Ma Bell, Not Google, Creates The Real Open Source Borg – The Next Platform

True to its name, Googles famous Borg cluster controller has absorbed a lot of different ideas about how to manage server clusters and the applications that run atop them at the search engine and now cloud computing giant. And while the Kubernetes container controller that Google open sourced in June 2014 was certainly inspired by Borg, Kubernetes was really more of a kernel than it was a complete system, and the way you know that is that it took a long time to get Kubernetes to be truly usable in the enterprise.

Oddly enough, Airship, a mashup of Kubernetes, the OpenStack cloud controller with bare metal extensions, and a slew of other open source projects spearheaded by AT&T yes, the same Ma Bell that created the C compiler and then the Unix operating system back in 1969, starting the open source and Unix revolutions has surprisingly and, at least to some, quietly created a complete software stack that arguably rivals Borg and its extensions inside of Google.

This is a considerably different outcome than anyone might have predicted only four years ago, when we were all trying to figure out if OpenStack, Mesos, or Kubernetes was going to emerge as the ultimate cluster controller and application scheduler.

We wanted to make sure that what we were seeing unfolding with Airship made sense, so we reached out to Jonathan Bryce, executive director of the OpenStack Foundation, to make sure we were interpreting what AT&T was doing with systems software and specifically with the Airship extensions to OpenStack and Kubernetes correctly. And to be very precise, we asked if Airship was analogous to Borg and Omega at Google and Autopilot at Microsoft Azure, which control the clusters and overlaying layers of workload isolation, including virtual machines and containers, at these two hyperscalers.

The answer was a qualified probably, but Airship is more than Borg/Omega, which we covered here in detail more than four years ago, or Autopilot, which we discussed a few months later. We are not sure that Airship should not be called an uberating system, a conglomeration of runtimes, virtualization layers, and system management tools that can span an entire distributed computing system. Bryce, being a software developer and one with open source keenly in mind thinks of Airship as a framework more than an operating system.

From what I know, Airship is similar in concept to Autopilot and Borg/Omega, says Bryce. The way that I think about it, Airship is really a lifecycle management framework for operating open source software. Its focused on Kubernetes and OpenStack now, but down the road there, if there emerges a leading serverless framework or new AI tooling, these could plug in.

The real issue that Airship is addressing, says Bryce, is not only creating an operating system that can span bare metal, virtual machines, and containers (or any mix of them), wrapping around OpenStack and its bare metal extensions like Ironic or the MaaS layers added by Canonical, and the Kubernetes podding system for containers, but in taking control of how all of this open source software, which innovates at different rates, can be managed itself, including all of the release dependencies and including rollback capabilities when some piece of the open source software stack doesnt work out right.

For me, Airship is not just about installing software and getting it up and running, but its how do you benefit from this continuous innovation that open source projects deliver. The concept of lifecycle is so critical and its really a core of Airship.

Almost eight years ago, AT&T made a commitment to using and extending open source software to build out its global network, and to use whitebox hardware to run it, as a means of lowering the cost of its network services. This has been a huge transition for the company, but it is putting control back in its own hands rather than those of its equipment suppliers.

Airship is not to be confused with other open source efforts that AT&T has undertaken in recent years to provide orchestration and virtualization in its network. Airship has nothing to do with the Open Network Automation Platform, an orchestration and virtualization layer for network function virtualization that AT&T developed internally as ECOMP short for Enhanced Control, Orchestration, Management and Policy and merged with the competing and Open Orchestrator (Open-O) project back in 2017. Airship also has nothing to do with the DANOS open source network operating system that AT&T created, enhanced, and preserved starting in 2017 in the wake of Brocade Communications buying routing NOS provider Vyatta in 2012 and then losing interest. ONAP and DANOS have both been moved under the Linux Foundation umbrella, like many open source projects. Airship is thus far a free-standing community that administered under the OpenStack Foundation umbrella.

There are a lot of moving parts to Airship, but before getting into that, it is probably helpful to understand why AT&T created its own mashup of OpenStack and Kubernetes. Most large enterprises have a few to many datacenters, and the largest hyperscalers and cloud builders have maybe dozens of regions with a few datacenters in each region. AT&T has tens of thousands of datacenters, and deploying applications across these datacenters, which have a wide mix of sizes and types of equipment, is a very big hassle. What was needed, says Bryce, was a systems-level, pluggable approach to software, allowing for all kinds of open source projects to be snapped into Airship and maintained as a whole even though it is really a collection of pieces all being innovated at different rates. The other interesting thing about Airship is that it has a declarative approach to describing, deploying, and configuring software atop hardware. Airship is for deploying a datacenter, not a server or a switch or a storage server.

Googles Borg is also declarative when it comes to setting up clusters, and uses the Borg Control Language, or BCL, which is itself a variant of the General Configuration Language that the search engine giant created to configure and deploy hardware and the applications that run on it. That Airship declarative language is YAML, a variant of XML that is used in conjunction with OpenStack Helm, a document-based package manager for OpenStack that has been extended to Kubernetes. Here is what the Airship workflow looks like:

That makes it look simple, we know. It takes a lot of software, all working in concert, to make anything this complex look that simple.

Airship starts out with a minimalist Kubernetes environment that can in turn bootstrap OpenStack and other services. In fact, OpenStack is containerized with Airship, inside of Docker containers under the control of Kubernetes, which is like the package manager, and can be thought of as just another microservices application with components that can be tweaked or swapped out independently from the others in that collection of microservices that is called OpenStack.

Once OpenStack is up and running on Airship, you can, of course deploy Kubernetes on either bare metal using Ironic or on virtual machines using Nova. In most cases, service providers like AT&T want exactly this kind of isolation not just to keep applications and data separate from different users, but to keep users and administrators both among AT&Ts IT staff and the customers that use its network away from the underlying Kubernetes and OpenStack layers that implement the environment.

