WikiLeaks: CIA’s CouchPotato tool grabs footage from remote video streams – BetaNews

The latest addition to WikiLeaks' Vault 7 cache of CIA documents and tools is a user guide for CouchPotato. This project is designed to capture RTSP/H.264 video streams, typically from networked cameras.

This is rather different to the approach taken with the Dumbo project which required physical access to a computer. The CouchPotato documentation is relatively recent, only dating back to February 14, 2014.

See also:

The leaked documents relate to the first version of CouchPotato, and its not clear if further versions have been produced that iron out problems. CouchPotato 1.0, for instance, uses a massive amount of CPU time, meaning there is a risk that the activity would be noticed by a target.

The documentation explains:

CouchPotato is a remote tool for collection against RTSP/H.264 video streams. It provides the ability to collect either the stream as a video file (AVI) or capture still images (JPG) of frames from the stream that are of significant change from a previously captured frame. CouchPotato utilizes ffmpeg for video and image encoding and decoding as well as RTSP connectivity. In order to minimize size of the DLL binary, many of the audio and video codecs along with other unnecessary features have been removed from the version of ffmpeg that CouchPotato is built with. pHash, an image hashing algorithm, has been incorporated into ffmpegs image2 demuxer to provide image change detection capabilities. CouchPotato relies on being launched in an ICE v3 Fire and Collect compatible loader.

WikiLeaks says:

Today, August 10th 2017, WikiLeaks publishes the the User Guide for theCoachPotatoproject of the CIA.CouchPotatois a remote tool for collection against RTSP/H.264 video streams. It provides the ability to collect either the stream as a video file (AVI) or capture still images (JPG) of frames from the stream that are of significant change from a previously captured frame. It utilizes ffmpeg for video and image encoding and decoding as well as RTSP connectivity.CouchPotatorelies on being launched in an ICE v3 Fire and Collect compatible loader.

More information about CouchPotato is available on the WikiLeaks website.

Image credit: ZaZa Studio / Shutterstock

Read the original post:
WikiLeaks: CIA's CouchPotato tool grabs footage from remote video streams - BetaNews

Wikileaks releases a user guide for CIA’s CouchPotato project – Neowin

Government surveillance is one of the more trying issues we've had to face since the advent of the digital age. The lack of transparency from government agencies has led to the rise of such organizations as Wikileaks. While it has been accused of partisanship, anti-American narrative, and much more thanks to the eccentricity of its founder, it continues to leak confidential secrets of the CIA. The latest one is a user guide on a tool called CouchPotato.

A remote tool that allows for the collection of RTSP/H.264 video streams, CouchPotato can be used to "collect either the stream as a video file (AVI) or capture still images (JPG) of frames from the stream that are of significant change from a previously captured frame". FFmpeg and RSTP connectivity is used for encoding and decoding the streams.

They use a stripped down version of the FFmpeg software by removing unnecessary features along with various audio and video codecs. Instead, pHash, an image hashing algorithm, is incorporated to add the image change detection capabilities. This helps in reducing the binary footprint of the DLL. It relies on being launched in an ICE v3 Fire and Collect compatible loader.

The user guide consists of three sections that include an overview, prerequisites, and usage. The document strongly recommends to not launch out of a process that is critical to system stability such as services.exe as it may lead to a memory leak and open file handles. You can read the complete guide here.

Go here to read the rest:
Wikileaks releases a user guide for CIA's CouchPotato project - Neowin

Chelsea Manning photographed for Vogue – WSYR

Chelsea Manning in NYC Pride March Chelsea Manning in NYC Pride March Related Content

NEW YORK (CNNMoney) - Chelsea Manning is making her Vogue debut.

The former U.S. Army intelligence analyst, who served time in prison for leaking classified documents, will be featured in the magazine's September issue.

She was photographed by the renowned Annie Leibovitz, who has taken pictures of President Barack Obama, Queen Elizabeth II, John Lennon, Michael Jackson and Caitlyn Jenner.

Manning was convicted in 2013 for leaking reams of material to WikiLeaks. She was sentenced to 35 years in military prison but was released in May. Obama commuted her sentence days before he left office.

Manning came out as transgender the day after she was sentenced. She became the first person to take hormones while in military prison, and she remained in an all-male Army prison until she was released.

