Tinder’s Lack of Encryption Lets Strangers Spy on Your …

In 2018, you'd be forgiven for assuming that any sensitive app encrypts its connection from your phone to the cloud, so that the stranger two tables away at the coffee shop can't pull your secrets off the local Wi-Fi. That goes double for apps as personal as online dating services. But if you assumed that basic privacy protection for the world's most popular dating app, you'd be mistaken: As one application security company has found, Tinder's mobile apps still lack the standard encryption necessary to keep your photos, swipes, and matches hidden from snoops.

On Tuesday, researchers at Tel Aviv-based app security firm Checkmarx demonstrated that Tinder still lacks basic HTTPS encryption for photos. Just by being on the same Wi-Fi network as any user of Tinder's iOS or Android app, the researchers could see any photo the user did, or even inject their own images into his or her photo stream. And while other data in Tinder's apps are HTTPS-encrypted, Checkmarx found that they still leaked enough information to tell encrypted commands apart, allowing a hacker on the same network to watch every swipe left, swipe right, or match on the target's phone nearly as easily as if they were looking over the target's shoulder. The researchers suggest that lack of protection could enable anything from simple voyeuristic nosiness to blackmail schemes.

"We can simulate exactly what the user sees on his or her screen," says Erez Yalon, Checkmarx's manager of application security research. "You know everything: What theyre doing, what their sexual preferences are, a lot of information."

To demonstrate Tinder's vulnerabilities, Checkmarx built a piece of proof-of-concept software they call TinderDrift. Run it on a laptop connected to any Wi-Fi network where other connected users are tindering, and it automatically reconstructs their entire session.

[#video: https://www.youtube.com/embed/ZBTL1bmJ9o8

The central vulnerability TinderDrift exploits is Tinder's surprising lack of HTTPS encryption. The app instead transmits pictures to and from the phone over unprotected HTTP, making it relatively easy to intercept by anyone on the network. But the researchers used a few additional tricks to pull information out of the data Tinder does encrypt.

They found that different events in the app produced different patterns of bytes that were still recognizable, even in their encrypted form. Tinder represents a swipe left to reject a potential date, for instance, in 278 bytes. A swipe right is represented as 374 bytes, and a match rings up at 581. Combining that trick with its intercepted photos, TinderDrift can even label photos as approved, rejected, or matched in real time. "It's the combination of two simple vulnerabilities that create a major privacy issue," Yalon says. (Fortunately, the researchers say their technique doesn't expose messages Tinder users send to each other after they've matched.)

Checkmarx says it notified Tinder about its findings in November, but the company has yet to fix the problems.

'You know everything: What theyre doing, what their sexual preferences are, a lot of information.'

Erez Yalon, Checkmarx

In a statement to WIRED, a Tinder spokesperson wrote that "like every other technology company, we are constantly improving our defenses in the battle against malicious hackers," and pointed out that Tinder profile photos are public to begin with. (Though user interactions with those photos, like swipes and matches, are not.) The spokesperson added that the web-based version of Tinder is in fact HTTPS-encrypted, with plans to offer those protections more broadly. "We are working towards encrypting images on our app experience as well," the spokesperson said. "However, we do not go into any further detail on the specific security tools we use, or enhancements we may implement to avoid tipping off would be hackers."

For years, HTTPS has been a standard protection for just about any app or website that cares about your privacy. The dangers of skipping HTTPS protections were illustrated as early as 2010, when a proof-of-concept Firefox add-on called Firesheep, which allowed anyone to siphon unencrypted traffic off their local network, circulated online. Practically every major tech firm has since implemented HTTPSexcept, apparently, Tinder. While encryption can in some cases add to performance costs, modern servers and phones can easily handle that overhead, the Checkmarx researchers argue. "There's really no excuse for using HTTP these days," says Yalon.

Read more from the original source:
Tinder's Lack of Encryption Lets Strangers Spy on Your ...

Optical Encryption Market Size, Share, Trends and Forecast …

Optical encryption market is expected to grow at a moderate rate during the forecast period 2019-2025. Optical encryption is a medium to secure in-flight data in the network transport layer. It is carried over optical waves across fiber-optic cables. With an increasing number of data leaks and high-profile breaches, cybersecurity is a major concern. For instance, according to the Executive Officer of the President of the US, the US economy has incurred the loss due to malicious cyber activity costing between $57 billion to $109 billion in 2016. Three Ukrainian energy distribution companies were targeted for cyber-attacks in December 2015. This resulted in electricity outages for nearly 225,000 customers across Western Ukraines Ivano-Frankivsk region. The attackers achieved unauthorized access into the corporate network of a regional electricity distribution company. About twenty-three 35kV and seven 110 kV substations were disconnected for three hours. This became possible due to the theft of credentials from corporate networks. The attackers were trying to theft credentials from 6 months before and finally succeed. Such kinds of cybersecurity threats are expected to encourage the demand for optical encryption technologies. Optical encryption provides benefits such as providing no information about underlying services and adding no latency. This enables to provide an exceptionally secure connection to the infrastructure by protecting data from theft. Other crucial factors that are contributing to the growth of the market include rising investment in smart city projects and advances in optical encryption techniques.