Here is how OpenStack, Kubernetes, and the unique code created by AT&T and then others who joined the Airship project last year, such as SK Telecom and Intel, that glues Airship all together:

The chunks that AT&T and the Airship team have been working on are in blue, and with the exception of one piece, they are all relegated to a layer of the complete system stack that AT&T calls the Under Cloud Platform, or UCP, runtime. This all starts with bare metal servers, on top of which is a host operating system in this case Linux and a container runtime that is compliant with the Open Container Initiative specification meaning, in essence, a Docker container running atop that.

Airship then has containerized services that manage the configuration of the hybrid OpenStack/Kubernetes setup and that run underneath OpenStack and beside Kubernetes and Helm. OpenStack is the controller for virtual machine and bare metal provisioning, and Kubernetes is the controller for podded containers. Airship uses its own Ceph object store as the back-end for the Airship control plane, which is separate from the OpenStack or Kubernetes storage that will be used by applications. The stack also uses the Calico Layer 3 software-defined networking framework to provide routing functions for Airship that are separate from the networking stack used by OpenStack and Kubernetes applications. Sitting next to Kubernetes and Helm is a bit of orchestration software that AT&T created called Armada, which is where all that declaring with YAML in Helm documents, called charts, gets done.

In the blue boxes underneath OpenStack Helm sit Promenade, Shipyard, Drydock, Deckhand, Divingbell, and Berth. Promenade, through a process AT&T calls genesis (another Star Trek reference, no doubt) takes a single host system, loading it up with the current stack of Kubernetes and OpenStack software and use all of the code and configuration in this initial host to build out the remainder of the Kubernetes/OpenStack cluster that is described in the Helm documents. Here is the important bit: The same process that creates the initial Airship host is the one that is used to update the hosts from that point forward.

Shipyard is the REST front-end to Airship, which allows it to be integrated with continuous integration/continuous development platforms and to do audits and take various operational actions. Drydock replicates and configurations additional nodes in the cluster once the genesis machine is created, including control plane hosts to run the Airship elements as well as compute and storage hosts for applications. This bare metal provisioning done by Drydock includes setting up BIOS and firmware, RAID drive configurations, operating systems, and network configurations on these host machines. Deckhand is a central repository for site designs and changes to them, as expressed in those YAML documents. Divingbell is a minimalist bare metal configuration manager that aligns with Kubernetes pods and is used to repair or otherwise tweak a setup that is running, much as a Navy specialist in a diving bell can work on a ship. Berth is a minimalist VM that runs inside a container that also aligns with Kubernetes pods and is used in very specific ways. Aligning to Kubernetes means if you kill the pods, you kill the bare metal or VM instances.

The interesting thing about Airship is that although software could be provisioned to run on bare metal, in a virtual machine, or inside of a container in this entire environment, it is assumed that all elements of Airship itself are only deployed using containers.

Airship v1.0 went live in May and the project has just been graduated to a top-level project by the OpenStack Foundation. That means it is ready for prime-time deployments.

It will be interesting to see how this stands up in production against Googles on-premises Anthos stack, which was formerly known as Cloud Services Platform and which is a containers-only environment for applications as well as for Kubernetes itself.

The other thing that needs to be resolved is how various job schedulers can plug into Airship. Presumably the schedulers that work with OpenStack, such as Qonos, or Kubernetes, such as Volcano, kube-scehduler, or Navops and GridEngine from Univa, can plug right in at a higher level here in the Airship stack. One of the key things about Borg was not just that it set up hardware and software for applications, but it figured out when to actually run a mix of batch and interactive workloads to maximize utilization across Googles vast fleet of millions of servers. This is one of the trickier bits to manage, and even Google has had to make Borg pluggable and able to support different schedulers, including Omega and a slew of ones that exist but Google has not named outside of its own walls.

More:
Ma Bell, Not Google, Creates The Real Open Source Borg - The Next Platform

Red Hats credibility with IBMs strong brand to propel biz in India – Livemint

BENGALURU :Three months after International Business Machines (IBM) Corp. completed the acquisition of Red Hat Inc., president and chief executive officer (CEO) of the open source software company, Jim Whitehurst, insists that his strategy remains the same, even as IBMs market capabilities and size help his company achieve faster growth.

In an interview in Bengaluru, Whitehurst and Red Hat chairman and Nexus Venture Partners co-founder Naren Gupta spoke about the companys India plans and explained why they continue to see open source models as the future. Edited excerpts:

It has been a year since the deal was announced and three months since it was closed. Has the Red Hat strategy changed since?

Whitehurst: Red Hats strategy remains unchanged. We are an open source software company looking to deliver open source platforms. Every line of code we have is open source. That will continue to be true. Even for employee contributions, IBM changed its entire contribution policy to match that of Red Hat. The logic of the deal was more around how IBMs go-to-market capability can help us scale faster. Earlier, we just didnt have the size and scale to really be able to deliver these huge platforms for telcos. IBM is working hard to better optimize their software to run on our platforms.

Gupta: In many ways, the Red Hat-IBM deal extends the benefits of open source. We were doing well ourselves, but certainly we can accelerate whatever we are doing in partnership with IBM.

How is the deal panning out in India?

Whitehurst: Great. While we have credibility in open source, when it comes to running big mission critical systems, people trust IBM. Telcos around the world are a great example. Taking our stack together with IBM allows us to take that credibility and propel our business quickly. In India, IBM has a strong brand.

Typically, merger deals take a toll on employees, either in terms of morale or concerns around layoffs. How are you addressing that aspect?

