Crucifying Julian Assange – Truthdig

Julian Assanges sanctuary in the Ecuadorian Embassy in London has been transformed into a little shop of horrors. He has been largely cut off from communicating with the outside world for the last seven months. His Ecuadorian citizenship, granted to him as an asylum seeker, is in the process of being revoked. His health is failing. He is being denied medical care. His efforts for legal redress have been crippled by the gag rules, including Ecuadorian orders that he cannot make public his conditions inside the embassy in fighting revocation of his Ecuadorian citizenship.

Australian Prime Minister Scott Morrison has refused to intercede on behalf of Assange, an Australian citizen, even though the new government in Ecuador, led by Lenn Morenowho calls Assange an inherited problem and an impediment to better relations with Washingtonis making the WikiLeaks founders life in the embassy unbearable. Almost daily, the embassy is imposing harsher conditions for Assange, including making him pay his medical bills, imposing arcane rules about how he must care for his cat and demanding that he perform a variety of demeaning housekeeping chores.

The Ecuadorians, reluctant to expel Assange after granting him political asylum and granting him citizenship, intend to make his existence so unpleasant he will agree to leave the embassy to be arrested by the British and extradited to the United States. The former president of Ecuador, Rafael Correa, whose government granted the publisher political asylum, describes Assanges current living conditions as torture.

His mother, Christine Assange, said in a recent video appeal, Despite Julian being a multi-award-winning journalist, much loved and respected for courageously exposing serious, high-level crimes and corruption in the public interest, he is right now alone, sick, in painsilenced in solitary confinement, cut off from all contact and being tortured in the heart of London. The modern-day cage of political prisoners is no longer the Tower of London. Its the Ecuadorian Embassy.

Here are the facts, she went on. Julian has been detained nearly eight years without charge. Thats right. Without charge. For the past six years, the U.K. government has refused his request for access to basic health needs, fresh air, exercise, sunshine for vitamin D and access to proper dental and medical care. As a result, his health has seriously deteriorated. His examining doctors warned his detention conditions are life-threatening. A slow and cruel assassination is taking place before our very eyes in the embassy in London.

In 2016, after an in-depth investigation, the United Nations ruled that Julians legal and human rights have been violated on multiple occasions, she said. Hed been illegally detained since 2010. And they ordered his immediate release, safe passage and compensation. The U.K. government refused to abide by the U.N.s decision. The U.S. government has made Julians arrest a priority. They want to get around a U.S. journalists protection under the First Amendment by charging him with espionage. They will stop at nothing to do it.

As a result of the U.S. bearing down on Ecuador, his asylum is now under immediate threat, she said. The U.S. pressure on Ecuadors new president resulted in Julian being placed in a strict and severe solitary confinement for the last seven months, deprived of any contact with his family and friends. Only his lawyers could see him. Two weeks ago, things became substantially worse. The former president of Ecuador, Rafael Correa, who rightfully gave Julian political asylum from U.S. threats against his life and liberty, publicly warned when U.S. Vice President Mike Pence recently visited Ecuador a deal was done to hand Julian over to the U.S. He stated that because of the political costs of expelling Julian from their embassy was too high, the plan was to break him down mentally. A new, impossible, inhumane protocol was implemented at the embassy to torture him to such a point that he would break and be forced to leave.

Assange was once feted and courted by some of the largest media organizations in the world, including The New York Times and The Guardian, for the information he possessed. But once his trove of material documenting U.S. war crimes, much of it provided by Chelsea Manning, was published by these media outlets he was pushed aside and demonized. A leaked Pentagon document prepared by the Cyber Counterintelligence Assessments Branch dated March 8, 2008, exposed a black propaganda campaign to discredit WikiLeaks and Assange. The document said the smear campaign should seek to destroy the feeling of trust that is WikiLeaks center of gravity and blacken Assanges reputation. It largely has worked. Assange is especially vilified for publishing 70,000 hacked emails belonging to the Democratic National Committee (DNC) and senior Democratic officials. The Democrats and former FBI Director James Comey say the emails were copied from the accounts of John Podesta, Democratic candidate Hillary Clintons campaign chairman, by Russian government hackers. Comey has said the messages were probably delivered to WikiLeaks by an intermediary. Assange has said the emails were not provided by state actors.

The Democratic Partyseeking to blame its election defeat on Russian interference rather than the grotesque income inequality, the betrayal of the working class, the loss of civil liberties, the deindustrialization and the corporate coup dtat that the party helped orchestrateattacks Assange as a traitor, although he is not a U.S. citizen. Nor is he a spy. He is not bound by any law I am aware of to keep U.S. government secrets. He has not committed a crime. Now, stories in newspapers that once published material from WikiLeaks focus on his allegedly slovenly behaviornot evident during my visits with himand how he is, in the words of The Guardian, an unwelcome guest in the embassy. The vital issue of the rights of a publisher and a free press is ignored in favor of snarky character assassination.

Assange was granted asylum in the embassy in 2012 to avoid extradition to Sweden to answer questions about sexual offense charges that were eventually dropped. Assange feared that once he was in Swedish custody he would be extradited to the United States. The British government has said that, although he is no longer wanted for questioning in Sweden, Assange will be arrested and jailed for breaching his bail conditions if he leaves the embassy.

WikiLeaks and Assange have done more to expose the dark machinations and crimes of the American Empire than any other news organization. Assange, in addition to exposing atrocities and crimes committed by the United States military in our endless wars and revealing the inner workings of the Clinton campaign, made public the hacking tools used by the CIA and the National Security Agency, their surveillance programs and their interference in foreign elections, including in the French elections. He disclosed the conspiracy against British Labour Party leader Jeremy Corbyn by Labour members of Parliament. And WikiLeaks worked swiftly to save Edward Snowden, who exposed the wholesale surveillance of the American public by the government, from extradition to the United States by helping him flee from Hong Kong to Moscow. The Snowden leaks also revealed, ominously, that Assange was on a U.S. manhunt target list.

What is happening to Assange should terrify the press. And yet his plight is met with indifference and sneering contempt. Once he is pushed out of the embassy, he will be put on trial in the United States for what he published. This will set a new and dangerous legal precedent that the Trump administration and future administrations will employ against other publishers, including those who are part of the mob trying to lynch Assange. The silence about the treatment of Assange is not only a betrayal of him but a betrayal of the freedom of the press itself. We will pay dearly for this complicity.