The global optical encryption market is segmented on the basis of the encryption layer and vertical. Based on the encryption layer, the market is further classified into layer 1, layer 2 and layer 3. Additionally, on the basis of vertical, the market is further classified into military and defense, government, BFSI (Banking, financial services, and insurance), healthcare, retail, transportation, telecom & IT, and others. There has been a significant demand for optical encryption in BFSI to protect information of their customers. BFSI industry is susceptible to a breach of data. Hence, it requires upgrading transaction and processing technologies. In addition, the industry requires end-to-end security solutions for optimizing operations against external and internal threats. Due to services, including mobile banking, smart banking, and internet banking, the payment security transmitted over the network is a prime object for BFSI organizations. This, in turn, increases the demand for optical encryption solutions to control and secure sensitive data of customers by encrypting data, files, and emails, as well as offers financial security.

Geographically, the global optical encryption market is segmented into four major regions, such as North America, Europe, Asia-Pacific, and rest of the world (RoW). The factors that are encouraging the demand for optical encryption market in North America include well-developed IT infrastructure and significant cyber-attacks in the region. However, Asia-Pacific is anticipated to witness considerable growth in the market due to the increasing number of smart city projects and rising adoption of cloud-based services. The major players in the market include Cisco Systems, Inc., Infinera Corp., Ciena Corp., ECI Telecom Ltd., and Huawei Technologies Co., Ltd. The crucial strategies adopted by these companies include merger and acquisitions, product launches and collaborations to expand market share globally. As an instance, in October 2018, Infinera Corp. acquired Coriant, Inc., a global supplier of open network solutions. It offers solutions for major global network operators. The acquisition will enable Infinera Corp. to position as one of the major providers of vertically integrated optical network equipment across the globe. This will enable the company to deliver a strong portfolio of end-to-end and advanced packet optical network solutions for internet content providers and communication service providers.

Research Methodology:

The market study of the optical encryption market is incorporated by extensive primary and secondary research conducted by the research team at OMR. Secondary research has been conducted to refine the available data to breakdown the market in various segments, derive total market size, market forecast, and growth rate. Different approaches have been worked on to derive the market value and market growth rate. Our team collects facts and data related to the market from different geography to provide a better regional outlook. In the report, the country-level analysis is provided by analyzing various regional players, regional tax laws and policies, consumer behavior and macro-economic factors. Numbers extracted from Secondary research have been authenticated by conducting proper primary research. It includes tracking down key people from the industry and interviewing them to validate the data. This enables our analyst to derive the closest possible figures without any major deviations in the actual number. Our analysts try to contact as many executives, managers, key opinion leaders, and industry experts. Primary research brings authenticity in our reports.

Secondary Sources Include

The report is intended for government and private companies for overall market analysis and competitive analysis. The report provides in-depth analysis on market size, intended quality of the service preferred by consumers. The report will serve as a source for 360-degree analysis of the market thoroughly integrating different models.

Market Segmentation

The Report Covers

Read more:
Optical Encryption Market Size, Share, Trends and Forecast ...

MySQL Enterprise Transparent Data Encryption (TDE)

Only available in select Commercial Editions

MySQL Enterprise Transparent Data Encryption (TDE) protects your critical data byenabling data-at-rest encryption in the database. It protects the privacy of your information,prevents data breaches and helps meet regulatory requirements including:

MySQL Enterprise Transparent Data Encryption (TDE)

MySQL Enterprise TDE enables data-at-rest encryption by encrypting the physicalfiles of the database. Data is encrypted automatically, in real time, prior to writingto storage and decrypted when read from storage. As a result, hackers and malicious usersare unable to read sensitive data from tablespace files, database backups or disks. MySQLEnterprise TDE uses industry standard AES algorithms.

MySQL Enterprise TDE uses a two-tier encryption key architecture, consisting of a masterencryption key and tablespace keys providing easy key management and rotation. Tablespace keysare managed automatically over secure protocols while the master encryption key is stored ina centralized key management solution such as:

Oasis KMIP protocol implementations:

MySQL Enterprise TDE also supports HTTPS based APIs for Key Management such as:

MySQL enforces clear separation of keys from encrypted data using these centralized keymanagement solutions automate key rotation and storing historical keys.