Whitehurst: We were very clear from day one that RedHat is a distinct unit. There have been no layoffs and no changes in benefits. I still have a finance department, a legal department, and an human resources department. Everyone at Red Hat reports to me and I report to Ginni (IBM chairman, president and CEO Ginni Rometty). Weve actually accelerated our hiring and we are accelerating our business. Thats true here in India as well.

How did you manage to convince IBM that you need to be a separate unit? There are few parallelsVMware and LinkedIn to name only a couple.

Whitehurst: I spoke with Pat (Gelsinger, VMware CEO), Michael Dell (chairman and CEO of Dell Technologies). I also spent a lot of time with Jeff Weiner (CEO of LinkedIn) and Satya (Nadella, Microsoft CEO) who were all very generous with their time, talking about how they helped VMware and LinkedIn to remain separate companies.

To some extent, it helps that IBMs model is similar in terms of the nature of the company around revenue and margin. Were a subscription model, so I pretty much know how my revenue will shape up each quarter. As were operating on a different set of metrics, its easy for us to go back to IBM saying heres what were going to deliver in terms of revenue this quarter. So, a lot of friction points havent been there. The one exception is that we no longer have equity to give. So, we give IBM equity instead of Red Hat equity.

Gupta: I think IBM is being very smart about this thing. The reason they bought Red Hat was to leverage the innovation.

The pace of innovation is rising in technology. Youre going to see more models such as the Red Hat-IBM acquisition model. People are realizing that a lot of the innovation could be compromised if you merge two organizations.

Go here to read the rest:
Red Hats credibility with IBMs strong brand to propel biz in India - Livemint

Put on your tech specs: Amazon Web Services has joined the Java Community Process – The Register

Amazon has made another effort to be a good Java citizen by joining brewmasters at the Java Community Process (JCP), the group which develops specifications for the Java platform.

The firm's latest move was mentioned by Amazon's Yishai Galatzer, manager of the AWS Artifacts and Languages group at AWS, on Tuesday. Galatzer's team, of course, builds Amazon Corretto, a distribution of the OpenJDK.

The OpenJDK is an open source implementation of Java licensed under GPL v2 and presented in collaboration with Oracle, owners of Java, which uses OpenJDK code in its own Oracle JDK. Since April 2019, the Oracle JDK is not free for commercial use, for versions 9 and higher, a change which has increased interest in the OpenJDK.

Galatzer says that "we are ramping up our investment in OpenJDK," and references the company's contribution of the Amazon Corretto Crypto Provider earlier this year. It is also worth noting that James Gosling, inventor of Java, joined AWS as a Distinguished Engineer in 2017.

Now the company is joining the JCP, whose other members include (among many others) Apple, Arm, Cisco, Google, HP, IBM, Oracle, Samsung and VMware but not Microsoft.

AWS and open source is a contentious subject. Some open source companies see cloud providers as a threat because they make a business from providing services driven by open source software, without giving much back to the creators and stewards of that software. In some cases, open source projects have adopted new more restrictive licences as a result.

Tim Bray, co-author of the original XML specification, now works at AWS. He argues in a recent blog post that "the hypothesis that Open Source in and of itself constitutes a business model is not well supported by the evidence."

Rather, "operational excellence", as offered by (you guessed it) AWS is a proven good business. He recalls working for Sun when it acquired the open source database MySQL, but failing to get Twitter to pay for MySQL support even though "they were existentially dependent on this technology." Bray's post reads like an kind of apologia for the way AWS uses open source.

This tension in the open source community means that anything AWS can do to win kudos is good for public relations. That said, it also makes perfect sense that AWS, as a big Java user, aspires to a greater say in how the platform advances.

Sponsored: How to Process, Wrangle, Analyze and Visualize your Data with Three Complementary Tools

See the original post here:
Put on your tech specs: Amazon Web Services has joined the Java Community Process - The Register

Making sense of bitcoin, cryptocurrency and blockchain – PwC

From a business perspective, its helpful to think of blockchain technology as a type of next-generation business process improvement software. Collaborative technology, such as blockchain, promises the ability to improve the business processes that occur between companies, radically lowering the cost of trust. For this reason, it may offer significantly higher returns for each investment dollar spent than most traditional internal investments.

Financial institutions are exploring how they could also use blockchain technology to upend everything from clearing and settlement to insurance. These articles will help you understand these changesand what you should do about them.

For an overview of cryptocurrency, start with Money is no object from 2015. We explore the early days of bitcoin and provide survey data on consumer familiarity, usage, and more. We also look at how market participants, such as investors, technology providers, and financial institutions, will be affected as the market matures.

For a deeper dive into cryptocurrencies, we recommend that you read the following:

Carving up crypto provides an overview of how regulators are thinking about cryptocurrency in financial services, both in the United States and abroad.

In Cryptocurrencies: Time to consider plan B, we explore possible avenues for accounting treatment on cryptocurrencies.

For board members, Ten questions every board should ask about cryptocurrencies suggests questions to consider when engaging in a conversation about the strategic potential of cryptocurrencies.

For an overview of blockchain in financial services, visit this page: Blockchain in financial services. We examine some of the ways FS firms are using blockchain, and how we expect the blockchain technology to develop in the future. Blockchain isnt a cure-all, but there are clearly many problems for which this technology is the ideal solution.

For a deeper dive on specific topics related to blockchain, we recommend:

A strategists guide to blockchain examines the potential benefits of this important innovationand also suggests a way forward for financial institutions. Explore how others might try to disrupt your business with blockchain technology, and how your company could use it to leap ahead instead.

Building blocks: How financial services can create trust in blockchain discusses some of the issues internal audit and other parties may have with a blockchain solution, and how you can start to overcome some of those concerns.