Even if the Russians provided the Podesta emails to Assange, he should have published them. I would have. They exposed practices of the Clinton political machine that she and the Democratic leadership sought to hide. In the two decades I worked overseas as a foreign correspondent I was routinely leaked stolen documents by organizations and governments. My only concern was whether the documents were forged or genuine. If they were genuine, I published them. Those who leaked material to me included the rebels of the Farabundo Marti National Liberation Front (FMLN); the Salvadoran army, which once gave me blood-smeared FMLN documents found after an ambush; the Sandinista government of Nicaragua; the Israeli intelligence service, the Mossad; the Federal Bureau of Investigation; the Central Intelligence Agency; the Kurdistan Workers Party (PKK) rebel group; the Palestine Liberation Organization (PLO); the French intelligence service, Direction Gnrale de la Scurit Extrieure, or DGSE; and the Serbian government of Slobodan Milosovic, who was later tried as a war criminal.

We learned from the emails published by WikiLeaks that the Clinton Foundation received millions of dollars from Saudi Arabia and Qatar, two of the major funders of Islamic State. As secretary of state, Hillary Clinton paid her donors back by approving $80 billion in weapons sales to Saudi Arabia, enabling the kingdom to carry out a devastating war in Yemen that has triggered a humanitarian crisis, including widespread food shortages and a cholera epidemic, and left close to 60,000 dead. We learned Clinton was paid $675,000 for speaking at Goldman Sachs, a sum so massive it can only be described as a bribe. We learned Clinton told the financial elites in her lucrative talks that she wanted open trade and open borders and believed Wall Street executives were best-positioned to manage the economy, a statement that directly contradicted her campaign promises. We learned the Clinton campaign worked to influence the Republican primaries to ensure that Donald Trump was the Republican nominee. We learned Clinton obtained advance information on primary-debate questions. We learned, because 1,700 of the 33,000 emails came from Hillary Clinton, she was the primary architect of the war in Libya. We learned she believed that the overthrow of Moammar Gadhafi would burnish her credentials as a presidential candidate. The war she sought has left Libya in chaos, seen the rise to power of radical jihadists in what is now a failed state, triggered a massive exodus of migrants to Europe, seen Libyan weapon stockpiles seized by rogue militias and Islamic radicals throughout the region, and resulted in 40,000 dead. Should this information have remained hidden from the American public? You can argue yes, but you cant then call yourself a journalist.

They are setting my son up to give them an excuse to hand him over to the U.S., where he would face a show trial, Christine Assange warned. Over the past eight years, he has had no proper legal process. It has been unfair at every single turn with much perversion of justice. There is no reason to consider that this would change in the future. The U.S. WikiLeaks grand jury, producing the extradition warrant, was held in secret by four prosecutors but no defense and no judge. The U.K.-U.S. extradition treaty allows for the U.K. to extradite Julian to the U.S. without a proper basic case. Once in the U.S., the National Defense Authorization Act allows for indefinite detention without trial. Julian could very well be held in Guantanamo Bay and tortured, sentenced to 45 years in a maximum-security prison, or face the death penalty. My son is in critical danger because of a brutal, political persecution by the bullies in power whose crimes and corruption he had courageously exposed when he was editor in chief of WikiLeaks.

Assange is on his own. Each day is more difficult for him. This is by design. It is up to us to protest. We are his last hope, and the last hope, I fear, for a free press.

We need to make our protest against this brutality deafening, his mother said. I call on all you journalists to stand up now because hes your colleague and you are next. I call on all you politicians who say you entered politics to serve the people to stand up now. I call on all you activists who support human rights, refugees, the environment, and are against war, to stand up now because WikiLeaks has served the causes that you spoke for and Julian is now suffering for it alongside of you. I call on all citizens who value freedom, democracy and a fair legal process to put aside your political differences and unite, stand up now. Most of us dont have the courage of our whistleblowers or journalists like Julian Assange who publish them, so that we may be informed and warned about the abuses of power.

More here:
Crucifying Julian Assange - Truthdig

WikiLeaks founder Julian Assange’s official Twitter account …

Last Updated Dec 25, 2017 4:29 PM EST

The official Twitter account of controversial WikiLeaks founder Julian Assange -- @JulianAssange -- is back online after disappearing from the social media platform overnight. It's unclear whether the account was suspended by Twitter or deactivated by Assange.

A Twitter spokesperson did not answer CBS News' questions asking if the account was suspended but pointed to the company's language on how users can deactivate and reactivate their own accounts.

Assange's account posted the following image of Santa Claus on Monday morning without explaining the brief absence.

While the account was offline, anyone who tried to reach Assange's page received an error message from Twitter.

Twitter uses seeking Julian Assange's official account early on December 25, 2017 saw this message

Twitter.com

The official WikiLeaks Twitter account was still live but wasn't mentioning the Assange account. It later posted a reference to "oddities" on Twitter and said Assange's "physical situation at the embassy remains unaltered." Assange has been holed up at the Ecuadorean embassy in London since 2012, when he sought refuge there to avoid extradition to Sweden on rape charges, which wereeventually dropped.

Another account claiming to be Assange's alternate handle said Twitter deleted the official account ahead of a blockbuster story he's preparing to break. There was no confirmation that Assange authored the alternative account and it was later suspended by Twitter.

2017 CBS Interactive Inc. All Rights Reserved.

See more here:
WikiLeaks founder Julian Assange's official Twitter account ...

The Julian Assange Show: Cypherpunks, Part 1 (E8, p.1)

Cyber threats, hacker attacks and laws officially aiming to tackle internet piracy, but in fact infringing people's rights to online privacy. It's an increasingly topical subject - and the world's most famous whistleblower is aiming to get to the heart of it. In the latest edition of his interview program here on RT, Julian Assange gets together with activists from the Cypherpunk movement - Andy Mller-Maguhn, Jeremie Zimmermann, and Jacob Appelbaum.

You can catch the 8th edition of Julian Assange's series in full today at 11:30 GMT on http://rt.com/on-air/

If you've missed the previous episodes, you can always watch them online at http://assange.RT.com

Subscribe to RT! http://www.youtube.com/subscription_c...

Watch RT LIVE on our website http://rt.com/on-air

Like us on Facebook http://www.facebook.com/RTnewsFollow us on Twitter http://twitter.com/RT_comFollow us on Google+ http://plus.google.com/b/102728491539...