Since her release, Manning has spoken candidly about her life, including her decision to leak the classified records and her transition. Her first major interview after prison was published in the New York Times Magazine in June.

"It's not like I'm living in fear or anything," she told Vogue. "I'm so glad to be out and about and walking around."

Manning also participated in the New York City Pride March earlier this year with the American Civil Liberties Union.

Vogue's September issue, which publishes ahead of New York Fashion Week, is typically the largest and most significant that the magazine puts out each year. Previous editions have weighed in at 700 to 900 pages.

Actress Jennifer Lawrence will be featured on the cover.

Read this article:
Chelsea Manning photographed for Vogue - WSYR

Chelsea Manning poses for Vogue magazine in red swimsuit – PinkNews

Chelsea Manning has only been out of prison for a short time, but shes already made a splash.

The trans soldier spent seven years behind bars for leaking 700,000 classified documents to WikiLeaks.

Now she is out of prison thanks to President Obamas pardon and making the most of her new found freedom.

Manning posted a photo of herself in a red bathing suit to Instagram.

The image of her strutting down the beach, veteran photographer Annie Leibovitz, is taken from the September issue of Vogue.

Guess this is what freedom looks like, she captioned the image on Instagram.

The magazine followed the trans activist as she prepared for the Lambda Literary Awards, which honours LGBT writers.

I knew that I was different, Manning tells Vogue.

I gravitated more toward playing house, but the teachers were always pushing me toward playing the more competitive games with the boys.

She continues: I spent so much time wondering, Whats wrong with me? Why cant I fit in?

Manning was just 22 when she shared the US diplomatic correspondence, which included evidence of civilian deaths in Iraq and Afghanistan, profiles of detainees at Guantanamo prison camp, and low-level battlefield reports.

Manning speaking to ABC in her first interview since leaving prison. Interview below.

I have a responsibility to the public we all have a responsibility, Manning told ABC News.

Anything Ive done, its me. Theres no one else. No one told me to do this. Nobody directed me to do this. This is me. Its on me.

The 29-year-old added: Were getting all this information from all these different sources and its just death, destruction, mayhem.

Were filtering it all through facts, statistics, reports, dates, times, locations, and eventually, you just stop.

I stopped seeing just statistics and information, and I started seeing people.

Obamas decision to commute Mannings sentence one of the last of his presidency was credited by many commentators to years of campaigning from advocacy groups.

The decision was criticised by then President Elect Donald Trump, who called Manning an ungrateful traitor.

Read the original:
Chelsea Manning poses for Vogue magazine in red swimsuit - PinkNews

Vogue: Chelsea Manning Didn’t Regret ‘Leaking of State Secrets’ – NewsBusters (press release) (blog)


NewsBusters (press release) (blog)
Vogue: Chelsea Manning Didn't Regret 'Leaking of State Secrets'
NewsBusters (press release) (blog)
Laura Poitras, an executive producer of an upcoming Manning documentary, gave her subject a sort of bizarre mystical comparison to Edward Snowden, a fellow leaker of secrets. When I first met Ed Snowden in Hong Kong, he had the same sort of eerie ...
Chelsea Manning faces backlash after posing in a red swimsuit: 'You traitor!'International Business Times UK

all 72 news articles »

More:
Vogue: Chelsea Manning Didn't Regret 'Leaking of State Secrets' - NewsBusters (press release) (blog)

Supreme Court Asked to Look at Warrantless NSA Spying Powers – InsideSources

Digital rights advocates asked the U.S. Supreme Court Thursday to review the case of an American convicted with evidence gathered under FISA Section 702 warrantless National Security Agency surveillance authority meant to spy on foreign nationals.

Privacy and digital rights groups including the Electronic Frontier Foundation (EFF) filed a petition Thursday with the nations highest court seeking review of the case ofMohammed Mohamud, an American citizen who was charged in 2012 with planning to car-bomb a Christmas tree lighting ceremony in Portland, Oregon. Information used to prosecute Mohamud was gathered using Section 702 of the 2008 Foreign Intelligence Surveillance Amendments Act.