Our Global Blockchain Survey explores the current state of the technology across all sectors and geographies.

Many skeptics are beginning to wonder if the year of blockchain will ever really arrive. Blockchain announcements continue to occur, although they are less frequent and happen with less fanfare than they did a few years ago. Still, blockchain technology has the potential to result in a radically different competitive future for the financial services industry.

Go here to read the rest:
Making sense of bitcoin, cryptocurrency and blockchain - PwC

Top crypto exchanges for 2019 [40+ compared] | Finder.com

Electronic Funds TransferBank transfer (SEPA)Wire transfer

USD, EUR, GBP, JPY, CAD

BTC, ETH, XRP, BCH, EOS, LTC, ADA, XLM, DASH, XMR, USDT, ETC, QTUM, ZEC, REP, DOGE, GNO, MLN, ATOM, XTZ, SC

UK residents: In addition to normal crypto trading, Kraken offers margin lending. As this is a regulated activity which they are not authorised to offer in the UK, we advise you not to use this service. If you're interested in margin trading, see authorised providers.

Credit cardDebit cardPayPalWire transferLocal Online Banking

EUR, GBP, NZD, USD, AUD, CAD, CHF, NOK, ZAR, JPY, SEK, TRY, HUF, PLN

BTC, ETH, BCH, XRP, DASH, LTC, ETC, ADA, MIOTA, XLM, EOS, NEO, TRX, ZEC, XTZ

Copy the trades of leading cryptocurrency investors on this unique social investment platform. Non-US residents can read our review of eToro's global site here.

Bank transfer (ACH)Bank transferCryptocurrencyWire transfer

USD

BTC, ETH, XRP, BCH, LTC, USDT, BNB, ADA

Cryptocurrency

-

BTC, ETH, XRP, BCH, EOS, XVG, LTC, ADA, MIOTA, TRX, NEO, DASH, XMR, XEM, VET, ETC, ICX, QTUM, OMG, & 70+ more

Buy and trade 100+ cryptocurrencies on this global cryptocurrency exchange.

Credit cardDebit card

USD, EUR, GBP

BTC, ETH, XRP, BCH, EOS, LTC, XLM, ETC & 5+ more

Get US$10 in free bitcoin when you buy US$100 or more of any crypto. T&Cs apply.Buy and sell major cryptocurrencies on one of the world's most renowned cryptocurrency exchanges.

CashCredit cardDebit cardBank transfer (SEPA)

USD, EUR

BTC, ETH, ETC, BCH, LTC, ADA, QTUM, XRP

Buy coins like Bitcoin, Ethereum, Ripple, Litecoin and Bitcoin Cash with credit card.

Credit cardDebit cardOKPAYPayPalSOFORT

EUR, USD, CHF, GBP

BTC

Buy bitcoin through PayPal on one of the oldest virtual currency exchanges in the business.

Bank transfer (ACH)Credit cardBank transfer (SEPA)Faster Payments Service

USD, EUR, RUB, GBP & 125+ more

BTC, BTG, BCH, LTC, DASH, ETH, XRP, ZEC & 3+ more

Disclaimer: Highly volatile investment product. Your capital is at risk.Use your USD, EUR or RUB to buy and sell cryptocurrency at competitive exchange rates and with high maximums for verified accounts.

Bank transferCredit cardCryptocurrencyWire transfer

USD, EUR, JPY

BTC, ETH, BCH

With options to buy bitcoin and popular altcoins through credit card, wire transfer and more, BitfFyer offers users the choice of paying with cryptocurrency or USD, EUR and JPY.

SatoshiTango Cryptocurrency Exchange

Bank transferCashCryptocurrencyBank transfer (SEPA)

ARS, USD, EUR

BTC, LTC, XRP, ETH, BCH

SatoshiTango is an Argentina-based marketplace that allows you to easily buy, sell or trade Bitcoins.

Credit cardCryptocurrency

USD

BTC, BCH, MIOTA, XVG, NEO, ADA, XRP, TRX, ONT, ZIL, GAS, LTC, ZRX, QTUM, ETH, ETC, VET, ICX & 300+ more

CoinSwitch allows you to compare and convert over 250 cryptocurrencies across all exchanges.

Credit cardDebit card

USD, EUR

BTC, BCH, ETH, XMR, ZEC, DASH, XRP, ETC, LTC, DOGE, XLM,1ST, ADX, AMP, ANT, BAT, & 75+ more

Access competitive crypto-to-crypto exchange rates for more than 35 cryptocurrencies on this global exchange.

Bank transferCredit cardDebit cardeCheckPayPal

USD

BTC

Buy bitcoin instantly with credit card, PayPal or bank account on this peer-to-peer lending platform.

Bank transfer (ACH)Bank transfer (SEPA)Wire transfer

USD, EUR, GBP

BTC, BCH, ETH, LTC, ETC, ZRX, BAT

Formerly known as GDAX, Coinbase Pro is a US-based exchange which offers fiat currency payment options, including wire transfer, ACH bank transfer and SEPA.

Credit cardCryptocurrencyDebit cardBank transfer (SEPA)Wire transfer

USD, EUR

BTC, BCH, LTC, ETH, XRP

A global cryptocurrency exchange that facilitates crypto to fiat transactions, where you can use EUR or USD to buy bitcoin and popular altcoins.

CryptocurrencyWire transfer

USD

BTC, ETH, BOXX, XVG, SC, XRP, DOGE, STRAT, XMR, ADA, OMG, ETC, BCC, XLM, DGB, UKG, & 128+ more

Buy from one of the largest cryptocurrency exchanges with a selection of over 190+ cryptocurrencies and 3 USD pairings.