RT (Russia Today) is a global news network broadcasting from Moscow and Washington studios. RT is the first news channel to break the 500 million YouTube views benchmark.

Read the original here:
The Julian Assange Show: Cypherpunks, Part 1 (E8, p.1)

WikiLeaks Party – Wikipedia

Julian Assange's decision to run for the Australian Senate was announced via the WikiLeaks Twitter account in March 2012.[7] The intent to form a WikiLeaks Party was announced by Assange in late 2012,[5][8] and Assange stated that the party was to be a vehicle for his candidacy for a seat in the Australian Senate in the 2013 election.[5][9]

On 23 March 2013 the WikiLeaks Party submitted its registrations to the Australian Electoral Commission. The party had over 1300 fee-paying members.[10] The application was accepted and the party was registered as a political party on 2 July 2013.[11]

The party was involved in Glenn Druery's Minor Party Alliance around the 2013 federal election, but left after deciding not to preference as per Druery's advice.[12][13][14]

Assange is a native of Australia.[5] Since July 2012 Assange has lived in the Embassy of Ecuador, London, having been granted political asylum by Ecuador in an attempt to avoid arrest by UK authorities.[15] Assange is unable to leave the Embassy without being arrested by the Police Forces of the United Kingdom acting on an extradition order placed on him to travel to Sweden to answer allegations of rape and sexual molestation of two Swedish women. Assange fought the extradition order in the UK Court system from December 2010, however, subsequently both the UK High Court of Justice and the UK Supreme Court ruled that the extradition order had been lawfully made and duly dismissed Assange's request for an appeal against the extradition warrant.[17][18]

The party fielded candidates for the Australian Senate in the states of New South Wales, Victoria and Western Australia.[19] Two polling experts rated the WikiLeaks Party's electoral chances as highly unlikely.[20]

Christine Milne, leader of the Australian Greens, was positive about the emergence of the WikiLeaks Party as part of a move away from Australia's two-party system. However, the Greens said they had no intention of stepping aside for Assange in the Victoria Senate election.[21] Similarly, the Socialist Equality Party reaffirmed its intention to defend Assange against persecution but refused to endorse the WikiLeaks Party, stating that this position represents the "interests of the working class".[22]

Professor Anne Twomey, an expert on Australian constitutional law at the University of Sydney, suggested that if Assange were elected, this could be found invalid in the event of a legal challenge if a court ruled that his relationship with Ecuador breached the prohibition against the election of people "under any [acknowledgement] of allegiance, obedience or adherence to a foreign power".[23]

The party's campaign was thrown into turmoil just weeks before the election when members objected strongly to the party's voting preferences - see single transferable vote. In New South Wales, a fascist group was placed above the Greens, while in Western Australia the National Party was placed above Greens Senator Scott Ludlam, a strong supporter of WikiLeaks and Assange. The WikiLeaks Party blamed an unspecified "admin error" and announced an independent review would be held after the election.[24] When National Council members complained, CEO John Shipton attempted to subvert them and create a new power base. Leslie Cannold, Assange's running mate in Victoria, resigned along with many volunteers and members of the National Council.

The party published a short, inconclusive review by a party member five months later.[25] Former member Gary Lord responded with a comprehensive 20-page report fully examining the party's failures.[26]

Assange failed in his bid for a Senate seat. It is difficult to separate out his personal vote under the single transferable vote system. The party received 33,683 votes in Victoria from electors who voted the WikiLeaks ticket, with Assange at its head, and Assange received an additional 8,016 first preference votes from electors who numbered the candidates individually.[27] The party as a whole received 1.24%, the 7th highest primary vote in Victoria, and reached the 26th round of ballot before being eliminated without the opportunity to receive preference flows. The party received 88,100 votes or 0.66% nationally but only contested seats in three States. Gerry Georgatos came closest to winning a Senate seat for the WikiLeaks Party, reaching the 19th round with only seven rounds to go before being eliminated, also before any opportunity to receive preference flows. He fell about 3,000 primary votes short of being elected, but given that the party received only 9,767 primary votes in Western Australia, this was a large gap.[28]

The WikiLeaks Party candidates for the 2013 election were as follows:[29]

Victoria

New South Wales

Western Australia

The WikiLeaks Party subscribes to a libertarian ideology. Specific policies for the 2013 election included: introduction of a national shield law to protect a reporter's right not to reveal a source[39] and; "promoting free information and protection for whistle-blowers."[40]

CEO John Shipton stated that "The party stands for what Julian espouses transparency and accountability in government and of course human rights."[41] Assange himself has said the WikiLeaks Party would combine "a small, centralised leadership with maximum grassroots involvement," and that the party would advance WikiLeaks' objectives of promoting openness in government and politics, and that it would combat intrusions on individual privacy.[5][8][42][43] The Voice of Russia stated that Shipton in an interview "praised Russian diplomatic skills and Russian President Vladimir Putin and Foreign Minister Sergey Lavrov. Shipton and the WikiLeaks Party believe that the Russian President and Foreign Ministry are forces for peace."[44]

Assange has been reported as saying that he envisions the WikiLeaks Party as bound together by unswerving commitment to the core principles of civic courage nourished by understanding and truthfulness and the free flow of information, and one that will practise in politics what WikiLeaks has done in the field of information.[45] The Constitution of the WikiLeaks Party lists objectives, including: the protection of human rights and freedoms; transparency of governmental and corporate action, policy and information; recognition of the need for equality between generations; and support of Aboriginal and Torres Strait Islander self-determination.[45] The WikiLeaks Political party has criticised the Telstra Group's relationship with the FBI and US Department of Justice.[46][47]

In December 2013 a delegation from the party, including its chairman John Shipton, visited Syria and met with President Bashar al-Assad with the goals of demonstrating "solidarity with the Syrian people and their nation" and improving the party's understanding of the country's civil war. In a statement issued shortly before the visit, the WikiLeaks Party stated that it opposed outside intervention in the war, supported a negotiated peace process, and described reports of the Ghouta chemical attack by forces loyal to al-Assad in August 2013 as being "unsubstantiated" and comparable to the concerns which were raised over the Iraqi weapons of mass destruction program prior to the Iraq War.[48][49] The meeting with President al-Assad was attended by National Council members John Shipton, Gail Malone and by former National Council member Jamal Daoud.[4]

The meeting with Assad was criticized by the Australian Prime Minister, Foreign Minister and many WikiLeaks supporters. Shipton stated that the meeting with al-Assad was "just a matter of good manners", and that the delegation had also met with members of the Syrian opposition.[50] These meetings with the opposition have not been verified. Former National Council member and advocate for Shias in Sydney,[51][52] Jamal Daoud (resigned from the Greens over differences), who accompanied Shipton on the trip, expressed support for Assad on Twitter and on his blog.[53][54][55]

Visit link:
WikiLeaks Party - Wikipedia

What is Advanced Encryption Standard (AES): Beginner’s Guide

What is AES and how does it work

AES, or Advanced Encryption Standards, is a cryptographic cipher that is responsible for a large amount of the information security that you enjoy on a daily basis.