Database table encryption and decryption occurs without any additional coding, data type or schema modifications. Also, users and applications continue to access data transparently, without changes. MySQL Enterprise TDE gives developers and DBAs the flexibility to encrypt/decrypt existing MySQL tables that have not already been encrypted.

MySQL Enterprise TDE leverages database caching to achieve high performance and requires zero downtime to implement.

Continue reading here:
MySQL Enterprise Transparent Data Encryption (TDE)

What is Encryption? – Definition from WhatIs.com

Encryption is the method by which information is converted into secret code that hides the information's true meaning. The science of encrypting and decrypting information is called cryptography.

In computing, unencrypted data is also known asplaintext, and encrypted data is called ciphertext. The formulas used to encode and decode messages are called encryption algorithms or ciphers.

To be effective, a cipher includes a variable as part of the algorithm. The variable, which is called a key, is what makes a cipher's output unique. When an encrypted message is intercepted by an unauthorized entity, the intruder has to guess which cipher the sender used to encrypt the message, as well as what keys were used as variables. The time it takes to guess this information is what makes encryption such a valuable security tool.

At the beginning of the encryption process, the sender must decide what cipher will best disguise the meaning of the message and what variable to use as a key to make the encoded message unique. The most widely used types of ciphers fall into two categories: symmetric and asymmetric.

Symmetric ciphers, also referred to as secret key encryption, use a single key. The key is sometimes referred to as a shared secret because the sender or computing system doing the encryption must share the secret key with all entities authorized to decrypt the message. Symmetric key encryption is usually much faster than asymmetric encryption. The most widely used symmetric key cipher is the Advanced Encryption Standard (AES), which was designed to protect government-classified information.

Asymmetric ciphers, also known as public key encryption, use two different -- but logically linked -- keys. This type of cryptography often uses prime numbers to create keys since it is computationally difficult to factor large prime numbers and reverse-engineer the encryption. The Rivest-Shamir-Adleman (RSA) encryption algorithm is currently the most widely used public key algorithm. With RSA, the public or the private key can be used to encrypt a message; whichever key is not used for encryption becomes the decryption key.

Today, many cryptographic processes use a symmetric algorithm to encrypt data and an asymmetric algorithm to securely exchange the secret key.

Encryption plays an important role in securing many different types of information technology (IT) assets. It provides the following:

Encryption is commonly used to protect data in transit and data at rest. Every time someone uses an ATM or buys something online with a smartphone, encryption is used to protect the information being relayed. Businesses are increasingly relying on encryption to protect applications and sensitive information from reputational damage when there is a data breach.

There are three major components to any encryption system: the data, the encryption engine and the key management. In laptop encryption, all three components are running or stored in the same place: on the laptop.

In application architectures, however, the three components usually run or are stored in separate places to reduce the chance that compromise of any single component could result in compromise of the entire system.

The primary purpose of encryption is to protect the confidentiality of digital data stored on computer systems or transmitted over the internet or any other computer network.

This video from the Khan Academy explains how256-bit encryption works.

In addition to security, the adoption of encryption is often driven by the need to meet compliance regulations. A number of organizations and standards bodies either recommend or require sensitive data to be encrypted in order to prevent unauthorized third parties or threat actors from accessing the data. For example, the Payment Card Industry Data Security Standard (PCI DSS) requires merchants to encrypt customers' payment card data when it is both stored at rest and transmitted across public networks.

Hash functions provide another type of encryption. Hashing is the transformation of a string of characters into a fixed-length value or key that represents the original string. When data is protected by a cryptographic hash function, even the slightest change to the message can be detected because it will make a big change to the resulting hash.

Hash functions are considered to be a type of one-way encryption because keys are not shared and the information required to reverse the encryption does not exist in the output. To be effective, a hash function should be computationally efficient (easy to calculate), deterministic (reliably produces the same result), preimage-resistant (output does not reveal anything about input) and collision-resistant (extremely unlikely that two instances will produce the same result).

Popular hashing algorithms include the Secure Hashing Algorithm (SHA-2 and SHA-3) and Message Digest Algorithm 5 (MD5).

Encryption, which encodes and disguises the message's content, is performed by the message sender. Decryption, which is the process of decoding an obscured message, is carried out by the message receiver.

The security provided by encryption is directly tied to the type of cipher used to encrypt the data -- the strength of the decryption keys required to return ciphertext to plaintext. In the United States, cryptographic algorithms approved by the Federal Information Processing Standards (FIPS) or National Institute of Standards and Technology (NIST) should be used whenever cryptographic services are required.