Section 702 authorizes NSA to tap the physical infrastructure of internet service providers, like fiber connections, to intercept foreign emails, instant messages, and other communications belonging to foreign nationals as they exit and enter the U.S. But according to NSA, the program also incidentally sweeps up the communications of Americans corresponding with, and until recently, merely even mentioning foreign targets.

NSA is legally barred from searching through Americans communications without a warrant, but that wasnt the case with Mohamud. His emails were intercepted specifically by a program dubbed PRISM, the existence of which was leaked to the press by former NSA contractor Edward Snowden in 2013. PRISMgives NSA access to communications transmitted over internet edge services like Google, Yahoo, or Facebook.

Mohamud learned after his conviction that his emails were gathered under Section 702 and sought to suppress the evidence, arguing its gathering violated his Fourth Amendment rights against search and seizure without a warrant. The U.S. Court of Appeals for the Ninth Circuit noted the governments conduct was quite aggressive at times but upheld the search, a move EFF, the Center for Democracy and Technology and New Americas Open Technology Institute call dangerous and unprecedented.

The ruling provides an end-run around the Fourth Amendment, converting sweeping warrantless surveillance directed at foreigners into a tool for spying on Americans, Mark Rumold, a staff attorney for EFF, said Thursday. Section 702 is unlike any surveillance law in our countrys history, it is unconstitutional, and the Supreme Court should take this case to put a stop to this surveillance.

The groups add weight to a Supreme Court petition filed by Mohamuds attorneys in July, and join a long list of battles from the courts to Congress over the legality of Section 702. Wikimedia and the ACLU are suing the government over the use of Section 702 in theFourth Circuit Court of Appeals, and Congress has held several hearings this year to debate the laws renewal ahead of its expiration at the end of December.

Section 702 is at the heart of a dispute between Oregon Democratic Sen. Ron Wyden and Director of National Intelligence Dan Coats, the nations top spy chief. Wyden has pressed Coats and his predecessor to provide an estimate of the number of Americans incidentally swept up in Section 702 that both claim is impossible to produce. The senator has further suggested the authority could be used to warrantlessly target Americans directly.

Congresss concerns over Section 702 have become a point of rare bipartisanship for some. Kentucky Republican Sen. Rand Paul has fought alongside Wyden to peel back the curtain on Section 702. South Carolina Republican Sen. Lindsay Graham is grilling intelligence officials for information about what Section 702 gathers on lawmakers and other members of government, and if those intercepts can and are used to politically target government officials like former National Security Adviser Michael Flynn.

In testimony to Congress intelligence chiefs including NSA Director Mike Rogers have admitted Section 702 programs have a history of compliance issues, some highlighted by the Foreign Intelligence Surveillance Court, which approves more than 99 percent of the governments secret surveillance requests.

The typically intel-friendly court chastised the government for an institutional lack of candor on a very serious Fourth Amendment issue. One such opinion said NSA has engaged in significant overcollection . . . including the content of communications of non-target U.S. persons and persons in the U.S.

As a result, NSA in April suspended a Section 702 practice known as about collection when NSA sweeps up American emails and text messages exchanged with overseas users that simply mention search terms like an email address belonging to a target but isnt to or from a target.

The agency recently told Congress its working on a technical solution to reengage about collection.

All of the pushback comes as intelligence leaders pressure Congress not just to renew Section 702 but implement it permanently. Top Republicans and Democrats have endorsed the idea, including Senate Majority Whip John Cornyn of Texas and Intelligence Committee Ranking Member Dianne Feinstein of California.

In a recent interview, Snowden said using Section 702 to surveil Americans requires the agency to engage in little more than word games. Privacy advocates suspect the loophole created by Section 702 likelyamounts to millions or even hundreds of millions of warrantless interceptionsbelonging to Americans.

Follow Giuseppe on Twitter

Original post:
Supreme Court Asked to Look at Warrantless NSA Spying Powers - InsideSources

Ex-MI5 chief warns against crackdown on encrypted messaging apps – The Guardian

Jonathan Evans, former director general of the British security service, says Islamist terrorism will remain a threat for another 20-30 years. Photograph: PA

A former head of MI5 has spoken out against curtailing use of encryption in messaging apps despite warning that Islamist terrorism will remain a threat for up to another 30 years.