Applied by everyone from the NSA to Microsoft to Apple, AES is one of the most important cryptographic algorithms being used in 2018.

What exactly is AES? How does it work? And can non-techie people like you and me apply it to be more secure in our daily lives?

Thats exactly what we will be discussing in this guide.

AES or Advanced Encryption Standards (also known as Rijndael) is one of the most widely used methods for encrypting and decrypting sensitive information in 2017.

This encryption method uses what is known as a block cipher algorithm (which I will explain later) to ensure that data can be stored securely.

And while I will dive into the technical nuances and plenty of fun cryptography jargon in a moment, in order to fully appreciate AES we must first backtrack for a brief history lesson.

Before diving into AES in all of its encrypted glory, I want to discuss how AES achieved standardization and briefly talk about its predecessor DES or Data Encryption Standards.

Basing their development on a prototype algorithm designed by Horst Feistel, IBM developed the initial DES algorithm in the early 1970s.

The encryption was then submitted to the National Bureau of Standards who, in a later collaboration with the NSA, modified the original algorithm and later published it as a Federal Information Processing Standard in 1977.

DES became the standard algorithm used by the United States government for over two decades, until, in January of 1999, distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in under 24 hours.

They successfully concluded their efforts after only 22 hours and 15 minutes, bringing the algorithms weakness into the spotlight for all to see.

Over 5-years, the National Institute of Standards and Technology stringently evaluated cipher designs from 15 competing parties including, MARS from IBM, RC6 from RSA Security, Serpent, Twofish, and Rijndael, among many others.

Their decision was not made lightly, and throughout the 5-year process, the entire cryptographic community banded together to execute detailed tests, discussions, and mock attacks in order to find potential weaknesses and vulnerabilities that could compromise each ciphers security.

While the strength of the competing ciphers was obviously of paramount importance, it was not the only factor assessed by the various panels. Speed, versatility, and computational requirements were also reviewed as the government needed an encryption that was easy to implement, reliable, and fast.

And while there were many other algorithms that performed admirably (in fact many of them are still widely used today), the Rijndael cipher ultimately took home the trophy and was declared a federal standard.

Upon its victory, the Rijndael cipher, designed by two Belgian cryptographers (Joan Daemen and Vincent Rijmen) was renamed Advanced Encryption Standard.

But this ciphers success didnt end with its standardization.

In fact, after the standardization of AES, the cipher continued to rise through the ranks, and in 2003 it was deemed suitable by the NSA for guarding Top Secret Information.

So why exactly am I telling you all of this?

Well, in recent years, AES has been the subject of much controversy as many cryptographers and hackers questions its suitability for continued use. And while I am not posing as an industry expert, I want you to understand the process required to develop the algorithm and the tremendous amount of confidence that even the most secretive agencies place in the Rijndael cipher.

Before I dive into some of the more technical details about how AES works, lets first discuss how its being used in 2017.

It should be noted that AES is free for any public, private, commercial, or non-commercial use. (Although you should proceed with caution when implementing AES in software since the algorithm was designed on a big-endian system and the majority of personal computers run on little-endian systems.)

If any of you have ever downloaded a file off the internet and then gone to open that file only to notice that the file was compressed, (meaning that the original file size was reduced to minimize its affect on your hard drive) then you have likely installed software that relies on an AES encryption.

Common compression tools like WinZip, 7 Zip, and RAR allow you to compress and then decompress files in order to optimize storage space, and nearly all of them use AES to ensure file security.

If youre already familiar with the concept of cryptography and have taken extra measures to ensure the security of your personal data, the disk/partition encryption software that you use likely uses an AES algorithm.

BitLocker, FileVault, and CipherShed are all encryption software that run on AES to keep your information private.

The AES algorithm is also commonly applied to VPNs, or Virtual Private Networks.

For those of you who are unfamiliar with the term, a VPN is a tool that allows you to use a public internet connection in order to connect to a more secure network.

VPNs work by creating a tunnel between your public network connection and an encrypted network on a server operated by the VPN provider.

For example, if you regularly do work from your local coffee shop, you are probably aware that the public connection is incredibly insecure and leaves you vulnerable to all types of hacking.

With a VPN, you can easily solve this problem by connecting to a private network that will mask your online activities and keep your data secure.

Or, lets say that you are traveling to a country with stringent censorship laws and you notice that all of your favorite sites are restricted.

Once again, with a simple VPN setup, you can quickly regain access to these websites by connecting to a private network in your home country.

It should be noted, however, that not all VPNs are created equally.

While the best VPNs (likeExpressVPNand NordVPN) rely on an AES-256 encryption, there are a number of outdated services that still rely on PPTP and Blowfish (a long since obsolete 64-bit encryption), so be sure to do your research before selecting a provider.

In addition to the above applications, AES is used in a plethora of different softwareand applications with which you are undoubtedly familiar.

If you use any sort of master password tools like LastPass or 1Password, then you have been privy to the benefits of 256-bit AES encryption.

Have you ever played Grand Theft Auto? Well, the folks over at Rockstar developed a game engine that uses AES in order to prevent multiplayer hacking.

Oh, and lets not forget, any of you who like to send messages over WhatsApp or Facebook Messenger You guessed it! AES in action.

Hopefully, you are now beginning to realize just how integral AES in running the entire framework of modern society.

And now that you understand what it is and how its used, its time to get into the fun stuff. How this bad boy works.

The AES cipher is part of a family known as block ciphers, which are algorithms that encrypt data on a per-block basis.