Encryption is an effective way to secure data, but the cryptographic keys must be carefully managed to ensure data remains protected, yet accessible when needed. Access to encryption keys should be monitored and limited to those individuals who absolutely need to use them.

Strategies for managing encryption keys throughout their lifecycle and protecting them from theft, loss or misuse should begin with an audit to establish a benchmark for how the organization configures, controls, monitors and manages access to its keys.

Key management software can help centralize key management, as well as protect keys from unauthorized access, substitution or modification.

Key wrapping is a type of security feature found in some key management software suites that essentially encrypts an organization's encryption keys, either individually or in bulk. The process of decrypting keys that have been wrapped is called unwrapping. Key wrapping and unwrapping activities are usually carried out with symmetric encryption.

While encryption is designed to keep unauthorized entities from being able to understand the data they have acquired, in some situations, encryption can keep the data's owner from being able to access the data as well.

Key management is one of the biggest challenges of building an enterprise encryption strategy because the keys to decrypt the cipher text have to be living somewhere in the environment, and attackers often have a pretty good idea of where to look.

There are plenty of best practices for encryption key management. It's just that key management adds extra layers of complexity to the backup and restoration process. If a major disaster should strike, the process of retrieving the keys and adding them to a new backup server could increase the time that it takes to get started with the recovery operation.

Having a key management system in place isn't enough. Administrators must come up with a comprehensive plan for protecting the key management system. Typically, this means backing it up separately from everything else and storing those backups in a way that makes it easy to retrieve the keys in the event of a large-scale disaster.

For any cipher, the most basic method of attack is brute force -- trying each key until the right one is found. The length of the key determines the number of possible keys, hence the feasibility of this type of attack. Encryption strength is directly tied to key size, but as the key size increases, so too do the resources required to perform the computation.

Alternative methods of breaking encryptions include side-channel attacks, which don't attack the actual cipher but the physical side effects of its implementation. An error in system design or execution can enable such attacks to succeed.

Attackers may also attempt to break a targeted cipher through cryptanalysis, the process of attempting to find a weakness in the cipher that can be exploited with a complexity less than a brute-force attack. The challenge of successfully attacking a cipher is easier if the cipher itself is already flawed. For example, there have been suspicions that interference from the National Security Agency (NSA) weakened the DES algorithm, and following revelations from former NSA analyst and contractor Edward Snowden, many believe the NSA has attempted to subvert other cryptography standards and weaken encryption products.

Governments and law enforcement officials around the world, particularly in the Five Eyes (FVEY) intelligence alliance, continue to push for encryption backdoors, which they claim are necessary in the interests of national safety and security as criminals and terrorists increasingly communicate via encrypted online services.

According to the FVEY governments, the widening gap between the ability of law enforcement to lawfully access data and their ability to acquire and use the content of that data is "a pressing international concern" that requires "urgent, sustained attention and informed discussion."

Opponents of encryption backdoors have said repeatedly that government-mandated weaknesses in encryption systems put the privacy and security of everyone at risk because the same backdoors can be exploited by hackers.

Recently, law enforcement agencies, such as the Federal Bureau of Investigation (FBI), have criticized technology companies that offer E2EE, arguing that such encryption prevents law enforcement from accessing data and communications even with a warrant. The FBI has referred to this issue as "going dark," while the U.S. Department of Justice (DOJ) has proclaimed the need for "responsible encryption" that can be unlocked by technology companies under a court order.

Australia passed legislation that made it mandatory for visitors to provide passwords for all digital devices when crossing the border into Australia. The penalty for noncompliance is five years in jail.

By 2019, cybersecurity threats increasingly included encryption data on IoT and on mobile computing devices. While devices on IoT often are not targets themselves, they serve as attractive conduits for the distribution of malware. According to experts, attacks on IoT devices using malware modifications tripled in the first half of 2018 compared to the entirety of 2017.

Meanwhile, NIST has encouraged the creation of cryptographic algorithms suitable for use in constrained environments, including mobile devices. In a first round of judging in April 2019, NIST chose 56 lightweight cryptographic algorithms candidates to be considered for standardization. Further discussion on cryptographic standards for mobile devices is slated to be held in November 2019.

In February 2018, researchers at MIT unveiled a new chip, hardwired to perform public key encryption, which consumes only 1/400 as much power as software execution of the same protocols would. It also uses about 1/10 as much memory and executes 500 times faster.