CryptocurrencyWire transferBank transfer (USA only)

USD

BTC, ETH, BCH, LTC, ZEC

Trade bitcoin, Ethereum and more at a US-based exchange where payments can be made in USD.

Credit cardCryptocurrencyDebit cardPayeerPerfect MoneyBank transfer (SEPA)Wire transfer

USD, EUR, RUB, PLN, UAH

BTC, BCH, ETH, ETC, XRP, KICK, DASH, WAVES, ZEC, XMR, LTC, DOGE, USDT, ADA, INK

A UK-based cryptocurrency platform that provides buyers with a wide variety of payment options.

AdvCashCryptocurrencyPayeerPerfect Money

USD, RUB

BTC, BTG, DASH, ETH, LTC, DOGE, WAVES, LSK, BCC, TRX, ABYSS, PAC, ZEC, XVG, EOS, ETC, & 404+ more

Pay in USD, RUB or trade crypto to crypto at this Russian-based cryptocurrency exchange with hundreds of coins listed.

Cryptocurrency

-

BTC, BCH, XMR, DAG, ETH, XRP, EOS, LTC, ADA, TRX, NEO, ONT, STEEM, BTM, BCD, ZINC, VET, OLT, USDT, BSV, & 134+ more

Browse a variety of coin offerings in one of the largest multi-cryptocurrency exchanges and pay in cryptocurrency.

Cryptocurrency

-

BTC, ETH, 18T, BUT, LXT, CDC, UUU, AAC, CNN, UIP, UC, GSC, IIC, MEX, EGCC, SHE

Owned by the team behind Huobi.pro, HADAX lets users vote for cryptocurrencies it should list.

CryptocurrencyPayeerPerfect MoneyYandex Money

USD, EUR, RUB

BTC, ETH, DCN, BCH, NIO, TRX, DASH, COB, DOGE, PRIX, DSR, XCPO, LTC, XRB, VERI, LOC, & 84+ more

Supporting over 100 coins, you can exchange a variety of cryptocurrency pairs on this peer-to-peer platform.

Cryptocurrency

-

BTC, BCH, RVN, LTC, ALQO, LCC, ECA, SMART, POLIS, BCO, COLX, IC, XP, BWK, HTML, QBIC, & over 44+ more

Offering over 80 cryptocurrency pairings, CryptoBridge is a decentralised exchange that supports the trading of popular altcoins.

Cryptocurrency

-

BTC, BTG, DASH, ZET, XVP, XPM, WDC, VTC, VRC, UNO, TROLL, START, SLR, SLG, RDD, & 32+ more

Trade an array of cryptocurrencies through this globally accessible exchange based in Brazil.

CashWestern Union

USD

BTC

Buy and sell bitcoin fast through a cash deposit at your local bank branch or credit union, or via a money transfer service.

View post:
Top crypto exchanges for 2019 [40+ compared] | Finder.com

Bradley Manning Trial Begins; Prosecutor Says Leaker Gave …

Updated at 1:57 p.m. ET

As the court martial of Army Private First Class Bradley Manning got underway Monday, prosecutors argued that the former Army intelligence analyst "knowingly gave intelligence to the enemy" when he leaked 700,000 U.S. government documents to Wikileaks.

Manning's defense attorney did not deny that his client had leaked the documents but did so because he was "young, nave and good-intentioned". The release of the documents has been described as the most extensive leak of classified information in U.S. history.

In the three years since first being detained during a combat deployment to Iraq, the former Army intelligence analyst has become a cause clbre for civil liberties and anti-secrecy advocates who consider him a whistle-blower.

The court-martial for Manning, 25, is taking place at Fort Meade, Md., north of Washington D.C and is expected to last three months.

The most serious of the 22 charges Manning faces is aiding the enemy for which Manning could face life in prison if convicted. The additional charges include wrongfully causing intelligence to be published on the Internet knowing that it is accessible to the enemy; theft of public property or records; transmitting defense information; fraud and related activity in connection with computers.

In his opening arguments Army prosecutor Captain Joe Morrow presented detailed computer forensic evidence of Manning's computer activity that indicated he began passing along classified information to Wikileaks within two weeks of his deployment to Baghdad in November, 2009.

The prosecutor said the computer evidence indicated that in following months Manning gathered information in bulk, "not onesies or twosiesthese were massive, massive downloads." Morrow said the information gathered by Manning was of "great value to our adversaries and in particular to our enemies."

Morrow said Manning "knew the consequences of his actions" as he "literally dumped that information onto the Internet in the hands of the enemy."

Morrow presented chat logs of Manning's contacts with Wikileaks founder Julian Assange about some of the information that was released to his website. In particular he tried to link Manning's computer searches with a "most wanted" list of items the anti-secrecy website had published in 2009. Assange has not been charged in the case.

In his arguments David Coombs, Manning's attorney, described a young nave soldier who decided to release the classified documents he had access to "because he thought he could make the world a better place."

He said from among the "literally hundreds of millions of documents" Manning had access to he chose the documents he released not because of Wikileaks' most wanted list but because "he believed this information needed to be made public." "He was young, nave, good intentioned," said Coombs.

Challenging the prosecution's narrative Coombs pointed to a roadside blast on Christmas Eve, 2009 as being the prime motivator for Manning's leaks.

Coombs said that for Manning the good news that colleagues had escaped injury in a roadside blast that night was offset by the fact that a car carrying five Iraqi civilians took the brunt of the blast, killing one.

The defense attorney said Manning was transformed by incident because "he couldn't forget the lives lost that day" and "led him to feel that he needed to do somethingto make a difference in this world."

Ultimately he said Manning began to look for information that he could make public. In doing so Coombs said Manning purposefully looked for information that he believed "could not be used against the U.S. "

He said Manning leaked hundreds of thousands of battlefield reports from Iraq and Afghanistan out of a belief that "the American public should know what is happening on a day to day basis" in the two countries. He said Manning's research indicated the reports did not include intelligence sourcing, were historical in nature and did not contain information about future operations.