These blocks which are measured in bits determine the input of plaintext and output of ciphertext. So for example, since AES is 128 bits long, for every 128 bits of plaintext, 128 bits of ciphertext are produced.

Like nearly all encryption algorithms, AES relies on the use of keys during the encryption and decryption process. Since the AES algorithm is symmetric, the same key is used for both encryption and decryption (I will talk more about what this means in a moment).

AES operates on what is known as a 4 x 4 column major order matrix of bytes. If that seems like too much of a mouthful to you, the cryptography community agrees and termed this process the state.

The key size used for this cipher specifies the number of repetitions or rounds required to put the plaintext through the cipher and convert it into ciphertext.

Heres how the cycles break down.

While longer keys provide the users with stronger encryptions, the strength comes at the cost of performance, meaning that they will take longer to encrypt.

Conversely, while the shorter keys arent as strong as the longer ones, they provide much faster encryption times for the user.

Now before we move on, I want to briefly touch on a topic that has sparked a significant amount of controversy within the cryptographic community.

As I noted earlier, AES relies on a symmetric algorithm, meaning that thekey used to encrypt information is the same one used to decrypt it. When compared to an asymmetric algorithm, which relies on a private key for decryption and a separate public key for file encryption, symmetric algorithms are often said to be less secure.

And while it is true that asymmetric encryptions do have an added layer of security because they do not require the distribution of your private key, this does not necessarily mean that they are better in every scenario.

Symmetric algorithms do not require the same computational power as asymmetric keys, making them significantly faster than their counterparts.

However, where symmetric keys fall short is within the realm of file transferring. Because they rely on the same key for encryption and decryption, symmetric algorithms require you to find a secure method of transferring the key to the desired recipient.

With asymmetric algorithms, you can safely distribute your public key to anyone and everyone without worry, because only your private key can decrypt encrypted files.

So while asymmetric algorithms are certainly better for file transfers, I wanted to point out that AES is not necessarily less secure because it relies on symmetric cryptography, it is simply limited in its application.

AES has yet to be broken in the same way that DES was back in 1999, and the largest successful brute-force attack against any block cipher was only against a 64-bit encryption (at least to public knowledge).

The majority of cryptographers agree that, with current hardware, successfully attacking the AES algorithm, even on a 128-bit key would take billions of years and is, therefore, highly improbable.

At the present moment, there isnt a single known method that would allow someone to attack and decrypt data encrypted by AES so long as the algorithm was properly implemented.

However, many of the documents leaked by Edward Snowden show that the NSA is researching whether or not something known as the tau statistic could be used to break AES.

Side Channel Attacks

Despite all of the evidence pointing to the impracticality of an AES attack with current hardware, this doesnt mean that AES is completely secure.

Side channel attacks, which are an attack based on information gained from the physical implementation of a cryptosystem, can still be exploited to attack a system encrypted with AES. These attacks are not based on weaknesses in the algorithm, but rather physical indications of a potential weakness that can be exploited to breach the system.

Here are a few common examples.

The Anthem Hacking: How AES Could Have Saved 80 Million Peoples Personal Data

During February of 2015, the database for the Anthem insurance company was hacked, compromising the personal data of over 80 million Americans.

The personal data in question included everything from the names, addresses, and social security numbers of the victims.

And while the CEO of Anthem reassured the public by stating the credit card information of their clients was not compromised, any hacker worth his salt can easily commit financial fraud with the stolen information.

While the companys spokesperson claimed that the attack was unpreventable and that they had taken every measure to ensure the security of their clients information, nearly every major data security company in the world disputed this claim, pointing out that the breach was, in fact, completely preventable.

While Anthem encrypted data in transit, they did not encrypt that same data while it was at rest. Meaning that their entire database.

So even though the attack itself might have been unpreventable, by applying a simple AES encryption to the data at rest, Anthem could have prevented the hackers from viewing their customers data.

With the increasing prevalence of cyber-attacks and the growing concerns surrounding information security, it is more important now than ever before to have a strong understanding of the systems that keep you and your personal information safe.

And hopefully, this guide has helped you gain a general understanding of one of the most important security algorithms currently in use today.

AES is here to stay and understanding not only how it works, but how you can make it work for you will help you to maximize your digital security and mitigate your vulnerability to online attacks.

If you really want to dig into AES, I consider watching the video below by Christof Paar (it goes in-depth and its interesting, too):

If you have any further questions about AES or any insights that you have gained from cryptography-related research, please feel free to comment below and I will do my best to get back to you.

Here is the original post:
What is Advanced Encryption Standard (AES): Beginner's Guide