Because public key encryption protocols in computer networks are executed by software, they require precious energy and memory space. This is a problem in IoT, where many different sensors embedded in products such as appliances and vehicles connect to online servers. The solid-state circuitry greatly alleviates that energy and memory consumption.

The word encryption comes from the Greek word kryptos, meaning hidden or secret. The use of encryption is nearly as old as the art of communication itself. As early as 1900 B.C., an Egyptian scribe used nonstandard hieroglyphs to hide the meaning of an inscription. In a time when most people couldn't read, simply writing a message was often enough, but encryption schemes soon developed to convert messages into unreadable groups of figures to protect the message's secrecy while it was carried from one place to another. The contents of a message were reordered (transposition) or replaced (substitution) with other characters, symbols, numbers or pictures in order to conceal its meaning.

In 700 B.C., the Spartans wrote sensitive messages on strips of leather wrapped around sticks. When the tape was unwound, the characters became meaningless, but with a stick of exactly the same diameter, the recipient could recreate (decipher) the message. Later, the Romans used what's known as the Caesar Shift Cipher, a monoalphabetic cipher in which each letter is shifted by an agreed number. So, for example, if the agreed number is three, then the message, "Be at the gates at six" would become "eh dw wkh jdwhv dw vla." At first glance, this may look difficult to decipher, but juxtaposing the start of the alphabet until the letters make sense doesn't take long. Also, the vowels and other commonly used letters, like t and s, can be quickly deduced using frequency analysis, and that information, in turn, can be used to decipher the rest of the message.

The Middle Ages saw the emergence of polyalphabetic substitution, which uses multiple substitution alphabets to limit the use of frequency analysis to crack a cipher. This method of encrypting messages remained popular despite many implementations that failed to adequately conceal when the substitution changed -- also known as key progression. Possibly the most famous implementation of a polyalphabetic substitution cipher is the Enigma electromechanical rotor cipher machine used by the Germans during World War II.

It was not until the mid-1970s that encryption took a major leap forward. Until this point, all encryption schemes used the same secret for encrypting and decrypting a message: a symmetric key.

Encryption was almost exclusively used only by governments and large enterprises until the late 1970s when the Diffie-Hellman key exchange and RSA algorithms were first published and the first PCs were introduced.

In 1976, Whitfield Diffie and Martin Hellman's paper, "New Directions in Cryptography," solved one of the fundamental problems of cryptography: how to securely distribute the encryption key to those who need it. This breakthrough was followed shortly afterward by RSA, an implementation of public key cryptography using asymmetric algorithms, which ushered in a new era of encryption. By the mid-1990s, both public key and private key encryption were being routinely deployed in web browsers and servers to protect sensitive data.

Continue reading here:
What is Encryption? - Definition from WhatIs.com

WikiLeaks – Simple English Wikipedia, the free encyclopedia

WikiLeaks is a non-profit organization which uses its website to publish governmental, private data, corporate or religious documents that had previously been secret. The website was started in 2006, and had over 1.2 million documents in its database by the time one year had passed. Usually, it does not give out the names and addresses of people who post documents. The site is based in Sweden. Though its name is similar to Wikipedia, it is not related to Wikipedia or the Wikimedia Foundation.[1] The name was chosen because WikiLeaks used a wiki model at first, where people could edit the site, but it has since changed and is no longer open for editing.

In July 2010, WikiLeaks was in the news for publishing over 76,900 documents related to the War in Afghanistan. In October that same year, WikiLeaks posted almost 400,000 documents that were about the War in Iraq.

This was the largest ever leak of documents about the US Army. It reported mainly on deaths of civilians, soldiers, and sightings of homemade bombs or armed civilians.[2]

On 28 November WikiLeaks and five major newspapers - from Spain (El Pas), France (Le Monde), Germany (Der Spiegel), the United Kingdom (The Guardian), and the United States (The New York Times) - all began to publish the first 291 of 251,287 confidential diplomatic cables from 274 embassies dated from 19662010.[3] WikiLeaks plans to release all of the cables in phases over several months.[3]

This leak was widely covered by the international media, as many of the leaks contained information that affected countries other than the United States.[4][5][6][7][8] Some leaks were published by other news organizations like Fairfax Media.[9] White House Press Secretary Robert Gibbs said that an "open and transparent government is something that the President believes is truly important. But the stealing of classified information and its dissemination is a crime".[10]

Wikileaks posted more than 20,000 emails from the Democratic National Committee (DNC) to show they tried to undermine Bernie Sanders.[11]

Go here to read the rest:
WikiLeaks - Simple English Wikipedia, the free encyclopedia

Thanking Bradley Manning – truthout.org

A few evenings ago, as the sky began to darken here in Kabul, Afghanistan, a small group of the Afghan Peace Volunteers, (APVs), gathered for an informal presentation about WikiLeaks, its chief editor Julian Assange, and its most prominent contributor, Bradley Manning. Basir Bita, a regular visitor to the APV household, began the evenings discussion noting that June 1st will mark the beginning of Bradley Mannings fourth year in prison. Two days later his trial will begin, a trial which could sadly result in his imprisonment for a life sentence. June 1st also begins an international week of support and solidarity, aimed at thanking Bradley Manning. #ThankManning!