Jonathan Evans said the terrorist threat to Britain was a generational problem, and suggested the Westminster Bridge attack in March may have had an energising effect on extremists.

Without encryption, everything sent over the internet from credit card details to raunchy sexts is readable by anyone who sits between you and the information's recipient. That includes your internet service provider, and all the other technical organisations between the two devices, but it also includes anyone else who has managed to insert themselves into the chain, from another person on the same insecure wireless network to a state surveillance agency in any country the data flows through.

With encryption, that data is scrambled in such a way that it can only be read by someone with the right key. While some older and clumsier methods of encryption have been broken, modern standards are generally considered unbreakable even by an attacker possessing a vast amount of computer power.

But while encryption can protect data that it is vital to keep secret (which is why the same technology that keeps the internet encrypted is used by militaries worldwide), it also frustrates efforts by law enforcement to eavesdrop on terrorists, criminals and spies.

That's particularly true for end-to-end encryption, where the two devices communicating are not a user and a company (who may be compelled to turn over the information once it has been decrypted), but two individual users.

Thank you for your feedback.

But Lord Evans, who retired from the security service in 2013, told BBC Radio 4s Today programme that he would not support a clampdown on use of encryption.

His comments came after Amber Rudd, the home secretary, argued that internet companies were not doing enough to tackle extremism online. She has previously singled out the use of encryption as a problem.

Acknowledging that use of encryption had hampered security agencies efforts to access the content of communications between extremists, Evans added: Im not personally one of those who thinks we should weaken encryption because I think there is a parallel issue, which is cybersecurity more broadly.

While understandably there is a very acute concern about counter-terrorism, it is not the only threat that we face. The way in which cyberspace is being used by criminals and by governments is a potential threat to the UKs interests more widely.

Its very important that we should be seen and be a country in which people can operate securely thats important for our commercial interests as well as our security interests, so encryption in that context is very positive.

After the home secretarys intervention at the Global Internet Forum to Counter Terrorism in California this month, the companies taking part said they were cooperating to substantially disrupt terrorists ability to use the internet in furthering their causes, while also respecting human rights.

Looking ahead, Evans warned of the threat of a cyber-attack against the internet of things the networking of physical devices, ranging from cars to lightbulbs to TVs as a major issue.

As our vehicles, air transport, our critical infrastructure is resting critically on the internet, we need to be really confident that we have secured that because our economic and daily lives are going to be dependent on the security we can put in to protect us from cyber-attack, he said.

But the threat of Islamist terrorism was likely to remain at the fore for 20-30 years, he warned.

Were at least 20 years into this. My guess is that we will still be dealing with the long tail in another 20 years time I think this is genuinely a generational problem, Evans said.

I think that we are going to be facing 20 or 30 years of terrorist threats and therefore we need absolutely critically to persevere.

He said the London bombings in July 2005 triggered an energising effect on the extremist networks in the UK, and thought there would be a similar feeling after the Westminster Bridge attack.

We did see a huge upsurge in threat intelligence after 7 July and I suspect that theres the same sort of feeling in the period after the Westminster Bridge attack that a lot of people who thought Id like to do this suddenly decided Yep, if they can do it, then I can do it.

Since the atrocity in March, there have been attacks in Manchester, London Bridge and Finsbury Park.

Evans, now an independent crossbencher in the House of Lords, also told the programme he would be surprised if Russia had not attempted to interfere with British democracy, after repeated allegations of Kremlin interference in foreign elections.

He said: It would be extremely surprising if the Russians were interested in interfering in America and in France and in various other European countries but were not interested in interfering with the UK, because traditionally I think we have been seen as quite hawkish and therefore I would be surprised if there had not been attempts to interfere with the election.

Visit link:
Ex-MI5 chief warns against crackdown on encrypted messaging apps - The Guardian

Fornetix Awarded Patent for Breakthroughs in Encryption Key Management – Markets Insider

ASHBURN, Va., Aug. 10, 2017 /PRNewswire/ -- Fornetix, LLC today announced the issuance of patent number 9,729,577 from the US Patent Office which covers breakthrough solutions for the management of encryption keys and other security objects. The inventors listed on the patent are Charles White, Joseph Brand, and Stephen Edwards.