Bitcoincharts | Charts

Symbol LocalBitcoins (ARS) TradeHill (ARS) ANX (AUD) Bitcoin Market (AUD) BitMarket.eu (AUD) btcmarkets (AUD) Crypto X Change (AUD) LocalBitcoins (AUD) Mt. Gox (AUD) Ruxum (AUD) TradeHill (AUD) World Bitcoin Exchange (AUD) WeExchange (AUD) Brasil Bitcoin Market (BRL) BITCOIN TO YOU (BRL) FoxBit (BRL) LocalBitcoins (BRL) Mercado Bitcoin (BRL) OmniTrade (BRL) TradeHill (BRL) Coinnest (BTC) ANX (CAD) Bitalo (CAD) Coinbase (CAD) Kraken (CAD) LocalBitcoins (CAD) LibertyBit (CAD) Mt. Gox (CAD) TradeHill (CAD) Canadian Virtual Exchange (CAD) WeExchange (CAD) ANX (CHF) LocalBitcoins (CHF) Mt. Gox (CHF) Ruxum (CHF) TradeHill (CHF) ChileBit (CLP) TradeHill (CLP) ANX (CNY) BTC China (CNY) BtcTrade (CNY) CHBTC (CNY) Jubi (CNY) Mt. Gox (CNY) RMBTB (CNY) TradeHill (CNY) Bitcash.cz (CZK) BitStock (CZK) LocalBitcoins (CZK) TradeHill (CZK) LocalBitcoins (DKK) Mt. Gox (DKK) TradeHill (DKK) Abucoins (EUR) ANX (EUR) aqoin (EUR) Bitcoin7 (EUR) Paymium (EUR) Bitalo (EUR) BitBay (EUR) Bitcurex (EUR) BitMarket.net (EUR) Bitstamp (EUR) Bitcoin-24.com (EUR) bitcoin.de (EUR) btce (EUR) Bitcoin Euro Exchange (EUR) btcex.com (EUR) BTC-X (EUR) CEX.IO (EUR) GDAX (EUR) CoinFalcon (EUR) CoinsBank (EUR) Cryptonit (EUR) Crypto-Trade (EUR) EXMO (EUR) FBTC Exchange (EUR) FreshBTC (EUR) Global Bitcoin Exchange (EUR) hitbtc (EUR) IBWT (EUR) IMCEX.COM (EUR) Intersango (EUR) itBit (EUR) Justcoin (EUR) Kraken (EUR) LocalBitcoins (EUR) Mt. Gox (EUR) Ripple (EUR) The Rock Trading (EUR) Ruxum (EUR) TradeHill (EUR) Vircurex (EUR) WEX (EUR) zyado (EUR) Bitcoin Market (GAU) Bitcoin Market (GAU) ANX (GBP) Bitcoin Central (GBP) bit121 (GBP) Bitalo (GBP) BitMarket.eu (GBP) Britcoin (GBP) GDAX (GBP) Coinfloor (GBP) CoinsBank (GBP) Global Bitcoin Exchange (GBP) IBWT (GBP) Intersango (GBP) Kraken (GBP) LocalBitcoins (GBP) Mt. Gox (GBP) Ruxum (GBP) TradeHill (GBP) ANX (HKD) Bitcoin HK Exchange (HKD) LocalBitcoins (HKD) Mt. Gox (HKD) Ruxum (HKD) TradeHill (HKD) Ruxum (HUF) BitX (IDR) Indodax (IDR) Bit2C (ILS) LocalBitcoins (ILS) TradeHill (ILS) LocalBitcoins (INR) TradeHill (INR) ANX (JPY) bitFlyer (JPY) BTCBOX (JPY) btcex.com (JPY) coincheck (JPY) Fisco (JPY) Kraken (JPY) Mt. Gox (JPY) Ruxum (JPY) TradeHill (JPY) Zaif (JPY) Korbit (KRW) Kraken (KRW) bitme (LTC) IBWT (LTC) Justcoin (LTC) Kraken (LTC) Bitso (MXN) LocalBitcoins (MXN) TradeHill (MXN) BitX (MYR) BitX (NGN) Kraken (NMC) Bitcoins Norway (NOK) Justcoin (NOK) LocalBitcoins (NOK) Mt. Gox (NOK) TradeHill (NOK) ANX (NZD) bitNZ (NZD) LocalBitcoins (NZD) Mt. Gox (NZD) TradeHill (NZD) TradeHill (PEN) Urdubit (PKR) Abucoins (PLN) bid extreme (PLN) Bitalo (PLN) BitBay (PLN) Bitchange.pl (PLN) Bitcurex (PLN) BitMarket.net (PLN) Bitmaszyna (PLN) bitomat.pl (PLN) Flucto (PLN) FreshBTC (PLN) Global Bitcoin Exchange (PLN) Intersango (PLN) LocalBitcoins (PLN) Mt. Gox (PLN) NevBit (PLN) Ruxum (PLN) TradeHill (PLN) BTCXchange (RON) BitMarket.eu (RUB) btce (RUB) btcex.com (RUB) btcex.com (RUB) btcex.com (RUB) CEX.IO (RUB) EXMO (RUB) IMCEX.COM (RUB) LocalBitcoins (RUB) Mt. Gox (RUB) Ruxum (RUB) WEX (RUB) FYB-SE (SEK) Kapiton (SEK) LocalBitcoins (SEK) Mt. Gox (SEK) Ruxum (SEK) TradeHill (SEK) ANX (SGD) FYB-SG (SGD) itBit (SGD) LocalBitcoins (SGD) Mt. Gox (SGD) Ruxum (SGD) The Rock Trading (SLL) VirWox (SLL) LocalBitcoins (THB) Mt. Gox (THB) Ruxum (THB) Ruxum (UAH) 1coin (USD) Abucoins (USD) Allcoin (USD) ANX (USD) Bitcoin2Cash (USD) Bitcoin7 (USD) Bitcoin Market (USD) Bitcoin Market (USD) Bitcoin Market (USD) Bitcoin Market (USD) Bitcoin Market (USD) Bitalo (USD) BitBay (USD) BitBox (USD) Bitcurex (USD) Bitfinex (USD) bitfloor (USD) bitFlyer (USD) bitKonan (USD) BitMarket.eu (USD) bitme (USD) BitStamp (USD) Bitcoin-24.com (USD) BTC-Alpha (USD) BTCC (USD) btce (USD) btcex.com (USD) btcex.com (USD) BtcTree.com (USD) BTC-X (USD) Camp BX (USD) CEX.IO (USD) GDAX (USD) CoinsBank (USD) Coinsbit (USD) CoinTrader (USD) Crypto X Change (USD) Crypto-Trade (USD) ExchangeBitcoins.com (USD) EXMO (USD) FBTC Exchange (USD) FreshBTC (USD) GetBTC (USD) Global Bitcoin Exchange (USD) hitbtc (USD) IBWT (USD) IMCEX.COM (USD) Indacoin (USD) Intersango (USD) itBit (USD) Justcoin (USD) Kraken (USD) LakeBTC.com (USD) LocalBitcoins (USD) LibertyBit (USD) Mt. Gox (USD) OKCoin (USD) Ripple (USD) The Rock Trading (USD) Ruxum (USD) TradeHill (USD) TradeHill (USD) Vircurex (USD) WeExchange (USD) WEX (USD) LocalBitcoins (VEF) SurBitcoin (VEF) LocalBitcoins (VES) LocalBitcoins (VND) Remitano (VND) VBTC (VND) Justcoin (XRP) Kraken (XRP) Ripple (XRP) Snowcoin (XRP) BitX (ZAR) LocalBitcoins (ZAR) Ruxum (ZAR) TradeHill (ZAR)

< day >

Chart Type None CandleStick Closing Price Median Price OHLC Typical Price Weighted Close Price Band None Bollinger Band Donchian Channel Envelop (SMA 20 +/- 10%)

Moving Averages None Simple Exponential Triangular Weighted None Simple Exponential Triangular Weighted