He said Manning first became aware of the 250,000 diplomatic cables he leaked when his supervisor urged his team to use them in their intelligence reports. Coombs said Manning found State Department regulations which said most of the cables were unclassified. He said Manning felt the documents were important because they "showed how we deal with other countries."

In February, Manning pleaded guilty 10 lesser charges that carried a 20-year prison sentence. At a pre-trial hearing, Manning read for an hour from a 35-page statement in which he explained his motivations in releasing the classified documents. He said he had wanted "to spark a debate about foreign policy" and show "the true cost of war."

Army prosecutors decided soon after that they would continue to pursue prosecution for the most serious charges against him.

After opening arguments prosecutors began the procession of nearly 140 witnesses who will be called to testify for the case. On Monday, several Army criminal investigators were called to testify about the evidence they recovered from Manning's quarters and workspace in Baghdad, including contacts with Wikileak's Julian Assange. Specialist Eric Baker, Manning's roommate in Baghdad also testified that Manning spent most of his free time on his laptop.

Prosecutors will try to prove that Manning's leaks aided the enemy by calling as a witness a Navy SEAL who participated in the raid that killed Osama bin Laden. They say that copies of the documents Manning leaked to WikiLeaks were found on the computer hard-drives recovered by U.S. special operations forces during the raid.

Read More: Osama Bin Laden

That portion of the trial will likely be closed to the public and the media.

Now being held at the military prison at Fort Leavenworth, Kansas, Manning's initial detention at the Marine brig at Quantico, Va., became the subject of controversy. Supporters claimed the conditions of his detention there had amounted to cruel and unlawful punishment, which his attorneys said merited dismissing the case against him.

After a lengthy pre-trial hearing, the judge in the case found there was validity to some of the allegations and reduced his potential prison sentence by four months.

Related: Bradley Manning's Former Guards Testify About Controversial Incident

Sunday night Coombs posted a statement on his website thanking supporters for their financial support and for raising awareness of the case.

"On behalf of both myself and Pfc. Manning," he said, "I would like to thank everyone for their continued support over the last three years."

Original post at 7 a.m. ET

The rest is here:
Bradley Manning Trial Begins; Prosecutor Says Leaker Gave ...

‘Without Encryption, We Will Lose All Privacy’: Snowden …

In an op-ed published Tuesday by The Guardian, American whistleblower Edward Snowden expressed alarm over global governments' efforts to undermine encryption, highlighting a recent attempt by the United States, United Kingdom, and Australia to pressure Facebook to create a "backdoor" into its encrypted messaging applications.

"The true explanation for why the U.S., U.K., and Australian governments want to do away with end-to-end encryption is less about public safety than it is about power."Edward Snowden, whistleblower

"For more than half a decade, the vulnerability of our computers and computer networks has been ranked the number one risk in the U.S. Intelligence Community's Worldwide Threat Assessmentthat's higher than terrorism, higher than war," wrote Snowden.

"And yet, in the midst of the greatest computer security crisis in history, the U.S. government, along with the governments of the U.K. and Australia, is attempting to undermine the only method that currently exists for reliably protecting the world's information: encryption," he continued. "Should they succeed in their quest to undermine encryption, our public infrastructure and private lives will be rendered permanently unsafe."

As Snowden noted, "in the simplest terms, encryption is a method of protecting information, the primary way to keep digital communications safe." Messaging apps often use end-to-end encryption (E2EE)which, as the Electronic Frontier Foundation (EFF) explains, "ensures that a message is turned into a secret message by its original sender, and decoded only by its final recipient."

For six years straight, the vulnerability of our computer networks has been the top risk on the US Intelligence Communitys Worldwide Threat Assessment ranked higher than terrorism; higher than war.

This surveillance scheme will make it worse.https://t.co/MFZdRnCvTR

Edward Snowden (@Snowden) October 15, 2019

Facebook-owned WhatsApp already uses E2EE. The New York Times reported in January that Facebook CEO Mark Zuckerberg has ordered its implementation across all company messaging platforms, including Facebook Messenger and Instagram Direct. Acknowledging that encrypted apps could be used for "truly terrible things like child exploitation, terrorism, and extortion," Zuckerberg wrote in blog post on March 6 that "we've started working on these safety systems building on the work we've done in WhatsApp, and we'll discuss them with experts through 2019 and beyond before fully implementing end-to-end encryption."

SCROLL TO CONTINUE WITH CONTENT

On Oct. 4, four top officials from various countriesU.S. Attorney General William Barr, then-acting U.S. Homeland Security Secretary Kevin McAleenan, U.K. Home Secretary Priti Patel, and Australian Minister for Home Affairs Peter Duttonsent an open letter (pdf) to Zuckerberg requesting that "Facebook does not proceed with its plan to implement end-to-end encryption across its messaging services without ensuring that there is no reduction to user safety and without including a means for lawful access to the content of communications to protect our citizens."

Facebook responded by reiterating the company's commitment to its E2EE plans and opposition to backdoors. "We believe people have the right to have a private conversation online, wherever they are in the world," the company said in a statement. "End-to-end encryption already protects the messages of over a billion people every day... We strongly oppose government attempts to build backdoors because they would undermine the privacy and security of people everywhere."