Basir believes that the vast majority of Afghans are among myriads world-wide who have Manning to thank for information they will need in struggles for freedom, security, and peace. He wishes that more people would find the courage to stand up to military and government forces, especially their own, and act as whistle-blowers.

I often hear Afghan individuals and groups express longing for a far more democratic process than is allowed them in a country dominated by warlords, the U.S./NATO militaries, and their commanders. In the U.S., a lack of crucial information increasingly threatens democratic processes. How can people make informed choices if their leaders deliberately withhold crucial information from them? Mannings disclosures have brought desperately needed light to the U.S. and to countries around the world, including struggling countries like Afghanistan.

Get the news you want, delivered to your inbox every day.

Hakim, who mentors the Afghan Peace Volunteers, recalled that Bradley Manning passed on documents that record 91,730 Significant Actions, or SIGACTS undertaken here by the U.S. /ISAF forces, of which 75,000 were released by WikiLeaks. These SIGACTS include attacks by drones, sometimes invisible drones, and night raids.

Our group turned to discussing the history of WikiLeaks, how it formed and how it now functions. Those most familiar with computers and internet explained the process of disclosing information by anonymously following a computerized route to a dropbox.

In fact, the Afghan Peace Volunteers themselves have been communicating with Julian Assange.

Last winter, Nobel peace laureate Mairead Maguire had stayed with them shortly before she traveled to London for a visit to Julian Assange. Through Mairead, they had sent Assange a letter of solidarity.

The APVs heard that Manning has been more isolated than Assange; they all shook their heads when Basir reminded them that Bradley Manning was initially in solitary confinement for eleven months.

Ghulamai thought through the ironic process of how governments designate some documents secret, and how he would presume that the person who shares those secrets was a criminal. But Ali said that governments chiefly hide secrets from the public to maintain power. Hakim asked Abdulhai to imagine himself as the head of a government or of a large family. If you are working for the good of the family or the state, would you need to do things secretly? he asked.

No, Abdulhai replied. If I have power, and I am truly working for the best interests of my people, I will not need to do things in secret.

There was a keen conversation about who Bradley Manning was and what he did. Bradley Mannings own words, which journalists had to actually smuggle out of his pre-trial hearing, described how Bradleys mind had largely been made up by watching the secret video that he would come to release under the title Collateral Murder:

They dehumanized the individuals they were engaging and seemed to not value human life by referring to them as quote dead bastards unquote and congratulating each other on the ability to kill in large numbers. At one point in the video theres an individual on the ground attempting to crawl to safety. The individual is seriously wounded. Instead of calling for medical attention to the location, one of the aerial weapons team crew members verbally asks for the wounded person to pick up a weapon so that he can have a reason to engage. For me, this seems similar to a child torturing ants with a magnifying glass.

While saddened by the aerial weapons team crews lack of concern about human life, I was disturbed by the response of the discovery of injured children at the scene. In the video, you can see that the bongo truck driving up to assist the wounded individual. In response the aerial weapons team crew as soon as the individuals are a threat, they repeatedly request for authorization to fire on the bongo truck and once granted they engage the vehicle at least six times. Together, the APVs watched the deeply disturbing Collateral Damage video itself. They were avid to learn what they could do to support and thank Bradley Manning. Yet theyre aware of the risks faced by people who organize public demonstrations in Afghanistan.

Its far easier to stand up for Bradley where I live, back in the U.S. I hope many more of us will devote the time and energy we owe this young man for risking everything, as he did, to enlighten us and the world.

The Afghan Peace Volunteers are eager for ways to link with others worldwide to express thanks and concern for a remarkably brave and conscience-driven 25-year old man whose courage and whose light is so acutely needed in this darkening time. Ive seen the fierce light of these young people and, knowing them, Im certain that others will be seeing it too in the years ahead. Are we readying signals with which to answer them, are we preparing ways to show people like them, and like Julian Assange, and like Bradley Manning, that they are not alone?