Technical Indicators large indicators None Accumulation/Distribution Aroon Oscillator Aroon Up/Down Avg Directional Index Avg True Range Bollinger Band Width Chaikin Money Flow Chaikin Oscillator Chaikin Volatility Close Location Value Commodity Channel Index Detrended Price Osc Donchian Channel Width Ease of Movement Fast Stochastic MACD Mass Index Momentum Money Flow Index Neg Volume Index On Balance Volume Performance % Price Oscillator % Volume Oscillator Pos Volume Index Price Volume Trend Rate of Change RSI Slow Stochastic StochRSI TRIX Ultimate Oscillator Volume William's %R None Accumulation/Distribution Aroon Oscillator Aroon Up/Down Avg Directional Index Avg True Range Bollinger Band Width Chaikin Money Flow Chaikin Oscillator Chaikin Volatility Close Location Value Commodity Channel Index Detrended Price Osc Donchian Channel Width Ease of Movement Fast Stochastic MACD Mass Index Momentum Money Flow Index Neg Volume Index On Balance Volume Performance % Price Oscillator % Volume Oscillator Pos Volume Index Price Volume Trend Rate of Change RSI Slow Stochastic StochRSI TRIX Ultimate Oscillator Volume William's %R None Accumulation/Distribution Aroon Oscillator Aroon Up/Down Avg Directional Index Avg True Range Bollinger Band Width Chaikin Money Flow Chaikin Oscillator Chaikin Volatility Close Location Value Commodity Channel Index Detrended Price Osc Donchian Channel Width Ease of Movement Fast Stochastic MACD Mass Index Momentum Money Flow Index Neg Volume Index On Balance Volume Performance % Price Oscillator % Volume Oscillator Pos Volume Index Price Volume Trend Rate of Change RSI Slow Stochastic StochRSI TRIX Ultimate Oscillator Volume William's %R None Accumulation/Distribution Aroon Oscillator Aroon Up/Down Avg Directional Index Avg True Range Bollinger Band Width Chaikin Money Flow Chaikin Oscillator Chaikin Volatility Close Location Value Commodity Channel Index Detrended Price Osc Donchian Channel Width Ease of Movement Fast Stochastic MACD Mass Index Momentum Money Flow Index Neg Volume Index On Balance Volume Performance % Price Oscillator % Volume Oscillator Pos Volume Index Price Volume Trend Rate of Change RSI Slow Stochastic StochRSI TRIX Ultimate Oscillator Volume William's %R

Options Show Volume BarsVolume in CurrencyParabolic SARLog ScalePercentage Scale

See the original post:

Bitcoincharts | Charts

‘State of Surveillance’ with Edward Snowden and Shane Smith (VICE on HBO: Season 4, Episode 13)

When NSA whistleblower Edward Snowden leaked details of massive government surveillance programs in 2013, he ignited a raging debate over digital privacy and security. That debate came to a head this year, when Apple refused an FBI court order to access the iPhone of alleged San Bernardino Terrorist Syed Farook. Meanwhile, journalists and activists are under increasing attack from foreign agents. To find out the government's real capabilities, and whether any of us can truly protect our sensitive information, VICE founder Shane Smith heads to Moscow to meet the man who started the conversation, Edward Snowden.

VICE on HBO Season 1: http://bit.ly/1BAQdq5VICE on HBO Season 2:http://bit.ly/1LBL8y6VICE on HBO Season 3:http://bit.ly/1XaNpct

Check out VICE News' continuing coverage of Edward Snowden and the surveillance debate:

Snowden Claims 'Deceptive' NSA Still Has Proof He Tried to Raise Surveillance Concerns: http://bit.ly/25MqUfD

Exclusive: Snowden Tried to Tell NSA About Surveillance Concerns, Documents Reveal: http://bit.ly/1TVVkog

Click here to subscribe to VICE: http://bit.ly/Subscribe-to-VICE

Check out our full video catalog: http://bit.ly/VICE-VideosVideos, daily editorial and more: http://vice.comMore videos from the VICE network: https://www.fb.com/vicevideoLike VICE on Facebook: http://fb.com/viceFollow VICE on Twitter: http://twitter.com/viceRead our Tumblr: http://vicemag.tumblr.comFollow us on Instagram: http://instagram.com/viceCheck out our Pinterest: https://pinterest.com/vicemag

See the original post here:
'State of Surveillance' with Edward Snowden and Shane Smith (VICE on HBO: Season 4, Episode 13)

Edward Snowden (Foreword of The Assassination Complex)

byEdward Snowden, Osamu Aoki, Daisuke Igeta

really liked it 4.00 avg rating 1 rating

Want to Readsaving

Error rating book. Refresh and try again.

Rate this book

Clear rating

3.59 avg rating 69 ratings published 2015

Want to Readsaving

Error rating book. Refresh and try again.

Rate this book

Clear rating

really liked it 4.00 avg rating 33 ratings

Want to Readsaving

Error rating book. Refresh and try again.

Rate this book

Clear rating

4.50 avg rating 10 ratings published 2015

Want to Readsaving

Error rating book. Refresh and try again.

Rate this book

Clear rating

Want to Readsaving

Error rating book. Refresh and try again.

Rate this book

Clear rating

0.00 avg rating 0 ratings

Want to Readsaving

Error rating book. Refresh and try again.

Rate this book

Clear rating

Want to Readsaving

Error rating book. Refresh and try again.

Rate this book

Clear rating

0.00 avg rating 0 ratings

Want to Readsaving

Error rating book. Refresh and try again.

Rate this book

Clear rating

See original here:
Edward Snowden (Foreword of The Assassination Complex)

Edward Snowden: Israeli spyware NSO Group tracked Jamal …

Israeli spyware was used to track and kill journalist Jamal Khashoggi, the US National Security Agency whistleblower Edward Snowden claims.

Snowden, who leaked classified information from the NSA in 2013, and who is currently living in Russia, made the allegation during a video conference in Tel Aviv.

According to Snowden, Israeli spy firm NSO Group which sells sophisticated hacking tools to governments, militaries, and intelligence agencies was used to track and eventually murder Khashoggi at the Saudi Embassy in Istanbul last month.

The firm is reportedly behind the hacking tool for iPhones that forced Apple to issue a critical software update in 2016, and its Pegasus spyware, which enables hackers to access messages, photos, microphone, and camera, and has reportedly been used by governments to keep an eye on dissidents abroad.