Encryption is a human right in the digital society. Full stop. We should have it by design and default in the technology we use. I agree with @Snowden "Without encryption, we will lose all privacy. This is our new battleground" https://t.co/9YhAh0UsWn

Francesca Bria (@francesca_bria) October 15, 2019

Although Facebook has thus far resisted government pressure, Snowden warned Tuesday that "if Barr's campaign is successful, the communications of billions will remain frozen in a state of permanent insecurity: users will be vulnerable by design. And those communications will be vulnerable not only to investigators in the U.S., U.K., and Australia, but also to the intelligence agencies of China, Russia, and Saudi Arabianot to mention hackers around the world."

Snowden, who worked for CIA and NSA, is now president of the board of directors of the nonprofit Freedom of the Press Foundation. Last month, the whistleblower published a memoir entitled Permanent Record about his experience leaking classified U.S. government documents to the press in 2013, which sparked global discussions about privacy rights and mass surveillance, and led Snowden to seek asylum in Russia.

"When I came forward in 2013, the U.S. government wasn't just passively surveilling internet traffic as it crossed the network, but had also found ways to co-opt and, at times, infiltrate the internal networks of major American tech companies. At the time, only a small fraction of web traffic was encrypted: six years later, Facebook, Google, and Apple have made encryption-by-default a central part of their products, with the result that today close to 80 percent of web traffic is encrypted," Snowden wrote. "Barr, who authorized one of the earliest mass surveillance programs without reviewing whether it was legal, is now signalling an intention to haltor even roll backthe progress of the last six years."

While Barr and his co-signers "invoked the spectre of the web's darkest forces" to justify their opposition to E2EE, Snowden argued that "the true explanation for why the U.S., U.K., and Australian governments want to do away with end-to-end encryption is less about public safety than it is about power: E2EE gives control to individuals and the devices they use to send, receive, and encrypt communications, not to the companies and carriers that route them. This, then, would require government surveillance to become more targeted and methodical, rather than indiscriminate and universal."

Read the original post:
'Without Encryption, We Will Lose All Privacy': Snowden ...

Security pros reiterate warning against encryption backdoors

Government-mandated encryption backdoors make countries, and more specifically their election systems, vulnerable to cyber attack, 74% of information security professionals warn.

At the same time, 72% believe laws that allow governments to access encrypted personal data will not make citizens safer from terrorists, according to a poll by security firm Venafi of 384 attendees of the Black Hat USA 2019 security conference earlier in August in Las Vegas.

The findings echo a similar poll of attendees of RSA Conference 2019 in San Francisco in March, which showed 73% of respondents were opposed to government-mandated backdoors.

Governments and law enforcement officials around the world, particularly in the Five Eyesintelligence alliance, continue to push for encryption backdoors, which they claim are necessary in the interests of national safety and security as criminals and terrorists increasingly communicated via encrypted online services.

According to the Five Eyes governments, the increasing gap between the ability of law enforcement to lawfully access data and their ability to acquire and use the content of that data is a pressing international concern that requires urgent, sustained attention and informed discussion.

Last month, the US Senate Intelligence Committee reported that election systems in all 50 states were targeted by Russia during the 2016 election, said Kevin Bocek, vice-president of security strategy and threat intelligence at Venafi.

We know that encryption backdoors dramatically increase security risks for every kind of sensitive data, and that includes all types of data that affects our national security. The IT security community overwhelmingly agrees that encryption backdoors would have a disastrous impact on the integrity of our elections and on our digital economy as a whole.

Opponents of encryption backdoors have said repeatedly that government-mandated weaknesses in encryption systems put the privacy and security of everyone at risk the same backdoors can be exploited by hackers.

The survey also shows that 70% of the Black Hat USA respondents believe countries with government-mandated encryption backdoors are at an economic disadvantage in the global marketplace, while 84% would never knowingly use a device or program from a company that agreed to install a backdoor.

Bocek added: On a consumer level, people want technology that prioritises the security and privacy of their personal data. This kind of trust is priceless. Encryption backdoors would not only make us much less safe at a national level, they also clearly have the potential to inflict significant economic and political damage.

In July 2019, US attorney general William Barr said consumers should accept the risks that encryption backdoors pose to their personal security to ensure law enforcement can access encrypted communications. But more recently, Canadas public safety minister Ralph Goodale called for his government to work with internet companies to find a balance between internet privacy and the needs of law enforcement.

In December 2018,the parliament of another Five Eyes member, Australia, passed controversial legislation requiring tech businesses to create encryption backdoorswithin their products, prompting criticism from security and privacy advocacy groups, including theElectronic Frontier Foundation(EFF).

The Australian legislation is based on the UKs equally controversialInvestigatory Powers Act, but the Australian law goes a step further by including the power to compel individual network administrators, sysadmins, and open source developers to comply with secret demands, including potentially to force them to keep their cooperation secret from their managers, lawyers and executive leadership.

The US, Canada, Australia and the UK are all members of theFive Eyesintelligence alliance, which in September 2018called on tech firms to include backdoors in their encrypted productsto give access to law enforcement authorities or face various measures.

The group said it encouraged information and communications technology service providers to voluntarily establish lawful access solutions to their products and services, but warned in astatementthat should governments continue to encounter impediments to lawful access to information necessary to aid the protection of the citizens of our countries, we may pursue technological, enforcement, legislative or other measures to achieve lawful access solutions.

View post:
Security pros reiterate warning against encryption backdoors

Encryption – servicepro.wiki

Documents (or other items) attached to objects, such as Service Requests, in ServicePRO can be encrypted. Encrypting attachments ensures that only those authorized to review the information in the attachment, can do so. Encryption Settings for your Help Desk are managed here.

From the Configuration tab, click on the Encryption option.

The following window appears:

Encryption Settings

Trustees

A trustee is a privileged user who can decrypt any file in ServicePRO with the aid of another trustee.

Enforce Encryption

By checking the boxes beside objects here, users who attach items to these objects will be required to encrypt them.

Select the objects, if any, that your help desk requires encryption.