"The issuance of this patent, the first of many to come, highlights the disruptive role Key Orchestration will play in the encryption key management market," said Steve Philson, Chief Operating Officer of Fornetix. "It's a great way to protect our Intellectual Property and identify how truly groundbreaking this solution can be for an organization's data security efforts."

The Key Orchestration ecosystem gives organizations a new level of control over their encryption by combining a powerful policy engine, scalability for hundreds of millions of keys, automation of the key lifecycle, and a commitment to interoperability, extensibility, and industry standards.

Instead of relying on outdated perimeter defenses that are ripe for data breaches, Key Orchestration has the critical combination of speed, capacity, and management tools that allow an enterprise to encrypt vastly more data than previously possible. When the entire network is encrypted, it leaves nothing of value for hackers to steal in the event of a breach.

"The award of this patent validates the hard work, innovation, and vision of the Fornetix Team," said Charles White, Chief Technology Officer of Fornetix and one of the creators of Key Orchestration. "As the first of many patents, this sets the stage for driving encryption key management to encompass everything from the data center to the individual. Ultimately, this patent helps validate the broader Orchestration ecosystem and its impact in delivering interoperability, agility, and resilience to our partners and our customers."

About Fornetix

Fornetix is helping organizations unleash the full potential of encryption by conquering the key management bottleneck. Our Key Orchestration ecosystem automates the key lifecycle across the entire enterprise with groundbreaking precision and speed. Policy-driven automation of the key rotation lifecycle reduces human error and empowers your organization to remain secure and avoid costly data breaches. As global use of encryption rapidly expands, you can be prepared for the future with unparalleled scalability. Please call 1-844-KEY-ORCH or visit http://www.fornetix.comfor more information.

View original content with multimedia:http://www.prnewswire.com/news-releases/fornetix-awarded-patent-for-breakthroughs-in-encryption-key-management-300502661.html

SOURCE Fornetix

Read this article:
Fornetix Awarded Patent for Breakthroughs in Encryption Key Management - Markets Insider

Coinbase Becomes First Bitcoin ‘Unicorn’ – Fortune

A Bitcoin company has finally attained the "unicorn" title, an honorific bestowed upon startups valued at more than $1 billion.

Coinbase , a brokerage that established itself as one of the biggest brands in a now-booming cryptocurrency market , has raised $100 million at a private valuation of $1.6 billion that includes the capital raised, the company tells Fortune. The venture capital firm Institutional Venture Partners led the round with participation by Spark Capital, Greylock Partners, Battery Ventures, Section 32, and Draper Associates.

Coinbase had for months been rumored to be raising around $100 million at a valuation of $1 billion or more, as the Wall Street Journal reported in June. That deal, its fourth, is now final.

In previous rounds, Coinbase had raised a total of $117 million at a private valuation approaching $500 million, as Fortune reported . That sum already made it one of the most well financed Bitcoin ventures around, next to Circle and 21.

Get Data Sheet , Fortunes technology newsletter

Coinbase has been riding a wave of interest in cryptocurrencies in recent months. Virtual currency prices exploded this year with the resurgence of Bitcoin now trading at more than $3,400 per Bitcoin, well above its previous 2013 highs in the $900 rangeas well as the ascent of Ethereum , a rival cryptocurrency network that, for one thing, allows people mint and sell their own digital tokens .

Overall, the total market value for cryptocurrencies and tokens combined has soared to more than $120 billion from just under $20 billion at the beginning of the year. This exuberance has led many industry watchers to warn of a possible bubble .

Founded in 2012, Coinbase started as a Bitcoin wallet service that helped customers stash their digital wealth. The company later moved into the brokerage space, opening online exchanges where traders can swap or sell crypto coins.

This year has been a banner year for Coinbase. According to the company, it has facilitated the exchange of more than $25 billion in digital currency to date, five times more than the total sum it processed from its founding through the end of last year.

On Wednesday, Fidelity Investments, the asset manager, added the ability for customers to view the cryptocurrency holdings in their Coinbase accounts on its own website.

During the recent Bitcoin blockchain fork in which a faction of the network broke off and created a new currency, Bitcoin Cash, some customers blasted Coinbase for saying it did not intend immediately to support the new money. Eventually, Coinbase reversed course and agreed to allow users to access their potential Bitcoin Cash holdings at the start of next year.