Speaking remotely on Tuesday, Snowden said the Saudis targeted Khashoggi because they had infected the devices of one of his contacts another Saudi dissident living in Canada.

Snowden asked why Khashoggi was targeted. "How did they know what [Khashoggi's] plans and intentions were, how did they decide that he was someone they needed to act against, who was worth the risk," he said.

Snowden said the Saudis were able to procure information on Khashoggi by using the Israeli spy tools.

"The reality is that they bugged one of his few friends and contacts using software created by an Israeli company," Snowden claimed, which may have helped the Saudis keep tabs on Khashoggi and lure him to the consulate.

Saudi activist Omar Abdulaziz, who has been making videos critical of Saudi Arabia for years, says two of his brothers and several of his friends have recently been arrested.Screenshot/Youtube

Snowden referred to outspoken Saudi critic and internet personality Omar Abdulaziz, who had his smartphone targeted by the Pegasus software this year, according to a report by Citizen Lab. Abdulaziz resides in Canada and applied for political asylum in 2014 out of fear of retribution.

According to the report, Abdulaziz's device got infected after he clicked on a link purportedly sent from the courier company DHL, though he was unaware of the hacking until Citizen Lab reached out.

According to the 27-year-old, who hosts a popular satirical news program on YouTube, the government arrested two of his brothers and several of his friends back home in Saudi Arabia two months later.

Read more: A Canadian political refugee made videos criticizing Saudi Arabia now Saudi authorities have arrested his friends and family

Abdulaziz and Khashoggi were close associates, according to The Washington Post, and had been working on several projects together including a short human-rights film, and an initiative to build an online "army" inside Saudi Arabia that may have angered Saudi authorities and motivated his killing.

"They [Saudi agents] had everything," he told the Post. "They saw the messages between us. They listened to the calls."

He says Saudi authorities have attempted to intimidate him into silence, but he has refused. He says he is unable to contact people back home and is still concerned for their safety and security.

Still, he told The Post, he has vowed to continue fighting.

"They hacked my phone and jailed my brothers, kidnapped and maybe killed my friend," he told The Post last month. "I'm not going to stop."

Gorodenkoff/Shutterstock

Speaking in Tel Aviv, Snowden described the NSO group as "the worst of the worst in selling these burglary tools, that are being actively used to violate the human rights of dissidents, opposition figures, activists, to some pretty bad players."

"This is not a cyber security industry, its a cyber insecurity industry," he added. He also warned of other digital companies exploiting similar spyware.

Now read: Saudi agents are reportedly secretly installing spyware onto people's phones to track critics abroad

In a statement, the NSO Group said it is "the only company of its kind in the world that has an independent ethics committee, including outside experts with a background in law and international relations, to prevent its products from being used for bad purposes," it said in a statement Wednesday, according to Bloomberg.

"In contrast to what's published in the media, the company does not sell and does not allow their use in many countries."

Visit link:
Edward Snowden: Israeli spyware NSO Group tracked Jamal ...

Chelsea Manning – RationalWiki

We must stay strong and stay together.

Chelsea Manning (born Bradley Edward Manning, 1987) is a US army soldier who released a large quantity of restricted material to the public in 2010. She was convicted of espionage and sentenced to 35 years in jail in 2013. Barack Obama commutted her sentence in January 2017.

Manning, disgusted both with the homophobic policies in the military and distressed by the intelligence data she was handling, walked into work one day with a blank CD-R with the words LADY GAGA Sharpied onto the label. She put the CD in a MacBook drive, burned the copied confidential material onto the disc and mailed said disc to Julian Assange, owner of the inconveniently blunt website WikiLeaks. What Assange found was possibly the most incriminating examples of American military malfeasance since the Pentagon Papers ruined Nixon's day. Besides a collection of diplomatic cables that opened every dirty closed-door secret on the entire Western military infrastructure (including insights on the boozy sex-capades of Italian PM Silvio Berlusconi), it revealed a portrait of ground-level US troops objectively functioning as war criminals. This, of course, made a lot of people upset at Manning for spoiling their fantasy that the US military had actually been doing something right for a change.

Unfortunately, Manning's whistle-blowing technique of "copy everything and send it out without reading it" wasn't the smartest decision, and it led to the release of documents that, among other things, revealed the names of some of the last remaining Jews residing in Baghdad,[2] where they face heavy persecution and hatred from the city's Muslim majority.

In March 2011, Manning was charged with 22 specifications, including aiding the enemy, wrongfully causing intelligence to be published on the Internet knowing that it was accessible to the enemy, theft of public property or records, and transmitting defense information. On February 28, 2013, a judge accepted guilty pleas to 10 of the 22 specified charges. Later that year, Manning was acquitted of aiding the enemy by knowingly giving out intelligence through indirect means, and was convicted of 19 of the 21 or 22 specified charges, including theft and six counts of espionage.

Manning is a trans woman. Because she made this announcement at roughly the same time that she was convicted for the aforementioned releasing of classified documents, a bunch of people made noise about how she wasn't really transgender, but just trying to get out of serving time in a men's prison. This makes perfect sense, since as we all know, the surest way to avoid bullying is to pretend to be transgender.

Although this was most prominent among ordinary people on the Internet, that bastion of classy journalism Fox News was not above this sort of bullshit. Fox's Jon Scott combined it with a pathetically transparent face-saving "some might say" line:

You know, there are cynics out there, and maybe I'm one of them, who say maybe this is all part of a plan to get, you know, early release or parole or a new trial or something, by maintaining some kind of a ruse here that isn't necessarily the case.

Some within the transgender community, one of the most vocal being Kristin Beck, are also less than thrilled with having to be put into the same category as Manning.[3] In 2014, she successfully was granted a name change by Leavenworth County District Judge David King.[4]

Manning has been denied treatment for her gender dysphoria in prison.[5] She has sued to get treatment for gender dysphoria.[6] Manning has spent more than 9 months in solitary confinement.[7] As a result of her mistreatment in prison, she made two suicide attempts.[8] After her first suicide attempt, she was punished with further time in solitary confinement.[9] She was released in May 2017.

Following her release from prison, Manning has become an activist for government transparency and transgender rights, among other progressive causes. She is running for Senator of Maryland as a Democrat[10].

Read the rest here:
Chelsea Manning - RationalWiki