Original post:
Thanking Bradley Manning - truthout.org

List of charges in United States v. Manning – Wikipedia

United States v. Manning is the court-martial case involving United States Army Private First Class Bradley Manning (now known as Chelsea Manning), who delivered U.S. government documents to persons not authorized to receive them in 2009 and 2010. Media reports said that the receiver was Julian Assange of WikiLeaks. Manning was arrested in May 2010 and a court-martial was held in JuneAugust 2013.[1] The charges were related to events which occurred "at or near" Contingency Operating Station Hammer, Iraq, in 2009 and 2010.

The charges were:

Total: 34

Most of the charges are related to the transfer of documents to another party. These documents are:

According to news reports, many of the documents are the same as documents published by WikiLeaks, including:

The first set of charges came on July 5, 2010. The Specifications (Spec.) are listed below in the same order as given on the charge sheets. To the right of each specification is a description of the related documents or actions.[10]

A second set of charges was presented on March 1, 2011, and are as follows:[11]

Read the original:
List of charges in United States v. Manning - Wikipedia

How to Become a Cryptographer | Requirements for …

What Does a Cryptographer/Cryptanalyst Do? What is a Cryptographer/Cryptanalyst?

A Cryptographer develops algorithms, ciphers and security systems to encrypt sensitive information. A Cryptanalyst analyzes and decrypts any type of hidden information (e.g. encrypted data, cipher texts, telecommunications protocols, etc.) in cryptographic security systems. They are code makers and code breakers, professionals who ensure that private data regarding finance, national security and other important spheres are hidden from marauding cyber-terrorists.

Its a job that blends computer science, engineering and applied mathematics. As such, cryptographers and cryptanalysts often have a wide range of responsibilities, including designing codes & systems, testing & probing for vulnerabilities, and coming up with out of the box solutions. Hard skills and relevant work experience will help prepare you for many positions. But once youre there, expect the unexpected!

As the white knight of data, you may be required to:

Keep in mind that responsibilities will vary according to the job. Work for the NSA or the FBI could differ wildly from work for an insurance company. Cryptographers and cryptanalysts build successful careers throughout the public and private sectors.

Cryptographers and cryptanalysts come from all walks of life. You will often be able to begin your career straight out of university. Once you have amassed enough experience (and possibly a doctoral degree), you have the option to become a:

A Cryptographer/Cryptanalyst can also be known as a:

Since Cryptographers and Cryptanalysts are lumped with Mathematicians in the Bureau of Labor Statistics, salary numbers can be tricky to pinpoint. Here are some ballpark numbers:

Job descriptions for Cryptographers and Cryptanalysts share some common traits, especially when it comes to degrees and hard skills. A bachelors degree in a relevant field is good (e.g. math or comp sci), but an MS or PhD may be even better. For intermediate-level positions, training credentials and work experience are highly valued. But some junior-level positions may be open to new graduates. Its worth doing a little bit of career research.

You can start by talking to qualified professors and adjuncts who are involved in real-world projects. Computer science and math departments often include bios ofand contact info fortheir resident cryptography & cryptanalysis experts. These folks will often be able to point you in the right direction (e.g. how to find work in the private sector). You may also want to look into bootcamps, MOOCs, and other non-academic programs to hone your skills. In this section, weve highlighted a couple of training options where you can get your feet wet.

Employers will be looking for a bachelors degree in Mathematics, Computer Science, Computer Engineering or a related discipline. If you dont have a technical degree, you may be able to get away with extensive training and work experience. The NSA is willing to consider candidates with majors in both technical and non-technical degrees.

An MS is strongly suggested unless your bachelors degree is a double major in Mathematics and Computer Science. To expand your job opportunities, you could also consider a doctorate in Mathematics or Computer Science with a focus on cryptography.

This is a tough one to call. A job description for a Cryptographer at MIT might ask for a technical PhD or an MS with 5+ years of experience. Other employers may be satisfied with 3+ years of experience in security engineering/administration. Junior Cryptanalysts may be able to go straight into employment with no prior work experience. It will depend on the position.

Cryptography and cryptanalysis are built on the three pillars of computer science, engineering and applied mathematics. As you start your career, look at acquiring technical skills in:

Cryptographers and Cryptanalysts are intelligent, analytical and outstandingly creative. Like any great code breaker, they are willing to take on the most complex mathematical challenges. They have a strong ethical core and a passion for solving puzzles.

Above all, they are trustworthy enough to handle incredibly sensitive data. Because you will often be working with classified information, employers will also want to see evidence of your honesty and good judgment.

Unlike more established fields, cryptography and cryptanalysis are relative newcomers to the world of security accreditation. EC-Council has developed one certification that specifically deals with encryption: CES: Certified Encryption Specialist.