Coinbase has also been battling an IRS inquiry in recent months that seeks information about cryptocurrency buyers and sellers for tax purposes. The agency most recently said it would exempt people from the probe who transacted less than $20,000 in digital currency.

These hiccups haven't slowed the company's pace. Coinbase said it would put the newly raised money toward bolstering its engineering and customer support teams, opening a New York office for its professional trading operations, and continuing to develop Toshi, an Ethereum-based messaging and wallet app that it debuted last year.

Coinbase isn't the only recent benefactor from crypto mania that has lately gripped the world. GV, the venture capital arm of Alphabet , formerly known as Google Ventures, recently led a $40 million funding round for Blockchain , a cryptocurrency wallet provider based in London. Other investment firms like Andreessen Horowitz, Union Square Ventures, and Sequoia have been backing so-called crypto hedge funds, like Polychain Capital and Metastable , that invest in digital tokens and cryptocurrencies too.

Continued here:
Coinbase Becomes First Bitcoin 'Unicorn' - Fortune

At last, a kosher cryptocurrency: BitCoen The Register – The Register

Viacheslav Semenchuk, a Russian entrepreneur, has just launched a cryptocurrency for Jews.

Similar in concept to Bitcoin, it is called BitCoen, "the first Kosher cryptocurrency," as described on the company's Russian website. In the US, Coen and its variant Cohen are common surnames in the Jewish community; in Hebrew, they mean priest.

Semenchuk, according to RT, has invested $500,000 in the project and hopes to raise as much as $20m through an initial coin offering that aims to sell 100m worth of BitCoen digital tokens to investors.

With that much market capitalization, BitCoen would rank at about 115th among the more than 1,000 cryptocurrencies tracked by coinmarketcap.com. Bitcoin's current market cap is about $55bn.

The company began a pre-sale through its website on Wednesday, offering 300,000 BitCoen (under the abbreviation BEN) at a price of $0.75 per token. It expects to launch a wider offering in October.

"Our team came to the conclusion that the Jewish community is the world's only community within the framework of which a full-fledged and self-sufficient cryptocurrency can be created and recognized by the whole community," said Angelika Sheshunova, COO of BitCoen, in an email to The Register.

"We expect that the cryptocurrency will cover all Jewish communities around the world. And the main guarantor of stability here is that the keys from the management of the cryptocurrency will be in the hands of the most respected members of the community."

Sheshunova said there's no way to guarantee that only members of the Jewish community will use BitCoen. "However, the functionality of the system and the inherent features are most appealing to the members of the Jewish community," she said.

Said features include a plan to give 10 per cent of released coins to Jewish organizations as "tzedakah," or charity, and governance by a six-person community council.

Sheshunova explained, "Important decisions in the system are made by the 'council of six.' Each of them is well-respected in the Jewish community, and will represent their preferred course [in] business, politics, finance, technology, public service, [and] culture."

BitCoen will be "a completely new blockchain with its own architecture, its own security and special functionality," according an emailed quote that Sheshunova attributed to Andrei Nedobyolsky, CTO of the project.

That name returned no results in Google, Bing, or Yandex. The Register asked if BitCoen could provide more details about Nedobyolsky's technical qualifications, but has not heard back.

According to Sheshunova, BitCoen plans to make some of its code available, eventually. "In accordance with the ideology of blockchain, we plan to share some of the code that is critical for system users, with requirement specifications of security, transparency and functionality," she said. "However, this will be done after the launch of the main elements of the system."

BitCoen's lack of technical clarity appears to be matched by its muddled public communication. On Wednesday, the firm published a post in Russian on Medium to dispel what it characterized as a fiction about its project.

The post states that BitCoen is still negotiating with the Chief Rabbi of Russia (there are apparently two at present) and Jewish community leaders about potential involvement with the project. It also suggests that the currency will be controlled by those participating in the community and not just Jews.

"All media statements that 'the currency is controlled by the Jews' we consider unconcrete and far-fetched in order to increase the readability and popularity of articles and materials, where these statements are applied," the post says, as rendered by Google Translate.

Sponsored: The Joy and Pain of Buying IT - Have Your Say

Continue reading here:
At last, a kosher cryptocurrency: BitCoen The Register - The Register