Passphrase Indicate the minimum number of characters required for encryption passphrases. Obviously, the longer the passphrase, the more secure your encrypted files will be. Users will be required to enter this passphrase for each encrypted file they are authorized to open.Setting an Encryption Passphrase Before you can encrypt a file or be selected as a trustee, a passphrase must be set. To increase security, the passphrase is in addition to the password required to log in to ServicePRO.

User Options - Setting an Encryption Passphrase

Encrypting Attached Files When encryption setup has been completed, file attachment encryption can take place.

Encrypting Attached Files

Decrypting Attached Files

Trustee Decryption On occasion, it might be necessary to decrypt a file when none of the selected users for whom the file was encrypted are available for example, when an employee leaves the company.

Decrypting files in this situation is called Trustee Decryption and requires a minimum of two trustees.

NOTE:If you have specified that a minimum of 3 trustees are required to decrypt the file, then your form will feature with three frames, requiring 3 trustees to enter their information.

Forgotten Passphrases If you forget your passphrase, you can create a new one with the assistance of two trustees.

Changing Trustees To change a trustee, you must have the assistance of another trustee.

Tips and Best Practices Ensure that you have at least three trustees who will not lose or forget their passwords. If an attachment is encrypted, the file will not be recoverable if you do not have the appropriate number of trustees to decrypt the file.

Follow this link:
Encryption - servicepro.wiki

Mozy Encryption

In simple terms, encryption is a secret pass phrase that is applied to the contents of your files to ensure that they are completely unreadable without the means to do so along with that encryption key. Mozy encrypts your files on your computer before they are sent over the Internet to the Mozy cloud. Your files remain encrypted when stored in the Mozy cloud and can only be read if you have both the encryption key and the means to read the encrypted file.

When you install Mozy software, you might be able to select the type of encryption key you want to use for your backups. Whether you can choose and exactly which types of encryption keys are available depends on the type of account you have. MozyHome accounts can choose either the Mozy default encryption key or a personal encryption key. If you use MozyPro or MozyEnterprise, your administrator can determine the encryption key types that you can choose from or whether you can choose at all. That encryption is permanently associated with all files sent to the Mozy cloud from that computer.

You can change the encryption key type after you install the Mozy software. Doing this requires deleting the computer from the account and re-activating the software. If users are permitted to activate the software, a user can re-launch the setup wizard through the software and reactivate. Otherwise, you must uninstall the software, then reinstall and reactivate. The Mozy software then uploads all the files again to ensure that the stored files match the current encryption key.

The type of encryption key that is used determines whether some tasks are seamless and simple or whether extra steps are required. The Mozy default encryption key yields the least complicated experiences. A personal or corporate encryption key requires an extra set of steps for certain tasks. For example, if a personal encryption key is used, that key must be supplied to access files from the Mozy cloud when you use the Mozy mobile app. If a personal or corporate key is used, when you download files from the Mozy cloud using a web browser that you must then also use the Mozy decryption utility to supply that key. If a KMS key is used, you must use the backup software or Restore Manager to download and decrypt files.

With a few exceptions, most features of Mozy are available regardless of which type of encryption key is used.

If you use MozyPro or MozyEnterprise, some features might have been disabled by your administrator. For example, some organizations choose not to permit their users to access their files online.

Mozy separately stores the key. This option lets Mozy automatically decrypt your files when you download or restore them. This is the least complicated, most seamless experience for users, imposing no restrictions on any Mozy features.

To ensure you can download and restore your files, you must either remember your key indefinitely, or you can save it and store it separately. If you choose to save it, a plain text file is saved to the location you choose. The file contains only the characters you entered when creating your key. To ensure you can always provide your key, it is best not to save it only on your computer, which could fail, or only anywhere else which you could easily lose or damage, such as a USB stick.

When you download and restore files, you must supply this key to decrypt those files. Mozy does not have access to your personal encryption key and cannot decrypt files for you. This means that if you lose your key, Mozy cannot help you decrypt your files. Even under force of law, Mozy cannot decrypt your files if you choose to use a personal encryption key. When you reinstall the Mozy software or install it on a replacement computer, you must supply this same key to ensure continued access to files you have previously backed up.

If you choose to use a personal encryption key and you also use the Mozy mobile app, you must provide your personal key to view and download files from the Mozy mobile app. For more information, see Provide Personal Encryption Key in the Mozy Mobile App.

If you choose to use a personal encryption key with Mozy Sync, each instance of the sync software you install must use exactly that same key.

If you use a personal encryption key, several Mozy features are affected.

If you use a corporate encryption key, several Mozy features are affected.

If you use KMS encryption keys, several Mozy features are affected.

If you have a MozyHome account, you can use the same type of encryption key, or the exact same personal encryption key, when you install each instance of the backup software. Or, you can choose to install each instance of the backup software with a different type of encryption key, or a different personal encryption key. You can install Mozy Sync with the same encryption key as the backup software or a different one; however, all your instances of Mozy Sync must use the exact same encryption key. In making these choices during installation, you can choose to create the simplest experience possible when downloading or restoring files. Or, you can choose to be responsible for managing the most secure experience, which can also be the most complex.

If you have a MozyPro or MozyEnterprise account, you might not be able to choose which type of encryption to use. Or, your administrator specifies which types you can choose from. If you can choose, the same considerations that are described for a MozyHome account apply to you as well. As always, if you use Mozy Sync, each installed instance must use not only the same type of encryption, but the exact same key.

With this scheme, you never need to remember or supply an encryption key to use any Mozy features.

With this scheme, you must always be able to provide each key as necessary to use certain Mozy features, particularly when restoring or downloading files, or when installing any Mozy software when you replace any computer.

More:
Mozy Encryption