Link:
How to Become a Cryptographer | Requirements for ...

Cryptography | MIT News

MIT team successfully tests a new method for verification of weapons reduction.

From digital circuits to ingestible robots, the Institute has helped spearhead key innovations in the technology revolution.

Neural network that securely finds potential drugs could encourage large-scale pooling of sensitive data.

Legatum Centers award for innovation in financial inclusion plays a key role in MITs push to expand African engagement.

CSAIL system encourages government transparency using cryptography on a public log of wiretap requests.

Cryptographic system could enable crowdsourced genomics, with volunteers contributing information to privacy-protected databases.

New isotope-detection method could prove compliance but avoid divulging secrets.

A tool that would provide a secure foundation for any cryptographic system may be close at hand.

Calculating encryption schemes theoretical security guarantees eases comparison, improvement.

MIT hosts the first of three conferences on privacy policy

For 65 years, most information-theoretic analyses of cryptographic systems have made a mathematical assumption that turns out to be wrong.

A new algorithm solves a major problem with homomorphic encryption, which would let Web servers process data without decrypting it.

MIT researchers show how to secure widely used encryption schemes against attackers who have intercepted examples of successful decryption.

Interactive proofs mathematical games that underlie much modern cryptography work even if players try to use quantum information to cheat.

Awards recognize a diverse range of technologies

Savvy hackers can steal a computers secrets by timing its data storage transactions or measuring its power use. New research shows how to stop them.

A new twist on pioneering work done by MIT cryptographers almost 30 years ago could lead to better ways of structuring contracts.

A switch that lets one photon alter the quantum state of another could point the way to both practical quantum computers and a quantum Internet.

Public-key system has worked and made Internet commerce feasible, but new systems are ready in case flaws are found.

A new system for ensuring accurate election tallies, which MIT researchers helped to develop, passed its first real-world test last Tuesday.

The rest is here:
Cryptography | MIT News

Cryptographer: Job Description, Duties and Salary Information

Cryptography requires significant formal education. Learn about the training, job duties and salary requirements to see if this is the right career for you.

Cryptographers help protect confidential information and may work to protect military, financial or political data. They may be involved in encrypting information or decrypting information. Cryptographers are required to pass a background check and possess at least a bachelor's degree in computer science, mathematics, or a related field.

Cryptographers analyze and decipher encrypted data to assist law enforcement or government agencies in solving crime, threats or security concerns. They also develop computational models that help solve problems in business, engineering, science, or other industries. A minimum of a bachelor's degree and experience in information technology is required for many jobs in cyber analysis that use cryptography. Government jobs in this field typically require a background check and security clearance.

Since much of their work is mathematics-based, cryptographers are often grouped with mathematicians for statistical purposes. According to U.S. Bureau of Labor Statistics (BLS) data, the field of mathematicians should see favorable growth rates over the next few years, but because the field is small, that won't translate into many jobs.

Source: *U.S. Bureau of Labor Statistics

In the past, cryptography was primarily used to protect military, political, financial, law-enforcement, and other confidential data through the use of a key needed unlock encrypted information. Today, digital information is also encrypted. Cryptographers write algorithms designed to mask information such as account and credit card numbers and wireless networks. Corporations, military organizations, and government agencies also use encryption to protect computers and networks from hackers and cyber-terrorists.

According to O*Net Online, cryptographers apply mathematical theories to solve problems in various industries, including engineering, business, and science. Cryptographers may analyze and decipher encryption systems as well as develop new encryption algorithms. They may develop statistical or mathematical models to analyze data and come up with methods to correct problems. They also test these models for accuracy and reliability.

Some cryptographers are specialists in cyber security. According to job postings found at CareerBuilder.com in August 2013, cyber-analysts may identify issues that make software vulnerable to hacking and help design solutions, including encryption, to prevent it. They may also test software to discover ways to penetrate and access the data. Cyber analysts may work with online services, application servers, and databases.

The BLS cited the average annual salary for mathematicians, including cryptanalysts, was $104,870 in May 2018. Those that worked in the federal executive branch had an average of $112,600. The BLS also reported that the highest-paying jobs for mathematicians were found in District of Columbia, Washington and Colorado.

Cryptographers must have a high level of analytical skill and understanding of mathematical theories in order to break encryptions to decipher coded data, or to create an encryption system to protect data. They may work with law enforcement professionals to access data relevant to crimes or with the military to protect data from being accessed by those without authorization. Job prospects are expected to be strong for cryptographers from 2018 to 2028, with a job growth rate that's much faster than average when compared to all occupations.

Read more:
Cryptographer: Job Description, Duties and Salary Information