500 AWS certifications and 9 AWS Competencies, offering a full spectrum of cloud capabilities.

Onica has differentiated itself in the APN with their ability to accelerate the innovative capabilities of the cloud such as Artificial Intelligence (AI), Machine Learning (ML), Big Data, and IoT. At AWS re:Invent 2018, Onica launched a proprietary IoTanium Developer Kit, which provided physical IoT hardware to help customers quickly prototype connected devices. IoTanium Cloud, the next evolution of Onicas IoTanium suite, is a cloud configuration tool that is designed to codify best practices in building a serverless IoT backend on AWS to easily create serverless ingestion pipelines, device monitoring metrics, and accelerate data flow from IoT devices. Developers can gain preview access to IoTanium Cloud before it launches in AWS Marketplace starting on Monday, December 2nd at Onica.com/IoTaniumCloud.

Onicas IoT, AI, and ML capabilities will be on full display at AWS re:Invent 2019 as Onica has developed a hands-on interactive lab for attendees to work with the IoTanium Developer Kit and IoTanium Cloud. The Onica.create(AI.Magic) experience will guide attendees through the hardware assembly of an IoT-enabled magic wand. Participants will then leverage Amazon SageMaker to train wand gestures. After testing their models, their complete IoT experience can be realized as they use the Magic Wand to navigate a Wizard through a virtual maze using only the gestures trained into their magic wand. All participants who successfully complete the lab within the 30-minute time limit will take home their own IoTanium DevKit. The Onica.create(AI.Magic) lab can be found at AWS re:Invent 2019 in the Quad at ARIA, Booth 508. To learn more, please visit onica.com/reinvent.

The IoTanium Developer Kit along with IoTanium Cloud is designed to provide customers an opportunity to prototype IoT-enabled applications quickly and painlessly, letting them leverage the full suite of AWS analytics services for device data. IoTanium allows customers to spend more time focused on the business value of IoT applications, rather than the undifferentiated heavy lifting of connectivity, charging, provisioning, device management, and security.

With more than 25 billion connected devices in use by 2021, its critical that developers have access to the tools and services that will give their IoT applications a competitive edge, said Tolga Tarhan, Chief Technology Officer at Onica. With IoTanium Cloud and the IoTanium Developer Kit, were excited to help developers increase efficiencies and drive actual business value from their applications.

Earlier this year, Onica announced it had agreed to be acquired by Rackspace. The acquisition brings Onicas innovative professional services and strategic advisory expertise including application and infrastructure modernization, serverless development, containers, and IoT to the Rackspace portfolio, complementing its existing managed cloud services capabilities.

AWS re:Invent 2019 takes place from December 2-6 in Las Vegas. The Onica.create(AI.Magic) lab can be found at AWS re:Invent 2019 in the Quad at ARIA, Booth 508. To learn more about the Onica.create(AI.Magic) lab, please visit onica.com/reinvent.

About Onica

Onica is a cloud consulting and managed services company, helping businesses enable, operate, and innovate on the cloud. From migration strategy to operational excellence, cloud-native development, and immersive transformation, Onica is a full spectrum integrator, helping hundreds of companies realize the value, efficiency, and productivity of the cloud. Learn more at http://www.onica.com.

Share article on social media or email:

Read the rest here:

Onica Showcases Advanced Internet of Things, Artificial Intelligence, and Machine Learning Capabilities at AWS re:Invent 2019 - PR Web

Amazon is now offering quantum computing as a service with Braket for AWS – The Verge

Google and IBM may be battling for quantum supremacy, but Amazon is currently happy to be a middleman today, its announcing and launching a preview of Amazon Braket, its attempt to turn the nascent field of quantum computing into a service you can access over the internet, a month after Microsoft did something similar. Amazon Braket is a fully managed AWS service, with security & encryption baked in at each level, the company explains in a blog post.

For now, it sounds like a pretty limited affair, where you will mean Amazons corporate customers, and where service means the ability to experiment by running simulations on a set of existing quantum computers from partners D-Wave, IonQ, and Rigetti. (IonQ is also a Microsoft Azure Quantum partner.)

This new service is designed to let you get some hands-on experience with qubits and quantum circuits. You can build and test your circuits in a simulated environment and then run them on an actual quantum computer, writes Amazon.

But Amazon says its also creating the AWS Center for Quantum Computing, a physical lab near the California Institute of Technology (Caltech) where it may research quantum computers of its own and more uses for quantum computers, for that matter. The companys director of quantum computing confirmed to Wired that Amazon is working on quantum hardware.

Theoretically, quantum computers could calculate far faster than traditional supercomputers thanks to the fact that their bits can exist in multiple quantum states instead of simply being on (1) or off (0), and thats what Google recently claimed it had achieved with its 54-qubit Sycamore quantum computer. The company says its machine successfully made a calculation that would take the worlds most powerful supercomputer 10,000 years.

But quantum computers are also rare and extremely expensive, so Amazon and Microsoft are each attempting to turn them into a shared, managed, and potentially scalable resource, like Amazon already does with its highly valuable AWS cloud computing platform. That invisible server empire serves as backbone for many of the internet services you use today.

Update, 8:56 PM ET: Id missed that Microsoft also announced a similar Azure Quantum service last month, and Ive updated to mention it.

Original post:

Amazon is now offering quantum computing as a service with Braket for AWS - The Verge